Automatic monitor github cve using Github Actions
Last generated: 2024-11-15 02:21:57.068631
CVE | Name | Description | Date |
---|---|---|---|
CVE-2024-9821 | RandomRobbieBF/CVE-2024-9821 | Bot for Telegram on WooCommerce <= 1.2.4 - Authenticated (Subscriber+) Telegram Bot Token Disclosure to Authentication Bypass | 2024-10-11T15:35:39Z |
CVE-2024-9707 | RandomRobbieBF/CVE-2024-9707 | Hunk Companion <= 1.8.4 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation/Activation | 2024-10-11T06:21:38Z |
CVE-2024-9680 | tdonaworth/Firefox-CVE-2024-9680 | no description | 2024-10-17T16:10:38Z |
CVE-2024-9593 | RandomRobbieBF/CVE-2024-9593 | Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution | 2024-10-18T09:11:03Z |
CVE-2024-9570 | dylvie/CVE-2024-9570_D-Link-DIR-619L-bof | Exploit for CVE-2024-9570 | 2024-10-11T16:05:06Z |
CVE-2024-9465 | mustafaakalin/CVE-2024-9465 | Checkpoint SQL Injection via Time-Based Attack (CVE-2024-9465) | 2024-10-10T08:23:31Z |
CVE-2024-9465 | horizon3ai/CVE-2024-9465 | Proof of Concept Exploit for CVE-2024-9465 | 2024-10-09T16:22:05Z |
CVE-2024-9464 | horizon3ai/CVE-2024-9464 | Proof of Concept Exploit for CVE-2024-9464 | 2024-10-09T16:36:25Z |
CVE-2024-9441 | adhikara13/CVE-2024-9441 | Nortek Linear eMerge E3 Pre-Auth RCE PoC (CVE-2024-9441) | 2024-10-03T11:28:46Z |
CVE-2024-9441 | p33d/CVE-2024-9441 | no description | 2024-10-10T21:29:08Z |
CVE-2024-9234 | RandomRobbieBF/CVE-2024-9234 | GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload | 2024-10-17T18:48:12Z |
CVE-2024-9224 | RandomRobbieBF/CVE-2024-9224 | Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read | 2024-10-11T09:17:20Z |
CVE-2024-9166 | Andrysqui/CVE-2024-9166 | A vulnerability scanner that searches for the CVE-2024-9166 vulnerability on websites, more info about this vulnerability here: https://www.tenable.com/cve/CVE-2024-9166 | 2024-09-26T23:21:06Z |
CVE-2024-9106 | RandomRobbieBF/CVE-2024-9106 | Wechat Social login <= 1.3.0 - Authentication Bypass | 2024-10-01T10:28:08Z |
CVE-2024-9061 | RandomRobbieBF/CVE-2024-9061 | WP Popup Builder – Popup Forms and Marketing Lead Generation <= 1.3.5 - Unauthenticated Arbitrary Shortcode Execution via wp_ajax_nopriv_shortcode_Api_Add | 2024-10-16T07:57:48Z |
CVE-2024-9014 | EQSTLab/CVE-2024-9014 | Proof-of-Concept for CVE-2024-9014 | 2024-09-26T10:34:34Z |
CVE-2024-8949 | fa-rrel/CVE-2024-8949-POC | SourceCodester Online Eyewear Shop Remote File Inclusion Vulnerability | 2024-09-28T15:58:54Z |
CVE-2024-8752 | D3anSPGDMS/CVE-2024-8752 | poc of cve-2024-8752(WebIQ 2.15.9) | 2024-09-19T02:20:48Z |
CVE-2024-8698 | huydoppaz/CVE-2024-8698-POC | i'm noob with saml and keycloak . J4f | 2024-10-10T11:50:07Z |
CVE-2024-8529 | RandomRobbieBF/CVE-2024-8529 | LearnPress – WordPress LMS Plugin <= 4.2.7 - Unauthenticated SQL Injection via 'c_fields' | 2024-10-12T20:52:32Z |
CVE-2024-8522 | Avento/CVE-2024-8522 | LearnPress – WordPress LMS Plugin <= 4.2.7 - Unauthenticated SQL Injection via 'c_only_fields' | 2024-09-19T07:04:12Z |
CVE-2024-8517 | Chocapikk/CVE-2024-8517 | SPIP BigUp Plugin Unauthenticated RCE | 2024-09-06T18:17:18Z |
CVE-2024-8504 | Chocapikk/CVE-2024-8504 | VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504) | 2024-09-14T06:27:11Z |
CVE-2024-8504 | havokzero/ViciDial | CVE-2024-8504 | 2024-09-22T20:17:10Z |
CVE-2024-8484 | RandomRobbieBF/CVE-2024-8484 | REST API TO MiniProgram <= 4.7.1 - Unauthenticated SQL Injection | 2024-09-24T13:46:02Z |
CVE-2024-8353 | EQSTLab/CVE-2024-8353 | Proof-of-Concept for CVE-2024-8353 | 2024-09-30T17:33:59Z |
CVE-2024-8349 | karlemilnikka/CVE-2024-8349-and-CVE-2024-8350 | Authenticated Privilege Escalation to Admin exploiting Uncanny Groups for LearnDash. | 2024-09-17T13:44:04Z |
CVE-2024-8277 | PolatBey/CVE-2024-8277 | CVE-2024-8277 - 0Day Auto Exploit Authentication Bypass in WooCommerce Photo Reviews Plugin | 2024-09-12T14:40:59Z |
CVE-2024-8275 | p33d/CVE-2024-8275 | no description | 2024-09-26T07:16:21Z |
CVE-2024-8190 | horizon3ai/CVE-2024-8190 | CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection | 2024-09-16T15:33:46Z |
CVE-2024-8190 | tequilasunsh1ne/ivanti_CVE_2024_8190 | no description | 2024-10-08T09:35:01Z |
CVE-2024-8030 | codeb0ss/CVE-2024-8030-PoC | CVE-2024-8030 < GiveWP - Donation Plugin and Fundraising Platform Unauthenticated PHP Object Injection to Remote Code Execution [Exploit] | 2024-08-27T21:05:44Z |
CVE-2024-7965 | bi-zone/CVE-2024-7965 | This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64. | 2024-09-16T19:04:57Z |
CVE-2024-7954 | Chocapikk/CVE-2024-7954 | Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 | 2024-08-10T20:15:41Z |
CVE-2024-7954 | bigb0x/CVE-2024-7954 | This exploit will attempt to execute system commands on SPIP targets. | 2024-08-28T14:54:56Z |
CVE-2024-7954 | fa-rrel/CVE-2024-7954-RCE | Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 | 2024-09-01T10:59:45Z |
CVE-2024-7954 | TheCyberguy-17/RCE_CVE-2024-7954 | no description | 2024-09-23T16:11:20Z |
CVE-2024-7954 | MuhammadWaseem29/RCE-CVE-2024-7954 | no description | 2024-10-05T07:24:57Z |
CVE-2024-7928 | bigb0x/CVE-2024-7928 | Will attempt to retrieve DB details for FastAdmin instances | 2024-08-20T03:09:47Z |
CVE-2024-7928 | fa-rrel/CVE-2024-7928 | CVE-2024-7928 fastadmin vulnerability POC & Scanning | 2024-08-20T12:15:48Z |
CVE-2024-7928 | th3gokul/CVE-2024-7928 | CVE-2024-7928: FastAdmin < V1.3.4.20220530 Arbitrary File Reading Vulnerability | 2024-08-23T15:50:30Z |
CVE-2024-7928 | wh6amiGit/CVE-2024-7928 | CVE-2024-7928 FastAdmin < V1.3.4.20220530 exploit | 2024-08-22T14:39:13Z |
CVE-2024-7856 | l8BL/CVE-2024-7856 | Proof-of-Concept for CVE-2024-7856 | 2024-09-09T08:34:09Z |
CVE-2024-7854 | RandomRobbieBF/CVE-2024-7854 | Woo Inquiry <= 0.1 - Unauthenticated SQL Injection | 2024-10-04T14:59:36Z |
CVE-2024-7703 | lfillaz/CVE-2024-7703 | This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, leading to Stored XSS attacks. This can result in executing scripts when the file is accessed, potentially compromising user sessions or data. | 2024-08-17T14:44:08Z |
CVE-2024-7646 | r0binak/CVE-2024-7646 | PoC CVE-2024-7646 | 2024-08-29T19:10:08Z |
CVE-2024-7646 | dovics/cve-2024-7646 | PoC CVE-2024-7646 | 2024-09-25T11:13:07Z |
CVE-2024-7593 | codeb0ss/CVE-2024-7593-PoC | CVE-2024-7593 < Ivanti vTM [Authentication Bypass] | 2024-08-26T11:03:00Z |
CVE-2024-7593 | rxerium/CVE-2024-7593 | Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel. | 2024-08-28T10:02:05Z |
CVE-2024-7593 | D3N14LD15K/CVE-2024-7593_PoC_Exploit | CVE-2024-7593 Ivanti Virtual Traffic Manager 22.2R1 / 22.7R2 Admin Panel Authentication Bypass PoC [EXPLOIT] | 2024-09-24T22:24:35Z |
CVE-2024-7593 | skyrowalker/CVE-2024-7593 | no description | 2024-10-12T02:17:14Z |
CVE-2024-7514 | RandomRobbieBF/CVE-2024-7514 | WordPress Comments Import & Export <= 2.3.7 - Authenticated (Author+) Arbitrary File Read via Directory Traversal | 2024-10-11T10:43:22Z |
CVE-2024-7479 | PeterGabaldon/CVE-2024-7479_CVE-2024-7481 | TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006. | 2024-09-29T10:58:15Z |
CVE-2024-7339 | RevoltSecurities/CVE-2024-7339 | An Vulnerability detection and Exploitation tool for CVE-2024-7339 | 2024-08-05T16:26:18Z |
CVE-2024-7313 | Wayne-Ker/CVE-2024-7313 | Custom Proof-of-Concept on XSS to Unauthorized Admin Account Creation via WordPress Plugin Shield Security < 20.0.6 | 2024-08-16T01:01:57Z |
CVE-2024-7188 | codeb0ss/CVE-2024-7188-PoC | Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection | 2024-07-30T10:51:24Z |
CVE-2024-7135 | RandomRobbieBF/CVE-2024-7135 | Tainacan <= 0.21.7 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Read | 2024-10-11T10:56:59Z |
CVE-2024-7120 | codeb0ss/CVE-2024-7120-PoC | Mass Exploit < [CVE-2024-7120 - Raisecom] - Command Injection | 2024-08-01T17:39:45Z |
CVE-2024-7120 | fa-rrel/CVE-2024-7120 | 2024-08-30T15:50:50Z | |
CVE-2024-7094 | nastar-id/CVE-2024-7094 | CVE-2024-7094 Vulnerability checker | 2024-08-18T09:27:54Z |
CVE-2024-7029 | bigherocenter/CVE-2024-7029-EXPLOIT | no description | 2024-08-30T07:58:27Z |
CVE-2024-7029 | ebrasha/CVE-2024-7029 | A PoC tool for exploiting CVE-2024-7029 in AvTech devices, enabling RCE, vulnerability scanning, and an interactive shell. | 2024-09-02T10:16:49Z |
CVE-2024-7029 | geniuszlyy/CVE-2024-7029 | A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE) | 2024-10-08T10:04:08Z |
CVE-2024-6893 | codeb0ss/CVE-2024-6893-PoC | Mass Exploit < [CVE-2024-6893/CWE-611 - Journyx] - XML External Entities Injection (XXE) Exploit | 2024-08-17T22:47:45Z |
CVE-2024-6782 | zangjiahe/CVE-2024-6782 | Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. | 2024-08-06T15:31:48Z |
CVE-2024-6782 | jdpsl/CVE-2024-6782 | Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. | 2024-08-09T06:25:03Z |
CVE-2024-6782 | R4idB0Y/CVE-2024-6782-PoC | Unauthenticated remote code execution via Calibre’s content server in Calibre <= 7.14.0. | 2024-09-15T18:45:44Z |
CVE-2024-6778 | ading2210/CVE-2024-6778-POC | A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. | 2024-09-10T06:27:59Z |
CVE-2024-6769 | fortra/CVE-2024-6769 | Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) | 2024-08-29T16:40:49Z |
CVE-2024-6768 | fortra/CVE-2024-6768 | no description | 2024-07-18T07:52:46Z |
CVE-2024-6704 | codeb0ss/CVE-2024-6704 | CVE-2024-6704 - [Wordpress wpDiscuz_Plugin] < Unauthenticated HTML Injection Exploiter | 2024-08-03T22:33:57Z |
CVE-2024-6694 | codeb0ss/CVE-2024-6694-PoC | CVE-2024-6694 - WP Mail SMTP < SMTP Password Exposure (Exploiter) | 2024-07-21T21:41:02Z |
CVE-2024-6670 | sinsinology/CVE-2024-6670 | no description | 2024-08-30T17:13:14Z |
CVE-2024-6666 | labc-dev/CVE-2024-6666 | no description | 2024-07-23T09:37:20Z |
CVE-2024-6624 | RandomRobbieBF/CVE-2024-6624 | JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation | 2024-09-10T12:08:55Z |
CVE-2024-6592 | RedTeamPentesting/watchguard-sso-client | Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594) | 2024-09-17T14:01:10Z |
CVE-2024-6536 | apena-ba/CVE-2024-6536 | no description | 2024-07-31T14:31:56Z |
CVE-2024-6529 | Abdurahmon3236/CVE-2024-6529 | no description | 2024-08-02T20:02:39Z |
CVE-2024-65230 | CBaekhyunC/cve-2024-65230 | no description | 2024-01-23T10:16:43Z |
CVE-2024-6387 | FerasAlrimali/CVE-2024-6387-POC | SSHd cve-2024-6387-poc | 2024-07-01T13:38:47Z |
CVE-2024-6387 | getdrive/CVE-2024-6387-PoC | no description | 2024-07-01T12:51:18Z |
CVE-2024-6387 | shyrwall/cve-2024-6387-poc | no description | 2024-07-01T12:48:36Z |
CVE-2024-6387 | acrono/cve-2024-6387-poc | 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc | 2024-07-01T12:16:21Z |
CVE-2024-6387 | zgzhang/cve-2024-6387-poc | a signal handler race condition in OpenSSH's server (sshd) | 2024-07-01T10:55:29Z |
CVE-2024-6387 | lflare/cve-2024-6387-poc | 32-bit PoC for CVE-2024-6387 "regreSSHion" -- mirror of the original 7etsuo/cve-2024-6387-poc | 2024-07-01T12:26:40Z |
CVE-2024-6387 | passwa11/cve-2024-6387-poc | no description | 2024-07-01T14:08:23Z |
CVE-2024-6387 | 3yujw7njai/CVE-2024-6387 | SSH RCE PoC CVE-2024-6387 | 2024-07-02T01:08:05Z |
CVE-2024-6387 | kuffsit/check_cve_2024_6387 | no description | 2024-07-01T16:38:15Z |
CVE-2024-6387 | jack0we/CVE-2024-6387 | no description | 2024-07-01T18:28:25Z |
CVE-2024-6387 | TAM-K592/CVE-2024-6387 | Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications. | 2024-07-02T02:51:37Z |
CVE-2024-6387 | teamos-hub/regreSSHion | This is a POC I wrote for CVE-2024-6387 | 2024-07-02T02:54:05Z |
CVE-2024-6387 | muyuanlove/CVE-2024-6387fixshell | no description | 2024-07-02T02:35:24Z |
CVE-2024-6387 | zgimszhd61/cve-2024-6387-poc | no description | 2024-07-02T01:39:10Z |
CVE-2024-6387 | betancour/OpenSSH-Vulnerability-test | OpenSSH CVE-2024-6387 Vulnerability Checker | 2024-07-02T01:24:04Z |
CVE-2024-6387 | oliferFord/CVE-2024-6387-SSH-RCE | no description | 2024-07-02T06:54:54Z |
CVE-2024-6387 | HadesNull123/CVE-2024-6387_Check | RCE OpenSSH CVE-2024-6387 Check | 2024-07-02T05:21:29Z |
CVE-2024-6387 | thegenetic/CVE-2024-6387-exploit | CVE-2024-6387 exploit | 2024-07-02T04:09:44Z |
CVE-2024-6387 | Mufti22/CVE-2024-6387-checkher | no description | 2024-07-02T03:48:37Z |
CVE-2024-6387 | ahlfors/CVE-2024-6387 | no description | 2024-07-02T03:42:35Z |
CVE-2024-6387 | PrincipalAnthony/CVE-2024-6387-Updated-x64bit | Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in | 2024-07-02T09:45:04Z |
CVE-2024-6387 | Maikefee/CVE-2024-6387_Check.py | no description | 2024-07-02T03:27:03Z |
CVE-2024-6387 | CiderAndWhisky/regression-scanner | Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https://github.com/bigb0x/CVE-2024-6387 using ChatGPT to translate the code to PHP. | 2024-07-02T07:42:46Z |
CVE-2024-6387 | R4Tw1z/CVE-2024-6387 | This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently. | 2024-07-02T06:40:09Z |
CVE-2024-6387 | shamo0/CVE-2024-6387_PoC | Script for checking CVE-2024-6387 (regreSSHion) | 2024-07-02T08:13:23Z |
CVE-2024-6387 | paradessia/CVE-2024-6387-nmap | CVE-2024-6387-nmap | 2024-07-02T08:19:55Z |
CVE-2024-6387 | DanWiseProgramming/CVE-2024-6387-Mitigation-Ansible-Playbook | An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version. | 2024-07-02T10:34:17Z |
CVE-2024-6387 | SecWithMoh/CVE-2024-6387 | This Go program scans targets for CVE-2024-6387 in OpenSSH, categorizing servers by vulnerability status and port availability. | 2024-07-02T09:41:40Z |
CVE-2024-6387 | ACHUX21/checker-CVE-2024-6387 | no description | 2024-07-02T12:48:27Z |
CVE-2024-6387 | hssmo/cve-2024-6387_AImade | cve-2024-6387_AImade | 2024-07-02T12:24:25Z |
CVE-2024-6387 | rumochnaya/openssh-cve-2024-6387.sh | openssh-cve-2024-6387.sh | 2024-07-02T11:05:07Z |
CVE-2024-6387 | zenzue/CVE-2024-6387-Mitigation | Mitigation Guide for CVE-2024-6387 in OpenSSH | 2024-07-02T11:08:40Z |
CVE-2024-6387 | edsonjt81/CVE-2024-6387_Check | no description | 2024-07-02T20:35:53Z |
CVE-2024-6387 | RickGeex/CVE-2024-6387-Checker | CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH. | 2024-07-02T18:46:24Z |
CVE-2024-6387 | BrandonLynch2402/cve-2024-6387-nuclei-template | no description | 2024-07-02T20:19:12Z |
CVE-2024-6387 | xonoxitron/regreSSHion-checker | Quickly identifies servers vulnerable to OpenSSH 'regreSSHion' (CVE-2024-6387). | 2024-07-02T18:59:54Z |
CVE-2024-6387 | n1cks0n/Test_CVE-2024-6387 | Test_CVE-2024-6387 is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH | 2024-07-02T18:30:28Z |
CVE-2024-6387 | th3gokul/CVE-2024-6387 | CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server | 2024-07-02T17:04:52Z |
CVE-2024-6387 | MrR0b0t19/CVE-2024-6387-Exploit-POC | no description | 2024-07-02T16:34:12Z |
CVE-2024-6387 | xonoxitron/regreSSHion | CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems. | 2024-07-02T14:41:43Z |
CVE-2024-6387 | dawnl3ss/CVE-2024-6387 | no description | 2024-07-02T15:13:33Z |
CVE-2024-6387 | no-one-sec/CVE-2024-6387 | 开箱即用的AK47 | 2024-07-02T15:13:09Z |
CVE-2024-6387 | xristos8574/regreSSHion-nmap-scanner | A bash script for nmap to scan for vulnerable machines in regards to the latest CVE-2024-6387 | 2024-07-02T13:50:47Z |
CVE-2024-6387 | k4t3pr0/CVE-2024-6387-POC | no description | 2024-07-02T10:05:43Z |
CVE-2024-6387 | grupooruss/CVE-2024-6387 | regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script | 2024-07-02T21:16:45Z |
CVE-2024-6387 | t3rry327/cve-2024-6387-poc | no description | 2024-07-03T13:21:10Z |
CVE-2024-6387 | CognisysGroup/CVE-2024-6387-Checker | no description | 2024-07-02T21:47:02Z |
CVE-2024-6387 | sxlmnwb/CVE-2024-6387 | Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems. | 2024-07-03T06:08:32Z |
CVE-2024-6387 | JackSparrowhk/ssh-CVE-2024-6387-poc | CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器,专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全。 | 2024-07-04T03:51:16Z |
CVE-2024-6387 | AiGptCode/ssh_exploiter_CVE-2024-6387 | CVE-2024-6387 with auto ip scanner and auto expliot | 2024-07-02T12:57:35Z |
CVE-2024-6387 | sms2056/CVE-2024-6387 | no description | 2024-07-04T06:10:56Z |
CVE-2024-6387 | turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker | Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows. | 2024-07-04T03:56:08Z |
CVE-2024-6387 | Symbolexe/CVE-2024-6387 | SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems | 2024-07-03T08:22:57Z |
CVE-2024-6387 | 4lxprime/regreSSHive | rewrited SSH Exploit for CVE-2024-6387 (regreSSHion) | 2024-07-04T14:34:21Z |
CVE-2024-6387 | lala-amber/CVE-2024-6387 | no description | 2024-07-04T13:28:53Z |
CVE-2024-6387 | d0rb/CVE-2024-6387 | This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH. | 2024-07-02T06:53:35Z |
CVE-2024-6387 | SiberianHacker/CVE-2024-6387-Finder | CVE-2024-6387 SSH finder | 2024-07-05T15:15:41Z |
CVE-2024-6387 | l0n3m4n/CVE-2024-6387 | PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) | 2024-07-02T18:32:46Z |
CVE-2024-6387 | imv7/CVE-2024-6387 | no description | 2024-07-05T11:18:38Z |
CVE-2024-6387 | 0x4D31/cve-2024-6387_hassh | HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion). | 2024-07-05T02:46:57Z |
CVE-2024-6387 | invaderslabs/regreSSHion-CVE-2024-6387- | Provides instructions for using the script to check if your OpenSSH installation is vulnerable to CVE-2024-6387 | 2024-07-04T13:15:54Z |
CVE-2024-6387 | sardine-web/CVE-2024-6387_Check | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | 2024-07-04T21:20:26Z |
CVE-2024-6387 | bigb0x/CVE-2024-6387 | Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others. | 2024-07-01T20:45:53Z |
CVE-2024-6387 | azurejoga/CVE-2024-6387-how-to-fix | Vulnerability remediation and mitigationCVE-2024-6387 | 2024-07-05T21:29:11Z |
CVE-2024-6387 | dgicloud/patch_regreSSHion | Correção e Atualização do OpenSSH para CVE-2024-6387 | 2024-07-05T16:59:19Z |
CVE-2024-6387 | sardine-web/CVE-2024-6387-template | Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387 | 2024-07-05T11:05:26Z |
CVE-2024-6387 | devarshishimpi/CVE-2024-6387-Check | CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure. | 2024-07-02T11:55:39Z |
CVE-2024-6387 | asterictnl-lvdw/CVE-2024-6387 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) | 2024-07-08T11:27:49Z |
CVE-2024-6387 | vkaushik-chef/regreSSHion | Chef Inspec profile for checking regreSSHion vulnerability CVE-2024-6387 | 2024-07-08T11:48:15Z |
CVE-2024-6387 | harshinsecurity/sentinelssh | SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments. | 2024-07-03T10:26:23Z |
CVE-2024-6387 | jocker2410/CVE-2024-6387_poc | no description | 2024-07-03T15:51:16Z |
CVE-2024-6387 | dgourillon/mitigate-CVE-2024-6387 | no description | 2024-07-09T12:16:44Z |
CVE-2024-6387 | mrmtwoj/CVE-2024-6387 | no description | 2024-07-09T14:06:02Z |
CVE-2024-6387 | kubota/CVE-2024-6387-Vulnerability-Checker | This Rust Code is designed to check SSH servers for the CVE-2024-6387 vulnerability | 2024-07-09T21:01:15Z |
CVE-2024-6387 | filipi86/CVE-2024-6387-Vulnerability-Checker | This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file. | 2024-07-09T17:40:19Z |
CVE-2024-6387 | DimaMend/cve-2024-6387-poc | no description | 2024-07-10T13:27:23Z |
CVE-2024-6387 | k4t3pr0/CVE-2024-6387-Check | Lỗ hổng thực thi mã không được xác thực từ xa trong máy chủ OpenSSH | 2024-07-12T03:28:41Z |
CVE-2024-6387 | Passyed/regreSSHion-Fix | Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian | 2024-07-11T23:22:14Z |
CVE-2024-6387 | Sibijo/mitigate_ssh | OpenSSH vulnerability CVE-2024-6387 | 2024-07-11T16:54:41Z |
CVE-2024-6387 | ThemeHackers/CVE-2024-6387 | CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH. | 2024-07-11T14:37:17Z |
CVE-2024-6387 | liqhtnd/sshd-logingracetime0 | Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd. | 2024-07-04T01:02:34Z |
CVE-2024-6387 | Jhonsonwannaa/CVE-2024-6387 | OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'exécuter du code arbitraire | 2024-07-14T18:00:49Z |
CVE-2024-6387 | xaitax/CVE-2024-6387_Check | CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH | 2024-07-01T20:33:20Z |
CVE-2024-6387 | ThatNotEasy/CVE-2024-6387 | OpenSSH RCE Massive Vulnerable Scanner | 2024-07-15T16:04:57Z |
CVE-2024-6387 | wiggels/regresshion-check | CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387 | 2024-07-01T22:53:32Z |
CVE-2024-6387 | prelearn-code/CVE-2024-6387 | no description | 2024-07-25T02:32:19Z |
CVE-2024-6387 | alex14324/ssh_poc2024 | An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server | 2024-07-31T14:19:19Z |
CVE-2024-6387 | almogopp/OpenSSH-CVE-2024-6387-Fix | A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workaround. This repository helps secure systems against potential remote code execution risks associated with affected OpenSSH versions. | 2024-08-20T09:57:24Z |
CVE-2024-6387 | s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH | no description | 2024-08-19T16:45:53Z |
CVE-2024-6387 | HadesNull123/CVE-2024-6387_Check | RCE OpenSSH CVE-2024-6387 Check and Exploit | 2024-08-26T04:40:27Z |
CVE-2024-6387 | identity-threat-labs/Article-RegreSSHion-CVE-2024-6387 | In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named "regreSSHion," this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems. | 2024-08-29T15:00:56Z |
CVE-2024-6387 | identity-threat-labs/CVE-2024-6387-Vulnerability-Checker | This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file. | 2024-08-28T13:28:08Z |
CVE-2024-6387 | l-urk/CVE-2024-6387 | Proof of concept python script for regreSSHion exploit. | 2024-07-30T06:13:11Z |
CVE-2024-6386 | argendo/CVE-2024-6386 | Research and PoC for CVE-2024-6386 | 2024-09-05T14:44:36Z |
CVE-2024-6366 | Abdurahmon3236/CVE-2024-6366 | no description | 2024-08-03T10:30:49Z |
CVE-2024-6239 | Sharkkcode/CVE_2024_6239_slide | CVE_2024_6239_slide | 2024-08-30T16:23:16Z |
CVE-2024-6222 | Florian-Hoth/CVE-2024-6222 | Docker Extension/Dashboard RCE Vulnerability | 2024-08-06T18:20:46Z |
CVE-2024-6205 | j3r1ch0123/CVE-2024-6205 | This is a python written PoC of a recent vulnerability in a wordpress plugin. More information on that here | 2024-07-21T04:59:31Z |
CVE-2024-6095 | Abdurahmon3236/-CVE-2024-6095 | no description | 2024-09-01T13:12:20Z |
CVE-2024-6050 | kac89/CVE-2024-6050 | Reflected XSS in SOWA OPAC | 2024-07-01T14:31:37Z |
CVE-2024-6043 | lfillaz/CVE-2024-6043 | This Python tool exploits the CVE-2024-6043 vulnerability, which affects the SourceCodester Best House Rental Management System 1.0. The vulnerability allows remote attackers to perform SQL Injection via the admin_class.php file, specifically targeting the username parameter |
2024-08-17T20:30:28Z |
CVE-2024-6028 | truonghuuphuc/CVE-2024-6028-Poc | CVE-2024-6028 Quiz Maker <= 6.5.8.3 - Unauthenticated SQL Injection via 'ays_questions' Parameter | 2024-06-25T13:55:27Z |
CVE-2024-5961 | kac89/CVE-2024-5961 | Reflected XSS in 2ClickPortal | 2024-07-01T11:17:48Z |
CVE-2024-5947 | Cappricio-Securities/CVE-2024-5947 | Deep Sea Electronics DSE855 - Authentication Bypass | 2024-07-07T14:03:49Z |
CVE-2024-5932 | 0xb0mb3r/CVE-2024-5932-PoC | Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection | 2024-08-21T09:51:21Z |
CVE-2024-5932 | EQSTLab/CVE-2024-5932 | Proof-of-Concept for CVE-2024-5932 | 2024-08-25T11:51:36Z |
CVE-2024-5932 | OxLmahdi/cve-2024-5932 | no description | 2024-10-11T08:12:38Z |
CVE-2024-5806 | watchtowrlabs/watchTowr-vs-progress-moveit_CVE-2024-5806 | Exploit for the CVE-2024-5806 | 2024-06-24T16:28:35Z |
CVE-2024-5737 | afine-com/CVE-2024-5737 | AdmirorFrames Joomla! Extension < 5.0 - HTML Injection | 2024-06-28T10:27:35Z |
CVE-2024-5736 | afine-com/CVE-2024-5736 | AdmirorFrames Joomla! Extension < 5.0 - Server-Side Request Forgery | 2024-06-28T10:27:08Z |
CVE-2024-5735 | afine-com/CVE-2024-5735 | AdmirorFrames Joomla! Extension < 5.0 - Full Path Disclosure | 2024-06-28T10:15:17Z |
CVE-2024-56662 | nimosec/cve-2024-56662 | cve | 2024-08-13T02:37:41Z |
CVE-2024-5655 | VulnResearcher/CVE-2024-5655-Gitlab-CSRF-GraphQL | Private exploit CVE-2024-5655 to Gitlab (Private repositories disclosure) | 2024-07-03T08:52:48Z |
CVE-2024-5633 | Adikso/CVE-2024-5633 | PoC for CVE-2024-5633 | 2024-07-21T20:27:24Z |
CVE-2024-5522 | truonghuuphuc/CVE-2024-5522-Poc | CVE-2024-5522 HTML5 Video Player <= 2.5.26 - Unauthenticated SQL Injection | 2024-05-31T04:41:46Z |
CVE-2024-5522 | kryptonproject/CVE-2024-5522-PoC | no description | 2024-09-11T04:46:46Z |
CVE-2024-5522 | geniuszlyy/CVE-2024-5522 | A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites | 2024-10-01T16:02:12Z |
CVE-2024-5420 | K4yd0/CVE-2024-5420_XSS | no description | 2024-09-02T16:39:59Z |
CVE-2024-5420 | fa-rrel/CVE-2024-5420-XSS | SEH utnserver Pro/ProMAX / INU-100 20.1.22 - XSS | 2024-09-02T15:29:22Z |
CVE-2024-5356 | droyuu/Aj-Report-sql-CVE-2024-5356-POC | no description | 2024-09-12T03:02:20Z |
CVE-2024-5326 | truonghuuphuc/CVE-2024-5326-Poc | CVE-2024-5326 Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX <= 4.1.2 - Missing Authorization to Arbitrary Options Update | 2024-06-01T04:23:54Z |
CVE-2024-5326 | cve-2024/CVE-2024-5326-Poc | no description | 2024-06-14T07:12:29Z |
CVE-2024-5274 | Alchemist3dot14/CVE-2024-5274-Detection | Guardian Code: A Script to Uncover CVE-2024-5274 Vulnerabilities | 2024-07-10T02:15:56Z |
CVE-2024-5274 | mistymntncop/CVE-2024-5274 | no description | 2024-08-29T11:58:25Z |
CVE-2024-5246 | Abdurahmon3236/CVE-2024-5246 | no description | 2024-08-02T20:56:39Z |
CVE-2024-5084 | Chocapikk/CVE-2024-5084 | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | 2024-05-27T20:04:10Z |
CVE-2024-5084 | KTN1990/CVE-2024-5084 | WordPress Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | 2024-05-25T03:49:04Z |
CVE-2024-5084 | k3lpi3b4nsh33/CVE-2024-5084 | no description | 2024-06-06T03:25:44Z |
CVE-2024-5084 | WOOOOONG/CVE-2024-5084 | PoC Exploit for CVE-2024-5084 | 2024-07-03T04:24:43Z |
CVE-2024-5009 | sinsinology/CVE-2024-5009 | Exploit for CVE-2024-5009 | 2024-07-08T12:15:29Z |
CVE-2024-5009 | th3gokul/CVE-2024-5009 | CVE-2024-5009 : WhatsUp Gold SetAdminPassword Privilege Escalation | 2024-07-09T16:56:49Z |
CVE-2024-4956 | gmh5225/CVE-2024-4956 | Unauthenticated Path Traversal in Nexus Repository 3 | 2024-05-24T12:45:45Z |
CVE-2024-4956 | erickfernandox/CVE-2024-4956 | Unauthenticated Path Traversal in Nexus Repository 3 | 2024-05-23T11:39:06Z |
CVE-2024-4956 | codeb0ss/CVE-2024-4956-PoC | CVE-2024-4956 - Nexus < Exploit | 2024-05-23T16:46:28Z |
CVE-2024-4956 | xungzzz/CVE-2024-4956 | CVE-2024-4956 Nuclei Template | 2024-05-23T08:15:08Z |
CVE-2024-4956 | thinhap/CVE-2024-4956-PoC | no description | 2024-05-27T03:09:36Z |
CVE-2024-4956 | banditzCyber0x/CVE-2024-4956 | Nexus Repository Manager 3 Unauthenticated Path Traversal | 2024-05-23T06:47:13Z |
CVE-2024-4956 | eoslvs/CVE-2024-4956 | no description | 2024-05-27T13:48:15Z |
CVE-2024-4956 | ifconfig-me/CVE-2024-4956-Bulk-Scanner | [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner | 2024-05-26T06:50:48Z |
CVE-2024-4956 | GoatSecurity/CVE-2024-4956 | CVE-2024-4956 : Nexus Repository Manager 3 poc exploit | 2024-05-28T15:05:31Z |
CVE-2024-4956 | TypicalModMaker/CVE-2024-4956 | Proof-Of-Concept (POC) for CVE-2024-4956 | 2024-05-28T21:20:53Z |
CVE-2024-4956 | Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager | Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0 | 2024-05-30T08:04:27Z |
CVE-2024-4956 | verylazytech/CVE-2024-4956 | POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal | 2024-06-09T10:57:29Z |
CVE-2024-4956 | Cappricio-Securities/CVE-2024-4956 | Sonatype Nexus Repository Manager 3 (LFI) | 2024-06-03T02:49:20Z |
CVE-2024-4956 | fin3ss3g0d/CVE-2024-4956 | CVE-2024-4956 Python exploitation utility | 2024-06-05T15:37:39Z |
CVE-2024-4956 | JolyIrsb/CVE-2024-4956 | no description | 2024-08-14T16:41:01Z |
CVE-2024-4956 | UMASANKAR-MG/Path-Traversal-CVE-2024-4956 | no description | 2024-09-26T15:05:41Z |
CVE-2024-4956 | An00bRektn/shirocrack | Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956. | 2024-10-04T19:54:05Z |
CVE-2024-4898 | cve-2024/CVE-2024-4898-Poc | no description | 2024-06-14T07:01:58Z |
CVE-2024-4898 | truonghuuphuc/CVE-2024-4898-Poc | CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation | 2024-06-12T10:03:14Z |
CVE-2024-4885 | sinsinology/CVE-2024-4885 | Exploit for CVE-2024-4885 | 2024-07-08T12:14:42Z |
CVE-2024-4883 | sinsinology/CVE-2024-4883 | Exploit for CVE-2024-4883 | 2024-07-08T12:14:01Z |
CVE-2024-4879 | Brut-Security/CVE-2024-4879 | CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow | 2024-07-12T10:32:37Z |
CVE-2024-4879 | zgimszhd61/CVE-2024-4879 | no description | 2024-07-13T07:02:18Z |
CVE-2024-4879 | Mr-r00t11/CVE-2024-4879 | no description | 2024-07-12T21:43:48Z |
CVE-2024-4879 | bigb0x/CVE-2024-4879 | Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability | 2024-07-12T13:02:47Z |
CVE-2024-4879 | tequilasunsh1ne/CVE_2024_4879 | no description | 2024-07-15T02:51:34Z |
CVE-2024-4879 | Praison001/CVE-2024-4879-ServiceNow | Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releases | 2024-07-16T04:03:28Z |
CVE-2024-4879 | ShadowByte1/CVE-2024-4879 | no description | 2024-07-15T12:27:33Z |
CVE-2024-4879 | NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning | CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it. | 2024-07-28T06:51:33Z |
CVE-2024-4879 | jdusane/CVE-2024-4879 | Python script designed to detect specific vulnerabilities in ServiceNow instances and dump database connection details if the vulnerability is found. This tool is particularly useful for security researchers and penetration testers. | 2024-08-14T06:55:41Z |
CVE-2024-4879 | fa-rrel/CVE-2024-4879 | Jelly Template Injection Vulnerability in ServiceNow - POC CVE-2024-4879 | 2024-08-27T03:43:28Z |
CVE-2024-4879 | 0xWhoami35/CVE-2024-4879 | no description | 2024-09-13T01:20:34Z |
CVE-2024-4875 | RandomRobbieBF/CVE-2024-4875 | HT Mega – Absolute Addons For Elementor <= 2.5.2 - Missing Authorization to Options Update | 2024-05-21T14:15:16Z |
CVE-2024-48644 | rosembergpro/CVE-2024-48644 | Reolink Duo 2 WiFi v1.0.280 - Account Enumeration Vulnerability | 2024-10-17T23:27:04Z |
CVE-2024-4761 | michredteam/CVE-2024-4761 | High CVE-2024-4761 Exploit | 2024-05-14T17:45:22Z |
CVE-2024-47177 | referefref/cupspot-2024-47177 | PoC honeypot for detecting exploit attempts against CVE-2024-47177 | 2024-09-27T05:18:23Z |
CVE-2024-47176 | tonyarris/CVE-2024-47176-Scanner | Scanner for the CUPS vulnerability CVE-2024-47176 | 2024-09-27T20:04:21Z |
CVE-2024-47176 | workabhiwin09/CVE-2024-47176 | CUPS Browsd Check_CVE-2024-47176 | 2024-09-27T18:23:16Z |
CVE-2024-47176 | mr-r3b00t/CVE-2024-47176 | Scanner | 2024-09-28T16:02:41Z |
CVE-2024-47176 | nma-io/CVE-2024-47176 | A simple CVE-2024-47176 (cups_browsed) check tool written in go. | 2024-09-29T17:53:50Z |
CVE-2024-47176 | aytackalinci/CVE-2024-47176 | Vulnerability Scanner for CUPS: CVE-2024-47176 | 2024-09-28T19:01:31Z |
CVE-2024-47176 | l0n3m4n/CVE-2024-47176 | Unauthenticated RCE on cups-browsed (exploit and nuclei template) | 2024-10-03T15:53:04Z |
CVE-2024-47176 | gumerzzzindo/CVE-2024-47176 | no description | 2024-10-05T09:22:36Z |
CVE-2024-47176 | lkarlslund/jugular | Ultrafast CUPS-browsed scanner (CVE-2024-47176) | 2024-09-29T09:05:30Z |
CVE-2024-47176 | GO0dspeed/spill | POC scanner for CVE-2024-47176 | 2024-09-27T01:22:43Z |
CVE-2024-47176 | MalwareTech/CVE-2024-47176-Scanner | A simple scanner for identifying vulnerable cups-browsed instances on your network | 2024-10-07T07:25:18Z |
CVE-2024-47176 | AxthonyV/CVE-2024-47176 | This repository contains a scanner for detecting vulnerabilities in the cups-browsed service of CUPS (Common Unix Printing System). The vulnerability CVE-2024-47176 allows a remote attacker to exploit an insecure configuration of the daemon, potentially leading to arbitrary code execution. | 2024-10-07T16:14:37Z |
CVE-2024-47176 | gianlu111/CUPS-CVE-2024-47176 | A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). | 2024-10-17T18:21:10Z |
CVE-2024-47076 | mutkus/CVE-2024-47076 | Linux ve Unix sistemlerinizin CVE-2024-47076 açığından etkilenip etkilenmediğini bu script ile öğrenebilirsiniz. | 2024-09-29T15:13:58Z |
CVE-2024-47066 | l8BL/CVE-2024-47066 | Proof-of-Concept for CVE-2024-47066 | 2024-09-24T09:59:27Z |
CVE-2024-4701 | JoeBeeton/CVE-2024-4701-POC | POC for CVE-2024-4701 | 2024-05-13T11:58:19Z |
CVE-2024-46986 | vidura2/CVE-2024-46986 | no description | 2024-09-22T14:27:35Z |
CVE-2024-46901 | devhaozi/CVE-2024-46901 | Subversion CVE-2024-46901 PoC | 2024-10-11T13:28:55Z |
CVE-2024-46658 | jackalkarlos/CVE-2024-46658 | Syrotech SY-GOPON-8OLT-L3 v1.6.0_240629 | 2024-10-03T12:12:23Z |
CVE-2024-46635 | h1thub/CVE-2024-46635 | no description | 2024-10-01T03:07:04Z |
CVE-2024-46627 | d4lyw/CVE-2024-46627 | CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests. | 2024-09-25T10:32:53Z |
CVE-2024-46532 | KamenRiderDarker/CVE-2024-46532 | Reproduction of SQL Injection Vulnerabilities in OpenHIS | 2024-09-27T14:39:54Z |
CVE-2024-46451 | vidura2/CVE-2024-46451 | no description | 2024-09-22T14:47:57Z |
CVE-2024-46377 | vidura2/CVE-2024-46377 | no description | 2024-09-23T03:47:36Z |
CVE-2024-46310 | UwUtisum/CVE-2024-46310 | POC for CVE-2024-46310 For FXServer version's v9601 and prior, Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint | 2024-08-28T19:36:52Z |
CVE-2024-46278 | ayato-shitomi/CVE-2024-46278-teedy_1.11_account-takeover | 【Teedy 1.11】Account Takeover via XSS | 2024-08-28T03:17:37Z |
CVE-2024-46256 | barttran2k/POC_CVE-2024-46256 | POC_CVE-2024-46256 | 2024-09-19T09:35:12Z |
CVE-2024-46209 | h4ckr4v3n/CVE-2024-46209 | no description | 2024-08-26T17:52:27Z |
CVE-2024-4577 | Junp0/CVE-2024-4577 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC | 2024-06-07T09:42:40Z |
CVE-2024-4577 | 0x20c/CVE-2024-4577-nuclei | CVE-2024-4577 nuclei-templates | 2024-06-08T03:12:28Z |
CVE-2024-4577 | Yukiioz/CVE-2024-4577 | no description | 2024-06-07T20:10:49Z |
CVE-2024-4577 | Sysc4ll3r/CVE-2024-4577 | Nuclei Template for CVE-2024-4577 | 2024-06-07T17:01:20Z |
CVE-2024-4577 | WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP | no description | 2024-06-07T17:02:52Z |
CVE-2024-4577 | Wh02m1/CVE-2024-4577 | no description | 2024-06-07T12:49:20Z |
CVE-2024-4577 | taida957789/CVE-2024-4577 | no description | 2024-06-07T10:58:57Z |
CVE-2024-4577 | ohhhh693/CVE-2024-4577 | CVE-2024-4577 | 2024-06-07T09:42:31Z |
CVE-2024-4577 | zjhzjhhh/CVE-2024-4577 | CVE-2024-4577 | 2024-06-07T09:53:32Z |
CVE-2024-4577 | princew88/CVE-2024-4577 | no description | 2024-06-07T09:48:36Z |
CVE-2024-4577 | manuelinfosec/CVE-2024-4577 | Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands. | 2024-06-08T05:27:44Z |
CVE-2024-4577 | xcanwin/CVE-2024-4577-PHP-RCE | no description | 2024-06-08T13:04:45Z |
CVE-2024-4577 | bl4cksku11/CVE-2024-4577 | This is a PoC for PHP CVE-2024-4577. | 2024-06-11T15:11:56Z |
CVE-2024-4577 | TAM-K592/CVE-2024-4577 | CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters. | 2024-06-07T05:50:23Z |
CVE-2024-4577 | K3ysTr0K3R/CVE-2024-4577-EXPLOIT | A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE) | 2024-06-09T23:32:11Z |
CVE-2024-4577 | it-t4mpan/check_cve_2024_4577.sh | Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerability | 2024-06-10T07:28:44Z |
CVE-2024-4577 | 11whoami99/CVE-2024-4577 | POC & $BASH script for CVE-2024-4577 | 2024-06-07T09:51:39Z |
CVE-2024-4577 | Chocapikk/CVE-2024-4577 | PHP CGI Argument Injection vulnerability | 2024-06-09T14:18:21Z |
CVE-2024-4577 | dbyMelina/CVE-2024-4577 | python poc编写练手,可以对单个目标或批量检测 | 2024-06-09T13:46:46Z |
CVE-2024-4577 | zomasec/CVE-2024-4577 | CVE-2024-4577 Exploit POC | 2024-06-08T06:36:14Z |
CVE-2024-4577 | gotr00t0day/CVE-2024-4577 | Argument injection vulnerability in PHP | 2024-06-15T02:49:37Z |
CVE-2024-4577 | Sh0ckFR/CVE-2024-4577 | Fixed and minimalist PoC of the CVE-2024-4577 | 2024-06-13T14:25:04Z |
CVE-2024-4577 | hexedbyte/cve-2024-4577 | no description | 2024-06-13T11:28:33Z |
CVE-2024-4577 | nemu1k5ma/CVE-2024-4577 | php-cgi RCE快速检测 | 2024-06-12T02:16:09Z |
CVE-2024-4577 | XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE | no description | 2024-06-12T11:50:01Z |
CVE-2024-4577 | aaddmin1122345/CVE-2024-4577-POC | CVE-2024-4577 | 2024-06-12T04:50:25Z |
CVE-2024-4577 | d3ck4/Shodan-CVE-2024-4577 | POC for CVE-2024-4577 with Shodan integration | 2024-06-12T06:45:08Z |
CVE-2024-4577 | VictorShem/CVE-2024-4577 | CVE-2024-4577 POC | 2024-06-17T17:53:31Z |
CVE-2024-4577 | ZephrFish/CVE-2024-4577-PHP-RCE | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template | 2024-06-08T12:23:35Z |
CVE-2024-4577 | amandineVdw/CVE-2024-4577 | no description | 2024-06-19T01:50:40Z |
CVE-2024-4577 | Entropt/CVE-2024-4577_Analysis | no description | 2024-06-12T07:33:41Z |
CVE-2024-4577 | jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE | no description | 2024-06-18T13:19:21Z |
CVE-2024-4577 | watchtowrlabs/CVE-2024-4577 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC | 2024-06-07T09:52:54Z |
CVE-2024-4577 | PhinehasNarh/CVE-2024-4577-Defend | no description | 2024-06-24T10:48:24Z |
CVE-2024-4577 | huseyinstif/CVE-2024-4577-Nuclei-Template | no description | 2024-06-07T10:40:37Z |
CVE-2024-4577 | ggfzx/CVE-2024-4577 | no description | 2024-06-26T07:07:49Z |
CVE-2024-4577 | olebris/CVE-2024-4577 | CVE-2024-4577 | 2024-06-28T10:19:59Z |
CVE-2024-4577 | AlperenY-cs/CVE-2024-4577 | Create lab for CVE-2024-4577 | 2024-06-28T14:11:15Z |
CVE-2024-4577 | charis3306/CVE-2024-4577 | CVE-2024-4577 EXP | 2024-07-03T15:30:52Z |
CVE-2024-4577 | cybersagor/CVE-2024-4577 | CVE-2024-4577 Exploits | 2024-07-05T12:47:44Z |
CVE-2024-4577 | l0n3m4n/CVE-2024-4577-RCE | PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploit) | 2024-07-06T19:37:14Z |
CVE-2024-4577 | bibo318/CVE-2024-4577-RCE-ATTACK | ATTACK PoC - PHP CVE-2024-4577 | 2024-07-11T02:22:32Z |
CVE-2024-4577 | waived/CVE-2024-4577-PHP-RCE | Automated PHP remote code execution scanner for CVE-2024-4577 | 2024-07-15T21:31:14Z |
CVE-2024-4577 | nNoSuger/CVE-2024-4577 | CVE | 2024-07-18T16:39:27Z |
CVE-2024-4577 | a-roshbaik/CVE-2024-4577-PHP-RCE | no description | 2024-07-24T20:25:46Z |
CVE-2024-4577 | a-roshbaik/CVE-2024-4577 | no description | 2024-07-24T20:23:03Z |
CVE-2024-4577 | Jcccccx/CVE-2024-4577 | 批量验证POC和EXP | 2024-07-31T10:14:14Z |
CVE-2024-4577 | ManuelKy08/CVE-2024-4577---RR | no description | 2024-08-08T14:04:12Z |
CVE-2024-4577 | bughuntar/CVE-2024-4577 | CVE-2024-4577 Exploits | 2024-08-17T02:01:57Z |
CVE-2024-4577 | fa-rrel/CVE-2024-4577-RCE | PHP CGI Argument Injection (CVE-2024-4577) RCE | 2024-08-20T02:56:03Z |
CVE-2024-4577 | ywChen-NTUST/PHP-CGI-RCE-Scanner | Scanning CVE-2024-4577 vulnerability with a url list. | 2024-09-10T17:31:07Z |
CVE-2024-4577 | phirojshah/CVE-2024-4577 | no description | 2024-09-12T19:27:52Z |
CVE-2024-4577 | AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577- | 🚨 New Incident Report Completed! 🚨 Just wrapped up "Event ID 268: SOC292 - Possible PHP Injection Detected (CVE-2024-4577)" on LetsDefend.io. This analysis involved investigating an attempted Command Injection targeting our PHP server. Staying ahead of these threats with continuous monitoring and swift containment! 🛡️ | 2024-09-12T19:10:38Z |
CVE-2024-4577 | JeninSutradhar/CVE-2024-4577-checker | A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI. | 2024-10-04T13:10:19Z |
CVE-2024-4577 | longhoangth18/CVE-2024-4577 | no description | 2024-10-14T09:11:06Z |
CVE-2024-45614 | ooooooo-q/puma_header_normalization-CVE-2024-45614 | Puma Header normalization CVE-2024-45614 確認 | 2024-09-28T06:29:00Z |
CVE-2024-45589 | BenRogozinski/CVE-2024-45589 | no description | 2024-09-04T03:45:33Z |
CVE-2024-45519 | TOB1a3/CVE-2024-45519-PoC | CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***. | 2024-09-26T01:13:19Z |
CVE-2024-45519 | p33d/CVE-2024-45519 | no description | 2024-09-28T08:29:06Z |
CVE-2024-45519 | Chocapikk/CVE-2024-45519 | Zimbra - Remote Command Execution (CVE-2024-45519) | 2024-10-05T00:15:18Z |
CVE-2024-45507 | Avento/CVE-2024-45507_Behinder_Webshell | no description | 2024-09-11T07:14:13Z |
CVE-2024-45410 | jphetphoumy/traefik-CVE-2024-45410-poc | A proof of concept of traefik CVE to understand the impact | 2024-09-26T09:58:27Z |
CVE-2024-45409 | synacktiv/CVE-2024-45409 | Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) exploit | 2024-10-07T09:24:46Z |
CVE-2024-45388 | codeb0ss/CVE-2024-45388-PoC | Mass Exploit - CVE-2024-45388 - Hoverfly < Arbitrary File Read | 2024-09-09T11:35:10Z |
CVE-2024-45383 | SpiralBL0CK/CVE-2024-45383 | poc for CVE-2024-45383 | 2024-09-18T15:40:19Z |
CVE-2024-45265 | TheHermione/CVE-2024-45265 | CVE-2024-45265 | 2024-08-26T11:02:37Z |
CVE-2024-45264 | TheHermione/CVE-2024-45264 | CVE-2024-45264 | 2024-08-26T10:10:52Z |
CVE-2024-45244 | shanker-sec/hlf-time-oracle | Chaincode for blockchain Hyperledger Fabric provides accurate time to other chaincodes. Thus solving the security problem associated with transaction time manipulation (CVE-2024-45244). | 2024-07-28T19:19:42Z |
CVE-2024-45244 | shanker-sec/HLF_TxTime_spoofing | PoC covering the problem of transaction time manipulation (CVE-2024-45244) in the Hyperledger Fabric blockchain. | 2024-06-23T14:56:14Z |
CVE-2024-45241 | d4lyw/CVE-2024-45241 | Path Traversal in CentralSquare's CryWolf | 2024-08-25T15:57:40Z |
CVE-2024-45241 | verylazytech/CVE-2024-45241 | no description | 2024-09-19T12:43:48Z |
CVE-2024-45200 | latte-soft/kartlanpwn | Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's "KartLANPwn" buffer overflow vulnerability | 2024-09-13T00:41:32Z |
CVE-2024-45058 | 0xbhsu/CVE-2024-45058 | PoC for CVE-2024-45058 Broken Access Control, allowing any user with view permission in the user configuration section to become an administrator changing their own user type. | 2024-08-30T18:44:05Z |
CVE-2024-44947 | Abdurahmon3236/CVE-2024-44947 | no description | 2024-09-03T18:37:40Z |
CVE-2024-44946 | Abdurahmon3236/CVE-2024-44946 | no description | 2024-09-01T13:45:12Z |
CVE-2024-44902 | fru1ts/CVE-2024-44902 | no description | 2024-09-05T15:22:22Z |
CVE-2024-44867 | ChengZyin/CVE-2024-44867 | no description | 2024-09-10T01:49:36Z |
CVE-2024-44849 | extencil/CVE-2024-44849 | 🔥 CVE-2024-44849 Exploit | 2024-09-07T00:00:20Z |
CVE-2024-4484 | Abo5/CVE-2024-4484 | This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the payload is reflected in the response, indicating a vulnerability. | 2024-06-12T23:09:39Z |
CVE-2024-44815 | nitinronge91/Extracting-User-credentials-For-Web-portal-and-WiFi-AP-For-Hathway-Router-CVE-2024-44815- | CVE-2024-44815 | 2024-08-31T10:17:11Z |
CVE-2024-44812 | b1u3st0rm/CVE-2024-44812-PoC | Proof of Concept Exploit for CVE-2024-44812 - SQL Injection Authentication Bypass vulnerability in Online Complaint Site v1.0 | 2024-08-31T15:20:27Z |
CVE-2024-44623 | merbinr/CVE-2024-44623 | Details about the Blind RCE issue(SPX-GC) in SPX-GC | 2024-09-13T17:11:16Z |
CVE-2024-44610 | BertoldVdb/PcanExploit | CVE-2024-44610: Authenticated remote root exploit in Peak PCAN-Ethernet CAN-(FD) gateways | 2024-07-23T10:34:19Z |
CVE-2024-44542 | alphandbelt/CVE-2024-44542 | no description | 2024-09-13T15:05:17Z |
CVE-2024-44541 | pointedsec/CVE-2024-44541 | This repository details a SQL Injection vulnerability in Inventio Lite v4's, including exploitation steps and a Python script to automate the attack. It provides information on the vulnerable code, recommended fixes, and how to extract and decrypt administrative credentials. | 2024-08-07T08:45:43Z |
CVE-2024-44450 | VoidSecOrg/CVE-2024-44450 | no description | 2024-09-06T11:53:03Z |
CVE-2024-4443 | truonghuuphuc/CVE-2024-4443-Poc | CVE-2024-4443 Business Directory Plugin – Easy Listing Directories for WordPress <= 6.4.2 - Unauthenticated SQL Injection via listingfields Parameter | 2024-05-26T16:34:58Z |
CVE-2024-4439 | d0rb/CVE-2024-4439 | The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1. | 2024-05-06T09:07:36Z |
CVE-2024-4439 | MielPopsssssss/CVE-2024-4439 | CVE-2024-4439 PoC | 2024-05-06T08:50:23Z |
CVE-2024-4439 | xssor-dz/-CVE-2024-4439 | WordPress Core < 6.5.2 - Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block | 2024-05-20T23:39:54Z |
CVE-2024-4439 | soltanali0/CVE-2024-4439 | aa | 2024-10-10T09:30:11Z |
CVE-2024-44349 | AndreaF17/PoC-CVE-2024-44349 | no description | 2024-07-26T09:24:37Z |
CVE-2024-44346 | sahil3276/CVE-2024-44346 | Public Disclosure of CVE-2024-44346 | 2024-09-17T18:20:59Z |
CVE-2024-44346 | Shauryae1337/CVE-2024-44346 | Public Disclosure | 2024-09-13T10:27:23Z |
CVE-2024-44337 | Brinmon/CVE-2024-44337 | CVE-2024-44337 POC The package github.com/gomarkdown/markdown is a Go library for parsing Markdown text and rendering as HTML. which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. |
2024-10-15T13:44:20Z |
CVE-2024-44193 | mbog14/CVE-2024-44193 | Hacking Windows through iTunes - Local Privilege Escalation 0-day | 2024-10-04T14:20:15Z |
CVE-2024-44083 | Azvanzed/CVE-2024-44083 | Makes IDA (most versions) to crash upon opening it. | 2024-08-25T12:33:14Z |
CVE-2024-4406 | Yogehi/cve-2024-4406-xiaomi13pro-exploit-files | Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro. | 2024-10-14T09:38:04Z |
CVE-2024-44000 | absholi7ly/CVE-2024-44000-LiteSpeed-Cache | CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data. | 2024-09-06T03:38:13Z |
CVE-2024-44000 | gbrsh/CVE-2024-44000 | LiteSpeed Unauthorized Account Takeover | 2024-09-06T13:43:30Z |
CVE-2024-44000 | ifqygazhar/CVE-2024-44000-LiteSpeed-Cache | CVE-2024-44000-LiteSpeed-Cache | 2024-09-16T14:13:52Z |
CVE-2024-44000 | geniuszlyy/CVE-2024-44000 | is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies | 2024-10-10T15:58:10Z |
CVE-2024-43998 | RandomRobbieBF/CVE-2024-43998 | Blogpoet <= 1.0.2 - Missing Authorization via blogpoet_install_and_activate_plugins() | 2024-09-10T09:38:20Z |
CVE-2024-43965 | RandomRobbieBF/CVE-2024-43965 | SendGrid for WordPress <= 1.4 - Unauthenticated SQL Injection | 2024-10-14T05:58:17Z |
CVE-2024-43918 | KTN1990/CVE-2024-43918 | WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE | 2024-09-24T05:50:03Z |
CVE-2024-43917 | p33d/CVE-2024-43917 | no description | 2024-09-29T06:23:35Z |
CVE-2024-4367 | s4vvysec/CVE-2024-4367-POC | CVE-2024-4367 arbitrary js execution in pdf js | 2024-05-20T22:56:10Z |
CVE-2024-4367 | avalahEE/pdfjs_disable_eval | CVE-2024-4367 mitigation for Odoo 14.0 | 2024-05-23T07:34:15Z |
CVE-2024-4367 | spaceraccoon/detect-cve-2024-4367 | YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js | 2024-05-22T18:05:47Z |
CVE-2024-4367 | LOURC0D3/CVE-2024-4367-PoC | CVE-2024-4367 & CVE-2024-34342 Proof of Concept | 2024-05-20T10:02:23Z |
CVE-2024-4367 | Zombie-Kaiser/cve-2024-4367-PoC-fixed | PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。 | 2024-06-13T15:14:47Z |
CVE-2024-4367 | clarkio/pdfjs-vuln-demo | This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367 | 2024-05-22T23:18:20Z |
CVE-2024-4367 | Scivous/CVE-2024-4367-npm | CVE-2024-4367复现 | 2024-06-21T08:16:42Z |
CVE-2024-4367 | snyk-labs/pdfjs-vuln-demo | This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367 | 2024-06-17T11:39:41Z |
CVE-2024-4367 | UnHackerEnCapital/PDFernetRemotelo | PoC - Prueba de Concepto de CVE-2024-4367 en conjunto al CVE-2023-38831 en un solo Script | 2024-06-19T23:23:07Z |
CVE-2024-4367 | Masamuneee/CVE-2024-4367-Analysis | no description | 2024-09-04T14:43:33Z |
CVE-2024-43582 | jinxongwi/CVE-2024-43582-RCE | Metasploit Module for CVE-2024-43582 RPC Remote Desktop Service crititcal RCE | 2024-10-09T12:50:24Z |
CVE-2024-4358 | Harydhk7/CVE-2024-4358 | no description | 2024-06-04T16:07:36Z |
CVE-2024-4358 | RevoltSecurities/CVE-2024-4358 | An Vulnerability detection and Exploitation tool for CVE-2024-4358 | 2024-06-04T11:32:59Z |
CVE-2024-4358 | Sk1dr0wz/CVE-2024-4358_Mass_Exploit | no description | 2024-06-05T01:05:12Z |
CVE-2024-4358 | sinsinology/CVE-2024-4358 | Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) | 2024-06-03T08:22:10Z |
CVE-2024-4358 | verylazytech/CVE-2024-4358 | Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024 | 2024-06-09T06:30:06Z |
CVE-2024-4358 | fa-rrel/CVE-2024-4358 | Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358/CVE-2024-1800 | 2024-08-24T10:09:09Z |
CVE-2024-4352 | truonghuuphuc/CVE-2024-4352-Poc | CVE-2024-4352 Tutor LMS Pro <= 2.7.0 - Missing Authorization to SQL Injection | 2024-05-16T14:55:43Z |
CVE-2024-43425 | RedTeamPentesting/moodle-rce-calculatedquestions | Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425) | 2024-08-23T09:13:03Z |
CVE-2024-43363 | p33d/CVE-2024-43363 | no description | 2024-10-07T22:59:09Z |
CVE-2024-4323 | skilfoy/CVE-2024-4323-Exploit-POC | This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution. | 2024-05-20T15:04:13Z |
CVE-2024-4323 | d0rb/CVE-2024-4323 | Critical heap buffer overflow vulnerability in the handle_trace_request and parse_trace_request functions of the Fluent Bit HTTP server. | 2024-05-21T12:59:16Z |
CVE-2024-4323 | yuansec/CVE-2024-4323-dos_poc | no description | 2024-05-22T09:55:30Z |
CVE-2024-4320 | bolkv/CVE-2024-4320 | no description | 2024-08-08T03:54:38Z |
CVE-2024-43160 | KTN1990/CVE-2024-43160 | The BerqWP – Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads | 2024-09-17T04:19:54Z |
CVE-2024-43044 | HwMex0/CVE-2024-43044 | The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges. | 2024-08-08T08:28:26Z |
CVE-2024-43044 | jenkinsci-cert/SECURITY-3430 | This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044 | 2024-08-08T11:55:32Z |
CVE-2024-43044 | v9d0g/CVE-2024-43044-POC | CVE-2024-43044的利用方式 | 2024-08-13T07:32:35Z |
CVE-2024-43044 | convisolabs/CVE-2024-43044-jenkins | Exploit for the vulnerability CVE-2024-43044 in Jenkins | 2024-08-23T20:26:26Z |
CVE-2024-43035 | ZeroPathAI/Fonoster-LFI-PoC | Proof-of-concept exploit for Fonoster LFI vulnerability (CVE-2024-43035) | 2024-08-21T21:12:14Z |
CVE-2024-42992 | thanhh23/CVE-2024-42992 | CVE-2024-42992 | 2024-08-26T03:13:45Z |
CVE-2024-4295 | truonghuuphuc/CVE-2024-4295-Poc | CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash | 2024-06-05T09:29:20Z |
CVE-2024-4295 | cve-2024/CVE-2024-4295-Poc | no description | 2024-06-14T07:04:36Z |
CVE-2024-42919 | jeyabalaji711/CVE-2024-42919 | no description | 2024-08-19T19:50:50Z |
CVE-2024-42861 | qiupy123/CVE-2024-42861 | the | 2024-09-21T01:24:25Z |
CVE-2024-42850 | njmbb8/CVE-2024-42850 | An issue in Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements. | 2024-08-15T21:32:29Z |
CVE-2024-42849 | njmbb8/CVE-2024-42849 | An issue in Silverpeas v.6.4.2 and lower allows a remote attacker to cause a denial of service via the password change function. | 2024-08-15T21:57:29Z |
CVE-2024-42845 | partywavesec/invesalius3_vulnerabilities | InVesalius discovered CVE. CVE-2024-42845 | 2024-08-23T13:43:27Z |
CVE-2024-42834 | CyberSec-Supra/CVE-2024-42834 | no description | 2024-08-24T02:21:33Z |
CVE-2024-42758 | 1s1ldur/CVE-2024-42758 | CVE-2024-42758 - Dokuwiki (indexmenu plugin) - XSS Vulnerability | 2024-08-15T13:59:50Z |
CVE-2024-42658 | sudo-subho/CVE-2024-42658 | CVE-2024-42658 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the cookies parameter | 2024-08-17T03:02:20Z |
CVE-2024-42657 | sudo-subho/CVE-2024-42657 | CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process. | 2024-08-17T02:55:14Z |
CVE-2024-42642 | VL4DR/CVE-2024-42642 | no description | 2024-08-30T17:24:58Z |
CVE-2024-42461 | fevar54/CVE-2024-42461 | Se han identificado problemas en la verificación de firmas ECDSA y EDDSA en el proyecto Wycheproof. Las comprobaciones ausentes durante la etapa de decodificación de firmas permiten agregar o eliminar bytes cero, lo que afecta la capacidad de envío de correos. | 2024-08-06T21:56:15Z |
CVE-2024-4232 | Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Storage-in-Plaintext-CVE-2024-4232 | no description | 2024-06-18T11:05:06Z |
CVE-2024-4232 | Redfox-Secuirty/Digisol-DG--GR1321-s-Password-Storage-in-Plaintext--CVE-2024-4232 | no description | 2024-07-04T06:30:19Z |
CVE-2024-4231 | Redfox-Secuirty/Digisol-DG-GR1321-s-Improper-Access-Control-CVE-2024-4231 | no description | 2024-06-18T11:43:23Z |
CVE-2024-41992 | fj016/CVE-2024-41992-PoC | PoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT) | 2024-08-23T23:48:01Z |
CVE-2024-41958 | OrangeJuiceHU/CVE-2024-41958-PoC | This is a small proof of concept for CVE-2024-41958 | 2024-08-05T19:10:08Z |
CVE-2024-41662 | sh3bu/CVE-2024-41662 | Markdown XSS leads to RCE in VNote version <=3.18.1 | 2024-07-23T17:21:12Z |
CVE-2024-41651 | Fckroun/CVE-2024-41651 | CVE-2024-41651 | 2024-08-08T17:25:30Z |
CVE-2024-41640 | alemusix/CVE-2024-41640 | no description | 2024-07-17T07:00:31Z |
CVE-2024-41628 | Redshift-CyberSecurity/CVE-2024-41628 | no description | 2024-07-29T07:12:14Z |
CVE-2024-41570 | chebuya/Havoc-C2-SSRF-poc | CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit | 2024-07-13T19:54:27Z |
CVE-2024-41312 | Amal264882/CVE-2024-41312. | InstantCMS - Stored Cross Site Scripting (XSS) | 2024-08-26T06:32:49Z |
CVE-2024-41302 | patrickdeanramos/CVE-2024-41302-Bookea-tu-Mesa-is-vulnerable-to-SQL-Injection | Bookea-tu-Mesa is vulnerable to SQL Injection | 2024-07-14T13:01:36Z |
CVE-2024-41301 | patrickdeanramos/CVE-2024-41301-Bookea-tu-Mesa-is-vulnerable-to-Stored-Cross-Site-Scripting | no description | 2024-07-14T12:51:17Z |
CVE-2024-41290 | paragbagul111/CVE-2024-41290 | FlatPress CMS v1.3.1 1.3 was discovered to use insecure methods to > store authentication data | 2024-10-01T14:35:39Z |
CVE-2024-41110 | vvpoglazov/cve-2024-41110-checker | no description | 2024-07-25T08:03:15Z |
CVE-2024-41110 | PauloParoPP/CVE-2024-41110-SCAN | no description | 2024-07-26T18:41:42Z |
CVE-2024-41107 | d0rb/CVE-2024-41107 | This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack | 2024-07-23T09:39:42Z |
CVE-2024-40892 | xen0bit/fwbt | Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024-40892 / CVE-2024-40893 | 2024-08-21T17:27:21Z |
CVE-2024-40725 | TAM-K592/CVE-2024-40725-CVE-2024-40898 | CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks. | 2024-07-19T03:51:54Z |
CVE-2024-40711 | watchtowrlabs/CVE-2024-40711 | Pre-Auth Exploit for CVE-2024-40711 | 2024-09-15T17:25:32Z |
CVE-2024-40711 | realstatus/CVE-2024-40711-Exp | CVE-2024-40711-exp | 2024-10-16T05:02:27Z |
CVE-2024-40676 | Aakashmom/frameworks_base_accounts_CVE-2024-40676 | no description | 2024-10-17T11:29:33Z |
CVE-2024-40676 | Aakashmom/accounts_CVE-2024-40676- | no description | 2024-10-17T11:40:21Z |
CVE-2024-40675 | Aakashmom/intent_CVE-2024-40675 | no description | 2024-10-17T11:46:29Z |
CVE-2024-40673 | Aakashmom/G3_libcore_native_CVE-2024-40673 | no description | 2024-10-17T12:26:24Z |
CVE-2024-40662 | Aakashmom/net_G2.5_CVE-2024-40662 | no description | 2024-10-17T12:39:21Z |
CVE-2024-40658 | nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-40658 | no description | 2024-07-23T05:04:03Z |
CVE-2024-40617 | KyssK00L/CVE-2024-40617 | CVE-2024-40617 Exploit PoC | 2024-07-30T11:50:45Z |
CVE-2024-40512 | Jansen-C-Moreira/CVE-2024-40512 | OpenPetra v.2023.02 CVE-2024-40512 | 2024-07-13T22:06:16Z |
CVE-2024-40511 | Jansen-C-Moreira/CVE-2024-40511 | OpenPetra v.2023.02 CVE-2024-40511 | 2024-07-13T22:04:53Z |
CVE-2024-40510 | Jansen-C-Moreira/CVE-2024-40510 | OpenPetra v.2023.02 CVE-2024-40510 | 2024-07-13T22:03:17Z |
CVE-2024-40509 | Jansen-C-Moreira/CVE-2024-40509 | OpenPetra v.2023.02 CVE-2024-40509 | 2024-07-13T22:01:39Z |
CVE-2024-40508 | Jansen-C-Moreira/CVE-2024-40508 | OpenPetra v.2023.02 CVE-2024-40508 | 2024-07-13T21:54:07Z |
CVE-2024-40507 | Jansen-C-Moreira/CVE-2024-40507 | OpenPetra v.2023.02 Use CVE-2024-40507 | 2024-07-13T21:50:57Z |
CVE-2024-40506 | Jansen-C-Moreira/CVE-2024-40506 | OpenPetra v.2023.02 CVE-2024-40506 | 2024-07-13T21:42:23Z |
CVE-2024-40500 | nitipoom-jar/CVE-2024-40500 | no description | 2024-08-08T17:12:58Z |
CVE-2024-40498 | Dirac231/CVE-2024-40498 | no description | 2024-07-29T10:13:15Z |
CVE-2024-40492 | minendie/POC_CVE-2024-40492 | no description | 2024-07-13T04:57:48Z |
CVE-2024-40431 | SpiralBL0CK/CVE-2024-40431-CVE-2022-25479-EOP-CHAIN | CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) | 2024-09-17T06:28:17Z |
CVE-2024-40422 | alpernae/CVE-2024-40422 | no description | 2024-07-03T21:43:15Z |
CVE-2024-40422 | codeb0ss/CVE-2024-40422-PoC | Mass Exploit < [CVE-2024-40422 - Devika v1] - Path Traversal | 2024-08-05T22:21:06Z |
CVE-2024-40422 | j3r1ch0123/CVE-2024-40422 | Found this on exploit-db, decided to make my own for practice. This exploit will search out the passwd file and print the contents on a vulnerable system. | 2024-08-06T07:09:47Z |
CVE-2024-4040 | rbih-boulanouar/CVE-2024-4040 | no description | 2024-04-25T04:45:38Z |
CVE-2024-4040 | tucommenceapousser/CVE-2024-4040-Scanner | Scanner of vulnerability on crushftp instance | 2024-04-25T04:01:23Z |
CVE-2024-4040 | Mufti22/CVE-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | 2024-04-25T05:18:06Z |
CVE-2024-4040 | Mohammaddvd/CVE-2024-4040 | Exploit CrushFTP CVE-2024-4040 | 2024-04-30T13:27:34Z |
CVE-2024-4040 | Praison001/CVE-2024-4040-CrushFTP-server | Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms | 2024-04-29T10:21:53Z |
CVE-2024-4040 | jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability | no description | 2024-05-01T14:42:39Z |
CVE-2024-4040 | gotr00t0day/CVE-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | 2024-05-03T23:29:53Z |
CVE-2024-4040 | 1ncendium/CVE-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | 2024-05-13T17:33:36Z |
CVE-2024-4040 | Stuub/CVE-2024-4040-SSTI-LFI-PoC | CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass - Full Server Takeover - Wordlist Support | 2024-04-25T19:51:38Z |
CVE-2024-4040 | airbus-cert/CVE-2024-4040 | Scanner for CVE-2024-4040 | 2024-04-23T09:31:29Z |
CVE-2024-4040 | olebris/CVE-2024-4040 | CVE-2024-4040 PoC | 2024-06-28T10:32:51Z |
CVE-2024-4040 | entroychang/CVE-2024-4040 | CVE-2024-4040 PoC | 2024-07-05T05:46:56Z |
CVE-2024-4040 | geniuszlyy/GenCrushSSTIExploit | is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP | 2024-09-30T16:18:07Z |
CVE-2024-4040 | safeer-accuknox/CrushFTP-cve-2024-4040-poc | no description | 2024-09-18T04:45:54Z |
CVE-2024-40348 | bigb0x/CVE-2024-40348 | POC for CVE-2024-40348. Will attempt to read /etc/passwd from target | 2024-07-21T00:54:55Z |
CVE-2024-40348 | codeb0ss/CVE-2024-40348-PoC | Mass Exploit < [CVE-2024-40348 - Bazarr] - Arbitrary File Read | 2024-07-24T16:13:24Z |
CVE-2024-40324 | aleksey-vi/CVE-2024-40324 | no description | 2024-07-25T13:48:22Z |
CVE-2024-40318 | 3v1lC0d3/RCE-QloApps-CVE-2024-40318 | Remote code execution Vulnerability in QloApps (version 1.6.0.0) | 2024-06-27T22:15:16Z |
CVE-2024-40119 | sudo-subho/nepstech-xpon-router-CVE-2024-40119 | Cross-Site Request Forgery (CSRF) vulnerability in the password change function, which allows remote attackers to change the admin password without the user's consent, leading to a potential account takeover. | 2024-07-17T03:03:42Z |
CVE-2024-40110 | Abdurahmon3236/CVE-2024-40110 | no description | 2024-08-02T20:17:25Z |
CVE-2024-40080 | perras/CVE-2024-40080 | cve discovery proof-of-concept | 2024-08-06T13:28:53Z |
CVE-2024-39943 | truonghuuphuc/CVE-2024-39943-Poc | CVE-2024-39943 rejetto HFS (aka HTTP File Server) 3 before 0.52.10 on Linux, UNIX, and macOS allows OS command execution by remote authenticated users (if they have Upload permissions). This occurs because a shell is used to execute df (i.e., with execSync instead of spawnSync in child_process in Node.js). | 2024-07-05T06:46:34Z |
CVE-2024-39943 | tequilasunsh1ne/CVE_2024_39943 | no description | 2024-07-08T03:38:18Z |
CVE-2024-39943 | A-little-dragon/CVE-2024-39943-Exploit | no description | 2024-07-06T17:06:25Z |
CVE-2024-39929 | rxerium/CVE-2024-39929 | Detection method for Exim vulnerability CVE-2024-39929 | 2024-07-12T18:01:30Z |
CVE-2024-39929 | michael-david-fry/CVE-2024-39929 | POC to test CVE-2024-39929 against EXIM mail servers | 2024-07-29T15:09:53Z |
CVE-2024-39844 | ph1ns/CVE-2024-39844 | CVE-2024-39844 (ZNC < 1.9.1 modtcl RCE) | 2024-07-03T23:27:25Z |
CVE-2024-39700 | LOURC0D3/CVE-2024-39700-PoC | CVE-2024-39700 Proof of Concept | 2024-07-29T08:33:12Z |
CVE-2024-39689 | roy-aladin/InfraTest | DO NOT FORK, DEPLOY, OR USE FOR ANYTHING BUT LEARNING. These requirements are vulnerable to CVE-2024-39689 | 2024-03-20T14:16:38Z |
CVE-2024-39614 | Abdurahmon3236/-CVE-2024-39614 | no description | 2024-08-02T20:11:29Z |
CVE-2024-39306 | apena-ba/CVE-2024-39306 | no description | 2024-07-31T14:57:03Z |
CVE-2024-39304 | apena-ba/CVE-2024-39304 | no description | 2024-07-31T14:48:57Z |
CVE-2024-39250 | efrann/CVE-2024-39250 | CVE-2024-39250 TimeTrax SQLi | 2024-07-13T20:29:31Z |
CVE-2024-39249 | zunak/CVE-2024-39249 | no description | 2024-06-26T17:30:02Z |
CVE-2024-39248 | jasonthename/CVE-2024-39248 | Publication for Cross Site Scripting (XSS) in SimpCMS v0.1 - /SimpCMS/admin.php | 2024-06-26T21:06:56Z |
CVE-2024-3922 | truonghuuphuc/CVE-2024-3922-Poc | Dokan Pro <= 3.10.3 - Unauthenticated SQL Injection | 2024-06-12T07:42:10Z |
CVE-2024-39211 | artemy-ccrsky/CVE-2024-39211 | CVE-2024-39211 | 2024-07-04T09:24:34Z |
CVE-2024-39210 | KRookieSec/CVE-2024-39210 | Best house rental management system Local file contains vulnerability | 2024-07-05T08:01:22Z |
CVE-2024-39203 | 5r1an/CVE-2024-39203 | A cross-site scripting (XSS) vulnerability in the Backend Theme. Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | 2024-07-04T02:30:17Z |
CVE-2024-39081 | Amirasaiyad/BLE-TPMS | CVE-2024-39081. BLE TPMS data manipulation over bluetooth communication. | 2024-04-05T05:13:27Z |
CVE-2024-39069 | AungSoePaing/CVE-2024-39069 | CVE-2024-39069 | 2024-07-09T11:24:44Z |
CVE-2024-39031 | toneemarqus/CVE-2024-39031 | Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal | 2024-07-08T23:21:52Z |
CVE-2024-38856 | codeb0ss/CVE-2024-38856-PoC | Mass Exploit - CVE-2024-38856 [Remote Code Execution] | 2024-08-09T11:26:09Z |
CVE-2024-38856 | ThatNotEasy/CVE-2024-38856 | Perform With Massive Apache OFBiz Zero-Day Scanner & RCE | 2024-08-10T03:05:34Z |
CVE-2024-38856 | Praison001/CVE-2024-38856-ApacheOfBiz | Exploit for CVE-2024-38856 affecting Apache OFBiz versions before 18.12.15 | 2024-08-18T15:19:58Z |
CVE-2024-38856 | 0x20c/CVE-2024-38856-EXP | CVE-2024-38856 Exploit | 2024-08-22T04:05:02Z |
CVE-2024-38856 | BBD-YZZ/CVE-2024-38856-RCE | Apache OFBiz CVE-2024-38856 | 2024-08-28T03:17:22Z |
CVE-2024-38856 | emanueldosreis/CVE-2024-38856 | Nuclei template to scan for Apache Ofbiz affecting versions before 18.12.15 | 2024-08-27T21:16:09Z |
CVE-2024-38856 | securelayer7/CVE-2024-38856_Scanner | Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856) | 2024-08-08T02:40:56Z |
CVE-2024-38816 | startsw1th/cve-2024-38816-demo | no description | 2024-09-20T02:09:23Z |
CVE-2024-38816 | WULINPIN/CVE-2024-38816-PoC | CVE-2024-38816 Proof of Concept | 2024-09-28T23:16:23Z |
CVE-2024-38816 | Galaxy-system/cve-2024-38816 | no description | 2024-10-15T11:33:13Z |
CVE-2024-38793 | ret2desync/CVE-2024-38793-PoC | Proof of Concept code for exploitation of CVE-2024-38793 (Best Restaurant Menu by PriceListo <= 1.4.1 - Authenticated (Contributor+) SQL Injection) | 2024-08-18T10:26:23Z |
CVE-2024-3867 | c4cnm/CVE-2024-3867 | This repository shows u some information on this vulnerability, which were found by me. | 2024-05-08T06:19:05Z |
CVE-2024-38537 | Havoc10-sw/Detect_polyfill_CVE-2024-38537- | Here's a Python script that checks if the polyfill.io domain is present in the Content Security Policy (CSP) header of a given web application. | 2024-07-07T15:06:39Z |
CVE-2024-38526 | putget/pollypull | CVE-2024-38526 - Polyfill Scanner | 2024-09-05T17:09:50Z |
CVE-2024-38475 | p0in7s/CVE-2024-38475 | no description | 2024-08-18T11:30:50Z |
CVE-2024-38473 | Abdurahmon3236/CVE-2024-38473 | no description | 2024-08-02T19:57:52Z |
CVE-2024-38473 | juanschallibaum/CVE-2024-38473-Nuclei-Template | Nuclei template to detect Apache servers vulnerable to CVE-2024-38473 | 2024-08-23T14:39:31Z |
CVE-2024-38472 | Abdurahmon3236/CVE-2024-38472 | no description | 2024-08-03T16:08:28Z |
CVE-2024-38472 | mrmtwoj/apache-vulnerability-testing | Apache HTTP Server Vulnerability Testing Tool - PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709 | 2024-10-05T20:32:45Z |
CVE-2024-38396 | vin01/poc-cve-2024-38396 | PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution | 2024-06-16T09:43:46Z |
CVE-2024-38366 | ReeFSpeK/CocoaPods-RCE_CVE-2024-38366 | CocoaPods RCE Vulnerability CVE-2024-38366 | 2024-06-28T13:11:28Z |
CVE-2024-38189 | vx7z/CVE-2024-38189 | no description | 2024-08-20T12:41:57Z |
CVE-2024-38144 | Dor00tkit/CVE-2024-38144 | CVE-2024-38144 - DoS PoC | 2024-09-29T07:04:58Z |
CVE-2024-38127 | pwndorei/CVE-2024-38127 | no description | 2024-09-15T07:38:44Z |
CVE-2024-38100 | Florian-Hoth/CVE-2024-38100-RCE-POC | CVE-2024-38100 Windows Leaked Wallpaper Escelation to RCE vulnerability | 2024-08-06T18:26:50Z |
CVE-2024-38080 | pwndorei/CVE-2024-38080 | poc code for CVE-2024-38080 | 2024-09-01T11:25:22Z |
CVE-2024-38077 | murphysecurity/RDL-detect | 远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查 | 2024-08-09T07:45:25Z |
CVE-2024-38077 | Sec-Link/CVE-2024-38077 | no description | 2024-08-09T07:37:49Z |
CVE-2024-38077 | Wlibang/CVE-2024-38077 | CVE-2024-38077,本仓库仅用作备份, | 2024-08-09T07:46:09Z |
CVE-2024-38077 | SecStarBot/CVE-2024-38077-POC | no description | 2024-08-09T01:24:59Z |
CVE-2024-38077 | zhuxi1965/CVE-2024-38077-RDLCheck | 检测RDL服务是否运行,快速排查受影响资产 | 2024-08-10T01:10:06Z |
CVE-2024-38077 | atlassion/CVE-2024-38077-check | 基于135端口检测目标是否存在CVE-2024-38077漏洞 | 2024-08-10T12:49:51Z |
CVE-2024-38077 | lworld0x00/CVE-2024-38077-notes | no description | 2024-08-10T06:31:04Z |
CVE-2024-38077 | psl-b/CVE-2024-38077-check | no description | 2024-08-09T22:01:46Z |
CVE-2024-38077 | qi4L/CVE-2024-38077 | RDL的堆溢出导致的RCE | 2024-08-09T05:00:44Z |
CVE-2024-38077 | BBD-YZZ/fyne-gui | CVE-2024-38077,仅支持扫描测试~ | 2024-08-15T07:14:00Z |
CVE-2024-38077 | Destiny0991/check_38077 | Windows远程桌面授权服务CVE-2024-38077检测工具 | 2024-08-23T08:32:40Z |
CVE-2024-38077 | mrmtwoj/CVE-2024-38077 | CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service | 2024-10-09T06:39:21Z |
CVE-2024-38063 | diegoalbuquerque/CVE-2024-38063 | mitigation script by disabling ipv6 of all interfaces | 2024-08-15T12:41:01Z |
CVE-2024-38063 | noradlb1/CVE-2024-38063-VB | CVE-2024-38063 VB | 2024-08-17T01:11:12Z |
CVE-2024-38063 | almogopp/Disable-IPv6-CVE-2024-38063-Fix | A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix | 2024-08-20T08:48:08Z |
CVE-2024-38063 | p33d/cve-2024-38063 | Poc for cve-2024-38063 | 2024-08-18T22:24:43Z |
CVE-2024-38063 | dweger-scripts/CVE-2024-38063-Remediation | no description | 2024-08-19T19:44:37Z |
CVE-2024-38063 | zaneoblaneo/cve_2024_38063_research | CVE 2024-38063 Research and POC development | 2024-08-22T03:51:43Z |
CVE-2024-38063 | haroonawanofficial/CVE-2024-38063-Research-Tool | This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP/IP vulnerabilities in CVEs | 2024-08-24T15:04:54Z |
CVE-2024-38063 | ynwarcs/CVE-2024-38063 | poc for CVE-2024-38063 (RCE in tcpip.sys) | 2024-08-24T18:25:46Z |
CVE-2024-38063 | PumpkinBridge/Windows-CVE-2024-38063 | Windows TCP/IP IPv6(CVE-2024-38063) | 2024-08-28T01:46:44Z |
CVE-2024-38063 | patchpoint/CVE-2024-38063 | no description | 2024-08-27T15:21:25Z |
CVE-2024-38063 | zenzue/CVE-2024-38063-POC | potential memory corruption vulnerabilities in IPv6 networks. | 2024-08-28T08:57:23Z |
CVE-2024-38063 | Sachinart/CVE-2024-38063-poc | Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. | 2024-08-17T14:58:36Z |
CVE-2024-38063 | Th3Tr1ckst3r/CVE-2024-38063 | CVE-2024-38063 research so you don't have to. | 2024-08-23T06:28:03Z |
CVE-2024-38063 | AdminPentester/CVE-2024-38063- | Remotely Exploiting The Kernel Via IPv6 | 2024-08-28T15:28:14Z |
CVE-2024-38063 | ps-interactive/cve-2024-38063 | no description | 2024-09-02T14:16:31Z |
CVE-2024-38063 | Brownpanda29/Cve-2024-38063 | no description | 2024-09-03T14:36:35Z |
CVE-2024-38063 | FrancescoDiSalesGithub/quick-fix-cve-2024-38063 | quick powershell script to fix cve-2024-38063 | 2024-09-07T16:27:27Z |
CVE-2024-38063 | KernelKraze/CVE-2024-38063_PoC | This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability. | 2024-09-01T09:20:02Z |
CVE-2024-38063 | Faizan-Khanx/CVE-2024-38063 | CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6 | 2024-09-10T07:15:20Z |
CVE-2024-38063 | ThemeHackers/CVE-2024-38063 | CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE) | 2024-08-31T13:56:26Z |
CVE-2024-38063 | ArenaldyP/CVE-2024-38063-Medium | Kode Eksploitasi CVE-2024-38063 | 2024-09-21T17:33:52Z |
CVE-2024-38063 | lnx-dvlpr/cve-2024-38063 | no description | 2024-09-23T11:45:42Z |
CVE-2024-38063 | becrevex/CVE-2024-38063 | no description | 2024-10-08T06:24:54Z |
CVE-2024-38063 | idkwastaken/CVE-2024-38063 | no description | 2024-10-14T17:46:58Z |
CVE-2024-3806 | truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc | CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta | 2024-05-10T16:13:07Z |
CVE-2024-38041 | varwara/CVE-2024-38041 | Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver. | 2024-07-21T02:29:18Z |
CVE-2024-38036 | hnytgl/CVE-2024-38036 | 排查ipv6使用情况 | 2024-08-16T01:38:21Z |
CVE-2024-37889 | uname-s/CVE-2024-37889 | no description | 2024-06-17T04:50:00Z |
CVE-2024-37888 | 7Ragnarok7/CVE-2024-37888 | XSS PoC/Exploit for Open Link Plugin for CKEditor 4 | 2024-06-10T07:00:18Z |
CVE-2024-37843 | gsmith257-cyber/CVE-2024-37843-POC | POC for CVE-2024-37843. Craft CMS time-based blind SQLi | 2024-06-18T02:27:04Z |
CVE-2024-37791 | czheisenberg/CVE-2024-37791 | 我的CVE-2024-37791 | 2024-06-19T09:16:30Z |
CVE-2024-37770 | k3ppf0r/CVE-2024-37770 | CVE-2024-37770 | 2024-07-05T16:13:34Z |
CVE-2024-37765 | Atreb92/cve-2024-37765 | no description | 2024-07-01T10:39:40Z |
CVE-2024-37764 | Atreb92/cve-2024-37764 | no description | 2024-07-01T10:37:21Z |
CVE-2024-37763 | Atreb92/cve-2024-37763 | no description | 2024-07-01T10:35:51Z |
CVE-2024-37762 | Atreb92/cve-2024-37762 | no description | 2024-07-01T10:28:56Z |
CVE-2024-37759 | crumbledwall/CVE-2024-37759_PoC | PoC of CVE-2024-37759 | 2024-06-21T02:58:40Z |
CVE-2024-37742 | Eteblue/CVE-2024-37742 | This repository contains a PoC for exploiting CVE-2024-37742, a vulnerability in Safe Exam Browser (SEB) ≤ 3.5.0 on Windows. The vulnerability enables unauthorized clipboard data sharing between SEB's kiosk mode and the underlying system, compromising the integrity of exams. | 2024-06-20T21:01:28Z |
CVE-2024-37726 | carsonchan12345/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation | no description | 2024-07-03T07:26:07Z |
CVE-2024-37726 | NextGenPentesters/CVE-2024-37726-MSI-Center-Local-Privilege-Escalation | no description | 2024-07-07T09:21:21Z |
CVE-2024-37713 | fullbbadda1208/CVE-2024-37713 | no description | 2024-09-08T13:19:36Z |
CVE-2024-37393 | optistream/securenvoy-cve-2024-37393 | Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513) | 2024-06-10T12:42:57Z |
CVE-2024-37147 | 0xmupa/CVE-2024-37147-PoC | no description | 2024-07-11T10:20:00Z |
CVE-2024-37085 | mahmutaymahmutay/CVE-2024-37085 | Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only) | 2024-08-02T13:31:59Z |
CVE-2024-37085 | Florian-Hoth/CVE-2024-37085-RCE-POC | CVE-2024-37085 VMware ESXi RCE Vulnerability | 2024-08-06T18:23:43Z |
CVE-2024-37085 | WTN-arny/Vmware-ESXI | CVE-2024-37085 unauthenticated shell upload to full administrator on domain-joined esxi hypervisors. | 2024-08-12T17:44:17Z |
CVE-2024-37085 | WTN-arny/CVE-2024-37085 | no description | 2024-08-18T17:48:34Z |
CVE-2024-37084 | vuhz/CVE-2024-37084 | Spring Cloud Remote Code Execution | 2024-09-11T14:09:50Z |
CVE-2024-37084 | Kayiyan/CVE-2024-37084-Poc | Analysis , Demo exploit and poc about CVE-2024-37084 | 2024-09-10T16:58:54Z |
CVE-2024-37084 | Ly4j/CVE-2024-37084-Exp | Spring Cloud Data Flow CVE-2024-37084 exp | 2024-10-15T06:55:05Z |
CVE-2024-37084 | A0be/CVE-2024-37084-Exp | Spring Cloud Data Flow CVE-2024-37084 exp | 2024-10-15T18:54:25Z |
CVE-2024-37081 | mbadanoiu/CVE-2024-37081 | CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server | 2024-07-06T18:29:13Z |
CVE-2024-37081 | Mr-r00t11/CVE-2024-37081 | no description | 2024-07-09T16:14:41Z |
CVE-2024-37081 | CERTologists/Modified-CVE-2024-37081-POC | no description | 2024-07-21T08:42:23Z |
CVE-2024-37081 | CERTologists/-CVE-2024-37081-POC | no description | 2024-07-21T08:41:40Z |
CVE-2024-37051 | LeadroyaL/CVE-2024-37051-EXP | CVE-2024-37051 poc and exploit | 2024-06-11T16:01:13Z |
CVE-2024-37051 | mrblackstar26/CVE-2024-37051 | Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) | 2024-06-13T09:15:58Z |
CVE-2024-37032 | Bi0x/CVE-2024-37032 | Path traversal in Ollama with rogue registry server | 2024-06-26T03:11:29Z |
CVE-2024-37032 | ahboon/CVE-2024-37032-scanner | CVE-2024-37032 scanner | 2024-07-10T07:24:09Z |
CVE-2024-36991 | sardine-web/CVE-2024-36991 | Path traversal vulnerability in Splunk Enterprise on Windows | 2024-07-06T17:15:39Z |
CVE-2024-36991 | th3gokul/CVE-2024-36991 | CVE-2024-36991: Path traversal that affects Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10. | 2024-07-06T15:24:24Z |
CVE-2024-36991 | Mr-xn/CVE-2024-36991 | Path Traversal On The "/Modules/Messaging/" Endpoint In Splunk Enterprise On Windows | 2024-07-06T01:00:57Z |
CVE-2024-36991 | Cappricio-Securities/CVE-2024-36991 | Path traversal vulnerability in Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10 that allows reading sensitive files. | 2024-07-10T09:42:08Z |
CVE-2024-36991 | bigb0x/CVE-2024-36991 | POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file. | 2024-07-06T00:49:40Z |
CVE-2024-36877 | jjensn/CVE-2024-36877 | Exploit POC for CVE-2024-36877 | 2024-08-09T15:33:04Z |
CVE-2024-36877 | CERTologists/POC-CVE-2024-36877 | no description | 2024-08-17T20:47:52Z |
CVE-2024-36842 | abbiy/Backdooring-Oncord-Android-Sterio- | CVE-2024-36842, Creating Persistent Backdoor on Oncord+ android/ios car infotaiment using malicious script! | 2024-05-09T12:28:11Z |
CVE-2024-36837 | phtcloud-dev/CVE-2024-36837 | CVE-2024-36837 POC | 2024-06-15T16:44:51Z |
CVE-2024-36837 | lhc321-source/CVE-2024-36837 | CVE-2024-36837 POC | 2024-09-28T10:44:03Z |
CVE-2024-36821 | IvanGlinkin/CVE-2024-36821 | The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821 | 2024-06-10T15:52:02Z |
CVE-2024-3656 | h4x0r-dz/CVE-2024-3656 | Keycloak admin API allows low privilege users to use administrative functions | 2024-10-12T09:17:00Z |
CVE-2024-36539 | Abdurahmon3236/CVE-2024-36539 | no description | 2024-08-03T06:37:21Z |
CVE-2024-36527 | bigb0x/CVE-2024-36527 | POC for CVE-2024-36527: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal | 2024-06-20T09:42:07Z |
CVE-2024-36424 | secunnix/CVE-2024-36424 | K7 Ultimate Security < v17.0.2019 "K7RKScan.sys" Null Pointer Dereference PoC | 2024-08-13T00:06:17Z |
CVE-2024-36416 | kva55/CVE-2024-36416 | Tool for validating / testing CVE-2024-36416 | 2024-06-09T07:18:54Z |
CVE-2024-36401 | bigb0x/CVE-2024-36401 | POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets. | 2024-07-04T13:19:47Z |
CVE-2024-36401 | Niuwoo/CVE-2024-36401 | POC | 2024-07-05T03:02:30Z |
CVE-2024-36401 | zgimszhd61/CVE-2024-36401 | no description | 2024-07-06T06:04:41Z |
CVE-2024-36401 | Mr-xn/CVE-2024-36401 | Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit | 2024-07-06T01:10:28Z |
CVE-2024-36401 | RevoltSecurities/CVE-2024-36401 | Exploiter a Vulnerability detection and Exploitation tool for GeoServer Unauthenticated Remote Code Execution CVE-2024-36401. | 2024-07-05T15:24:50Z |
CVE-2024-36401 | jakabakos/CVE-2024-36401-GeoServer-RCE | no description | 2024-07-12T07:01:12Z |
CVE-2024-36401 | ahisec/geoserver- | geoserver CVE-2024-36401漏洞利用工具 | 2024-07-17T02:25:21Z |
CVE-2024-36401 | Chocapikk/CVE-2024-36401 | GeoServer Remote Code Execution | 2024-07-30T18:43:40Z |
CVE-2024-36401 | yisas93/CVE-2024-36401-PoC | no description | 2024-08-01T21:22:51Z |
CVE-2024-36401 | justin-p/geoexplorer | Mass scanner for CVE-2024-36401 | 2024-08-27T15:28:04Z |
CVE-2024-36401 | daniellowrie/CVE-2024-36401-PoC | Proof-of-Concept Exploit for CVE-2024-36401 GeoServer 2.25.1 | 2024-09-13T10:28:48Z |
CVE-2024-36401 | PunitTailor55/GeoServer-CVE-2024-36401 | GeoServer CVE-2024-36401: Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions | 2024-09-28T14:55:50Z |
CVE-2024-36401 | netuseradministrator/CVE-2024-36401 | geoserver图形化漏洞利用工具 | 2024-10-05T10:08:55Z |
CVE-2024-36401 | kkhackz0013/CVE-2024-36401 | no description | 2024-10-14T15:57:06Z |
CVE-2024-36104 | ggfzx/CVE-2024-36104 | no description | 2024-06-17T07:57:58Z |
CVE-2024-36079 | DxRvs/vaultize_CVE-2024-36079 | no description | 2024-05-20T22:07:41Z |
CVE-2024-3596 | alperenugurlu/CVE-2024-3596-Detector | no description | 2024-07-09T19:44:40Z |
CVE-2024-35584 | whwhwh96/CVE-2024-35584 | OpenSIS SQLi Injection | 2024-10-14T17:24:01Z |
CVE-2024-35538 | cyberaz0r/Typecho-Multiple-Vulnerabilities | Exploits for Typecho CVE-2024-35538, CVE-2024-35539 and CVE-2024-35540 | 2024-08-18T17:09:05Z |
CVE-2024-3552 | truonghuuphuc/CVE-2024-3552-Poc | CVE-2024-3552 Web Directory Free <= 1.6.9 - Unauthenticated SQL Injection | 2024-05-27T15:36:24Z |
CVE-2024-35511 | efekaanakkar/CVE-2024-35511 | Men Salon Management System Using PHP and MySQL | 2024-05-25T13:07:35Z |
CVE-2024-35475 | carsonchan12345/CVE-2024-35475 | no description | 2024-05-22T14:21:48Z |
CVE-2024-35469 | dovankha/CVE-2024-35469 | CVE-2024-35469 - SQL injection | 2024-05-11T07:27:31Z |
CVE-2024-35468 | dovankha/CVE-2024-35468 | CVE-2024-35468 - SQL injection | 2024-05-11T05:23:41Z |
CVE-2024-35333 | momo1239/CVE-2024-35333 | no description | 2024-05-14T13:02:36Z |
CVE-2024-35315 | ewilded/CVE-2024-35315-POC | Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC | 2024-06-03T14:29:35Z |
CVE-2024-35242 | KKkai0315/CVE-2024-35242 | A test repository for the vulnerability CVE-2024-35242's PoC | 2024-07-15T15:01:31Z |
CVE-2024-35205 | cyb3r-w0lf/Dirty_Stream-Android-POC | Dirty Stream exploit for MI-File Explorer V1-210567 version. CVE-2024-35205 | 2024-06-17T08:10:47Z |
CVE-2024-34958 | Gr-1m/CVE-2024-34958 | idccms CSRF poc | 2024-05-20T08:15:05Z |
CVE-2024-3495 | truonghuuphuc/CVE-2024-3495-Poc | CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection | 2024-05-23T02:41:15Z |
CVE-2024-3495 | zomasec/CVE-2024-3495-POC | The Country State City Dropdown CF7 WordPress plugin (versions up to 2.7.2) is vulnerable to SQL Injection via 'cnt' and 'sid' parameters. Insufficient escaping and lack of preparation in the SQL query allow unauthenticated attackers to append queries, potentially extracting sensitive database information. | 2024-05-28T02:57:12Z |
CVE-2024-34833 | ShellUnease/CVE-2024-34833-payroll-management-system-rce | no description | 2024-05-02T10:37:56Z |
CVE-2024-34832 | julio-cfa/CVE-2024-34832 | CVE-2024-34832 | 2024-05-14T19:15:31Z |
CVE-2024-34831 | enzored/CVE-2024-34831 | Disclosure of CVE-2024-34831 | 2024-09-08T23:58:09Z |
CVE-2024-34741 | uthrasri/CVE-2024-34741 | no description | 2024-10-04T13:41:09Z |
CVE-2024-34739 | uthrasri/CVE-2024-34739 | no description | 2024-10-04T09:40:59Z |
CVE-2024-34716 | aelmokhtar/CVE-2024-34716_PoC | no description | 2024-05-14T18:48:41Z |
CVE-2024-34693 | mbadanoiu/CVE-2024-34693 | CVE-2024-34693: Server Arbitrary File Read in Apache Superset | 2024-07-27T21:28:11Z |
CVE-2024-34693 | labc-dev/CVE-2024-34693 | no description | 2024-07-29T04:30:23Z |
CVE-2024-34693 | Mr-r00t11/CVE-2024-34693 | no description | 2024-07-30T18:02:25Z |
CVE-2024-34582 | silent6trinity/CVE-2024-34582 | no description | 2024-05-16T12:40:46Z |
CVE-2024-34474 | Alaatk/CVE-2024-34474 | Clario through 2024-04-11 for Windows Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM. | 2024-05-05T05:28:15Z |
CVE-2024-34472 | osvaldotenorio/CVE-2024-34472 | no description | 2024-05-05T00:54:56Z |
CVE-2024-34471 | osvaldotenorio/CVE-2024-34471 | no description | 2024-05-05T01:10:39Z |
CVE-2024-34470 | osvaldotenorio/CVE-2024-34470 | no description | 2024-05-05T00:31:31Z |
CVE-2024-34470 | Cappricio-Securities/CVE-2024-34470 | HSC Mailinspector 5.2.17-3 through 5.2.18 - Local File Inclusion | 2024-06-20T04:01:42Z |
CVE-2024-34470 | Mr-r00t11/CVE-2024-34470 | no description | 2024-06-20T16:47:28Z |
CVE-2024-34470 | bigb0x/CVE-2024-34470 | POC and bulk scanner for CVE-2024-34470 | 2024-06-19T11:32:40Z |
CVE-2024-34470 | th3gokul/CVE-2024-34470 | CVE-2024-34470 : An Unauthenticated Path Traversal Vulnerability in HSC Mailinspector | 2024-06-23T02:23:57Z |
CVE-2024-34469 | Toxich4/CVE-2024-34469 | CVE-2024-34469 | 2024-05-07T07:47:20Z |
CVE-2024-34463 | yash-chandna/CVE-2024-34463 | no description | 2024-09-02T12:33:33Z |
CVE-2024-34452 | surajhacx/CVE-2024-34452 | Cross-Site Scripting (XSS) Vulnerability in CMSimple_XH | 2024-06-19T17:38:49Z |
CVE-2024-34361 | T0X1Cx/CVE-2024-34361-PiHole-SSRF-to-RCE | This repository contains an exploit for CVE-2024-34361, a critical Pi-hole vulnerability (CVSS 8.6). It uses SSRF to achieve RCE by exploiting improper URL validation, allowing attackers to send arbitrary requests and execute commands on the system. Disclaimer: For educational and ethical security testing only. Unauthorized use is illegal. | 2024-07-07T21:22:36Z |
CVE-2024-34351 | Voorivex/CVE-2024-34351 | no description | 2024-05-12T10:49:41Z |
CVE-2024-34351 | God4n/nextjs-CVE-2024-34351-_exploit | PoC for a full exploitation of NextJS SSRF (CVE-2024-34351) | 2024-08-27T15:10:26Z |
CVE-2024-34350 | Sudistark/rewrites-nextjs-CVE-2024-34350 | no description | 2024-06-27T14:00:34Z |
CVE-2024-3435 | ymuraki-csc/cve-2024-3435 | no description | 2024-05-20T02:17:44Z |
CVE-2024-34329 | pamoutaf/CVE-2024-34329 | no description | 2024-07-22T17:39:06Z |
CVE-2024-34313 | vincentscode/CVE-2024-34313 | ☣️ This repository contains the description and a proof of concept for CVE-2024-34313 | 2024-06-23T09:02:07Z |
CVE-2024-34312 | vincentscode/CVE-2024-34312 | ☣️ This repository contains the description and a proof of concept for CVE-2024-34312 | 2024-06-23T08:37:44Z |
CVE-2024-34310 | 3309899621/CVE-2024-34310 | CVE-2024-34310 | 2024-05-10T13:36:19Z |
CVE-2024-34226 | dovankha/CVE-2024-34226 | CVE-2024-34226 - SQL injection | 2024-05-11T10:33:04Z |
CVE-2024-34225 | dovankha/CVE-2024-34225 | CVE-20240-34225 - Cross Site Scripting | 2024-05-11T10:20:52Z |
CVE-2024-34224 | dovankha/CVE-2024-34224 | CVE-2024-34224 - Cross Site Scripting | 2024-05-11T08:58:31Z |
CVE-2024-34223 | dovankha/CVE-2024-34223 | CVE-2024-34223 - Insecure permission | 2024-05-11T08:36:16Z |
CVE-2024-34222 | dovankha/CVE-2024-34222 | CVE-2024-34222 - SQL injection | 2024-05-11T08:20:55Z |
CVE-2024-34221 | dovankha/CVE-2024-34221 | CVE-2024-34221 - Insecure pemission | 2024-05-09T10:32:30Z |
CVE-2024-34220 | dovankha/CVE-2024-34220 | CVE-2024-34220 - SQL injection | 2024-04-27T10:32:10Z |
CVE-2024-34144 | MXWXZ/CVE-2024-34144 | PoC for CVE-2024-34144 | 2024-07-29T03:02:39Z |
CVE-2024-34102 | ArturArz1/TestCVE-2024-34102 | no description | 2024-06-27T16:59:29Z |
CVE-2024-34102 | Chocapikk/CVE-2024-34102 | CosmicSting (CVE-2024-34102) | 2024-06-28T23:33:21Z |
CVE-2024-34102 | d0rb/CVE-2024-34102 | A PoC demonstration , critical XML entity injection vulnerability in Magento | 2024-06-28T14:50:29Z |
CVE-2024-34102 | cmsec423/CVE-2024-34102 | Magento XXE | 2024-07-01T05:06:42Z |
CVE-2024-34102 | 11whoami99/CVE-2024-34102 | POC for CVE-2024-34102 : Unauthenticated Magento XXE and bypassing WAF , You will get http connection on ur webhook | 2024-06-28T12:45:40Z |
CVE-2024-34102 | bigb0x/CVE-2024-34102 | POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce. | 2024-06-27T21:57:24Z |
CVE-2024-34102 | cmsec423/Magento-XXE-CVE-2024-34102 | no description | 2024-07-01T05:08:37Z |
CVE-2024-34102 | 0x0d3ad/CVE-2024-34102 | Magento XXE (CVE-2024-34102) | 2024-06-30T16:49:26Z |
CVE-2024-34102 | th3gokul/CVE-2024-34102 | CVE-2024-34102: Unauthenticated Magento XXE | 2024-06-27T18:10:13Z |
CVE-2024-34102 | 0xhunster/CVE-2024-34102 | no description | 2024-07-03T21:47:28Z |
CVE-2024-34102 | jakabakos/CVE-2024-34102-CosmicSting-XXE-in-Adobe-Commerce-and-Magento | CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102) | 2024-07-01T08:19:28Z |
CVE-2024-34102 | unknownzerobit/poc | poc for CVE-2024-34102 | 2024-07-08T11:23:12Z |
CVE-2024-34102 | crynomore/CVE-2024-34102 | Burp Extension to test for CVE-2024-34102 | 2024-07-11T11:54:08Z |
CVE-2024-34102 | SamJUK/cosmicsting-validator | CosmicSting (CVE-2024-34102) POC / Patch Validator | 2024-07-07T23:35:18Z |
CVE-2024-34102 | Phantom-IN/CVE-2024-34102 | no description | 2024-07-14T08:40:59Z |
CVE-2024-34102 | bughuntar/CVE-2024-34102 | Exploitation CVE-2024-34102 | 2024-07-13T10:25:23Z |
CVE-2024-34102 | bughuntar/CVE-2024-34102-Python | CVE-2024-34102 Exploiter based on Python | 2024-07-13T17:31:10Z |
CVE-2024-34102 | etx-Arn/CVE-2024-34102-RCE-PoC | CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce | 2024-08-01T17:36:33Z |
CVE-2024-34102 | etx-Arn/CVE-2024-34102-RCE | CVE-2024-34102 unauthenticated RCE PoC for Magento/adobe commerce | 2024-07-30T04:42:45Z |
CVE-2024-34102 | wubinworks/magento2-cosmic-sting-patch | Magento 2 patch for CVE-2024-34102(aka CosmicSting). Another way(as an extension) to hotfix the security hole if you cannot apply the official patch or cannot upgrade Magento. | 2024-08-08T07:47:24Z |
CVE-2024-34102 | EQSTLab/CVE-2024-34102 | PoC for CVE-2024-34102 | 2024-08-13T07:33:20Z |
CVE-2024-34102 | Jhonsonwannaa/CVE-2024-34102 | adobe commerce | 2024-08-19T19:25:48Z |
CVE-2024-34102 | bka/magento-cve-2024-34102-exploit-cosmicstring | no description | 2024-10-08T17:02:11Z |
CVE-2024-3400 | Yuvvi01/CVE-2024-3400 | no description | 2024-04-13T05:16:21Z |
CVE-2024-3400 | CerTusHack/CVE-2024-3400-PoC | no description | 2024-04-13T11:55:53Z |
CVE-2024-3400 | MrR0b0t19/CVE-2024-3400 | Vulnerabilidad de palo alto | 2024-04-14T19:11:16Z |
CVE-2024-3400 | momika233/CVE-2024-3400 | no description | 2024-04-14T15:16:16Z |
CVE-2024-3400 | index2014/CVE-2024-3400-Checker | A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。 | 2024-04-17T04:58:42Z |
CVE-2024-3400 | h4x0r-dz/CVE-2024-3400 | CVE-2024-3400 Palo Alto OS Command Injection | 2024-04-16T14:18:08Z |
CVE-2024-3400 | CONDITIONBLACK/CVE-2024-3400-POC | no description | 2024-04-16T17:08:15Z |
CVE-2024-3400 | FoxyProxys/CVE-2024-3400 | no description | 2024-04-13T18:14:47Z |
CVE-2024-3400 | LoanVitor/CVE-2024-3400- | no description | 2024-04-16T07:31:22Z |
CVE-2024-3400 | AdaniKamal/CVE-2024-3400 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | 2024-04-16T01:43:24Z |
CVE-2024-3400 | 0x0d3ad/CVE-2024-3400 | CVE-2024-3400 | 2024-04-13T14:00:31Z |
CVE-2024-3400 | retkoussa/CVE-2024-3400 | CVE-2024-3400 : Palo Alto OS Command Injection - POC | 2024-04-17T22:28:10Z |
CVE-2024-3400 | phantomradar/cve-2024-3400-poc | Simple POC for CVE-2024-3400 | 2024-04-17T21:03:39Z |
CVE-2024-3400 | Chocapikk/CVE-2024-3400 | no description | 2024-04-16T21:21:41Z |
CVE-2024-3400 | ak1t4/CVE-2024-3400 | Global Protec Palo Alto File Write Exploit | 2024-04-17T16:01:20Z |
CVE-2024-3400 | ZephrFish/CVE-2024-3400-Canary | Have we not learnt from HoneyPoC? | 2024-04-17T11:41:01Z |
CVE-2024-3400 | ihebski/CVE-2024-3400 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | 2024-04-16T21:24:15Z |
CVE-2024-3400 | HackingLZ/panrapidcheck | Extract useful information from PANOS support file for CVE-2024-3400 | 2024-04-19T14:56:17Z |
CVE-2024-3400 | codeblueprint/CVE-2024-3400 | Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400 | 2024-04-18T16:35:29Z |
CVE-2024-3400 | pwnj0hn/CVE-2024-3400 | Finding Palo Alto devices vulnerable to CVE-2024-3400. | 2024-04-19T06:37:32Z |
CVE-2024-3400 | sxyrxyy/CVE-2024-3400-Check | no description | 2024-04-18T21:12:49Z |
CVE-2024-3400 | Ravaan21/CVE-2024-3400 | CVE-2024-3400 POC written in Rust and Python | 2024-04-18T21:14:15Z |
CVE-2024-3400 | swaybs/CVE-2024-3400 | Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts | 2024-04-18T16:45:51Z |
CVE-2024-3400 | hahasagined/CVE-2024-3400 | EDL for IPs attacking customers with CVE-2024-3400 | 2024-04-18T15:06:03Z |
CVE-2024-3400 | zam89/CVE-2024-3400-pot | Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability | 2024-04-24T14:21:26Z |
CVE-2024-3400 | W01fh4cker/CVE-2024-3400-RCE-Scan | CVE-2024-3400-RCE | 2024-04-16T16:18:56Z |
CVE-2024-3400 | schooldropout1337/CVE-2024-3400 | no description | 2024-04-18T10:16:22Z |
CVE-2024-3400 | Kr0ff/cve-2024-3400 | Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation | 2024-04-21T12:38:13Z |
CVE-2024-3400 | 0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection | no description | 2024-04-25T10:23:03Z |
CVE-2024-3400 | terminalJunki3/CVE-2024-3400-Checker | Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. | 2024-04-24T14:30:34Z |
CVE-2024-3400 | marconesler/CVE-2024-3400 | Exploit for GlobalProtect CVE-2024-3400 | 2024-04-27T18:58:41Z |
CVE-2024-3400 | MurrayR0123/CVE-2024-3400-Compromise-Checker | A simple bash script to check for evidence of compromise related to CVE-2024-3400 | 2024-04-15T03:28:22Z |
CVE-2024-3400 | andrelia-hacks/CVE-2024-3400 | no description | 2024-05-12T19:48:20Z |
CVE-2024-3400 | tk-sawada/IPLineFinder | Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400 | 2024-05-15T15:50:32Z |
CVE-2024-3400 | iwallarm/cve-2024-3400 | no description | 2024-05-19T12:38:04Z |
CVE-2024-33911 | xbz0n/CVE-2024-33911 | no description | 2024-05-05T11:14:47Z |
CVE-2024-33896 | codeb0ss/CVE-2024-33896-PoC | Proof of concept CVE-2024-33896 | 2024-08-20T13:49:15Z |
CVE-2024-33883 | Grantzile/PoC-CVE-2024-33883 | PoC of CVE-2024-33883, RCE vulnerability of ejs. | 2024-06-25T18:40:31Z |
CVE-2024-33775 | Neo-XeD/CVE-2024-33775 | no description | 2024-05-01T15:46:32Z |
CVE-2024-33722 | fuzzlove/soplanning-1.52-exploits | SOPlanning 1.52.00 CSRF/SQLi/XSS (CVE-2024-33722, CVE-2024-33724) | 2024-04-22T19:51:18Z |
CVE-2024-33644 | Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally | Reproducing the following CVEs with dockerfile:CVE-2024-33644 CVE-2024-34370 CVE-2024-22120 | 2024-08-20T21:27:49Z |
CVE-2024-33559 | absholi7ly/WordPress-XStore-theme-SQL-Injection | (CVE-2024-33559) The XStore theme for WordPress is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query | 2024-05-17T04:15:34Z |
CVE-2024-33544 | codeb0ss/CVE-2024-33544-PoC | Mass Exploit - CVE-2024-33544 < Unauthenticated < SQL Injection | 2024-07-17T22:13:50Z |
CVE-2024-33453 | Ant1sec-ops/CVE-2024-33453 | Sensitive Data exposure | 2024-09-03T07:21:25Z |
CVE-2024-33438 | julio-cfa/CVE-2024-33438 | CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE). | 2024-04-24T16:31:17Z |
CVE-2024-33352 | mmiszczyk/CVE-2024-33352 | BlueStacks privilege escalation through VM backdooring | 2024-07-16T07:38:19Z |
CVE-2024-33339 | balckgu1/Poc | This repository is a proof of vulnerability for CVE-2024-33339 | 2024-04-28T01:56:40Z |
CVE-2024-33210 | paragbagul111/CVE-2024-33210 | A cross-site scripting (XSS) vulnerability has been identified in Flatpress 1.3. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users. | 2024-09-28T08:24:42Z |
CVE-2024-33209 | paragbagul111/CVE-2024-33209 | FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser. | 2024-09-28T08:17:01Z |
CVE-2024-33113 | tekua/CVE-2024-33113 | Le routeur D-LINK DIR-845L est vulnérable à un problème de divulgation d'informations. Plus précisément, le fichier bsc_sms_inbox.php sur l'appareil peut être exploité pour divulguer des informations sensibles. | 2024-06-25T14:16:03Z |
CVE-2024-33113 | FaLLenSKiLL1/CVE-2024-33113 | D-LINK DIR-845L is vulnerable to information disclosure via the bsc_sms_inbox.php file. | 2024-06-24T19:50:13Z |
CVE-2024-33111 | FaLLenSKiLL1/CVE-2024-33111 | D-Link DIR-845L router is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php. | 2024-06-25T14:54:01Z |
CVE-2024-33078 | HBLocker/CVE-2024-33078 | no description | 2024-05-01T15:45:45Z |
CVE-2024-3293 | truonghuuphuc/CVE-2024-3293-Poc | CVE-2024-3293 rtMedia for WordPress, BuddyPress and bbPress <= 4.6.18 - Authenticated (Contributor+) SQL Injection via rtmedia_gallery Shortcode | 2024-05-30T04:51:32Z |
CVE-2024-32766 | 3W1nd4r/CVE-2024-32766-RCE | writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass | 2024-05-02T23:39:18Z |
CVE-2024-3273 | adhikara13/CVE-2024-3273 | Exploit for CVE-2024-3273, supports single and multiple hosts | 2024-04-07T15:36:18Z |
CVE-2024-3273 | Chocapikk/CVE-2024-3273 | D-Link NAS CVE-2024-3273 Exploit Tool | 2024-04-07T03:09:13Z |
CVE-2024-3273 | ThatNotEasy/CVE-2024-3273 | D-Link NAS Command Execution Exploit | 2024-04-10T00:27:02Z |
CVE-2024-3273 | blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC | CVE-2024-30255 This repository contains a proof-of-concept (PoC) Python script to demonstrate the CPU exhaustion vulnerability in Envoy caused by a flood of CONTINUATION frames. | 2024-04-09T15:59:50Z |
CVE-2024-3273 | K3ysTr0K3R/CVE-2024-3273-EXPLOIT | A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE | 2024-04-09T12:26:37Z |
CVE-2024-3273 | LeopoldSkell/CVE-2024-3273 | no description | 2024-04-16T09:12:58Z |
CVE-2024-3273 | yarienkiva/honeypot-dlink-CVE-2024-3273 | Quick and dirty honeypot for CVE-2024-3273 | 2024-04-07T21:15:33Z |
CVE-2024-3273 | mrrobot0o/CVE-2024-3273- | no description | 2024-04-23T06:31:19Z |
CVE-2024-3273 | OIivr/Turvan6rkus-CVE-2024-3273 | no description | 2024-05-05T22:07:02Z |
CVE-2024-3273 | X-Projetion/CVE-2024-3273-D-Link-Remote-Code-Execution-RCE | CVE-2024-3273 - D-Link Remote Code Execution (RCE) | 2024-09-21T11:17:34Z |
CVE-2024-3272 | aliask/dinkleberry | Patch your D-Link device affected by CVE-2024-3272 | 2024-05-21T08:40:37Z |
CVE-2024-32709 | truonghuuphuc/CVE-2024-32709-Poc | CVE-2024-32709 WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Unauthenticated SQL Injection | 2024-05-05T17:21:55Z |
CVE-2024-32700 | nastar-id/CVE-2024-32700 | no description | 2024-08-03T07:41:30Z |
CVE-2024-32651 | zcrosman/cve-2024-32651 | changedetection rce though ssti | 2024-05-26T21:24:14Z |
CVE-2024-32651 | s0ck3t-s3c/CVE-2024-32651-changedetection-RCE | Server-Side Template Injection Exploit | 2024-09-16T13:11:38Z |
CVE-2024-32640 | Stuub/CVE-2024-32640-SQLI-MuraCMS | CVE-2024-32640 - Automated SQLi Exploitation PoC | 2024-05-16T01:02:32Z |
CVE-2024-32640 | 0x3f3c/CVE-2024-32640-SQLI-MuraCMS | no description | 2024-05-17T13:43:59Z |
CVE-2024-32640 | sammings/CVE-2024-32640 | sql延时注入poc | 2024-06-06T08:56:34Z |
CVE-2024-32523 | truonghuuphuc/CVE-2024-32523-Poc | CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion | 2024-05-11T18:16:31Z |
CVE-2024-32459 | absholi7ly/FreeRDP-Out-of-Bounds-Read-CVE-2024-32459- | The FreeRDP - Out-of-Bounds Read (CVE-2024-32459) vulnerability concerns FreeRDP, a free implementation of Remote Desktop Protocol. FreeRDP-based clients and servers using a version of FreeRDP prior to version 3.5.0 or 2.11.6 are vulnerable to out-of-bounds reading12. Versions 3.5.0 and 2.11.6 correct the problem | 2024-05-22T04:19:27Z |
CVE-2024-32399 | NN0b0dy/CVE-2024-32399 | no description | 2024-04-22T15:15:37Z |
CVE-2024-32371 | chucrutis/CVE-2024-32371 | no description | 2024-05-06T17:41:06Z |
CVE-2024-32370 | chucrutis/CVE-2024-32370 | no description | 2024-05-06T17:28:57Z |
CVE-2024-32369 | chucrutis/CVE-2024-32369 | no description | 2024-05-06T17:22:15Z |
CVE-2024-32258 | liyansong2018/CVE-2024-32258 | no description | 2024-04-18T17:07:07Z |
CVE-2024-32238 | asdfjkl11/CVE-2024-32238 | no description | 2024-04-20T03:55:21Z |
CVE-2024-32238 | FuBoLuSec/CVE-2024-32238 | H3C ER8300G2-X config download | 2024-04-20T16:23:10Z |
CVE-2024-32205 | Lucky-lm/CVE-2024-32205 | no description | 2024-04-20T04:11:19Z |
CVE-2024-3217 | BassamAssiri/CVE-2024-3217-POC | no description | 2024-04-17T13:43:57Z |
CVE-2024-32136 | xbz0n/CVE-2024-32136 | no description | 2024-05-05T10:49:08Z |
CVE-2024-32113 | Mr-xn/CVE-2024-32113 | Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104] | 2024-06-03T15:57:59Z |
CVE-2024-32113 | RacerZ-fighting/CVE-2024-32113-POC | Apache OfBiz vulns | 2024-04-10T13:22:11Z |
CVE-2024-32113 | YongYe-Security/CVE-2024-32113 | CVE-2024-32113 Apache OFBIZ Batch Scanning | 2024-08-07T07:12:56Z |
CVE-2024-32104 | Cerberus-HiproPlus/CVE-2024-32104 | no description | 2024-07-31T12:20:07Z |
CVE-2024-32030 | huseyinstif/CVE-2024-32030-Nuclei-Template | no description | 2024-06-24T11:57:26Z |
CVE-2024-32004 | 10cks/CVE-2024-32004-POC | no description | 2024-05-20T14:59:16Z |
CVE-2024-32004 | Wadewfsssss/CVE-2024-32004 | no description | 2024-05-19T13:57:46Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-POC | no description | 2024-05-19T05:05:07Z |
CVE-2024-32002 | M507/CVE-2024-32002 | local poc for CVE-2024-32002 | 2024-05-18T02:42:33Z |
CVE-2024-32002 | safebuffer/CVE-2024-32002 | CVE-2024-32002 RCE PoC | 2024-05-18T15:05:28Z |
CVE-2024-32002 | markuta/hooky | A submodule for exploiting CVE-2024-32002 vulnerability. | 2024-05-17T15:37:42Z |
CVE-2024-32002 | 10cks/hook | CVE-2024-32002-hook | 2024-05-20T02:44:07Z |
CVE-2024-32002 | aitorcastel/poc_CVE-2024-32002 | no description | 2024-05-19T16:33:35Z |
CVE-2024-32002 | aitorcastel/poc_CVE-2024-32002_submodule | no description | 2024-05-19T16:34:11Z |
CVE-2024-32002 | amalmurali47/git_rce | Exploit PoC for CVE-2024-32002 | 2024-05-17T19:33:08Z |
CVE-2024-32002 | amalmurali47/hook | Hook for the PoC for exploiting CVE-2024-32002 | 2024-05-17T19:35:44Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-linux-submod | no description | 2024-05-19T05:32:08Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-linux-hulk | no description | 2024-05-19T05:31:41Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-linux-smash | no description | 2024-05-19T05:32:34Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-hulk | no description | 2024-05-19T05:08:08Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-submod | no description | 2024-05-19T05:08:22Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-smash | no description | 2024-05-19T05:08:36Z |
CVE-2024-32002 | KiranKumarK20/CVE-2024-32002 | no description | 2024-05-20T10:07:51Z |
CVE-2024-32002 | jweny/CVE-2024-32002_EXP | no description | 2024-05-20T02:58:57Z |
CVE-2024-32002 | CrackerCat/CVE-2024-32002_EXP | no description | 2024-05-20T06:12:02Z |
CVE-2024-32002 | jweny/CVE-2024-32002_HOOK | no description | 2024-05-20T02:52:42Z |
CVE-2024-32002 | Roronoawjd/hook | CVE-2024-32002 hook POC | 2024-05-21T12:31:57Z |
CVE-2024-32002 | Hector65432/cve-2024-32002-2 | no description | 2024-05-22T15:24:46Z |
CVE-2024-32002 | Hector65432/cve-2024-32002-1 | no description | 2024-05-22T15:24:19Z |
CVE-2024-32002 | 1mxml/CVE-2024-32002-poc | no description | 2024-05-22T10:01:58Z |
CVE-2024-32002 | YuanlooSec/CVE-2024-32002-poc | no description | 2024-05-22T02:51:36Z |
CVE-2024-32002 | JJoosh/CVE-2024-32002-Reverse-Shell | Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad. | 2024-05-21T13:45:58Z |
CVE-2024-32002 | vincepsh/CVE-2024-32002 | Repo for testing CVE-2024-32002 | 2024-05-22T18:43:36Z |
CVE-2024-32002 | vincepsh/CVE-2024-32002-hook | CVE-2024-32002-hook | 2024-05-22T18:50:56Z |
CVE-2024-32002 | bfengj/CVE-2024-32002-Exploit | no description | 2024-05-22T11:32:33Z |
CVE-2024-32002 | ycdxsb/CVE-2024-32002-submod | no description | 2024-05-22T11:27:14Z |
CVE-2024-32002 | ycdxsb/CVE-2024-32002-hulk | no description | 2024-05-22T11:26:30Z |
CVE-2024-32002 | bfengj/CVE-2024-32002-hook | no description | 2024-05-22T11:05:48Z |
CVE-2024-32002 | Roronoawjd/git_rce | CVE-2024-32002 POC | 2024-05-21T13:19:15Z |
CVE-2024-32002 | WOOOOONG/CVE-2024-32002 | PoC Exploit for CVE-2024-32002 | 2024-05-23T06:38:34Z |
CVE-2024-32002 | WOOOOONG/hook | PoC Exploit for CVE-2024-32002 | 2024-05-23T06:38:56Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-EXP | no description | 2024-05-23T04:25:51Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-poc-rce | no description | 2024-05-18T11:23:43Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-poc-aw | A POC for CVE-2024-32002 demonstrating arbitrary write into the .git directory. | 2024-05-25T10:30:57Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-submodule-aw | A submodule to demonstrate CVE-2024-32002. Demonstrates arbitrary write into .git. | 2024-05-25T10:29:13Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-submodule-rce | no description | 2024-05-18T11:20:31Z |
CVE-2024-32002 | fadhilthomas/poc-cve-2024-32002 | poc of git rce using cve-2024-32002 | 2024-05-23T07:56:05Z |
CVE-2024-32002 | fadhilthomas/hook | part of poc cve-2024-32002 | 2024-05-24T09:23:42Z |
CVE-2024-32002 | Goplush/CVE-2024-32002-git-rce | no description | 2024-05-28T05:27:23Z |
CVE-2024-32002 | AD-Appledog/CVE-2024-32002 | CVE-2024-32002wakuwaku | 2024-05-31T02:40:31Z |
CVE-2024-32002 | AD-Appledog/wakuwaku | cve-2024-32002yahhh | 2024-05-31T02:45:44Z |
CVE-2024-32002 | markuta/CVE-2024-32002 | A proof of concept for the git vulnerability CVE-2024-32002 | 2024-05-17T15:35:50Z |
CVE-2024-32002 | 431m/rcetest | CVE-2024-32002 poc test | 2024-05-30T06:08:33Z |
CVE-2024-32002 | Zhang-Yiiliin/test_cve_2024_32002 | no description | 2024-05-31T08:10:39Z |
CVE-2024-32002 | tobelight/cve_2024_32002 | https://www.cve.org/CVERecord?id=CVE-2024-32002 | 2024-06-01T12:27:50Z |
CVE-2024-32002 | tobelight/cve_2024_32002_hook | no description | 2024-06-01T12:25:04Z |
CVE-2024-32002 | Basyaact/CVE-2024-32002-PoC_Chinese | none | 2024-06-01T20:19:05Z |
CVE-2024-32002 | bonnettheo/CVE-2024-32002 | exploit for CVE-2024-32002 | 2024-06-20T07:37:09Z |
CVE-2024-32002 | sysonlai/CVE-2024-32002-hook | no description | 2024-07-07T14:50:23Z |
CVE-2024-32002 | EQSTSeminar/git_rce | git clone rce CVE-2024-32002 | 2024-07-03T08:01:39Z |
CVE-2024-32002 | TSY244/CVE-2024-32002-git-rce | no description | 2024-07-20T04:31:26Z |
CVE-2024-32002 | TSY244/CVE-2024-32002-git-rce-father-poc | no description | 2024-07-20T03:59:35Z |
CVE-2024-32002 | h3xm4n/CVE-2024-32002 | RCE through git recursive cloning. | 2024-07-29T01:06:19Z |
CVE-2024-32002 | blackninja23/CVE-2024-32002 | no description | 2024-07-27T23:44:25Z |
CVE-2024-32002 | charlesgargasson/CVE-2024-32002 | GIT RCE CVE-2024-32002 | 2024-07-29T10:00:41Z |
CVE-2024-32002 | tiyeume25112004/CVE-2024-32002 | Just small script to exploit CVE-2024-32002 | 2024-07-30T23:20:51Z |
CVE-2024-32002 | NishanthAnand21/CVE-2024-32002-PoC | PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories | 2024-07-30T14:58:00Z |
CVE-2024-32002 | daemon-reconfig/CVE-2024-32002 | A Reverse shell generator for gitlab-shell vulnerability cve 2024-32002 | 2024-07-28T14:22:01Z |
CVE-2024-32002 | chrisWalker11/running-CVE-2024-32002-locally-for-tesing | adapting CVE-2024-32002 for running offline and locally | 2024-08-02T18:44:00Z |
CVE-2024-32002 | sanan2004/CVE-2024-32002 | POC | 2024-08-17T16:43:26Z |
CVE-2024-32002 | FlojBoj/CVE-2024-32002 | no description | 2024-07-30T21:22:29Z |
CVE-2024-32002 | Masamuneee/CVE-2024-32002-POC | This is a demo for CVE-2024-32002 POC | 2024-09-27T03:10:04Z |
CVE-2024-32002 | Masamuneee/hook | This is a demo for CVE-2024-32002 POC | 2024-09-27T03:09:18Z |
CVE-2024-32002 | th4s1s/CVE-2024-32002-PoC | Proof of Concept for CVE-2024-32002 | 2024-09-27T03:29:15Z |
CVE-2024-32002 | Julian-gmz/hook_CVE-2024-32002 | hihihihaa | 2024-10-08T10:57:17Z |
CVE-2024-320002 | bonnettheo/hook | submodule for CVE-2024-320002 | 2024-06-20T09:02:23Z |
CVE-2024-31989 | vt0x78/CVE-2024-31989 | Exploit for CVE-2024-31989. | 2024-07-17T14:23:52Z |
CVE-2024-31982 | k3lpi3b4nsh33/CVE-2024-31982 | no description | 2024-06-22T08:47:20Z |
CVE-2024-31982 | bigb0x/CVE-2024-31982 | POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20 | 2024-06-22T21:20:33Z |
CVE-2024-31982 | th3gokul/CVE-2024-31982 | A tool for vulnerability detection and exploitation tool for CVE-2024-31982 | 2024-06-22T17:04:02Z |
CVE-2024-31974 | actuator/com.solarized.firedown | CVE-2024-31974 | 2024-05-17T02:02:00Z |
CVE-2024-31851 | GKalmus/referaat | CVE-2024-31851 | 2024-05-04T16:56:34Z |
CVE-2024-31848 | Stuub/CVE-2024-31848-PoC | PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal | 2024-05-07T10:42:03Z |
CVE-2024-31835 | paragbagul111/CVE-2024-31835 | Cross Site Scripting vulnerability in flatpress CMS Flatpress v1.3 allows a remote attacker to execute arbitrary code via a craftedpayload to the file name parameter. | 2024-09-27T15:17:10Z |
CVE-2024-3183 | Cyxow/CVE-2024-3183-POC | POC for CVE-2024-3183 (FreeIPA Rosting) | 2024-08-14T14:24:58Z |
CVE-2024-31819 | Chocapikk/CVE-2024-31819 | Unauthenticated Remote Code Execution (RCE) Vulnerability in WWBNIndex Plugin of AVideo Platform from 12.4 to 14.2 | 2024-03-27T14:41:10Z |
CVE-2024-31819 | Jhonsonwannaa/CVE-2024-31819 | An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component. | 2024-06-09T08:48:21Z |
CVE-2024-31777 | FreySolarEye/Exploit-CVE-2024-31777 | Public exploit for CVE-2024-31777 | 2024-04-11T13:48:19Z |
CVE-2024-31771 | restdone/CVE-2024-31771 | no description | 2024-04-10T17:09:34Z |
CVE-2024-31734 | HBLocker/CVE-2024-31734 | CVE-2024-31734 | 2024-04-15T07:19:10Z |
CVE-2024-31719 | VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability | no description | 2023-07-30T00:07:14Z |
CVE-2024-31666 | hapa3/CVE-2024-31666 | no description | 2024-03-31T08:27:30Z |
CVE-2024-3154 | cdxiaodong/CVE-2024-3154-communication | how does it run? | 2024-04-29T04:03:11Z |
CVE-2024-31497 | sh1k4ku/CVE-2024-31497 | A script designed to uncover vulnerabilities in Putty by exploiting CVE-2024-31497. | 2024-04-17T04:00:20Z |
CVE-2024-31497 | edutko/cve-2024-31497 | no description | 2024-04-17T10:43:42Z |
CVE-2024-31497 | HugoBond/CVE-2024-31497-POC | Proof Of Concept that exploits PuTTy CVE-2024-31497. | 2024-05-10T14:30:50Z |
CVE-2024-31351 | KTN1990/CVE-2024-31351_wordpress_exploit | Wordpress - Copymatic – AI Content Writer & Generator <= 1.6 - Unauthenticated Arbitrary File Upload | 2024-05-25T04:02:23Z |
CVE-2024-31319 | 23Nero/fix-02-failure-CVE-2024-31319-CVE-2024-0039 | no description | 2024-08-23T06:28:12Z |
CVE-2024-31211 | Abdurahmon3236/-CVE-2024-31211 | no description | 2024-08-03T19:26:55Z |
CVE-2024-31210 | Abo5/CVE-2024-31210 | This Ruby script checks if a given WordPress site is vulnerable to CVE-2024-31210, which allows administrator-level users on single-site installations and Super Admin-level users on Multisite installations to execute arbitrary PHP code via the plugin upload mechanism. | 2024-06-13T00:24:56Z |
CVE-2024-3116 | TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4 | Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4 | 2024-04-07T23:03:55Z |
CVE-2024-3105 | hunThubSpace/CVE-2024-3105-PoC | A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE) | 2024-08-10T14:52:44Z |
CVE-2024-31025 | mortal-sec/CVE-2024-31025 | Vulnerability verification | 2024-03-28T23:50:30Z |
CVE-2024-30998 | efekaanakkar/CVE-2024-30998 | no description | 2024-03-30T11:18:21Z |
CVE-2024-30973 | Athos-Zago/CVE-2024-30973 | POC VIDEO - https://youtu.be/hNzmkJj-ImM?si=NF0yoSL578rNy7wN | 2024-04-24T16:10:22Z |
CVE-2024-30956 | leoCottret/CVE-2024-30956 | (DOM-based XSS) HTML Injection vulnerability in TOWeb v.12.05 and before allows an attacker to inject HTML/JS code via the _message.html component. | 2024-04-03T07:38:11Z |
CVE-2024-3094 | Fractal-Tess/CVE-2024-3094 | no description | 2024-03-29T23:36:07Z |
CVE-2024-3094 | bioless/xz_cve-2024-3094_detection | Script to detect CVE-2024-3094. | 2024-03-29T23:20:22Z |
CVE-2024-3094 | lypd0/CVE-2024-3094-Vulnerabity-Checker | Verify that your XZ Utils version is not vulnerable to CVE-2024-3094 | 2024-03-29T20:52:27Z |
CVE-2024-3094 | OpensourceICTSolutions/xz_utils-CVE-2024-3094 | no description | 2024-03-29T21:41:42Z |
CVE-2024-3094 | ioprojecton/dir-3040_dos | CVE-2024-27619 | 2024-02-24T19:21:00Z |
CVE-2024-3094 | ashwani95/CVE-2024-3094 | no description | 2024-03-30T15:29:05Z |
CVE-2024-3094 | wgetnz/CVE-2024-3094-check | no description | 2024-03-30T07:38:39Z |
CVE-2024-3094 | Hacker-Hermanos/CVE-2024-3094_xz_check | This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the "xz" utility, as specified by CVE-2024-3094. | 2024-03-29T23:21:44Z |
CVE-2024-3094 | isuruwa/CVE-2024-3094 | CVE-2024-3094 | 2024-03-31T04:50:09Z |
CVE-2024-3094 | hazemkya/CVE-2024-3094-checker | no description | 2024-03-30T21:56:17Z |
CVE-2024-3094 | FabioBaroni/CVE-2024-3094-checker | Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094) | 2024-03-29T20:28:17Z |
CVE-2024-3094 | Horizon-Software-Development/CVE-2024-3094 | no description | 2024-03-30T20:05:13Z |
CVE-2024-3094 | harekrishnarai/xz-utils-vuln-checker | Checker for CVE-2024-3094 where malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. | 2024-03-30T16:25:50Z |
CVE-2024-3094 | zgimszhd61/cve-2024-3094-detect-tool | no description | 2024-04-01T04:28:24Z |
CVE-2024-3094 | galacticquest/cve-2024-3094-detect | no description | 2024-04-01T02:25:33Z |
CVE-2024-3094 | MrBUGLF/XZ-Utils_CVE-2024-3094 | XZ-Utils工具库恶意后门植入漏洞(CVE-2024-3094) | 2024-04-01T01:56:08Z |
CVE-2024-3094 | gayatriracha/CVE-2024-3094-Nmap-NSE-script | no description | 2024-03-31T17:53:11Z |
CVE-2024-3094 | Simplifi-ED/CVE-2024-3094-patcher | Ansible playbook for patching CVE-2024-3094 | 2024-03-31T14:09:28Z |
CVE-2024-3094 | teyhouse/CVE-2024-3094 | K8S and Docker Vulnerability Check for CVE-2024-3094 | 2024-03-30T17:35:49Z |
CVE-2024-3094 | krascovict/OSINT---CVE-2024-3094- | no description | 2024-03-31T12:21:34Z |
CVE-2024-3094 | Yuma-Tsushima07/CVE-2024-3094 | A script to detect if xz is vulnerable - CVE-2024-3094 | 2024-03-31T10:45:44Z |
CVE-2024-3094 | k4t3pr0/Check-CVE-2024-3094 | no description | 2024-03-31T08:14:41Z |
CVE-2024-3094 | devjanger/CVE-2024-3094-XZ-Backdoor-Detector | CVE-2024-3094 XZ Backdoor Detector | 2024-04-02T01:56:29Z |
CVE-2024-3094 | hackingetico21/revisaxzutils | Script en bash para revisar si tienes la vulnerabilidad CVE-2024-3094. | 2024-04-02T01:22:04Z |
CVE-2024-3094 | ackemed/detectar_cve-2024-3094 | no description | 2024-04-01T15:36:58Z |
CVE-2024-3094 | dah4k/CVE-2024-3094 | no description | 2024-04-01T16:42:47Z |
CVE-2024-3094 | byinarie/CVE-2024-3094-info | Information for CVE-2024-3094 | 2024-03-29T17:03:01Z |
CVE-2024-3094 | emirkmo/xz-backdoor-github | History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094. | 2024-03-30T10:48:54Z |
CVE-2024-3094 | brinhosa/CVE-2024-3094-One-Liner | no description | 2024-03-30T23:16:10Z |
CVE-2024-3094 | mesutgungor/xz-backdoor-vulnerability | CVE-2024-3094 | 2024-04-01T09:09:54Z |
CVE-2024-3094 | mightysai1997/CVE-2024-3094 | no description | 2024-04-01T09:06:25Z |
CVE-2024-3094 | mightysai1997/CVE-2024-3094-info | no description | 2024-04-01T09:05:47Z |
CVE-2024-3094 | Mustafa1986/CVE-2024-3094 | no description | 2024-03-31T18:46:58Z |
CVE-2024-3094 | amlweems/xzbot | notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) | 2024-04-01T14:28:09Z |
CVE-2024-3094 | gustavorobertux/CVE-2024-3094 | Checker - CVE-2024-3094 | 2024-04-01T15:15:16Z |
CVE-2024-3094 | pentestfunctions/CVE-2024-3094 | CVE-2024-3094 - Checker (fix for arch etc) | 2024-04-02T08:55:50Z |
CVE-2024-3094 | 0xlane/xz-cve-2024-3094 | XZ Backdoor Extract(Test on Ubuntu 23.10) | 2024-04-01T16:08:50Z |
CVE-2024-3094 | lockness-Ko/xz-vulnerable-honeypot | An ssh honeypot with the XZ backdoor. CVE-2024-3094 | 2024-03-30T22:07:24Z |
CVE-2024-3094 | ScrimForever/CVE-2024-3094 | Detectar CVE-2024-3094 | 2024-04-02T03:36:07Z |
CVE-2024-3094 | Bella-Bc/xz-backdoor-CVE-2024-3094-Check | Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor | 2024-04-03T13:09:32Z |
CVE-2024-3094 | MagpieRYL/CVE-2024-3094-backdoor-env-container | This is a container environment running CVE-2024-3094 sshd backdoor instance, working with https://github.com/amlweems/xzbot project. IT IS NOT Docker, just implemented by chroot. | 2024-04-03T10:50:47Z |
CVE-2024-3094 | Security-Phoenix-demo/CVE-2024-3094-fix-exploits | Collection of Detection, Fix, and exploit for CVE-2024-3094 | 2024-04-03T07:51:49Z |
CVE-2024-3094 | weltregie/liblzma-scan | Scans liblzma from xu-utils for backdoor (CVE-2024-3094) | 2024-04-04T11:29:41Z |
CVE-2024-3094 | CyberGuard-Foundation/CVE-2024-3094 | Our current information about the CVE-2024-3094 backdoor. | 2024-04-02T23:10:06Z |
CVE-2024-3094 | TheTorjanCaptain/CVE-2024-3094-Checker | The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094. | 2024-04-03T19:10:43Z |
CVE-2024-3094 | crfearnworks/ansible-CVE-2024-3094 | Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor) | 2024-04-04T13:31:20Z |
CVE-2024-3094 | felipecosta09/cve-2024-3094 | A tutorial on how to detect the CVE 2024-3094 | 2024-04-04T06:40:56Z |
CVE-2024-3094 | robertdebock/ansible-playbook-cve-2024-3094 | A small repo with a single playbook. | 2024-04-04T14:52:09Z |
CVE-2024-3094 | iheb2b/CVE-2024-3094-Checker | The CVE-2024-3094 Checker is a Bash tool for identifying if Linux systems are at risk from the CVE-2024-3094 flaw in XZ/LZMA utilities. It checks XZ versions, SSHD's LZMA linkage, and scans for specific byte patterns, delivering results in a concise table format. | 2024-04-03T22:19:50Z |
CVE-2024-3094 | hackintoanetwork/ARC-Browser-Address-Bar-Spoofing-PoC | CVE-2024-25733 - ARC Browser Address Bar Spoofing PoC - iOS/iPadOS | 2024-04-06T20:18:15Z |
CVE-2024-3094 | r0binak/xzk8s | Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094 | 2024-04-02T20:07:14Z |
CVE-2024-3094 | jfrog/cve-2024-3094-tools | no description | 2024-03-31T10:46:33Z |
CVE-2024-3094 | alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer | Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook | 2024-03-30T19:23:30Z |
CVE-2024-3094 | Juul/xz-backdoor-scan | Scan for files containing the signature from the xz backdoor (CVE-2024-3094) |
2024-04-06T06:29:43Z |
CVE-2024-3094 | fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094- | La siguiente regla YARA ayuda a detectar la presencia del backdoor en la librería liblzma comprometida en sistemas que utilizan las versiones 5.6.0 y 5.6.1 de la herramienta de compresión XZ. | 2024-04-13T16:37:32Z |
CVE-2024-3094 | neuralinhibitor/xzwhy | XZ Utils CVE-2024-3094 POC for Kubernetes | 2024-04-18T13:08:05Z |
CVE-2024-3094 | przemoc/xz-backdoor-links | apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links | 2024-04-02T20:17:07Z |
CVE-2024-3094 | reuteras/CVE-2024-3094 | Obsidian notes about CVE-2024-3094 | 2024-04-01T12:41:00Z |
CVE-2024-3094 | robertdebock/ansible-role-cve_2024_3094 | Check xz vulnerability (cve_2024_3094) on your system. | 2024-04-02T08:31:40Z |
CVE-2024-3094 | buluma/ansible-role-cve_2024_3094 | Check xz vulnerability (cve_2024_3094) on your system. | 2024-04-20T06:15:57Z |
CVE-2024-3094 | shefirot/CVE-2024-3094 | Basic POC to test CVE-2024-3094 vulnerability inside K8s cluster | 2024-06-11T14:19:17Z |
CVE-2024-3094 | DANO-AMP/CVE-2024-3094 | SSH EXPLOIT BYPASS AUTH SSH | 2024-07-05T12:02:10Z |
CVE-2024-3094 | robertdfrench/ifuncd-up | GNU IFUNC is the real culprit behind CVE-2024-3094 | 2024-07-05T18:36:16Z |
CVE-2024-30896 | XenoM0rph97/CVE-2024-30896 | no description | 2024-03-22T16:50:40Z |
CVE-2024-30875 | Ant1sec-ops/CVE-2024-30875 | Reflected Cross Site Scripting - RXSS | 2024-09-03T07:11:08Z |
CVE-2024-30851 | chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc | Jasmin ransomware web panel path traversal PoC | 2024-04-04T22:59:55Z |
CVE-2024-30850 | chebuya/CVE-2024-30850-chaos-rat-rce-poc | CHAOS RAT web panel path RCE PoC | 2024-04-05T21:35:04Z |
CVE-2024-30737 | yashpatelphd/CVE-2024-30737 | Remote Command Execution Vulnerability in ROS Kinetic Kame | 2024-04-05T11:41:48Z |
CVE-2024-30736 | yashpatelphd/CVE-2024-30736 | Insecure Deserialization Vulnerability in ROS Kinetic Kame | 2024-04-05T11:37:53Z |
CVE-2024-30735 | yashpatelphd/CVE-2024-30735 | Arbitrary File Upload Vulnerability in ROS Kinetic Kame | 2024-04-05T11:35:13Z |
CVE-2024-30733 | yashpatelphd/CVE-2024-30733 | Buffer Overflow Vulnerability in ROS Kinetic Kame | 2024-04-05T11:30:30Z |
CVE-2024-30730 | yashpatelphd/CVE-2024-30730 | Insecure Logging Vulnerability in ROS Kinetic Kame | 2024-04-05T11:23:45Z |
CVE-2024-30729 | yashpatelphd/CVE-2024-30729 | OS Command Injection Vulnerability in ROS Kinetic Kame | 2024-04-05T11:20:26Z |
CVE-2024-30728 | yashpatelphd/CVE-2024-30728 | Security Misconfiguration in ROS Kinetic Kame | 2024-04-05T11:18:00Z |
CVE-2024-30727 | yashpatelphd/CVE-2024-30727 | Information Leakage in ROS Kinetic Kame via Plaintext Message Transmission | 2024-04-05T11:14:44Z |
CVE-2024-30726 | yashpatelphd/CVE-2024-30726 | Shell Injection Vulnerability in ROS Kinetic Kame | 2024-04-05T11:11:38Z |
CVE-2024-30724 | yashpatelphd/CVE-2024-30724 | Unauthorized Information Access Vulnerability in ROS Kinetic Kame | 2024-04-05T11:06:04Z |
CVE-2024-30723 | yashpatelphd/CVE-2024-30723 | Unauthorized Node Injection Vulnerability in ROS Kinetic Kame | 2024-04-05T11:02:29Z |
CVE-2024-30722 | yashpatelphd/CVE-2024-30722 | Denial-of-Service (DoS) Vulnerability in ROS Kinetic Kame | 2024-04-05T10:59:20Z |
CVE-2024-30721 | yashpatelphd/CVE-2024-30721 | Arbitrary File Upload Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:18:56Z |
CVE-2024-30719 | yashpatelphd/CVE-2024-30719 | Insecure Deserialization Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:13:48Z |
CVE-2024-30718 | yashpatelphd/CVE-2024-30718 | Remote Command Execution Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:10:33Z |
CVE-2024-30716 | yashpatelphd/CVE-2024-30716 | Insecure Logging Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:03:00Z |
CVE-2024-30715 | yashpatelphd/CVE-2024-30715 | Buffer Overflow Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:00:47Z |
CVE-2024-30713 | yashpatelphd/CVE-2024-30713 | OS Command Injection Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:55:12Z |
CVE-2024-30712 | yashpatelphd/CVE-2024-30712 | Shell Injection Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:51:04Z |
CVE-2024-30711 | yashpatelphd/CVE-2024-30711 | Security Misconfiguration in ROS2 Dashing Diademata | 2024-04-05T08:47:00Z |
CVE-2024-30710 | yashpatelphd/CVE-2024-30710 | Information Leakage in ROS2 Dashing Diademata via Plaintext Message Transmission | 2024-04-05T08:44:11Z |
CVE-2024-30708 | yashpatelphd/CVE-2024-30708 | Denial-of-Service (DoS) Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:35:00Z |
CVE-2024-30707 | yashpatelphd/CVE-2024-30707 | Unauthorized Node Injection Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:31:34Z |
CVE-2024-30706 | yashpatelphd/CVE-2024-30706 | Unauthorized Access Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:28:29Z |
CVE-2024-30704 | yashpatelphd/CVE-2024-30704 | Insecure Deserialization Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:53:14Z |
CVE-2024-30703 | yashpatelphd/CVE-2024-30703 | Arbitrary File Upload Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:50:36Z |
CVE-2024-30702 | yashpatelphd/CVE-2024-30702 | Remote Command Execution Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:47:50Z |
CVE-2024-30701 | yashpatelphd/CVE-2024-30701 | Insecure Logging Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:44:57Z |
CVE-2024-30699 | yashpatelphd/CVE-2024-30699 | Buffer Overflow Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:40:30Z |
CVE-2024-30697 | yashpatelphd/CVE-2024-30697 | Information Leakage in ROS2 Galactic Geochelone via Plaintext Message Transmission | 2024-04-05T07:34:53Z |
CVE-2024-30696 | yashpatelphd/CVE-2024-30696 | OS Command Injection Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:32:26Z |
CVE-2024-30695 | yashpatelphd/CVE-2024-30695 | Security Misconfiguration in ROS2 Galactic Geochelone | 2024-04-05T07:29:59Z |
CVE-2024-30694 | yashpatelphd/CVE-2024-30694 | Shell Injection Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:26:05Z |
CVE-2024-30692 | yashpatelphd/CVE-2024-30692 | Denial-of-Service (DoS) Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:21:20Z |
CVE-2024-30691 | yashpatelphd/CVE-2024-30691 | Unauthorized Access Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:18:11Z |
CVE-2024-30690 | yashpatelphd/CVE-2024-30690 | Unauthorized Node Injection Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:13:52Z |
CVE-2024-30688 | yashpatelphd/CVE-2024-30688 | Arbitrary File Upload Vulnerability in ROS2 Iron Irwini | 2024-04-05T07:07:24Z |
CVE-2024-30687 | yashpatelphd/CVE-2024-30687 | Insecure Deserialization Vulnerability in ROS2 Iron Irwini | 2024-04-05T07:04:36Z |
CVE-2024-30686 | yashpatelphd/CVE-2024-30686 | Remote Command Execution Vulnerability in ROS2 Iron Irwini | 2024-04-05T07:00:40Z |
CVE-2024-30684 | yashpatelphd/CVE-2024-30684 | Insecure Logging Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:48:46Z |
CVE-2024-30683 | yashpatelphd/CVE-2024-30683 | Buffer Overflow Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:45:50Z |
CVE-2024-30681 | yashpatelphd/CVE-2024-30681 | OS Command Injection Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:39:18Z |
CVE-2024-30680 | yashpatelphd/CVE-2024-30680 | Shell Injection Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:36:11Z |
CVE-2024-30679 | yashpatelphd/CVE-2024-30679 | Security Misconfiguration in ROS2 Iron Irwini | 2024-04-05T06:33:28Z |
CVE-2024-30678 | yashpatelphd/CVE-2024-30678 | Information Leakage in ROS2 Iron Irwini via Plaintext Message Transmission | 2024-04-05T06:29:53Z |
CVE-2024-30676 | yashpatelphd/CVE-2024-30676 | Denial-of-Service (DoS) Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:24:24Z |
CVE-2024-30675 | yashpatelphd/CVE-2024-30675 | Unauthorized Node Injection Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:21:37Z |
CVE-2024-30674 | yashpatelphd/CVE-2024-30674 | Unauthorized Information Access Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:17:48Z |
CVE-2024-30672 | yashpatelphd/CVE-2024-30672 | Arbitrary File Upload Vulnerability in ROS Melodic Morenia | 2024-04-05T06:07:36Z |
CVE-2024-30667 | yashpatelphd/CVE-2024-30667 | Insecure Deserialization Vulnerability in ROS Melodic Morenia | 2024-04-05T05:53:01Z |
CVE-2024-30666 | yashpatelphd/CVE-2024-30666 | Buffer Overflow Vulnerability in ROS Melodic Morenia | 2024-04-05T05:49:12Z |
CVE-2024-30665 | yashpatelphd/CVE-2024-30665 | OS Command Injection Vulnerability in ROS Melodic Morenia | 2024-04-05T05:45:12Z |
CVE-2024-30663 | yashpatelphd/CVE-2024-30663 | Security Misconfiguration in ROS Melodic Morenia | 2024-04-05T05:39:58Z |
CVE-2024-30662 | yashpatelphd/CVE-2024-30662 | Information Leakage in ROS Melodic Morenia via Plaintext Message Transmission | 2024-04-05T05:36:29Z |
CVE-2024-30661 | yashpatelphd/CVE-2024-30661 | Unauthorized Information Access Vulnerability in ROS Melodic Morenia | 2024-04-05T05:32:35Z |
CVE-2024-30659 | yashpatelphd/CVE-2024-30659 | Shell Injection Vulnerability in ROS Melodic Morenia | 2024-04-05T05:23:02Z |
CVE-2024-30658 | yashpatelphd/CVE-2024-30658 | Denial-of-Service (DoS) Vulnerability in ROS Melodic Morenia | 2024-04-05T05:17:00Z |
CVE-2024-30657 | yashpatelphd/CVE-2024-30657 | Unauthorized Node Injection Vulnerability in ROS Melodic Morenia | 2024-04-05T05:07:42Z |
CVE-2024-30657 | badsectorlabs/ludus_xz_backdoor | An Ansible Role that installs the xz backdoor (CVE-2024-3094) on a Debian host and optionally installs the xzbot tool. | 2024-04-05T01:44:26Z |
CVE-2024-30656 | Yashodhanvivek/Firebolt-wristphone-vulnerability | This repository is for Firebolt wristphone vulnerability for CVE ID CVE-2024-30656 suggested by MITRE. Mitre yet to confirm on ID | 2024-04-08T17:05:39Z |
CVE-2024-30614 | Lucky-lm/CVE-2024-30614 | no description | 2024-04-06T08:26:04Z |
CVE-2024-30491 | truonghuuphuc/CVE-2024-30491-Poc | CVE-2024-30491 ProfileGrid <= 5.7.8 - Authenticated (Subscriber+) SQL Injection | 2024-05-04T14:22:15Z |
CVE-2024-30270 | Alchemist3dot14/CVE-2024-30270-PoC | The script exploits Mailcow vulnerabilities via XSS and RCE, emphasizing the need for robust security measures and responsible usage to enhance web application security. | 2024-06-21T04:47:48Z |
CVE-2024-30212 | Fehr-GmbH/blackleak | CVE-2024-30212 | 2024-06-11T09:13:16Z |
CVE-2024-30090 | Dor00tkit/CVE-2024-30090 | CVE-2024-30090 - LPE PoC | 2024-10-17T08:38:47Z |
CVE-2024-30088 | tykawaii98/CVE-2024-30088 | no description | 2024-06-24T10:37:26Z |
CVE-2024-30088 | NextGenPentesters/CVE-2024-30088- | 🆘New Windows Kernel Priviledge Escalation Vulnerability | 2024-06-27T07:05:46Z |
CVE-2024-30088 | Zombie-Kaiser/CVE-2024-30088-Windows-poc | 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。 | 2024-07-05T16:02:56Z |
CVE-2024-30088 | exploits-forsale/collateral-damage | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | 2024-07-15T08:07:05Z |
CVE-2024-30088 | Admin9961/CVE-2024-30088 | Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088. | 2024-07-27T10:41:33Z |
CVE-2024-30088 | Justintroup85/exploits-forsale-collateral-damage | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | 2024-08-25T12:47:10Z |
CVE-2024-30078 | 52by/CVE-2024-30078 | no description | 2024-06-17T17:48:23Z |
CVE-2024-30078 | nkontopoul/checkwifivulnerability | Only tested in windows 11. Checks if you are protected via windows update against CVE-2024-30078 Windows Wi-Fi Driver Remote Code Execution Vulnerability | 2024-06-18T20:05:06Z |
CVE-2024-30078 | kvx07/CVE_2024_30078_A_POC | no description | 2024-06-18T04:43:31Z |
CVE-2024-30078 | lvyitian/CVE-2024-30078- | CVE-2024-30078 Detection and Command Execution Script | 2024-06-16T08:06:03Z |
CVE-2024-30078 | blkph0x/CVE_2024_30078_POC_WIFI | basic concept for the latest windows wifi driver CVE | 2024-06-20T05:58:45Z |
CVE-2024-30078 | a-roshbaik/CVE_2024_30078_POC_WIFI | no description | 2024-07-24T20:56:54Z |
CVE-2024-30056 | absholi7ly/Microsoft-Edge-Information-Disclosure | CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 2024-05-27T06:37:34Z |
CVE-2024-30052 | ynwarcs/CVE-2024-30052 | Materials for CVE-2024-30052. | 2024-10-04T19:09:45Z |
CVE-2024-30051 | fortra/CVE-2024-30051 | no description | 2024-08-14T16:20:38Z |
CVE-2024-30043 | W01fh4cker/CVE-2024-30043-XXE | Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing | 2024-06-06T18:31:57Z |
CVE-2024-29988 | Sploitus/CVE-2024-29988-exploit | Exploit for Microsoft SmartScreen malicious execution (april 2024) | 2024-05-03T12:17:25Z |
CVE-2024-29973 | momika233/CVE-2024-29973 | no description | 2024-06-19T09:28:46Z |
CVE-2024-29973 | RevoltSecurities/CVE-2024-29973 | Exploiter a Vulnerability detection and Exploitation tool for CVE-2024-29973 with Asychronous Performance. | 2024-06-21T15:20:52Z |
CVE-2024-29973 | p0et08/CVE-2024-29973 | PoC and Bulk Scanner for CVE-2024-29973 | 2024-06-21T06:38:50Z |
CVE-2024-29973 | k3lpi3b4nsh33/CVE-2024-29973 | no description | 2024-06-20T01:52:35Z |
CVE-2024-29973 | bigb0x/CVE-2024-29973 | POC for CVE-2024-29973 | 2024-06-19T10:34:56Z |
CVE-2024-29973 | skyrowalker/CVE-2024-29973 | no description | 2024-10-10T23:48:55Z |
CVE-2024-29972 | WanLiChangChengWanLiChang/CVE-2024-29972 | no description | 2024-06-20T11:12:52Z |
CVE-2024-29972 | Pommaq/CVE-2024-29972-CVE-2024-29976-CVE-2024-29973-CVE-2024-29975-CVE-2024-29974-poc | This is a proof of concept for the Zyxel vulnerabilities I found. Read the blog :) | 2024-06-30T17:54:02Z |
CVE-2024-29972 | codeb0ss/CVE-2024-29972-PoC | CVE-2024-29972 - Exploit | 2024-07-04T21:31:07Z |
CVE-2024-2997 | lfillaz/CVE-2024-2997 | The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful for security assessments. | 2024-08-03T14:40:08Z |
CVE-2024-29943 | bjrjk/CVE-2024-29943 | A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE | 2024-06-27T13:47:52Z |
CVE-2024-29895 | secunnix/CVE-2024-29895 | Cacti CVE-2024-29895 POC | 2024-05-16T06:29:21Z |
CVE-2024-29895 | Stuub/CVE-2024-29895-CactiRCE-PoC | CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds | 2024-05-15T13:11:45Z |
CVE-2024-29895 | ticofookfook/CVE-2024-29895.py | no description | 2024-05-16T20:03:03Z |
CVE-2024-29895 | Rubioo02/CVE-2024-29895 | CVE-2024-29895 - RCE on CACTI 1.3.X dev | 2024-05-17T22:03:29Z |
CVE-2024-29868 | DEVisions/CVE-2024-29868 | Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0 | 2024-06-24T14:53:05Z |
CVE-2024-29863 | pawlokk/qlikview-poc-CVE-2024-29863 | PoC for LPE with QlikView | 2024-07-22T07:38:34Z |
CVE-2024-29855 | sinsinology/CVE-2024-29855 | PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855 | 2024-06-13T08:32:55Z |
CVE-2024-29849 | sinsinology/CVE-2024-29849 | Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) | 2024-06-10T06:12:20Z |
CVE-2024-29847 | sinsinology/CVE-2024-29847 | Exploit for CVE-2024-29847 | 2024-09-14T21:51:41Z |
CVE-2024-29824 | horizon3ai/CVE-2024-29824 | Ivanti EPM SQL Injection Remote Code Execution Vulnerability | 2024-06-12T13:53:32Z |
CVE-2024-29824 | R4be1/CVE-2024-29824 | Ivanti EPM SQL Injection Remote Code Execution Vulnerability(Optimized version based on h3) | 2024-06-18T09:07:23Z |
CVE-2024-29824 | codeb0ss/CVE-2024-29824-PoC | Mass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE) | 2024-07-12T19:26:10Z |
CVE-2024-2961 | mattaperkins/FIX-CVE-2024-2961 | Quick mitigation script | 2024-04-24T07:32:08Z |
CVE-2024-2961 | rvizx/CVE-2024-2961 | CVE-2024–2961 Security Issue Mitigation Script | 2024-05-20T06:53:23Z |
CVE-2024-2961 | ambionics/cnext-exploits | Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() | 2024-05-27T08:30:06Z |
CVE-2024-2961 | absolutedesignltd/iconvfix | Bash script to patch for CVE-2024-2961 | 2024-05-30T13:45:43Z |
CVE-2024-2961 | exfil0/test_iconv | This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc. | 2024-06-03T23:53:43Z |
CVE-2024-2961 | kjdfklha/CVE-2024-2961_poc | no description | 2024-06-04T09:57:46Z |
CVE-2024-2961 | tnishiox/cve-2024-2961 | no description | 2024-06-04T08:05:09Z |
CVE-2024-29510 | swsmith2391/CVE-2024-29510 | POC code for CVE-2024-29510 and demo VulnApp | 2024-07-09T13:27:40Z |
CVE-2024-29455 | yashpatelphd/CVE-2024-29455 | Arbitrary File Upload Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:54:01Z |
CVE-2024-29454 | yashpatelphd/CVE-2024-29454 | Remote Command Execution Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:49:26Z |
CVE-2024-29452 | yashpatelphd/CVE-2024-29452 | Insecure Deserialization Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:44:28Z |
CVE-2024-29450 | yashpatelphd/CVE-2024-29450 | Privilege Escalation in ROS2 Humble Hawksbill | 2024-03-21T14:37:07Z |
CVE-2024-29449 | yashpatelphd/CVE-2024-29449 | Cleartext Transmission Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:32:10Z |
CVE-2024-29448 | yashpatelphd/CVE-2024-29448 | Buffer Overflow Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:25:35Z |
CVE-2024-29447 | yashpatelphd/CVE-2024-29447 | Security Misconfiguration in ROS2 Humble Hawksbill | 2024-03-21T14:22:28Z |
CVE-2024-29445 | yashpatelphd/CVE-2024-29445 | Information Leakage in ROS2 Humble Hawksbill via Plaintext Message Transmission | 2024-03-21T14:17:57Z |
CVE-2024-29444 | yashpatelphd/CVE-2024-29444 | OS Command Injection Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:14:51Z |
CVE-2024-29443 | yashpatelphd/CVE-2024-29443 | Shell Injection Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:05:43Z |
CVE-2024-29442 | yashpatelphd/CVE-2024-29442 | Unauthorized Information Access Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:52:18Z |
CVE-2024-29441 | yashpatelphd/CVE-2024-29441 | Denial-of-Service (DoS) Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:31:50Z |
CVE-2024-29440 | yashpatelphd/CVE-2024-29440 | Unauthorized Access Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:48:01Z |
CVE-2024-29439 | yashpatelphd/CVE-2024-29439 | Unauthorized Node Injection Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:43:22Z |
CVE-2024-29415 | felipecruz91/node-ip-vex | Sample project that uses VEX to supress CVE-2024-29415. | 2024-07-05T07:50:29Z |
CVE-2024-29399 | ally-petitt/CVE-2024-29399 | CVE-2024-29399 reference | 2024-04-08T23:03:04Z |
CVE-2024-29375 | ismailcemunver/CVE-2024-29375 | CSV Injection in Addactis IBNRS 3.10.3.107 | 2024-03-11T16:32:41Z |
CVE-2024-29296 | ThaySolis/CVE-2024-29296 | CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4 | 2024-04-09T20:36:03Z |
CVE-2024-29296 | Lavender-exe/CVE-2024-29296-PoC | User Enumeration through response time difference | 2024-04-29T19:09:41Z |
CVE-2024-29275 | Cyphercoda/nuclei_template | CVE-2024-29275.yaml | 2024-06-20T16:19:30Z |
CVE-2024-29272 | awjkjflkwlekfdjs/CVE-2024-29272 | no description | 2024-03-25T22:43:42Z |
CVE-2024-29269 | wutalent/CVE-2024-29269 | CVE-2024-29269 | 2024-04-03T02:02:27Z |
CVE-2024-29269 | YongYe-Security/CVE-2024-29269 | Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit | 2024-04-12T07:36:08Z |
CVE-2024-29269 | Chocapikk/CVE-2024-29269 | An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter. | 2024-05-19T19:05:00Z |
CVE-2024-29269 | Jhonsonwannaa/CVE-2024-29269 | An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter. | 2024-06-08T22:06:33Z |
CVE-2024-29269 | K3ysTr0K3R/CVE-2024-29269-EXPLOIT | A PoC exploit for CVE-2024-29269 - Telesquare TLR-2005KSH Remote Code Execution (RCE) | 2024-07-01T23:49:59Z |
CVE-2024-29269 | hack-with-rohit/CVE-2024-29269-RCE | no description | 2024-09-08T08:56:33Z |
CVE-2024-29269 | Quantum-Hacker/CVE-2024-29269 | no description | 2024-09-28T18:01:30Z |
CVE-2024-29197 | mansploit/CVE-2024-29197-exploit | TENDA ROUTER AC10 - RCE (full research) | 2024-03-25T09:47:01Z |
CVE-2024-29194 | mansploit/CVE-2024-29194-POC | exploit for OneUptime - grab the master_key, escalate to admin | 2024-03-25T09:29:37Z |
CVE-2024-29184 | abdulbugblaster/CVE-2024-29184 | no description | 2024-09-07T04:08:36Z |
CVE-2024-29050 | Akrachli/CVE-2024-29050 | CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services. | 2024-10-04T08:19:11Z |
CVE-2024-28999 | HussainFathy/CVE-2024-28999 | Exploit for CVE-2024-28999 SolarWinds Platform Race Condition Vulnerability - login page | 2024-06-22T13:39:56Z |
CVE-2024-28995 | bigb0x/CVE-2024-28995 | CVE-2024-28995 POC Vulnerability Scanner | 2024-06-14T23:05:40Z |
CVE-2024-28995 | 0xc4t/CVE-2024-28995 | Exploit for CVE-2024-28995 | 2024-06-14T08:04:48Z |
CVE-2024-28995 | huseyinstif/CVE-2024-28995-Nuclei-Template | no description | 2024-06-14T08:01:13Z |
CVE-2024-28995 | ggfzx/CVE-2024-28995 | no description | 2024-06-14T07:56:03Z |
CVE-2024-28995 | krypton-kry/CVE-2024-28995 | CVE-2024-28995 PoC | 2024-06-14T04:06:58Z |
CVE-2024-28995 | karkis3c/cves | SolarWinds Serv-U Directory Traversal Vulnerability (CVE-2024-28995) POC | 2024-06-13T12:02:33Z |
CVE-2024-28995 | Praison001/CVE-2024-28995-SolarWinds-Serv-U | Exploit for CVE-2024-28995 affecting SolarWinds Serv-U 15.4.2 HF 1 and previous versions | 2024-06-26T10:51:50Z |
CVE-2024-28995 | Stuub/CVE-2024-28995 | CVE-2024-28955 Exploitation PoC | 2024-07-01T11:49:51Z |
CVE-2024-28995 | gotr00t0day/CVE-2024-28995 | SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. | 2024-08-24T17:05:48Z |
CVE-2024-28987 | fa-rrel/CVE-2024-28987-POC | Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987) | 2024-09-05T09:01:58Z |
CVE-2024-28987 | horizon3ai/CVE-2024-28987 | Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability | 2024-09-24T18:12:38Z |
CVE-2024-28987 | PlayerFridei/CVE-2024-28987 | CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk | 2024-09-30T16:12:14Z |
CVE-2024-2887 | PumpkinBridge/Chrome-CVE-2024-2887-RCE-POC | Chrome(CVE-2024-2887)RCE-POC | 2024-08-25T07:30:25Z |
CVE-2024-2887 | rycbar77/CVE-2024-2887 | For V8CTF M123 | 2024-08-25T12:13:07Z |
CVE-2024-2879 | herculeszxc/CVE-2024-2879 | CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection | 2024-04-08T18:50:02Z |
CVE-2024-2879 | nickswink/D-Link-NAS-Devices-Unauthenticated-RCE | UNTESTED exploit script for CVE-2024-3272 + CVE-2024-3273. The script exploits a backdoor authentication bypass + arbitrary command injection vulnerability. | 2024-04-08T13:54:07Z |
CVE-2024-2876 | c0d3zilla/CVE-2024-2876 | POC for SQLi vulnerability in Icegram express | 2024-04-25T09:53:22Z |
CVE-2024-2876 | Quantum-Hacker/CVE-2024-2876 | no description | 2024-09-14T16:08:56Z |
CVE-2024-2876 | 0xAgun/CVE-2024-2876 | no description | 2024-09-17T05:54:18Z |
CVE-2024-2876 | skyrowalker/CVE-2024-2876 | no description | 2024-10-09T19:24:53Z |
CVE-2024-28757 | krnidhi/expat_2.1.1_CVE-2024-28757 | no description | 2024-05-03T04:58:24Z |
CVE-2024-28757 | saurabh2088/expat_2_1_1_CVE-2024-28757 | no description | 2024-05-03T10:11:38Z |
CVE-2024-28757 | RenukaSelvar/expat_CVE-2024-28757 | no description | 2024-05-03T09:21:27Z |
CVE-2024-28757 | saurabh2088/expat_2_1_0_CVE-2024-28757 | no description | 2024-05-03T09:24:51Z |
CVE-2024-28741 | chebuya/CVE-2024-28741-northstar-agent-rce-poc | Agent RCE PoC for CVE-2024-28741, a stored XSS vulnerability in NorthStar C2. | 2024-03-12T01:40:35Z |
CVE-2024-28715 | Lq0ne/CVE-2024-28715 | no description | 2024-03-13T01:59:57Z |
CVE-2024-2865 | RobertSecurity/CVE-2024-2865-CRITICAL | [CRITICAL] Mergen Software QMS Exploit SQL injection to RFI (Remote File Inclusion) | 2024-03-26T08:20:07Z |
CVE-2024-28589 | Alaatk/CVE-2024-28589 | Local Privilege Escalation Vulnerability on Axigen for Windows | 2024-04-03T15:31:02Z |
CVE-2024-2856 | Schnaidr/CVE-2024-2856-Stack-overflow-EXP | Tenda AC10 Router exploit stack-based buffer overflow | 2024-03-25T14:34:26Z |
CVE-2024-2856 | codewhitesec/HttpRemotingObjRefLeak | Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059) | 2024-03-11T10:14:39Z |
CVE-2024-28515 | heshi906/CVE-2024-28515 | A vuln about csapp. | 2024-03-19T01:53:48Z |
CVE-2024-28515 | bsekercioglu/cve2024-3094-Checker | no description | 2024-03-30T11:49:27Z |
CVE-2024-28397 | Marven11/CVE-2024-28397 | to be released | 2024-03-22T04:29:34Z |
CVE-2024-28397 | Marven11/CVE-2024-28397-js2py-Sandbox-Escape | CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction. | 2024-06-19T01:46:33Z |
CVE-2024-28397 | CYBER-WARRIOR-SEC/CVE-2024-28397-js2py-Sandbox-Escape | no description | 2024-06-21T04:43:21Z |
CVE-2024-28255 | YongYe-Security/CVE-2024-28255 | OpenMetadata_RCE (CVE-2024-28255) Batch scan/exploit | 2024-04-12T04:29:58Z |
CVE-2024-28247 | T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read | This repository provides an exploit for CVE-2024-28247, highlighting a vulnerability that permits a remote attacker to read arbitrary files on the system. | 2024-03-31T15:25:15Z |
CVE-2024-28213 | 0x1x02/CVE-2024-28213 | Here's a brief description of CVE-2024-28213: "CVE-2024-28213 is a critical vulnerability affecting versions prior to 3.5.9 of nGrinder. It allows unauthenticated users to send serialized Java objects to the application, potentially leading to the execution of arbitrary code through unsafe Java object deserialization. | 2024-03-07T17:38:41Z |
CVE-2024-28213 | bsekercioglu/cve2024-21762-ShodanChecker | no description | 2024-03-07T13:13:21Z |
CVE-2024-28116 | gunzf0x/Grav-CMS-RCE-Authenticated | Exploit against Grav CMS (versions below 1.7.45) that allows Remote Code Execution for an authenticated user - CVE-2024-28116 | 2024-09-07T05:00:19Z |
CVE-2024-28116 | geniuszlyy/GenGravSSTIExploit | is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116) | 2024-10-05T12:05:06Z |
CVE-2024-28088 | levpachmanov/cve-2024-28088-poc | no description | 2024-03-14T07:02:11Z |
CVE-2024-28085 | skyler-ferrante/CVE-2024-28085 | WallEscape vulnerability in util-linux | 2024-03-11T00:15:03Z |
CVE-2024-28085 | oditynet/sleepall | trojan CVE-2024-28085 CVE 28085 | 2024-08-27T08:34:15Z |
CVE-2024-28000 | Alucard0x1/CVE-2024-28000 | LiteSpeed Cache Privilege Escalation PoC | 2024-08-24T05:12:56Z |
CVE-2024-28000 | arch1m3d/CVE-2024-28000 | PoC for the CVE-2024 Litespeed Cache Privilege Escalation | 2024-08-27T07:20:44Z |
CVE-2024-28000 | ebrasha/CVE-2024-28000 | LiteSpeed Cache Privilege Escalation PoC - CVE-2024-28000 | 2024-08-25T16:57:24Z |
CVE-2024-28000 | SSSSuperX/CVE-2024-28000 | CVE-2024-28000 LiteSpeed Cache Privilege Escalation Scan&Exp | 2024-09-09T06:19:54Z |
CVE-2024-28000 | JohnDoeAnonITA/CVE-2024-28000 | CVE-2024-28000 Exploit for litespeed-cache =<6.3 allows Privilege Escalation with creation of administrator account | 2024-09-10T08:16:16Z |
CVE-2024-27983 | lirantal/CVE-2024-27983-nodejs-http2 | CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (server-nossl.js ) based on CVE-2024-27983 which exploits a continuation flood vulnerability in HTTP2 servers. |
2024-04-14T11:34:52Z |
CVE-2024-27972 | truonghuuphuc/CVE-2024-27972-Poc | CVE-2024-27972 WP Fusion Lite <= 3.41.24 - Authenticated (Contributor+) Remote Code Execution | 2024-05-18T14:17:34Z |
CVE-2024-27971 | truonghuuphuc/CVE-2024-27971-Note | CVE-2024-27971 WordPress Premmerce Permalink Manager for WooCommerce Plugin <= 2.3.10 is vulnerable to Local File Inclusion | 2024-05-03T13:38:33Z |
CVE-2024-27956 | truonghuuphuc/CVE-2024-27956 | CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection | 2024-04-27T11:03:36Z |
CVE-2024-27956 | X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN | CVE-2024-27956 WORDPRESS RCE PLUGIN | 2024-05-03T16:19:19Z |
CVE-2024-27956 | diego-tella/CVE-2024-27956-RCE | PoC for SQL Injection in CVE-2024-27956 | 2024-05-01T01:58:28Z |
CVE-2024-27956 | k3ppf0r/CVE-2024-27956 | CVE-2024-27956 | 2024-05-07T10:07:00Z |
CVE-2024-27956 | FoxyProxys/CVE-2024-27956 | no description | 2024-05-05T19:50:54Z |
CVE-2024-27956 | W3BW/CVE-2024-27956-RCE-File-Package | no description | 2024-05-15T07:48:54Z |
CVE-2024-27956 | AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956 | WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries | 2024-05-14T14:21:49Z |
CVE-2024-27956 | itzheartzz/MASS-CVE-2024-27956 | no description | 2024-06-09T07:21:44Z |
CVE-2024-27956 | cve-2024/CVE-2024-27956-RCE | no description | 2024-06-14T07:13:54Z |
CVE-2024-27956 | TadashiJei/Valve-Press-CVE-2024-27956-RCE | Valve Press - CVE-2024-27956-RCE - SQL Injection | 2024-06-13T02:05:31Z |
CVE-2024-27956 | Cappricio-Securities/CVE-2024-27956 | WordPress Automatic Plugin <= 3.92.0 - SQL Injection | 2024-06-07T04:40:06Z |
CVE-2024-27956 | ThatNotEasy/CVE-2024-27956 | Perform with massive Wordpress SQLI 2 RCE | 2024-07-11T14:17:23Z |
CVE-2024-27956 | CERTologists/EXPLOITING-CVE-2024-27956 | no description | 2024-07-23T08:24:56Z |
CVE-2024-27815 | jprx/CVE-2024-27815 | macOS/ XNU kernel buffer overflow. Introduced in macOS 14.0 (xnu-10002.1.13), fixed in macOS 14.5 (xnu-10063.121.3) | 2024-06-19T22:03:02Z |
CVE-2024-27804 | R00tkitSMM/CVE-2024-27804 | POC for CVE-2024-27804 | 2024-05-14T14:17:06Z |
CVE-2024-27766 | Ant1sec-ops/CVE-2024-27766 | Database authenticated code execution | 2023-03-02T11:20:48Z |
CVE-2024-27697 | SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697 | Arbitrary Code Execution on FuguHub 8.4 | 2024-03-09T22:24:03Z |
CVE-2024-27674 | Alaatk/CVE-2024-27674 | Macro Expert <= 4.9.4 - Insecure Permissions Privilege Escalation | 2024-04-03T15:16:09Z |
CVE-2024-27673 | Alaatk/CVE-2024-27673 | ASUS Control Center Express =< 01.06.15 - Unquoted Service Path | 2024-04-03T14:47:20Z |
CVE-2024-27665 | Thirukrishnan/CVE-2024-27665 | no description | 2024-03-11T04:46:19Z |
CVE-2024-27632 | ally-petitt/CVE-2024-27632 | CVE-2024–27632 Reference | 2024-04-06T23:42:30Z |
CVE-2024-27631 | ally-petitt/CVE-2024-27631 | CVE-2024–27631 Reference | 2024-04-06T23:30:01Z |
CVE-2024-27630 | ally-petitt/CVE-2024-27630 | CVE-2024–27630 Reference | 2024-04-07T00:13:13Z |
CVE-2024-27564 | MuhammadWaseem29/SSRF-Exploit-CVE-2024-27564 | no description | 2024-09-15T10:25:01Z |
CVE-2024-27564 | Quantum-Hacker/CVE-2024-27564 | no description | 2024-09-15T15:11:54Z |
CVE-2024-27518 | secunnix/CVE-2024-27518 | SUPERAntiSpyware Professional X <=10.0.1264 LPE Vulnerability PoC | 2024-04-03T13:41:18Z |
CVE-2024-27462 | Alaatk/CVE-2024-27462 | Wondershare MobileTrans 4.5.6 - Unquoted Service Path | 2024-04-13T06:27:28Z |
CVE-2024-27460 | xct/CVE-2024-27460 | Plantronics Desktop Hub LPE | 2024-05-12T09:53:07Z |
CVE-2024-27460 | Alaatk/CVE-2024-27460 | HP Plantronics Hub 3.2.1 Updater Privilege Escalation | 2024-05-13T11:15:14Z |
CVE-2024-27460 | 10cks/CVE-2024-27460-installer | no description | 2024-05-18T02:25:11Z |
CVE-2024-27348 | kljunowsky/CVE-2024-27348 | Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit | 2024-06-03T19:08:24Z |
CVE-2024-27348 | Zeyad-Azima/CVE-2024-27348 | Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 ) | 2024-05-31T20:11:37Z |
CVE-2024-27348 | jakabakos/CVE-2024-27348-Apache-HugeGraph-RCE | no description | 2024-06-12T08:14:39Z |
CVE-2024-27316 | lockness-Ko/CVE-2024-27316 | Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested) | 2024-04-09T08:08:07Z |
CVE-2024-27316 | aeyesec/CVE-2024-27316_poc | no description | 2024-04-17T20:08:05Z |
CVE-2024-27292 | th3gokul/CVE-2024-27292 | CVE-2024-27292 : Docassemble V1.4.96 Unauthenticated Path Traversal | 2024-07-02T04:41:35Z |
CVE-2024-27292 | tequilasunsh1ne/CVE_2024_27292 | no description | 2024-07-08T03:30:14Z |
CVE-2024-27282 | Abo5/CVE-2024-27282 | script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/ | 2024-06-12T23:54:03Z |
CVE-2024-27198 | W01fh4cker/CVE-2024-27198-RCE | CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4 | 2024-03-06T03:15:03Z |
CVE-2024-27198 | rampantspark/CVE-2024-27198 | A PoC for CVE-2024-27198 written in golang | 2024-03-07T15:12:56Z |
CVE-2024-27198 | K3ysTr0K3R/CVE-2024-27198-EXPLOIT | A PoC exploit for CVE-2024-27198 - JetBrains TeamCity Authentication Bypass | 2024-03-09T22:04:07Z |
CVE-2024-27198 | CharonDefalt/CVE-2024-27198-RCE | no description | 2024-03-09T04:04:23Z |
CVE-2024-27198 | passwa11/CVE-2024-27198-RCE | no description | 2024-03-08T12:40:09Z |
CVE-2024-27198 | yoryio/CVE-2024-27198 | Exploit for CVE-2024-27198 - TeamCity Server | 2024-03-05T05:43:06Z |
CVE-2024-27198 | Chocapikk/CVE-2024-27198 | Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4 | 2024-03-04T22:44:36Z |
CVE-2024-27198 | Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198- | Em fevereiro de 2024, foi identificado duas novas vulnerabilidades que afetam o servidor JetBrains TeamCity (CVE-2024-27198 e CVE-2024-27199) | 2024-04-02T09:46:51Z |
CVE-2024-27198 | Stuub/RCity-CVE-2024-27198 | CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information | 2024-04-22T22:14:24Z |
CVE-2024-27198 | HPT-Intern-Task-Submission/CVE-2024-27198 | no description | 2024-07-20T17:26:13Z |
CVE-2024-27198 | jrbH4CK/CVE-2024-27198 | PoC about CVE-2024-27198 | 2024-08-16T05:39:57Z |
CVE-2024-27198 | dkhacks/CVE_2024_27198 | no description | 2024-09-03T16:11:54Z |
CVE-2024-27198 | geniuszlyy/CVE-2024-27198 | is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198) | 2024-10-09T13:36:56Z |
CVE-2024-27173 | Ieakd/0day-POC-for-CVE-2024-27173 | no description | 2024-06-14T07:04:46Z |
CVE-2024-27130 | watchtowrlabs/CVE-2024-27130 | PoC for CVE-2024-27130 | 2024-05-17T07:58:01Z |
CVE-2024-27130 | d0rb/CVE-2024-27130 | This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS | 2024-05-21T11:14:22Z |
CVE-2024-27088 | 200101WhoAmI/CVE-2024-27088 | redos | 2024-08-21T05:21:38Z |
CVE-2024-26817 | MaherAzzouzi/CVE-2024-26817-amdkfd | Potential Integer Overflow Leading To Heap Overflow in AMD KFD. | 2024-04-14T12:25:50Z |
CVE-2024-2667 | Puvipavan/CVE-2024-2667 | This is POC for CVE-2024-2667 (InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload) | 2024-04-28T17:14:47Z |
CVE-2024-26581 | laoqin1234/Linux-Root-CVE-2024-26581-PoC | no description | 2024-09-11T08:29:40Z |
CVE-2024-26581 | madfxr/CVE-2024-26581-Checker | [CVE-2024-26581] Vulnerability Checker for BGN Internal | 2024-09-10T09:32:25Z |
CVE-2024-26574 | Alaatk/CVE-2024-26574 | Wondershare Filmora v.13.0.51 - Insecure Permissions Privilege Escalation | 2024-04-04T13:44:08Z |
CVE-2024-26560 | sajaljat/CVE-2024-26560 | (XSS) | 2024-02-26T12:03:43Z |
CVE-2024-26535 | sajaljat/CVE-2024-26535 | (XSS) | 2024-02-26T12:02:10Z |
CVE-2024-26534 | sajaljat/CVE-2024-26534 | no description | 2024-02-26T11:59:59Z |
CVE-2024-26521 | hackervegas001/CVE-2024-26521 | Html Injection vulnearbility in CE-Phoenix-v1.0.8.20 where malicious HTML code is inserted into a website. This can lead to a variety of issues, from minor website defacement to serious data breaches. | 2024-02-16T05:40:33Z |
CVE-2024-26503 | RoboGR00t/Exploit-CVE-2024-26503 | Exploit for Open eClass – CVE-2024-26503: Unrestricted File Upload Leads to Remote Code Execution | 2024-03-15T13:01:43Z |
CVE-2024-26475 | TronciuVlad/CVE-2024-26475 | An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. | 2024-03-10T22:51:05Z |
CVE-2024-26308 | crazycatMyopic/cve | Docker Deskop giving issue CVE-2024-26308 for maven [reproduce] | 2024-08-11T14:10:14Z |
CVE-2024-26304 | Roud-Roud-Agency/CVE-2024-26304-RCE-exploits | Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024) | 2024-05-04T10:09:24Z |
CVE-2024-26304 | X-Projetion/CVE-2024-26304-RCE-exploit | CVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS | 2024-10-05T01:38:36Z |
CVE-2024-26230 | kiwids0220/CVE-2024-26230 | no description | 2024-04-11T03:59:28Z |
CVE-2024-26230 | Wa1nut4/CVE-2024-26230 | LPE of CVE-2024-26230 | 2024-08-28T16:31:26Z |
CVE-2024-26229 | RalfHacker/CVE-2024-26229-exploit | Windows LPE | 2024-06-11T08:03:29Z |
CVE-2024-26229 | team-MineDEV/CVE-2024-26229 | Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。 | 2024-06-16T05:06:31Z |
CVE-2024-26229 | apkc/CVE-2024-26229-BOF | BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel | 2024-06-13T11:57:50Z |
CVE-2024-26229 | varwara/CVE-2024-26229 | CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code | 2024-06-10T17:02:03Z |
CVE-2024-26229 | Cracked5pider/eop24-26229 | A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user | 2024-08-04T17:40:51Z |
CVE-2024-26229 | mqxmm/CVE-2024-26229 | no description | 2024-10-13T12:10:35Z |
CVE-2024-26218 | exploits-forsale/CVE-2024-26218 | Proof-of-Concept for CVE-2024-26218 | 2024-04-26T16:41:04Z |
CVE-2024-26160 | 0x00Alchemist/CVE-2024-26160 | cldflt.sys information disclosure vulnerability (KB5034765 - KB5035853, Win 11). | 2024-10-04T00:04:42Z |
CVE-2024-26144 | gmo-ierae/CVE-2024-26144-test | no description | 2024-05-24T07:26:40Z |
CVE-2024-26026 | passwa11/CVE-2024-26026 | CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION | 2024-05-09T03:14:14Z |
CVE-2024-26026 | GRTMALDET/Big-IP-Next-CVE-2024-26026 | no description | 2024-05-13T22:04:01Z |
CVE-2024-25897 | i-100-user/CVE-2024-25897 | exploit que vulnera Jenkins hecho en Python | 2024-08-08T18:21:44Z |
CVE-2024-25832 | 0xNslabs/CVE-2024-25832-PoC | PoC Script for CVE-2024-25832: Exploit chain reverse shell, information disclosure (root password leak) + unrestricted file upload in DataCube3 | 2024-03-06T04:11:59Z |
CVE-2024-25809 | sajaljat/CVE-2024-25809 | (XSS) | 2024-02-17T12:16:29Z |
CVE-2024-25735 | codeb0ss/CVE-2024-25735-PoC | CVE-2024-25735 - WyreStorm Apollo VX20 - Information Disclosure | 2024-02-16T12:03:20Z |
CVE-2024-25731 | actuator/com.cn.dq.ipc | CVE-2024-25731 | 2024-02-06T04:38:12Z |
CVE-2024-25723 | david-botelho-mariano/exploit-CVE-2024-25723 | no description | 2024-03-20T01:28:09Z |
CVE-2024-25641 | thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26 | CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26 | 2024-08-27T01:19:25Z |
CVE-2024-25641 | Safarchand/CVE-2024-25641 | PoC for CVE-2024-25641 Authenticated RCE on Cacti v1.2.26 | 2024-08-27T16:41:39Z |
CVE-2024-25641 | StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26 | Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵 | 2024-08-29T06:27:25Z |
CVE-2024-25641 | 5ma1l/CVE-2024-25641 | This repository automates the process of exploiting CVE-2024-25641 on Cacti 1.2.26 | 2024-08-26T13:34:35Z |
CVE-2024-25600 | Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands. | 2024-02-22T10:53:45Z |
CVE-2024-25600 | Christbowel/CVE-2024-25600_Nuclei-Template | Nuclei template and information about the POC for CVE-2024-25600 | 2024-02-21T00:27:33Z |
CVE-2024-25600 | Chocapikk/CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 | 2024-02-20T20:16:09Z |
CVE-2024-25600 | hy011121/CVE-2024-25600-wordpress-Exploit-RCE | (Mirorring) | 2024-02-29T20:53:42Z |
CVE-2024-25600 | K3ysTr0K3R/CVE-2024-25600-EXPLOIT | A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE) | 2024-03-01T09:28:08Z |
CVE-2024-25600 | 0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands. | 2024-04-17T15:21:01Z |
CVE-2024-25600 | X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE | WORDPRESS-CVE-2024-25600-EXPLOIT-RCE - WordPress Bricks Builder Remote Code Execution (RCE) | 2024-04-20T06:36:22Z |
CVE-2024-25600 | RHYru9/CVE-2024-25600-mass | no description | 2024-05-05T02:18:00Z |
CVE-2024-25600 | ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | 0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit | 2024-06-02T10:49:03Z |
CVE-2024-25600 | k3lpi3b4nsh33/CVE-2024-25600 | no description | 2024-06-06T02:13:06Z |
CVE-2024-25600 | WanLiChangChengWanLiChang/CVE-2024-25600 | no description | 2024-06-06T03:59:06Z |
CVE-2024-25600 | KaSooMi0228/CVE-2024-25600-Bricks-Builder-WordPress | no description | 2024-07-30T09:02:31Z |
CVE-2024-25600 | wh6amiGit/CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks | 2024-08-20T12:18:58Z |
CVE-2024-25503 | EQSTLab/CVE-2024-25503 | PoC for CVE-2024-25503 | 2024-09-06T06:17:18Z |
CVE-2024-25466 | FixedOctocat/CVE-2024-25466 | Description for CVE-2024-25466 | 2024-02-15T07:47:14Z |
CVE-2024-25423 | DriverUnload/cve-2024-25423 | Cinema 4D out-of-bounds write vulnerability when parsing c4d files | 2024-02-18T06:35:31Z |
CVE-2024-25412 | paragbagul111/CVE-2024-25412 | A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email field | 2024-09-27T16:13:26Z |
CVE-2024-25411 | paragbagul111/CVE-2024-25411 | A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php | 2024-09-27T15:49:08Z |
CVE-2024-25381 | Ox130e07d/CVE-2024-25381 | no description | 2024-02-01T11:42:48Z |
CVE-2024-25376 | ewilded/CVE-2024-25376-POC | CVE-2024-25376 - Local Privilege Escalation in TUSBAudio | 2024-02-24T09:30:45Z |
CVE-2024-25293 | EQSTLab/CVE-2024-25293 | PoC for CVE-2024-25293 | 2024-09-06T06:12:32Z |
CVE-2024-25292 | EQSTLab/CVE-2024-25292 | PoC for CVE-2024-25292 | 2024-09-06T06:16:29Z |
CVE-2024-25291 | EQSTLab/CVE-2024-25291 | PoC for CVE-2024-25291 | 2024-09-06T06:15:35Z |
CVE-2024-25281 | sajaljat/CVE-2024-25281 | (XSS) | 2024-02-17T12:14:56Z |
CVE-2024-25280 | sajaljat/CVE-2024-25280 | Broken Access control | 2024-02-17T12:11:58Z |
CVE-2024-25279 | sajaljat/CVE-2024-25279 | (XSS) | 2024-02-17T12:10:12Z |
CVE-2024-25278 | sajaljat/CVE-2024-25278 | no description | 2024-02-17T11:59:51Z |
CVE-2024-25277 | maen08/CVE-2024-25277 | Resources and PoCs | 2024-02-25T16:54:33Z |
CVE-2024-25270 | fbkcs/CVE-2024-25270 | for future article of research vulnerability in MIRAPOLIS LMS | 2024-02-22T08:18:47Z |
CVE-2024-25270 | W01fh4cker/ScreenConnect-AuthBypass-RCE | ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!! | 2024-02-21T09:42:04Z |
CVE-2024-25251 | ASR511-OO7/CVE-2024-25251 | no description | 2024-02-20T10:03:29Z |
CVE-2024-25250 | ASR511-OO7/CVE-2024-25250. | no description | 2024-03-06T11:11:24Z |
CVE-2024-25249 | intbjw/CVE-2024-25249 | An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. | 2024-02-21T08:19:00Z |
CVE-2024-25227 | thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227 | no description | 2024-02-23T16:46:54Z |
CVE-2024-25227 | thetrueartist/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227 | no description | 2024-03-13T17:58:41Z |
CVE-2024-25202 | Agampreet-Singh/CVE-2024-25202 | A vulnerability was found in PHPgurukul visitor management system 1.0. it has been rated as problemic. Affected by the issue is some unknown functionality of the file search bar that called search-result.php and search-visitor.php . The vulnerability is Cross-Site-Scripting (XSS). | 2024-02-20T18:19:53Z |
CVE-2024-25175 | jet-pentest/CVE-2024-25175 | no description | 2024-03-22T11:54:36Z |
CVE-2024-25170 | shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 | no description | 2024-02-25T12:28:49Z |
CVE-2024-25169 | shenhav12/CVE-2024-25169-Mezzanine-v6.0.0 | no description | 2024-02-25T12:21:40Z |
CVE-2024-25153 | rainbowhatrkn/CVE-2024-25153 | Proof-of-concept exploit for CVE-2024-25153. | 2024-03-18T09:02:56Z |
CVE-2024-25153 | nettitude/CVE-2024-25153 | Proof-of-concept exploit for CVE-2024-25153. | 2024-03-12T17:26:10Z |
CVE-2024-25092 | RandomRobbieBF/CVE-2024-25092 | NextMove Lite < 2.18.0 - Subscriber+ Arbitrary Plugin Installation/Activation | 2024-02-14T11:30:59Z |
CVE-2024-24919 | P3wc0/CVE-2024-24919 | no description | 2024-05-31T01:14:19Z |
CVE-2024-24919 | am-eid/CVE-2024-24919 | no description | 2024-05-30T23:52:53Z |
CVE-2024-24919 | Bytenull00/CVE-2024-24919 | Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT | 2024-05-30T20:14:19Z |
CVE-2024-24919 | emanueldosreis/CVE-2024-24919 | POC exploit for CVE-2024-24919 information leakage | 2024-05-30T14:41:32Z |
CVE-2024-24919 | LucasKatashi/CVE-2024-24919 | CVE-2024-24919 Exploit PoC | 2024-05-30T16:23:18Z |
CVE-2024-24919 | hendprw/CVE-2024-24919 | no description | 2024-05-30T15:40:11Z |
CVE-2024-24919 | c3rrberu5/CVE-2024-24919 | Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN. | 2024-05-30T07:55:53Z |
CVE-2024-24919 | nexblade12/CVE-2024-24919 | no description | 2024-05-31T17:41:08Z |
CVE-2024-24919 | GlobalsecureAcademy/CVE-2024-24919 | Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs | 2024-05-31T17:14:48Z |
CVE-2024-24919 | GoatSecurity/CVE-2024-24919 | CVE-2024-24919 exploit | 2024-05-31T13:11:40Z |
CVE-2024-24919 | smackerdodi/CVE-2024-24919-nuclei-templater | Nuclei template for CVE-2024-24919 | 2024-05-31T12:33:34Z |
CVE-2024-24919 | Vulnpire/CVE-2024-24919 | no description | 2024-05-31T11:29:03Z |
CVE-2024-24919 | satriarizka/CVE-2024-24919 | A simple bash and python script to check for the vulnerability CVE-2024-24919 | 2024-05-31T08:01:13Z |
CVE-2024-24919 | zam89/CVE-2024-24919 | Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point) | 2024-05-31T07:59:17Z |
CVE-2024-24919 | 0x3f3c/CVE-2024-24919 | no description | 2024-05-31T12:08:28Z |
CVE-2024-24919 | r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN | Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | 2024-06-01T12:02:43Z |
CVE-2024-24919 | r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check | Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | 2024-06-01T11:54:39Z |
CVE-2024-24919 | YN1337/CVE-2024-24919 | Mass scanner for CVE-2024-24919 | 2024-06-01T09:54:13Z |
CVE-2024-24919 | gurudattch/CVE-2024-24919 | no description | 2024-06-01T03:26:29Z |
CVE-2024-24919 | fernandobortotti/CVE-2024-24919 | no description | 2024-06-01T02:20:28Z |
CVE-2024-24919 | nicolvsrlr27/CVE-2024-24919 | no description | 2024-06-01T03:05:35Z |
CVE-2024-24919 | eoslvs/CVE-2024-24919 | no description | 2024-05-30T17:26:08Z |
CVE-2024-24919 | MohamedWagdy7/CVE-2024-24919 | no description | 2024-05-31T22:07:21Z |
CVE-2024-24919 | seed1337/CVE-2024-24919-POC | no description | 2024-05-31T11:52:59Z |
CVE-2024-24919 | mr-kasim-mehar/CVE-2024-24919-Exploit | no description | 2024-06-02T08:19:50Z |
CVE-2024-24919 | J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT | no description | 2024-06-02T06:17:06Z |
CVE-2024-24919 | ifconfig-me/CVE-2024-24919-Bulk-Scanner | CVE-2024-24919 [Check Point Security Gateway Information Disclosure] | 2024-06-01T10:51:14Z |
CVE-2024-24919 | bigb0x/CVE-2024-24919-Sniper | CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers. | 2024-06-02T20:16:22Z |
CVE-2024-24919 | Expl0itD0g/CVE-2024-24919---Poc | a Proof of Concept of CVE-2024-24919 | 2024-06-02T13:58:36Z |
CVE-2024-24919 | B1naryo/CVE-2024-24919-POC | no description | 2024-06-02T13:09:51Z |
CVE-2024-24919 | Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN | no description | 2024-05-31T12:10:05Z |
CVE-2024-24919 | Rug4lo/CVE-2024-24919-Exploit | CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access. | 2024-06-03T12:18:35Z |
CVE-2024-24919 | Tim-Hoekstra/CVE-2024-24919 | no description | 2024-06-04T04:29:35Z |
CVE-2024-24919 | GuayoyoCyber/CVE-2024-24919 | Nmap script to check vulnerability CVE-2024-24919 | 2024-06-03T18:17:45Z |
CVE-2024-24919 | birdlex/cve-2024-24919-checker | no description | 2024-06-03T08:39:09Z |
CVE-2024-24919 | RevoltSecurities/CVE-2024-24919 | An Vulnerability detection and Exploitation tool for CVE-2024-24919 | 2024-05-31T10:18:36Z |
CVE-2024-24919 | starlox0/CVE-2024-24919-POC | A Simple Exploit Code(POC) to Automate CVE-2024–24919 | 2024-06-06T16:03:35Z |
CVE-2024-24919 | un9nplayer/CVE-2024-24919 | This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919 | 2024-05-31T18:14:19Z |
CVE-2024-24919 | nullcult/CVE-2024-24919-Exploit | CVE-2024-24919 exploit that checks more files for better visibility | 2024-06-07T12:14:19Z |
CVE-2024-24919 | 3UR/CVE-2024-24919 | CLI based PoC for CVE-2024-24919 | 2024-05-31T09:43:14Z |
CVE-2024-24919 | satchhacker/cve-2024-24919 | no description | 2024-06-08T10:17:00Z |
CVE-2024-24919 | SalehLardhi/CVE-2024-24919 | no description | 2024-06-11T03:33:30Z |
CVE-2024-24919 | protonnegativo/CVE-2024-24919 | Python script to automate the process of finding vulnerable sites for CVE-2024-24919. | 2024-06-10T01:29:19Z |
CVE-2024-24919 | verylazytech/CVE-2024-24919 | POC - CVE-2024–24919 - Check Point Security Gateways | 2024-06-09T06:54:51Z |
CVE-2024-24919 | 0nin0hanz0/CVE-2024-24919-PoC | no description | 2024-06-03T13:30:31Z |
CVE-2024-24919 | 0xans/CVE-2024-24919 | no description | 2024-06-04T02:53:22Z |
CVE-2024-24919 | Cappricio-Securities/CVE-2024-24919 | Check Point Security Gateway (LFI) | 2024-06-01T01:33:00Z |
CVE-2024-24919 | ShadowByte1/CVE-2024-24919 | no description | 2024-07-14T23:26:51Z |
CVE-2024-24919 | H3KEY/CVE-2024-24919 | Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical. | 2024-07-22T06:04:13Z |
CVE-2024-24919 | Jutrm/cve-2024-24919 | no description | 2024-07-26T15:17:58Z |
CVE-2024-24919 | smkxt1/CVE-2024-24919 | no description | 2024-07-31T09:55:29Z |
CVE-2024-24919 | LuisMateo1/Arbitrary-File-Read-CVE-2024-24919 | no description | 2024-08-29T12:59:40Z |
CVE-2024-24919 | AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919- | 🔍 Just wrapped up an incident report on a Phishing Alert (Event ID 257, SOC282). Enhancing my expertise in email threat detection and response! 🚨 #Cybersecurity #SOCAnalyst #LetsDefend | 2024-08-31T16:57:06Z |
CVE-2024-24919 | geniuszlyy/CVE-2024-24919 | PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses | 2024-09-29T08:20:56Z |
CVE-2024-24919 | skyrowalker/CVE-2024-24919 | no description | 2024-10-09T17:54:28Z |
CVE-2024-24816 | afine-com/CVE-2024-24816 | CKEditor 4 < 4.24.0-lts - XSS vulnerability in samples that use the "preview" feature. | 2024-02-10T10:26:35Z |
CVE-2024-24809 | fa-rrel/CVE-2024-24809-Proof-of-concept | Critical Flaws in Traccar GPS System Expose Users to Remote Attacks | 2024-09-03T09:56:13Z |
CVE-2024-24787 | LOURC0D3/CVE-2024-24787-PoC | CVE-2024-24787 Proof of Concept | 2024-05-10T07:45:51Z |
CVE-2024-24760 | killerbees19/CVE-2024-24760 | mailcow: Docker Container Exposure to Local Network | 2024-03-04T00:53:35Z |
CVE-2024-24686 | SpiralBL0CK/CVE-2024-24686 | Crash File ( Poc for CVE-2024-24686) | 2024-10-15T23:20:34Z |
CVE-2024-24685 | SpiralBL0CK/CVE-2024-24685 | Crash File ( Poc for CVE-2024-24685) | 2024-10-15T23:16:05Z |
CVE-2024-24684 | SpiralBL0CK/CVE-2024-24684 | Crash File ( Poc for CVE-2024-24684) | 2024-10-15T23:04:32Z |
CVE-2024-24590 | LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590- | Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D | 2024-06-11T17:33:36Z |
CVE-2024-24590 | diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC | CVE-2024-24590 ClearML RCE&CMD POC | 2024-06-15T10:09:51Z |
CVE-2024-24590 | xffsec/CVE-2024-24590-ClearML-RCE-Exploit | no description | 2024-06-13T22:17:57Z |
CVE-2024-24590 | OxyDeV2/ClearML-CVE-2024-24590 | Proof of concept for CVE-2024-24590 | 2024-06-11T22:30:26Z |
CVE-2024-24590 | DemonPandaz2763/CVE-2024-24590 | Another CVE-2024-24590 poc | 2024-06-12T15:07:46Z |
CVE-2024-24590 | junnythemarksman/CVE-2024-24590 | Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with. | 2024-06-20T11:23:56Z |
CVE-2024-24590 | sviim/ClearML-CVE-2024-24590-RCE | With this script you can exploit the CVE-2024-24590 | 2024-07-21T04:16:24Z |
CVE-2024-24590 | Bigb972003/cve-2024-24590 | no description | 2024-08-11T09:21:08Z |
CVE-2024-24590 | j3r1ch0123/CVE-2024-24590 | Created this exploit for the Hack The Box machine, Blurry. | 2024-10-07T17:07:10Z |
CVE-2024-24576 | frostb1ten/CVE-2024-24576-PoC | Example of CVE-2024-24576 use case. | 2024-04-09T21:17:15Z |
CVE-2024-24576 | aydinnyunus/CVE-2024-24576-Exploit | CVE-2024-24576 Proof of Concept | 2024-04-10T14:06:09Z |
CVE-2024-24576 | dead1nfluence/Leantime-POC | CVE-2024-27474, CVE-2024-27476, CVE-2024-27477 | 2024-04-04T13:58:33Z |
CVE-2024-24576 | foxoman/CVE-2024-24576-PoC---Nim | CVE-2024-24576 PoC for Nim Lang | 2024-04-11T10:22:10Z |
CVE-2024-24576 | brains93/CVE-2024-24576-PoC-Python | no description | 2024-04-10T10:27:55Z |
CVE-2024-24576 | lpn/CVE-2024-24576.jl | Simple CVE-2024-24576 PoC in Julia | 2024-04-14T05:00:18Z |
CVE-2024-24576 | mishalhossin/CVE-2024-24576-PoC-Python | https://nvd.nist.gov/vuln/detail/CVE-2024-24576 | 2024-04-14T02:10:55Z |
CVE-2024-24576 | corysabol/batbadbut-demo | This is a simple demo for the BadBatBut vulnerability CVE-2024-24576 | 2024-04-12T23:36:05Z |
CVE-2024-24576 | SheL3G/CVE-2024-24576-PoC-BatBadBut | PoC for CVE-2024-24576 vulnerability "BatBadBut" | 2024-04-21T13:42:28Z |
CVE-2024-24576 | Gaurav1020/CVE-2024-24576-PoC-Rust | no description | 2024-04-20T18:54:00Z |
CVE-2024-24549 | Abdurahmon3236/CVE-2024-24549 | no description | 2024-08-02T21:05:34Z |
CVE-2024-24520 | xF-9979/CVE-2024-24520 | Arbitrary code execution vulnerability | 2024-02-18T03:13:53Z |
CVE-2024-24488 | minj-ae/CVE-2024-24488 | An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component. | 2024-02-01T02:29:19Z |
CVE-2024-24409 | passtheticket/CVE-2024-24409 | ADManager Plus Build < 7210 Elevation of Privilege Vulnerability | 2024-01-20T12:58:47Z |
CVE-2024-24409 | Valentin-Metz/writeup_split | Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684 | 2023-12-15T06:33:15Z |
CVE-2024-24409 | passtheticket/CVE-2024-24409 | ADManager Plus Build < 7210 Elevation of Privilege Vulnerability | 2024-03-25T20:51:56Z |
CVE-2024-24409 | passtheticket/CVE-2024-24409 | ADManager Plus Build < 7210 Elevation of Privilege Vulnerability | 2024-09-28T15:00:55Z |
CVE-2024-24402 | MAWK0235/CVE-2024-24402 | Priv esc in Nagios 2024R1.01 | 2024-02-18T20:33:28Z |
CVE-2024-24401 | MAWK0235/CVE-2024-24401 | Auto exploitation tool for CVE-2024-24401. | 2024-02-18T20:05:46Z |
CVE-2024-24398 | trustcves/CVE-2024-24398 | no description | 2024-02-05T09:15:17Z |
CVE-2024-24397 | trustcves/CVE-2024-24397 | no description | 2024-02-05T09:08:34Z |
CVE-2024-24396 | trustcves/CVE-2024-24396 | no description | 2024-02-05T08:43:33Z |
CVE-2024-24386 | erick-duarte/CVE-2024-24386 | no description | 2024-02-09T12:22:08Z |
CVE-2024-24337 | nitipoom-jar/CVE-2024-24337 | no description | 2024-02-06T16:33:13Z |
CVE-2024-24336 | nitipoom-jar/CVE-2024-24336 | no description | 2024-02-06T14:10:02Z |
CVE-2024-2432 | Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP | no description | 2024-03-14T17:48:49Z |
CVE-2024-24206 | l00neyhacker/CVE-2024-24206 | no description | 2024-01-29T00:22:54Z |
CVE-2024-24204 | l00neyhacker/CVE-2024-24204 | no description | 2024-01-29T00:21:26Z |
CVE-2024-24203 | l00neyhacker/CVE-2024-24203 | no description | 2024-01-29T00:20:36Z |
CVE-2024-24142 | BurakSevben/CVE-2024-24142 | no description | 2024-01-22T00:36:05Z |
CVE-2024-24141 | BurakSevben/CVE-2024-24141 | no description | 2024-01-21T23:56:41Z |
CVE-2024-24140 | BurakSevben/CVE-2024-24140 | no description | 2024-01-21T21:45:34Z |
CVE-2024-24139 | BurakSevben/CVE-2024-24139 | no description | 2024-01-15T01:48:55Z |
CVE-2024-24138 | BurakSevben/CVE-2024-24138 | no description | 2024-01-13T21:48:00Z |
CVE-2024-24137 | BurakSevben/CVE-2024-24137 | no description | 2024-01-13T13:11:35Z |
CVE-2024-24136 | BurakSevben/CVE-2024-24136 | no description | 2024-01-12T21:53:07Z |
CVE-2024-24135 | BurakSevben/CVE-2024-24135 | no description | 2024-01-12T22:49:01Z |
CVE-2024-24134 | BurakSevben/CVE-2024-24134 | no description | 2024-01-12T17:31:15Z |
CVE-2024-24108 | ASR511-OO7/CVE-2024-24108 | no description | 2024-03-06T11:14:39Z |
CVE-2024-24105 | ASR511-OO7/CVE-2024-24105 | no description | 2024-03-06T11:17:07Z |
CVE-2024-24104 | ASR511-OO7/CVE-2024-24104 | no description | 2024-03-06T11:23:03Z |
CVE-2024-24103 | ASR511-OO7/CVE-2024-24103 | no description | 2024-02-20T08:35:46Z |
CVE-2024-24102 | ASR511-OO7/CVE-2024-24102 | no description | 2024-02-20T08:34:50Z |
CVE-2024-24101 | ASR511-OO7/CVE-2024-24101 | no description | 2024-02-20T08:34:02Z |
CVE-2024-24100 | ASR511-OO7/CVE-2024-24100 | no description | 2024-02-25T09:02:08Z |
CVE-2024-24099 | ASR511-OO7/CVE-2024-24099 | no description | 2024-02-25T09:03:38Z |
CVE-2024-24098 | ASR511-OO7/CVE-2024-24098 | no description | 2024-02-20T08:33:10Z |
CVE-2024-24097 | ASR511-OO7/CVE-2024-24097 | no description | 2024-02-20T08:32:13Z |
CVE-2024-24096 | ASR511-OO7/CVE-2024-24096 | no description | 2024-02-25T09:07:19Z |
CVE-2024-24095 | ASR511-OO7/CVE-2024-24095 | no description | 2024-02-25T09:08:37Z |
CVE-2024-24094 | ASR511-OO7/CVE-2024-24094 | no description | 2024-02-20T08:30:36Z |
CVE-2024-24093 | ASR511-OO7/CVE-2024-24093 | no description | 2024-02-20T08:29:44Z |
CVE-2024-24092 | ASR511-OO7/CVE-2024-24092 | no description | 2024-02-20T08:21:12Z |
CVE-2024-24035 | ELIZEUOPAIN/CVE-2024-24035 | no description | 2024-02-06T18:49:34Z |
CVE-2024-24034 | ELIZEUOPAIN/CVE-2024-24034 | no description | 2024-02-06T16:47:07Z |
CVE-2024-23998 | EQSTLab/CVE-2024-23998 | PoC for CVE-2024-23998 | 2024-09-06T06:11:15Z |
CVE-2024-23997 | EQSTLab/CVE-2024-23997 | PoC for CVE-2024-23997 | 2024-09-06T06:07:12Z |
CVE-2024-23995 | EQSTLab/CVE-2024-23995 | PoC for CVE-2024-23995 | 2024-09-06T06:14:36Z |
CVE-2024-23897 | 10T4/PoC-Fix-jenkins-rce_CVE-2024-23897 | on this git you can find all information on the CVE-2024-23897 | 2024-01-27T13:27:57Z |
CVE-2024-23897 | CKevens/CVE-2024-23897 | CVE-2024-23897 jenkins-cli | 2024-01-27T12:57:28Z |
CVE-2024-23897 | yoryio/CVE-2024-23897 | Scanner for CVE-2024-23897 - Jenkins | 2024-01-27T04:35:20Z |
CVE-2024-23897 | vmtyan/poc-cve-2024-23897 | no description | 2024-01-26T21:39:26Z |
CVE-2024-23897 | h4x0r-dz/CVE-2024-23897 | CVE-2024-23897 | 2024-01-26T09:44:32Z |
CVE-2024-23897 | Vozec/CVE-2024-23897 | This repository presents a proof-of-concept of CVE-2024-23897 | 2024-01-28T01:57:06Z |
CVE-2024-23897 | Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution | CVE-2024-22515 arbitrary file upload and CVE-2024-22514 remote code execution for AgentDVR 5.1.6.0 (Authenticated) | 2024-01-27T15:36:05Z |
CVE-2024-23897 | jopraveen/CVE-2024-23897 | no description | 2024-01-29T12:00:25Z |
CVE-2024-23897 | wjlin0/CVE-2024-23897 | CVE-2024-23897 - Jenkins 任意文件读取 利用工具 | 2024-01-27T19:34:48Z |
CVE-2024-23897 | raheel0x01/CVE-2024-23897 | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. | 2024-01-28T12:53:23Z |
CVE-2024-23897 | binganao/CVE-2024-23897 | no description | 2024-01-26T08:02:00Z |
CVE-2024-23897 | viszsec/CVE-2024-23897 | Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE | 2024-01-29T04:41:53Z |
CVE-2024-23897 | brijne/CVE-2024-23897-RCE | CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE | 2024-02-02T23:13:26Z |
CVE-2024-23897 | AbraXa5/Jenkins-CVE-2024-23897 | PoC for Jenkins CVE-2024-23897 | 2024-02-01T03:17:35Z |
CVE-2024-23897 | WLXQqwer/Jenkins-CVE-2024-23897- | no description | 2024-02-04T01:14:40Z |
CVE-2024-23897 | kaanatmacaa/CVE-2024-23897 | Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability) | 2024-02-04T20:56:42Z |
CVE-2024-23897 | B4CK4TT4CK/CVE-2024-23897 | CVE-2024-23897 | 2024-02-13T22:38:50Z |
CVE-2024-23897 | Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. | 2024-02-07T15:07:37Z |
CVE-2024-23897 | godylockz/CVE-2024-23897 | POC for CVE-2024-23897 Jenkins File-Read | 2024-02-16T07:16:04Z |
CVE-2024-23897 | ifconfig-me/CVE-2024-23897 | Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897] | 2024-02-16T23:21:40Z |
CVE-2024-23897 | Nebian/CVE-2024-23897 | Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins. | 2024-02-21T18:32:45Z |
CVE-2024-23897 | pulentoski/CVE-2024-23897-Arbitrary-file-read | Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 | 2024-02-20T15:26:34Z |
CVE-2024-23897 | jenkinsci-cert/SECURITY-3314-3315 | Workaround for disabling the CLI to mitigate SECURITY-3314/CVE-2024-23897 and SECURITY-3315/CVE-2024-23898 | 2024-01-23T19:19:04Z |
CVE-2024-23897 | Abo5/CVE-2024-23897 | This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it. | 2024-02-26T03:07:28Z |
CVE-2024-23897 | xaitax/CVE-2024-23897 | CVE-2024-23897 - Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. | 2024-01-26T19:00:03Z |
CVE-2024-23897 | ThatNotEasy/CVE-2024-23897 | Perform with massive Jenkins Reading-2-RCE | 2024-02-19T02:29:12Z |
CVE-2024-23897 | Athulya666/CVE-2024-23897 | Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability | 2024-05-03T08:18:51Z |
CVE-2024-23897 | mil4ne/CVE-2024-23897-Jenkins-4.441 | no description | 2024-05-08T02:28:46Z |
CVE-2024-23897 | murataydemir/CVE-2024-23897 | [CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE) | 2024-05-07T11:00:03Z |
CVE-2024-23897 | Maalfer/CVE-2024-23897 | Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados | 2024-05-16T09:32:51Z |
CVE-2024-23897 | Surko888/Surko-Exploit-Jenkins-CVE-2024-23897 | Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897) | 2024-05-26T09:35:54Z |
CVE-2024-23897 | NoSpaceAvailable/CVE-2024-23897 | Reproduce CVE-2024–23897 | 2024-08-06T05:27:50Z |
CVE-2024-23897 | BinaryGoodBoy0101/Jenkins-Exploit-CVE-2024-23897-Fsociety | exploit diseñado para aprovechar una vulnerabilidad crítica en Jenkins versiones <= 2.441. La vulnerabilidad, CVE-2024-23897, permite la lectura arbitraria de archivos a través del CLI de Jenkins, lo que puede llevar a la exposición de información sensible o incluso a la ejecución remota de código (RCE) bajo ciertas circunstancias. | 2024-09-03T16:06:40Z |
CVE-2024-23897 | ShieldAuth-PHP/PBL05-CVE-Analsys | CVE-2024-23897 분석 | 2024-09-09T18:42:34Z |
CVE-2024-23897 | verylazytech/CVE-2024-23897 | POC - Jenkins File Read Vulnerability - CVE-2024-23897 | 2024-09-30T16:38:28Z |
CVE-2024-2389 | adhikara13/CVE-2024-2389 | no description | 2024-04-11T14:03:23Z |
CVE-2024-23780 | HazardLab-IO/CVE-2024-23780 | Netbox - CVE-2024-23780 | 2024-03-08T10:39:59Z |
CVE-2024-23774 | Verrideo/CVE-2024-23774 | no description | 2024-02-05T10:59:03Z |
CVE-2024-23773 | Verrideo/CVE-2024-23773 | no description | 2024-02-05T10:58:50Z |
CVE-2024-23772 | Verrideo/CVE-2024-23772 | no description | 2024-02-05T10:58:33Z |
CVE-2024-23747 | louiselalanne/CVE-2024-23747 | Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability | 2024-01-26T00:43:29Z |
CVE-2024-23746 | louiselalanne/CVE-2024-23746 | Miro Desktop 0.8.18 on macOS allows Electron code injection. | 2024-01-26T00:39:20Z |
CVE-2024-23745 | louiselalanne/CVE-2024-23745 | In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. | 2024-01-25T21:20:40Z |
CVE-2024-23743 | giovannipajeu1/CVE-2024-23743 | no description | 2023-12-19T17:07:27Z |
CVE-2024-23742 | giovannipajeu1/CVE-2024-23742 | CVE-2024-23742 | 2024-01-25T13:52:05Z |
CVE-2024-23741 | giovannipajeu1/CVE-2024-23741 | CVE-2024-23741 | 2024-01-25T13:49:10Z |
CVE-2024-23740 | giovannipajeu1/CVE-2024-23740 | CVE-2024-23739 | 2024-01-25T13:37:08Z |
CVE-2024-23739 | giovannipajeu1/CVE-2024-23739 | CVE-2024-23739 | 2024-01-25T13:44:16Z |
CVE-2024-23738 | giovannipajeu1/CVE-2024-23738 | CVE-2024-23738 | 2024-01-25T13:27:19Z |
CVE-2024-23727 | actuator/yi | CVE-2023-47882 - CVE-2024-23727 | 2023-11-05T20:37:24Z |
CVE-2024-23727 | akabe1/Graver | Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116) | 2024-03-24T13:14:52Z |
CVE-2024-23727 | douglasbuzatto/G3-Loop-DoS | This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing. | 2024-03-24T07:53:52Z |
CVE-2024-23722 | alexcote1/CVE-2024-23722-poc | no description | 2024-03-25T17:50:33Z |
CVE-2024-23709 | AbrarKhan/external_sonivox_CVE-2024-23709 | no description | 2024-08-13T08:44:25Z |
CVE-2024-23708 | uthrasri/CVE-2024-23708 | no description | 2024-08-08T13:16:58Z |
CVE-2024-23705 | uthrasri/frameworks_base_CVE-2024-23705 | no description | 2023-10-26T21:21:46Z |
CVE-2024-23692 | k3lpi3b4nsh33/CVE-2024-23692 | no description | 2024-06-11T07:21:04Z |
CVE-2024-23692 | Tupler/CVE-2024-23692-exp | CVE-2024-23692 exp | 2024-06-16T07:04:01Z |
CVE-2024-23692 | vanboomqi/CVE-2024-23692 | no description | 2024-06-13T09:12:06Z |
CVE-2024-23692 | Mr-r00t11/CVE-2024-23692 | no description | 2024-06-14T01:33:19Z |
CVE-2024-23692 | WanLiChangChengWanLiChang/CVE-2024-23692-RCE | no description | 2024-06-13T13:13:10Z |
CVE-2024-23692 | jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS | Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692) | 2024-06-13T06:00:24Z |
CVE-2024-23692 | 0x20c/CVE-2024-23692-EXP | CVE-2024-23692 Exploit | 2024-06-18T03:27:47Z |
CVE-2024-23692 | BBD-YZZ/CVE-2024-23692 | CVE-2024-23692 | 2024-06-17T08:46:48Z |
CVE-2024-23692 | pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692 | Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692) | 2024-07-10T04:44:27Z |
CVE-2024-23692 | verylazytech/CVE-2024-23692 | POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 | 2024-09-15T12:15:35Z |
CVE-2024-23652 | abian2/CVE-2024-23652 | no description | 2024-03-01T09:50:00Z |
CVE-2024-23443 | zhazhalove/osquery_cve-2024-23443 | Osqery extension HP BIOS WMI | 2024-02-18T02:15:44Z |
CVE-2024-23339 | 200101WhoAmI/CVE-2024-23339 | pp | 2024-08-21T05:03:32Z |
CVE-2024-23334 | ox1111/CVE-2024-23334 | CVE-2024-23334 | 2024-02-28T22:30:21Z |
CVE-2024-23334 | z3rObyte/CVE-2024-23334-PoC | A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1 | 2024-03-18T20:39:27Z |
CVE-2024-23334 | sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream | no description | 2024-03-17T10:56:02Z |
CVE-2024-23334 | jhonnybonny/CVE-2024-23334 | aiohttp LFI (CVE-2024-23334) | 2024-03-19T16:28:56Z |
CVE-2024-23334 | brian-edgar-re/poc-cve-2024-23334 | This repository contains a proof of concept about the exploitation of the aiohttp library for the reported vulnerability CVE-2024-23334. | 2024-04-27T13:21:50Z |
CVE-2024-23334 | binaryninja/CVE-2024-23334 | Expolit for CVE-2024-23334 (aiohttp >= 1.0.5> && <=3.9.1) | 2024-06-17T16:28:35Z |
CVE-2024-23334 | s4botai/CVE-2024-23334-PoC | A proof of concept of the LFI vulnerability on aiohttp 3.9.1 | 2024-09-08T10:37:29Z |
CVE-2024-23208 | hrtowii/CVE-2024-23208-test | no description | 2024-02-04T07:37:21Z |
CVE-2024-23200 | l00neyhacker/CVE-2024-23200 | CVE-2024-23200 | 2024-01-14T21:46:27Z |
CVE-2024-23199 | l00neyhacker/CVE-2024-23199 | CVE-2024-23199 | 2024-01-14T21:43:45Z |
CVE-2024-23113 | OxLmahdi/cve-2024-23113 | no description | 2024-10-11T08:13:10Z |
CVE-2024-23113 | CheckCve2/CVE-2024-23113 | test_private_CVE | 2024-10-11T15:16:00Z |
CVE-2024-23108 | horizon3ai/CVE-2024-23108 | CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection | 2024-05-20T14:34:09Z |
CVE-2024-23108 | hitem/CVE-2024-23108 | POC iteration for CVE-2024-23108 which can use -l for list input | 2024-05-28T17:21:11Z |
CVE-2024-23002 | xiaomaoxxx/CVE-2024-23002 | this is test POC for git_rce | 2024-07-07T12:55:29Z |
CVE-2024-22983 | keru6k/CVE-2024-22983 | An SQL injection Vulnerability in projectworlds' Visitor Management System | 2024-01-25T10:05:00Z |
CVE-2024-22939 | NUDTTAN91/CVE-2024-22939 | CVE-2024-22939 | 2024-01-25T07:00:38Z |
CVE-2024-22922 | keru6k/CVE-2024-22922 | A Broken Authentication Vulnerability found in Projectworlds' Visitor Management System | 2024-01-25T11:14:43Z |
CVE-2024-22917 | ASR511-OO7/CVE-2024-22917 | no description | 2024-02-25T09:10:40Z |
CVE-2024-22909 | BurakSevben/CVE-2024-22909 | no description | 2024-01-12T00:40:29Z |
CVE-2024-22899 | Chocapikk/CVE-2024-22899-to-22903-ExploitChain | Comprehensive Exploit Chain for Multiple Vulnerabilities in VinChin Backup & Recovery <= 7.2 | 2023-11-06T09:24:15Z |
CVE-2024-22894 | Jaarden/CVE-2024-22894 | no description | 2024-01-27T18:17:48Z |
CVE-2024-22891 | EQSTLab/CVE-2024-22891 | PoC for CVE-2024-22891 | 2024-09-06T06:13:39Z |
CVE-2024-22890 | BurakSevben/CVE-2024-22890 | no description | 2024-01-11T22:30:50Z |
CVE-2024-22889 | shenhav12/CVE-2024-22889-Plone-v6.0.9 | no description | 2024-01-25T10:26:29Z |
CVE-2024-22867 | brandon-t-elliott/CVE-2024-22867 | no description | 2024-02-11T01:52:52Z |
CVE-2024-22853 | FaLLenSKiLL1/CVE-2024-22853 | D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session. | 2024-06-29T10:21:11Z |
CVE-2024-22774 | Gray-0men/CVE-2024-22774 | Panoramic Dental Imaging software Stealthy Privilege Escalation Vulnerability | 2024-03-24T05:59:57Z |
CVE-2024-22752 | hacker625/CVE-2024-22752 | EaseUS MobiMover 6.0.5 Build 21620 - Insecure Files and Folders Permissions | 2024-03-05T09:54:00Z |
CVE-2024-22678 | l00neyhacker/CVE-2024-22678 | no description | 2024-01-29T00:19:48Z |
CVE-2024-22676 | l00neyhacker/CVE-2024-22676 | no description | 2024-01-29T00:19:06Z |
CVE-2024-22675 | l00neyhacker/CVE-2024-22675 | no description | 2024-01-29T00:17:51Z |
CVE-2024-22641 | zunak/CVE-2024-22641 | no description | 2024-04-01T16:11:28Z |
CVE-2024-22640 | zunak/CVE-2024-22640 | no description | 2024-04-01T15:43:07Z |
CVE-2024-2257 | Redfox-Secuirty/Digisol-DG-GR1321-s-Password-Policy-Bypass-CVE-2024-2257 | no description | 2024-06-18T11:27:57Z |
CVE-2024-22534 | austino2000/CVE-2024-22534 | no description | 2024-01-25T18:57:34Z |
CVE-2024-22532 | pwndorei/CVE-2024-22532 | no description | 2024-02-22T10:44:38Z |
CVE-2024-22526 | 200101WhoAmI/CVE-2024-22526 | bandi view | 2024-08-21T05:11:26Z |
CVE-2024-22515 | Orange-418/CVE-2024-22515-File-Upload-Vulnerability | no description | 2024-01-27T18:51:26Z |
CVE-2024-22514 | Orange-418/CVE-2024-22514-Remote-Code-Execution | no description | 2024-01-27T19:04:56Z |
CVE-2024-22416 | mindstorm38/ensimag-secu3a-cve-2024-22416 | CVE-2024-22416 exploit experiments | 2024-01-18T08:49:07Z |
CVE-2024-22411 | tamaloa/avo-CVE-2024-22411 | no description | 2024-01-19T09:19:52Z |
CVE-2024-22393 | omranisecurity/CVE-2024-22393 | Exploit for CVE-2024-22393 Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer. | 2024-03-08T08:45:12Z |
CVE-2024-22369 | oscerd/CVE-2024-22369 | CVE-2024-22369 Reproducer | 2024-01-10T11:01:59Z |
CVE-2024-22275 | mbadanoiu/CVE-2024-22275 | CVE-2024-22275: Partial File Read in VMware vCenter Server | 2024-07-06T18:14:28Z |
CVE-2024-22274 | mbadanoiu/CVE-2024-22274 | CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server | 2024-07-06T17:55:25Z |
CVE-2024-22274 | ninhpn1337/CVE-2024-22274 | no description | 2024-07-11T04:13:59Z |
CVE-2024-22274 | l0n3m4n/CVE-2024-22274-RCE | PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit) | 2024-07-15T07:26:59Z |
CVE-2024-22274 | Mustafa1986/CVE-2024-22274-RCE | no description | 2024-07-18T06:18:57Z |
CVE-2024-22263 | securelayer7/CVE-2024-22263_Scanner | (CVE-2024-22263) Spring Cloud Dataflow Arbitrary File Writing Scanner | 2024-08-21T19:58:25Z |
CVE-2024-22243 | SeanPesce/CVE-2024-22243 | Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF). | 2024-02-21T12:55:22Z |
CVE-2024-22234 | shellfeel/CVE-2024-22243-CVE-2024-22234 | env of CVE-2024-22243&CVE-2024-22234 | 2024-02-23T10:09:51Z |
CVE-2024-22198 | xiw1ll/CVE-2024-22198_Checker | Identify Nginx-ui version and check if it's vulnerable to CVE-2024-22198 | 2024-07-24T13:59:51Z |
CVE-2024-22145 | RandomRobbieBF/CVE-2024-22145 | InstaWP Connect <= 0.1.0.8 - Missing Authorization to Arbitrary Options Update (Subscriber+) | 2024-01-17T20:56:21Z |
CVE-2024-22120 | W01fh4cker/CVE-2024-22120-RCE | Time Based SQL Injection in Zabbix Server Audit Log --> RCE | 2024-05-20T03:29:09Z |
CVE-2024-22120 | isPique/CVE-2024-22120-RCE-with-gopher | This is my exploit for CVE-2024-22120, which involves an SSRF vulnerability inside an XXE with a Gopher payload. | 2024-08-13T14:51:44Z |
CVE-2024-22120 | g4nkd/CVE-2024-22120-RCE-with-gopher | This exploit was created to exploit an XXE (XML External Entity). Through it, I read the backend code of the web service and found an endpoint where I could use gopher to make internal requests on Zabbix vulnerable to RCE. | 2024-08-14T15:55:33Z |
CVE-2024-22026 | securekomodo/CVE-2024-22026 | Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core" | 2024-05-15T11:20:45Z |
CVE-2024-22024 | 0dteam/CVE-2024-22024 | Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure | 2024-02-09T14:31:56Z |
CVE-2024-22024 | tequilasunsh1ne/ivanti_CVE_2024_22024 | no description | 2024-10-08T09:27:46Z |
CVE-2024-22002 | 0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002 | no description | 2024-01-02T18:49:21Z |
CVE-2024-21978 | Freax13/cve-2024-21978-poc | no description | 2024-01-07T11:07:01Z |
CVE-2024-2193 | uthrasri/CVE-2024-2193 | no description | 2024-03-28T07:30:04Z |
CVE-2024-21899 | Oxdestiny/CVE-2024-21899-RCE-POC | Critical RCE CVE-2024-21899 Vulnerability in QNAP Products | 2024-03-27T19:19:49Z |
CVE-2024-21893 | h4x0r-dz/CVE-2024-21893.py | CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure | 2024-02-02T22:59:21Z |
CVE-2024-21887 | rxwx/pulse-meter | Tool for checking the Ivanti Connect Secure System Snapshot for IOCs related to CVE-2023-46805 and CVE-2024-21887 | 2024-01-16T19:19:52Z |
CVE-2024-21887 | duy-31/CVE-2023-46805_CVE-2024-21887 | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. | 2024-01-16T19:40:59Z |
CVE-2024-21887 | mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped | no description | 2024-01-19T08:11:31Z |
CVE-2024-21887 | raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887 | The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist. | 2024-01-18T13:25:46Z |
CVE-2024-21887 | Esonhugh/gitlab_honeypot | CVE-2023-7028 killer | 2024-01-18T10:13:18Z |
CVE-2024-21887 | Chocapikk/CVE-2024-21887 | A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. | 2024-01-16T20:59:38Z |
CVE-2024-21887 | oways/ivanti-CVE-2024-21887 | POC Checker for ivanti CVE-2024-21887 Command injcetion | 2024-01-14T09:25:56Z |
CVE-2024-21887 | tucommenceapousser/CVE-2024-21887 | exploit for ivanti | 2024-01-20T19:15:23Z |
CVE-2024-21887 | seajaysec/Ivanti-Connect-Around-Scan | Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887. | 2024-01-19T02:12:11Z |
CVE-2024-21887 | Chocapikk/CVE-2024-21893-to-CVE-2024-21887 | CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit | 2024-02-03T11:33:40Z |
CVE-2024-21887 | imhunterand/CVE-2024-21887 | Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits) | 2024-02-09T18:07:06Z |
CVE-2024-2188 | hacefresko/CVE-2024-2188 | Exploit for stored XSS vulnerability found in the TP-Link Archer AX50 router. | 2024-09-17T14:33:13Z |
CVE-2024-21793 | FeatherStark/CVE-2024-21793 | no description | 2024-05-09T02:31:13Z |
CVE-2024-21762 | redCode001/CVE-2024-21762-POC | FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!! | 2024-03-03T06:12:13Z |
CVE-2024-21762 | BishopFox/cve-2024-21762-check | Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762 | 2024-02-28T21:16:10Z |
CVE-2024-21762 | d0rb/CVE-2024-21762 | The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw. | 2024-03-17T09:15:22Z |
CVE-2024-21762 | h4x0r-dz/CVE-2024-21762 | out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability | 2024-03-13T09:17:28Z |
CVE-2024-21762 | cleverg0d/CVE-2024-21762-Checker | This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses. | 2024-03-11T12:28:05Z |
CVE-2024-21762 | r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check | Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación) | 2024-03-13T22:57:00Z |
CVE-2024-21762 | lolminerxmrig/multicheck_CVE-2024-21762 | no description | 2024-04-03T21:42:55Z |
CVE-2024-21762 | Codeb3af/Cve-2024-21762- | Full exploit of Cve-2024-21762! | 2024-04-16T22:06:52Z |
CVE-2024-21762 | rdoix/cve-2024-21762-checker | no description | 2024-06-20T02:58:02Z |
CVE-2024-21754 | CyberSecuritist/CVE-2024-21754-Forti-RCE | no description | 2024-06-27T18:52:06Z |
CVE-2024-21733 | LtmThink/CVE-2024-21733 | 一个验证对CVE-2024-21733 | 2024-08-15T09:47:32Z |
CVE-2024-21689 | salvadornakamura/CVE-2024-21689 | CVE-2024–21689 RCE Bamboo Data Center and Server Atlassian POC | 2024-08-23T15:32:50Z |
CVE-2024-21683 | r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server | 2024-05-23T02:10:24Z |
CVE-2024-21683 | absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server. | 2024-05-24T05:38:18Z |
CVE-2024-21683 | W01fh4cker/CVE-2024-21683-RCE | CVE-2024-21683 Confluence Post Auth RCE | 2024-05-23T09:05:40Z |
CVE-2024-21683 | phucrio/CVE-2024-21683-RCE | no description | 2024-05-27T11:14:54Z |
CVE-2024-21683 | xh4vm/CVE-2024-21683 | no description | 2024-06-04T12:00:00Z |
CVE-2024-21650 | codeb0ss/CVE-2024-21650-PoC | Mass Exploit - CVE-2024-21650 - XWiki < Remote code execution (RCE) | 2024-06-28T16:00:42Z |
CVE-2024-21644 | ltranquility/CVE-2024-21644-Poc | no description | 2024-03-30T01:00:31Z |
CVE-2024-21633 | 0x33c0unt/CVE-2024-21633 | MobSF Remote code execution (via CVE-2024-21633) | 2024-01-07T21:34:09Z |
CVE-2024-21626 | cdxiaodong/CVE-2024-21626 | CVE-2024-21626-poc-research-Reappearance-andtodo | 2024-02-02T03:56:03Z |
CVE-2024-21626 | zpxlz/CVE-2024-21626-POC | no description | 2024-02-01T12:53:18Z |
CVE-2024-21626 | laysakura/CVE-2024-21626-demo | Container Runtime Meetup #5 のLT用のデモ | 2024-02-02T11:51:08Z |
CVE-2024-21626 | zhangguanzhang/CVE-2024-21626 | no description | 2024-02-02T06:34:16Z |
CVE-2024-21626 | Wall1e/CVE-2024-21626-POC | no description | 2024-02-02T02:51:29Z |
CVE-2024-21626 | NitroCao/CVE-2024-21626 | PoC and Detection for CVE-2024-21626 | 2024-02-01T15:28:37Z |
CVE-2024-21626 | V0WKeep3r/CVE-2024-21626-runcPOC | no description | 2024-02-05T17:47:01Z |
CVE-2024-21626 | abian2/CVE-2024-21626 | no description | 2024-03-01T09:58:50Z |
CVE-2024-21626 | Sk3pper/CVE-2024-21626 | no description | 2024-03-15T10:38:27Z |
CVE-2024-21626 | KubernetesBachelor/CVE-2024-21626 | POC | 2024-04-03T11:45:19Z |
CVE-2024-21626 | dorser/cve-2024-21626 | no description | 2024-04-10T09:12:06Z |
CVE-2024-21626 | FlojBoj/CVE-2024-21626 | no description | 2024-08-25T15:11:42Z |
CVE-2024-21514 | bigb0x/CVE-2024-21514 | SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart | 2024-06-23T00:55:00Z |
CVE-2024-21413 | duy-31/CVE-2024-21413 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC | 2024-02-15T19:57:38Z |
CVE-2024-21413 | r00tb1t/CVE-2024-21413-POC | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC | 2024-02-16T21:10:31Z |
CVE-2024-21413 | Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | no description | 2024-02-20T12:41:15Z |
CVE-2024-21413 | xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Microsoft-Outlook-Remote-Code-Execution-Vulnerability | 2024-02-16T15:17:59Z |
CVE-2024-21413 | sanderswannalive/sumkaluissessss | CVE-2024-206565 | 2024-02-19T09:06:06Z |
CVE-2024-21413 | MSeymenD/CVE-2024-21413 | CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Alma | 2024-02-19T01:37:15Z |
CVE-2024-21413 | ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir. | 2024-02-23T12:13:11Z |
CVE-2024-21413 | dshabani96/CVE-2024-21413 | no description | 2024-02-29T10:07:34Z |
CVE-2024-21413 | DevAkabari/CVE-2024-21413 | CVE-2024-21413 exploit | 2024-02-28T07:26:24Z |
CVE-2024-21413 | CMNatic/CVE-2024-21413 | CVE-2024-21413 PoC for THM Lab | 2024-02-17T14:52:52Z |
CVE-2024-21413 | X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit | CVE-2024-21413 Microsoft Outlook RCE Exploit | 2024-05-03T16:09:54Z |
CVE-2024-21413 | th3Hellion/CVE-2024-21413 | no description | 2024-05-11T12:28:22Z |
CVE-2024-21413 | ShubhamKanhere307/CVE-2024-21413 | This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. | 2024-06-18T08:11:33Z |
CVE-2024-21413 | olebris/CVE-2024-21413 | CVE-2024-21413 PoC | 2024-06-28T10:27:34Z |
CVE-2024-21413 | DerZiad/CVE-2024-21413 | This is a mailer that use console prompt to exploit this vulnerability | 2024-06-30T08:53:46Z |
CVE-2024-21413 | Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape | no description | 2024-07-03T08:45:05Z |
CVE-2024-21413 | HYZ3K/CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability. | 2024-08-01T05:53:38Z |
CVE-2024-21413 | ThemeHackers/CVE-2024-21413 | CVE-2024-21413 - Microsoft Outlook Remote Code Execution Vulnerability PoC | 2024-08-31T13:18:43Z |
CVE-2024-21412 | lsr00ter/CVE-2024-21412_Water-Hydra | according to trendmicro's research | 2024-03-21T15:57:51Z |
CVE-2024-21400 | MegaCorp001/CVE-2024-21400-POC | CVE-2024-21400 is a privilege escalation vulnerability that rates a CVSS score of 9.0. | 2024-03-13T14:01:26Z |
CVE-2024-21388 | d0rb/CVE-2024-21388 | This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API. | 2024-03-28T09:31:31Z |
CVE-2024-21378 | d0rb/CVE-2024-21378 | This repository contains an exploit for targeting Microsoft Outlook through Exchange Online, leveraging a vulnerability to execute arbitrary code via COM DLLs. The exploit utilizes a modified version of Ruler to send a malicious form as an email, triggering the execution upon user interaction within the Outlook thick client. | 2024-03-12T14:11:58Z |
CVE-2024-21378 | tmcve/CVE-2024-TEST | aaa | 2024-03-13T16:16:53Z |
CVE-2024-21345 | FoxyProxys/CVE-2024-21345 | no description | 2024-04-28T21:36:33Z |
CVE-2024-21345 | exploits-forsale/CVE-2024-21345 | Proof-of-Concept for CVE-2024-21345 | 2024-04-26T16:38:17Z |
CVE-2024-21338 | hakaioffsec/CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. | 2024-04-13T05:53:02Z |
CVE-2024-21338 | UMU618/CVE-2024-21338 | Fork of https://github.com/hakaioffsec/CVE-2024-21338 | 2024-04-17T10:16:21Z |
CVE-2024-21338 | varwara/CVE-2024-21338 | PoC for the Untrusted Pointer Dereference in the appid.sys driver | 2024-04-23T19:09:22Z |
CVE-2024-21338 | Zombie-Kaiser/CVE-2024-21338-x64-build- | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. | 2024-05-18T15:38:34Z |
CVE-2024-21338 | tykawaii98/CVE-2024-21338_PoC | no description | 2024-06-23T06:03:44Z |
CVE-2024-21338 | Crowdfense/CVE-2024-21338 | Windows AppLocker Driver (appid.sys) LPE | 2024-07-29T13:18:06Z |
CVE-2024-21306 | d4rks1d33/C-PoC-for-CVE-2024-21306 | no description | 2024-04-08T01:15:21Z |
CVE-2024-21306 | PhucHauDeveloper/BadBlue | CVE-2024-21306 BadBlue implementation (Using DuckyScript) | 2024-05-06T02:05:02Z |
CVE-2024-21305 | tandasat/CVE-2024-21305 | Report and exploit of CVE-2024-21305. | 2023-12-16T23:27:34Z |
CVE-2024-21305 | haxpunk1337/CVE-2024 | no description | 2024-01-10T14:40:33Z |
CVE-2024-2122 | codeb0ss/CVE-2024-2122-PoC | no description | 2024-07-05T21:19:18Z |
CVE-2024-21111 | mansk1es/CVE-2024-21111 | Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability | 2024-04-22T07:05:04Z |
CVE-2024-21111 | 10cks/CVE-2024-21111-del | no description | 2024-05-17T03:09:54Z |
CVE-2024-21111 | x0rsys/CVE-2024-21111 | Precompiled binaries for Privilege Escalation in Oracle VM Virtual box prior to 7.0.16 | 2024-06-04T04:24:47Z |
CVE-2024-21107 | Alaatk/CVE-2024-21107 | Oracle VM VirtualBox for Windows prior to 7.0.16 - Elevation of Privileges | 2024-04-17T06:13:20Z |
CVE-2024-21006 | momika233/CVE-2024-21006 | no description | 2024-05-01T03:08:48Z |
CVE-2024-21006 | lightr3d/CVE-2024-21006_jar | CVE-2024-21006 exp | 2024-07-02T06:25:14Z |
CVE-2024-21006 | dadvlingd/CVE-2024-21006 | no description | 2024-07-25T00:32:00Z |
CVE-2024-20931 | GlassyAmadeus/CVE-2024-20931 | The Poc for CVE-2024-20931 | 2024-02-02T01:58:49Z |
CVE-2024-20931 | dinosn/CVE-2024-20931 | CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839 | 2024-02-06T15:09:33Z |
CVE-2024-20931 | ATonysan/CVE-2024-20931_weblogic | no description | 2024-02-06T09:21:08Z |
CVE-2024-20931 | JayBeale/cve-202421626 | no description | 2024-02-05T21:05:02Z |
CVE-2024-20931 | Leocodefocus/CVE-2024-20931-Poc | no description | 2024-02-06T06:35:07Z |
CVE-2024-2086 | MrCyberSecs/CVE-2024-2086-GOOGLE-DRIVE | The Integrate Google Drive unauthorized access of data | 2024-03-30T07:45:18Z |
CVE-2024-20767 | m-cetin/CVE-2024-20767 | Proof of Concept for CVE-2024-20767. Arbitrary file read from Adobe ColdFusion | 2024-03-26T10:03:51Z |
CVE-2024-20767 | yoryio/CVE-2024-20767 | Exploit for CVE-2024-20767 - Adobe ColdFusion | 2024-03-26T06:51:08Z |
CVE-2024-20767 | huyqa/cve-2024-20767 | no description | 2024-03-28T07:46:31Z |
CVE-2024-20767 | Chocapikk/CVE-2024-20767 | Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability | 2024-03-26T19:17:14Z |
CVE-2024-20767 | Praison001/CVE-2024-20767-Adobe-ColdFusion | Exploit for CVE-2024-20767 affecting Adobe ColdFusion | 2024-04-01T09:01:30Z |
CVE-2024-20746 | 200101WhoAmI/CVE-2024-20746 | adobe premiere pro | 2024-08-21T05:29:10Z |
CVE-2024-2074 | yuziiiiiiiiii/CVE-2024-2074 | CVE-2024-2074 | 2024-02-29T12:30:37Z |
CVE-2024-20698 | RomanRybachek/CVE-2024-20698 | Analysis of the vulnerability | 2024-01-17T04:35:42Z |
CVE-2024-20696 | clearbluejar/CVE-2024-20696 | no description | 2024-03-08T02:31:41Z |
CVE-2024-20666 | nnotwen/Script-For-CVE-2024-20666 | PowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in CVE-2024-20666. | 2024-02-15T13:53:21Z |
CVE-2024-20666 | invaderslabs/CVE-2024-20666 | CVE-2024-20666 vulnerability Solution patch failures in the Windows Recovery Environment (WinRE). | 2024-07-01T10:14:40Z |
CVE-2024-20666 | HYZ3K/CVE-2024-20666 | How to Check And Fix 0x80070643 Windows Update Error That Leads To CVE-2024-20666. | 2024-07-27T11:27:08Z |
CVE-2024-20656 | Wh04m1001/CVE-2024-20656 | no description | 2024-01-12T15:08:01Z |
CVE-2024-20656 | NUDTTAN91/CVE20240109 | no description | 2024-01-09T00:53:24Z |
CVE-2024-20656 | NUDTTAN91/CVE20240108 | no description | 2024-01-08T09:02:56Z |
CVE-2024-2054 | Madan301/CVE-2024-2054 | no description | 2024-03-25T07:01:59Z |
CVE-2024-20467 | saler-cve/PoC-Exploit-CVE-2024-20467 | no description | 2024-09-28T21:23:00Z |
CVE-2024-20419 | codeb0ss/CVE-2024-20419-PoC | CVE-2024-20419 - Cisco SSM On-Prem < Mass Password Reset Account Takeover Exploit | 2024-09-05T19:10:30Z |
CVE-2024-20405 | AbdElRahmanEzzat1995/CVE-2024-20405 | no description | 2024-06-09T18:55:03Z |
CVE-2024-20404 | AbdElRahmanEzzat1995/CVE-2024-20404 | no description | 2024-06-09T18:50:59Z |
CVE-2024-20399 | Blootus/CVE-2024-20399-Cisco-RCE | Private exploit for Cisco Nexus giving RCE | 2024-07-02T23:40:49Z |
CVE-2024-20356 | nettitude/CVE-2024-20356 | This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC. | 2024-04-12T15:07:42Z |
CVE-2024-20356 | SherllyNeo/CVE_2024_20356 | A oxidized version of https://github.com/nettitude/CVE-2024-20356/blob/main/CVE-2024-20356.py | 2024-05-20T00:57:01Z |
CVE-2024-20353 | codeb0ss/CVE-2024-20353-PoC | Mass Exploit - CVE-2024-20353 [Cisco] < Unauthenticated < Denial Of Service | 2024-07-13T16:04:25Z |
CVE-2024-20338 | annmuor/CVE-2024-20338 | CVE-2024-20338 talk for Behind The Code Talk | 2024-06-10T15:41:41Z |
CVE-2024-20291 | BetterCzz/CVE-2024-20291-POC | CVE-2024-20291-POC exploit ---> RCE | 2024-03-03T05:25:35Z |
CVE-2024-20291 | Instructor-Team8/CVE-2024-20291-POC | CVE-2024-20291-POC exploit ---> RCE | 2024-03-03T08:53:14Z |
CVE-2024-20017 | mellow-hype/cve-2024-20017 | exploits for CVE-2024-20017 | 2024-08-30T05:54:36Z |
CVE-2024-1939 | rycbar77/CVE-2024-1939 | For V8CTF M122 | 2024-08-25T12:08:54Z |
CVE-2024-1931 | passer12/CVE-2024-1931-reproduction | CVE-2024-1931-reproduction | 2024-08-13T14:09:20Z |
CVE-2024-1874 | ox1111/-CVE-2024-1874- | command injection | 2024-04-17T05:26:34Z |
CVE-2024-1874 | Tgcohce/CVE-2024-1874 | Proof Of Concept for CVE-2024-1874 | 2024-07-18T15:25:17Z |
CVE-2024-1781 | Icycu123/CVE-2024-1781 | CVE-2024-1781 | 2024-02-12T13:26:03Z |
CVE-2024-1709 | HussainFathy/CVE-2024-1709 | A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability | 2024-02-23T17:26:28Z |
CVE-2024-1709 | sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass | no description | 2024-03-22T21:20:19Z |
CVE-2024-1709 | jacobadodge/Spring2024_CVENG_8160 | no description | 2024-01-19T18:49:59Z |
CVE-2024-1709 | codeb0ss/CVE-2024-1709-PoC | Mass - CVE-2024-1709 - WP_Wzone < Unauthenticated SQL Injection | 2024-05-24T12:02:11Z |
CVE-2024-1709 | AhmedMansour93/Event-ID-229-Rule-Name-SOC262-CVE-2024-1709- | Event ID 229 Rule Name SOC262 ScreenConnect Authentication Bypass Exploitation Detected (CVE-2024-1709) | 2024-09-12T20:31:19Z |
CVE-2024-1709 | AMRICHASFUCK/Mass-CVE-2024-1709 | ScreenConnect AuthBypass Mass RCE | 2024-10-16T08:05:35Z |
CVE-2024-1708 | cjybao/CVE-2024-1709-and-CVE-2024-1708 | no description | 2024-04-02T04:58:38Z |
CVE-2024-1698 | codeb0ss/CVE-2024-1698-PoC | Mass Exploit CVE-2024-1698 - Wordpress NotificationX <= 2.8.2 - SQL Injection | 2024-03-19T14:22:45Z |
CVE-2024-1698 | kamranhasan/CVE-2024-1698-Exploit | This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698. | 2024-03-29T04:11:06Z |
CVE-2024-1698 | shanglyu/CVE-2024-1698 | no description | 2024-10-14T13:02:26Z |
CVE-2024-1655 | lnversed/CVE-2024-1655 | no description | 2024-05-06T10:56:47Z |
CVE-2024-1651 | hy011121/CVE-2024-1651-exploit-RCE | (Mirorring) | 2024-02-29T20:06:30Z |
CVE-2024-1651 | sharpicx/CVE-2024-1651-PoC | Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit. | 2024-02-23T11:04:24Z |
CVE-2024-1651 | Whiteh4tWolf/CVE-2024-1651-PoC | no description | 2024-04-19T16:18:59Z |
CVE-2024-1642470 | Symbolexe/CVE-2024-1642470 | CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent Driver. The vulnerability arises due to improper input validation within the driver's IOCTL handling mechanism. As a result, remote attackers can execute arbitrary code via crafted IOCTL requests, potentially leading to system compromise. | 2024-04-15T17:51:59Z |
CVE-2024-1561 | DiabloHTB/CVE-2024-1561 | Poc for CVE-2024-1561 affecting Gradio 4.12.0 | 2024-05-11T13:44:46Z |
CVE-2024-1561 | DiabloHTB/Nuclei-Template-CVE-2024-1561 | Nuclei Templates | 2024-05-12T19:55:53Z |
CVE-2024-1512 | rat-c/CVE-2024-1512 | PoC for CVE-2024-1512 in MasterStudy LMS WordPress Plugin. | 2024-03-01T11:08:37Z |
CVE-2024-1441 | almkuznetsov/CVE-2024-1441 | no description | 2024-04-16T07:14:33Z |
CVE-2024-1403 | horizon3ai/CVE-2024-1403 | Progress OpenEdge Authentication Bypass | 2024-03-06T15:27:18Z |
CVE-2024-1380 | RandomRobbieBF/CVE-2024-1380 | Relevanssi – A Better Search <= 4.22.0 - Missing Authorization to Unauthenticated Query Log Export | 2024-09-25T14:49:00Z |
CVE-2024-1346 | PeterGabaldon/CVE-2024-1346 | Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants. | 2024-02-25T11:51:03Z |
CVE-2024-1304 | guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS | POC Badgermeter moni tool - CVE-2024-1304 | 2024-02-08T09:29:54Z |
CVE-2024-1303 | guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal | POC Badgermeter moni tool - CVE-2024-1303 | 2024-02-08T09:29:14Z |
CVE-2024-1302 | guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure | POC Badgermeter moni tool - CVE-2024-1302 | 2024-02-08T09:27:53Z |
CVE-2024-1301 | guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection | POC Badgermeter moni tool - CVE-2024-1301 | 2024-02-08T09:08:05Z |
CVE-2024-12883 | mhtsec/cve-2024-12883 | no description | 2024-03-14T21:40:40Z |
CVE-2024-1269 | sajaljat/CVE-2024-1269 | (XSS) | 2024-02-17T12:21:17Z |
CVE-2024-1212 | Chocapikk/CVE-2024-1212 | Unauthenticated Command Injection In Progress Kemp LoadMaster | 2024-03-19T22:23:18Z |
CVE-2024-1212 | nak000/CVE-2024-1212 | no description | 2024-09-04T16:50:08Z |
CVE-2024-1210 | karlemilnikka/CVE-2024-1208-and-CVE-2024-1210 | Sensitive Information Exposure via API in LearnDash. | 2024-02-05T17:46:41Z |
CVE-2024-1209 | karlemilnikka/CVE-2024-1209 | Sensitive Information Exposure via assignments in LearnDash. | 2024-02-05T17:41:47Z |
CVE-2024-1208 | Cappricio-Securities/CVE-2024-1208 | LearnDash LMS < 4.10.3 - Sensitive Information Exposure | 2024-05-30T17:55:45Z |
CVE-2024-1207 | sahar042/CVE-2024-1207 | The WP Booking Calendar plugin for WordPress is vulnerable to SQL Injection via the 'calendar_request_params[dates_ddmmyy_csv]' parameter in all versions up to, and including, 9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attac | 2024-10-08T09:05:16Z |
CVE-2024-11451 | Xiaolqy/CVE-2024-11451 | no description | 2024-07-11T23:16:33Z |
CVE-2024-1112 | enessakircolak/CVE-2024-1112 | no description | 2024-08-04T13:26:46Z |
CVE-2024-1086 | Alicey0719/docker-POC_CVE-2024-1086 | no description | 2024-04-03T13:09:22Z |
CVE-2024-1086 | Notselwyn/CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. | 2024-03-20T21:16:41Z |
CVE-2024-1086 | CCIEVoice2009/CVE-2024-1086 | no description | 2024-04-30T16:10:37Z |
CVE-2024-1086 | kevcooper/CVE-2024-1086-checker | no description | 2024-06-03T22:04:03Z |
CVE-2024-1086 | feely666/CVE-2024-1086 | no description | 2024-06-10T15:19:39Z |
CVE-2024-1086 | xzx482/CVE-2024-1086 | no description | 2024-07-04T10:51:35Z |
CVE-2024-1071 | gbrsh/CVE-2024-1071 | Ultimate Member Unauthorized Database Access / SQLi | 2024-02-27T11:41:53Z |
CVE-2024-1071 | Matrexdz/CVE-2024-1071-Docker | no description | 2024-03-18T17:07:27Z |
CVE-2024-1071 | Matrexdz/CVE-2024-1071 | CVE-2024-1071 | 2024-03-18T16:58:46Z |
CVE-2024-1071 | Trackflaw/CVE-2024-1071-Docker | CVE-2024-1071 with Docker | 2024-03-04T18:29:17Z |
CVE-2024-1071 | fa-rrel/CVE-2024-1071-SQL-Injection | Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited | 2024-08-30T04:23:04Z |
CVE-2024-1071 | Dogu589/WordPress-Exploit-CVE-2024-1071 | no description | 2024-09-15T11:28:47Z |
CVE-2024-0986 | gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated | Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986 | 2024-04-16T03:24:25Z |
CVE-2024-0967 | Oxdestiny/CVE-2024-0967-exploit | ArcSight ESM up to 24.0 information disclosure proof-of-concept | 2024-03-01T22:31:38Z |
CVE-2024-0944 | Artemisxxx37/cve-2024-0944 | no description | 2024-09-10T13:23:25Z |
CVE-2024-0844 | 0x9567b/CVE-2024-0844 | CVE-2024-0844 - Popup More <= 2.2.4 - Authenticated (Admin+) Directory Traversal to Limited Local File Inclusion | 2023-12-31T15:36:51Z |
CVE-2024-0762 | tadash10/Detect-CVE-2024-0762 | Detecting vulnerabilities like CVE-2024-0762, particularly in UEFI firmware, is quite challenging due to the low-level nature | 2024-09-05T03:25:58Z |
CVE-2024-0757 | hunThubSpace/CVE-2024-0757-Exploit | A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE) | 2024-06-17T07:46:21Z |
CVE-2024-0741 | HyHy100/Firefox-ANGLE-CVE-2024-0741 | PoC for an OOB write vulnerability I reported to Mozilla in ANGLE Translator (aka WebGL Shader Compiler). | 2024-08-12T05:57:34Z |
CVE-2024-0713 | kitodd/CVE-2024-0713 | no description | 2024-03-12T08:32:26Z |
CVE-2024-0710 | karlemilnikka/CVE-2024-0710 | Unauthenticated Form Submission Unique ID Modification | 2024-04-10T07:23:11Z |
CVE-2024-0679 | RandomRobbieBF/CVE-2024-0679 | ColorMag <= 3.1.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | 2024-01-19T22:30:51Z |
CVE-2024-0624 | kodaichodai/CVE-2024-0624 | a PoC for CVE-2024-0624/WP Plugin - Paid Memberships Pro (<= 2.12.7) | 2024-09-11T05:20:41Z |
CVE-2024-0623 | kodaichodai/CVE-2024-0623 | a PoC for CVE-2024-0623/WP Plugin - VK Block Patterns (<= 1.31.1.1) | 2024-09-11T05:19:13Z |
CVE-2024-0590 | kodaichodai/CVE-2024-0590 | a PoC for CVE-2024-0590/WP Plugin - Microsoft Clarity (<= 0.9.3) | 2024-09-11T05:17:20Z |
CVE-2024-0588 | kodaichodai/CVE-2024-0588 | a PoC for CVE-2024-0588/WP Plugin - Paid Memberships Pro (<= 2.12.7) | 2024-09-11T05:14:59Z |
CVE-2024-0582 | ysanatomic/io_uring_LPE-CVE-2024-0582 | LPE exploit for CVE-2024-0582 (io_uring) | 2024-03-29T14:45:22Z |
CVE-2024-0582 | QDming/cve | Use CVE-2024-29278 | 2024-03-29T08:20:23Z |
CVE-2024-0582 | Forsaken0129/CVE-2024-0582 | no description | 2024-04-05T15:39:48Z |
CVE-2024-0582 | 0ptyx/cve-2024-0582 | no description | 2024-05-28T01:06:48Z |
CVE-2024-0582 | geniuszlyy/CVE-2024-0582 | is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582) | 2024-10-03T07:56:36Z |
CVE-2024-0566 | xbz0n/CVE-2024-0566 | no description | 2024-05-09T17:30:24Z |
CVE-2024-0519 | Oxdestiny/CVE-2024-0519-Chrome-exploit | Execute arbitrary code on the victim’s device, compromising data security and system integrity in Chrome 120.0.6099 | 2024-03-27T19:10:45Z |
CVE-2024-0509 | kodaichodai/CVE-2024-0509 | a PoC for CVE-2024-0509/WP Plugin - WP 404 Auto Redirect to Similar Post (<= 5.4.14) | 2024-09-11T05:05:05Z |
CVE-2024-0507 | convisolabs/CVE-2024-0507_CVE-2024-0200-github | Exploits for GitHub Enterprise CVE-2024-0507 and CVE-2024-0200 | 2024-03-18T03:19:14Z |
CVE-2024-0399 | xbz0n/CVE-2024-0399 | no description | 2024-05-09T18:21:42Z |
CVE-2024-0379 | kodaichodai/CVE-2024-0379 | a PoC for CVE-2024-0379/WP Plugin - Custom Twitter Feeds - A Tweets Widget or X Feed Widget (<= 2.2.1) | 2024-09-11T05:12:47Z |
CVE-2024-0352 | Cappricio-Securities/CVE-2024-0352 | Likeshop < 2.5.7.20210311 - Arbitrary File Upload | 2024-06-12T09:46:26Z |
CVE-2024-0324 | kodaichodai/CVE-2024-0324 | a PoC for CVE-2024-0324/WP Plugin - Profile Builder (<= 3.10.8) | 2024-01-01T21:22:13Z |
CVE-2024-0305 | jidle123/cve-2024-0305exp | cve-2024-0305可用的exp | 2024-04-18T03:13:43Z |
CVE-2024-0235 | Cappricio-Securities/CVE-2024-0235 | EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure | 2024-06-03T14:21:48Z |
CVE-2024-0230 | keldnorman/cve-2024-0230-blue | Helper script to POC of CVE-2024-0230 Bluetooth | 2024-05-21T22:23:57Z |
CVE-2024-0204 | m-cetin/CVE-2024-0204 | This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes. | 2024-01-24T20:10:34Z |
CVE-2024-0204 | cbeek-r7/CVE-2024-0204 | Scanning for vulnerable GoAnywhere MFT CVE-2024-0204 | 2024-01-23T22:42:58Z |
CVE-2024-0204 | horizon3ai/CVE-2024-0204 | Authentication Bypass in GoAnywhere MFT | 2024-01-23T20:16:14Z |
CVE-2024-0204 | adminlove520/CVE-2024-0204 | GoAnywhere MFT | 2024-02-04T01:40:46Z |
CVE-2024-0197 | ewilded/CVE-2024-0197-POC | Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK. | 2024-02-27T15:25:58Z |
CVE-2024-0195 | Cappricio-Securities/CVE-2024-0195 | SpiderFlow Crawler Platform - Remote Code Execution | 2024-06-11T02:34:34Z |
CVE-2024-0195 | fa-rrel/CVE-2024-0195-SpiderFlow | CVE-2024-0195 Improper Control of Generation of Code ('Code Injection') | 2024-08-31T07:37:55Z |
CVE-2024-0195 | MuhammadWaseem29/CVE-2024-0195-SpiderFlow | no description | 2024-09-02T15:01:15Z |
CVE-2024-0195 | hack-with-rohit/CVE-2024-0195-SpiderFlow | no description | 2024-09-07T06:01:29Z |
CVE-2024-0190 | codeb0ss/CVE-2024-0190-PoC | no description | 2024-01-02T22:41:35Z |
CVE-2024-0049 | nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049 | no description | 2024-07-29T11:12:32Z |
CVE-2024-0049 | Aakashmom/frameworks_av_android10_r33_CVE-2024-0049 | no description | 2024-09-03T12:15:01Z |
CVE-2024-0044 | pl4int3xt/cve_2024_0044 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | 2024-06-18T12:30:53Z |
CVE-2024-0044 | scs-labrat/android_autorooter | Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely | 2024-06-18T09:22:59Z |
CVE-2024-0044 | Re13orn/CVE-2024-0044-EXP | 利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。 | 2024-07-03T10:29:06Z |
CVE-2024-0044 | 007CRIPTOGRAFIA/c-CVE-2024-0044 | CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer aplicativo" que afeta as versões 12 e 13 do Android | 2024-07-11T18:46:45Z |
CVE-2024-0044 | Kai2er/CVE-2024-0044-EXP | 利用CVE-2024-0044 在Android12、13 没有root'下进行数据备份 用法./CVE-2024-0044-EXP.sh <package_name> | 2024-07-15T08:45:44Z |
CVE-2024-0044 | hunter24x24/cve_2024_0044 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 | 2024-08-01T20:14:22Z |
CVE-2024-0044 | nexussecelite/EvilDroid | EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience. | 2024-08-04T13:14:10Z |
CVE-2024-0044 | nahid0x1/CVE-2024-0044 | a vulnerability affecting Android version 12 & 13 | 2024-08-13T15:15:47Z |
CVE-2024-0044 | MrW0l05zyn/cve-2024-0044 | CVE-2024-0044 | 2024-08-19T02:51:14Z |
CVE-2024-0044 | canyie/CVE-2024-0044 | PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app | 2024-09-27T09:02:08Z |
CVE-2024-0044 | a-roshbaik/cve_2024_0044 | no description | 2024-10-02T19:31:19Z |
CVE-2024-0040 | nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0040 | no description | 2024-07-29T11:45:41Z |
CVE-2024-0040 | uthrasri/frameworks_av_CVE-2024-0040 | no description | 2024-08-06T06:13:59Z |
CVE-2024-0039 | 41yn14/CVE-2024-0039-Exploit | Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан для образовательных целей. | 2024-05-29T22:13:04Z |
CVE-2024-0030 | uthrasri/system_bt_CVE-2024-0030 | no description | 2024-08-09T08:17:31Z |
CVE-2024-0023 | AbrarKhan/G3_Frameworks_av_CVE-2024-0023 | no description | 2024-07-29T09:06:34Z |
CVE-2024-0023 | Aakashmom/frameworks_av_android10_r33_CVE-2024-0023 | no description | 2024-09-03T12:47:32Z |
CVE-2024-0015 | UmVfX1BvaW50/CVE-2024-0015 | a demo poc for CVE-2024-0015 | 2024-03-19T10:00:21Z |
CVE-2024-0001 | jiupta/CVE-2024-0001-EXP | no description | 2023-12-08T10:01:42Z |
CVE-2024-0001 | RobloxSecurityResearcher/RobloxVulnerabilityCVE-2024-0001 | Roblox vulnerability that allows injection into the roblox client VIA P.A.N.C.R.A.B method - Add-MpPreference -ExclusionPath "C:" #Enable Dll = True, Process = Roblox | 2024-03-04T05:40:39Z |
CVE-2023-9999 | obelia01/CVE-2023-9999 | test | 2023-08-21T12:02:45Z |
CVE-2023-7173 | sharathc213/CVE-2023-7173 | no description | 2024-01-02T08:41:10Z |
CVE-2023-7172 | sharathc213/CVE-2023-7172 | no description | 2024-01-02T07:28:25Z |
CVE-2023-7028 | RandomRobbieBF/CVE-2023-7028 | CVE-2023-7028 | 2024-01-12T10:53:50Z |
CVE-2023-7028 | V1lu0/CVE-2023-7028 | CVE-2023-7028 poc | 2024-01-12T07:42:02Z |
CVE-2023-7028 | duy-31/CVE-2023-7028 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. | 2024-01-12T15:17:59Z |
CVE-2023-7028 | Vozec/CVE-2023-7028 | This repository presents a proof-of-concept of CVE-2023-7028 | 2024-01-12T18:29:27Z |
CVE-2023-7028 | TheRedDevil1/CVE-2023-7028 | Exploit of account take-over in Gitlab | 2024-01-20T14:44:14Z |
CVE-2023-7028 | Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab | no description | 2024-01-23T10:37:07Z |
CVE-2023-7028 | thanhlam-attt/CVE-2023-7028 | no description | 2024-01-23T19:11:11Z |
CVE-2023-7028 | Trackflaw/CVE-2023-7028-Docker | Repository to install CVE-2023-7028 vulnerable Gitlab instance | 2024-01-25T09:56:00Z |
CVE-2023-7028 | mochammadrafi/CVE-2023-7028 | Python Code for Exploit Automation CVE-2023-7028 | 2024-01-26T06:29:34Z |
CVE-2023-7028 | yoryio/CVE-2023-7028 | Exploit for CVE-2023-7028 - GitLab CE/EE | 2024-01-18T05:17:00Z |
CVE-2023-7028 | olebris/Exploit_CVE_2023_7028- | Exploit_CVE_2023_7028 | 2024-06-28T09:54:59Z |
CVE-2023-7016 | ewilded/CVE-2023-7016-POC | POC for the flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows that allows an attacker to execute code at a SYSTEM level via local access. | 2024-02-27T14:48:19Z |
CVE-2023-6985 | RandomRobbieBF/CVE-2023-6985 | 10Web AI Assistant – AI content writing assistant <= 1.0.18 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation Description | 2024-01-29T16:51:53Z |
CVE-2023-6985 | X1r0z/Dubbo-RCE | PoC of Apache Dubbo CVE-2023-23638 | 2023-03-22T11:23:44Z |
CVE-2023-6933 | w2xim3/CVE-2023-6933 | Introduction to CVE-2023-6933 Vulnerability | 2024-01-28T23:16:53Z |
CVE-2023-6933 | hackeremmen/gitlab-exploit | GitLab CVE-2023-7028 | 2024-01-28T18:23:31Z |
CVE-2023-6895 | FuBoLuSec/CVE-2023-6895 | no description | 2024-01-17T12:53:47Z |
CVE-2023-6895 | michalbednarski/TheLastBundleMismatch | Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mitigation | 2024-01-20T07:14:06Z |
CVE-2023-6895 | nles-crt/CVE-2023-6895 | no description | 2024-02-07T09:28:10Z |
CVE-2023-6875 | UlyssesSaicha/CVE-2023-6875 | CVE-2023-6875 PoC | 2024-01-13T15:23:17Z |
CVE-2023-6875 | gbrsh/CVE-2023-6875 | Exploit for CVE-2023-6875 - Unauthorized Account Takeover. | 2024-01-27T14:20:51Z |
CVE-2023-6875 | hatlesswizard/CVE-2023-6875 | CVE-2023-6875 exploit written for Xakep.Ru | 2024-02-05T09:44:35Z |
CVE-2023-6710 | DedSec-47/Metasploit-Exploits-CVE-2023-6710 | Welcome to the Metasploit Exploits Repository, your go-to resource for a comprehensive collection of cutting-edge exploits designed for penetration testing and ethical hacking. Developed and maintained by Mohamed Mounir Boudjema, this repository is crafted with a deep understanding of the evolving landscape of cybersecurity. | 2023-12-25T09:40:31Z |
CVE-2023-6710 | DedSec-47/CVE-2023-6710 | Explore the depths of CVE-2023-6710 with our comprehensive Proof of Concept (PoC). This CVE, identified as a potential security vulnerability, has been meticulously examined to demonstrate its impact and provide a hands-on understanding of the associated risks. | 2023-12-25T09:50:23Z |
CVE-2023-6702 | kaist-hacking/CVE-2023-6702 | Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission) | 2024-06-02T14:15:27Z |
CVE-2023-6700 | RandomRobbieBF/CVE-2023-6700 | Cookie Information - Free GDPR Consent Solution <= 2.0.22 - Authenticated (Subscriber+) Arbitrary Options Update | 2024-01-30T10:32:54Z |
CVE-2023-6663 | cli-ish/CVE-2023-6663 | no description | 2023-12-23T11:39:57Z |
CVE-2023-6661 | cli-ish/CVE-2023-6661 | no description | 2023-12-23T11:39:50Z |
CVE-2023-6654 | qfmy1024/CVE-2023-6654 | CVE-2023-6654 EXP | 2024-02-27T07:50:01Z |
CVE-2023-6634 | krn966/CVE-2023-6634 | CVE-2023-6634 | 2024-04-05T18:07:08Z |
CVE-2023-6595 | sharmashreejaa/CVE-2023-6595 | no description | 2024-03-02T07:35:29Z |
CVE-2023-6567 | mimiloveexe/CVE-2023-6567-poc | Time-based SQLi | 2024-01-11T05:43:31Z |
CVE-2023-6553 | Chocapikk/CVE-2023-6553 | Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution | 2023-12-13T20:26:59Z |
CVE-2023-6553 | motikan2010/CVE-2023-6553-PoC | no description | 2023-12-27T14:14:51Z |
CVE-2023-6553 | kiddenta/CVE-2023-6553 | no description | 2024-01-01T16:57:17Z |
CVE-2023-6548 | Roonye660/CVE-2023-6548-POC | 0day for Citrix Netscaler ADC and NetScaler Gateway latest versions | 2024-03-04T08:57:27Z |
CVE-2023-6538 | Arszilla/CVE-2023-6538 | no description | 2023-12-18T09:29:42Z |
CVE-2023-6319 | illixion/root-my-webos-tv | CVE-2023-6319 proof of concept | 2024-04-11T18:58:17Z |
CVE-2023-6289 | RandomRobbieBF/CVE-2023-6289 | Swift Performance Lite <= 2.3.6.14 - Missing Authorization to Unauthenticated Settings Export | 2023-11-28T20:05:43Z |
CVE-2023-6246 | elpe-pinillo/CVE-2023-6246 | no description | 2024-03-02T15:45:52Z |
CVE-2023-6241 | s1204IT/CVE-2023-6241 | CVE-2023-6241 for Pixel 8 | 2024-05-02T02:17:31Z |
CVE-2023-6063 | motikan2010/CVE-2023-6063-PoC | CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection) | 2023-11-15T14:53:03Z |
CVE-2023-6063 | thesafdari/CVE-2023-6063 | CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection) | 2023-11-16T17:41:59Z |
CVE-2023-6063 | hackersroot/CVE-2023-6063-PoC | Exploiting SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063) | 2023-11-16T16:36:44Z |
CVE-2023-6036 | pctripsesp/CVE-2023-6036 | POC about Web3 – Crypto wallet Login & NFT token gating < 3.0.0 - Authentication Bypass Wordpress plugin | 2024-01-31T16:58:48Z |
CVE-2023-6036 | mdaseem03/cpanel_xss_2023 | cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel. | 2024-01-23T20:29:57Z |
CVE-2023-6019 | FireWolfWang/CVE-2023-6019 | Ray OS Command Injection RCE(Unauthorized) | 2024-04-10T09:24:06Z |
CVE-2023-6019 | miguelc49/CVE-2023-6019-3 | no description | 2024-04-14T07:35:11Z |
CVE-2023-6019 | miguelc49/CVE-2023-6019-2 | no description | 2024-04-13T18:46:44Z |
CVE-2023-6019 | miguelc49/CVE-2023-6019-1 | no description | 2024-04-13T18:46:49Z |
CVE-2023-6019 | Clydeston/CVE-2023-6019 | Python POC for CVE-2023-6019 taken from https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe | 2024-04-21T14:30:28Z |
CVE-2023-6000 | rxerium/CVE-2023-6000 | The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks. | 2024-03-10T16:20:22Z |
CVE-2023-5966 | pedrojosenavasperez/cve-2023-5966 | no description | 2022-10-20T13:00:10Z |
CVE-2023-5965 | pedrojosenavasperez/cve-2023-5965 | no description | 2022-10-20T15:35:07Z |
CVE-2023-5961 | HadessCS/CVE-2023-5961 | moxa ioLogik E1212 | 2024-01-31T15:00:16Z |
CVE-2023-5843 | codeb0ss/CVE-2023-5843-PoC | no description | 2023-10-31T02:13:06Z |
CVE-2023-5815 | codeb0ss/CVE-2023-5815-PoC | no description | 2023-10-26T22:50:26Z |
CVE-2023-5808 | Arszilla/CVE-2023-5808 | no description | 2023-12-18T09:24:14Z |
CVE-2023-5720 | miguelc49/CVE-2023-5720-1 | no description | 2024-04-13T18:45:35Z |
CVE-2023-5720 | miguelc49/CVE-2023-5720-3 | no description | 2024-04-13T18:45:39Z |
CVE-2023-5720 | miguelc49/CVE-2023-5720-2 | no description | 2024-04-13T18:45:31Z |
CVE-2023-5717 | uthrasri/CVE-2023-5717 | no description | 2024-01-23T09:04:00Z |
CVE-2023-5631 | soreta2/CVE-2023-5631-POC | Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 and allows XSS to be saved via an HTML email message with a crafted SVG document due to program/ behavior lib/Roundcube/rcube_washtml.php | 2024-04-05T20:47:32Z |
CVE-2023-5601 | codeb0ss/CVE-2023-5601-PoC | no description | 2023-10-19T00:47:06Z |
CVE-2023-5561 | pog007/CVE-2023-5561-PoC | WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | 2023-12-13T16:43:18Z |
CVE-2023-5546 | obelia01/CVE-2023-5546 | no description | 2023-08-21T11:50:01Z |
CVE-2023-5540 | cli-ish/CVE-2023-5540 | no description | 2023-10-18T07:58:33Z |
CVE-2023-5539 | cli-ish/CVE-2023-5539 | no description | 2023-10-18T07:58:25Z |
CVE-2023-5521 | Ylarod/CVE-2023-5521 | Root takeover via signature spoofing in KernelSU | 2023-10-11T12:08:31Z |
CVE-2023-5412 | RandomRobbieBF/CVE-2023-5412 | Image horizontal reel scroll slideshow <= 13.2 - Authenticated (Subscriber+) SQL Injection via Shortcode | 2023-10-31T09:26:21Z |
CVE-2023-5360 | sagsooz/CVE-2023-5360 | CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload | 2023-10-21T10:51:08Z |
CVE-2023-5360 | nastar-id/CVE-2023-5360 | CVE-2023-5360 | 2023-10-26T08:18:43Z |
CVE-2023-5360 | phankz/Worpress-CVE-2023-5360 | no description | 2023-10-26T06:56:48Z |
CVE-2023-5360 | Chocapikk/CVE-2023-5360 | Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360. | 2023-11-02T03:15:44Z |
CVE-2023-5360 | Jenderal92/WP-CVE-2023-5360 | Python 2.7 | 2023-11-03T00:58:36Z |
CVE-2023-5360 | Pushkarup/CVE-2023-5360 | The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE. | 2023-11-05T18:02:59Z |
CVE-2023-5360 | tucommenceapousser/CVE-2023-5360 | Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360. | 2023-11-02T03:28:59Z |
CVE-2023-5360 | 1337r0j4n/CVE-2023-5360 | CVE-2023-5360 Exploit/POC | 2023-11-13T12:51:34Z |
CVE-2023-5360 | angkerithhack001/CVE-2023-5360-PoC | CVE-2023-5360 EXPLOIT | 2023-12-27T09:32:05Z |
CVE-2023-52654 | FoxyProxys/CVE-2023-52654 | no description | 2024-05-09T20:53:03Z |
CVE-2023-52251 | BobTheShoplifter/CVE-2023-52251-POC | CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui. | 2024-01-06T11:07:36Z |
CVE-2023-5217 | Trinadh465/platform_external_libvpx_v1.4.0_CVE-2023-5217 | no description | 2023-10-06T11:01:08Z |
CVE-2023-5217 | Trinadh465/platform_external_libvpx_v1.8.0_CVE-2023-5217 | no description | 2023-10-06T10:43:38Z |
CVE-2023-5217 | UT-Security/cve-2023-5217-poc | A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface. | 2023-10-06T05:46:16Z |
CVE-2023-5217 | Boogipop/MetabaseRceTools | CVE-2023-38646 Metabase RCE | 2023-10-11T03:18:09Z |
CVE-2023-5204 | RandomRobbieBF/CVE-2023-5204 | AI ChatBot <= 4.8.9 - Unauthenticated SQL Injection via qc_wpbo_search_response | 2024-02-21T17:14:15Z |
CVE-2023-51810 | Pastea/CVE-2023-51810 | no description | 2024-01-10T17:47:54Z |
CVE-2023-51802 | geraldoalcantara/CVE-2023-51802 | Simple Student Attendance System v.1.0 - Cross-site scripting (XSS) vulnerabilities in attendance_report | 2024-01-11T17:28:16Z |
CVE-2023-51802 | ndrscodes/http2-rst-stream-attacker | Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses. | 2023-11-08T20:56:22Z |
CVE-2023-51801 | geraldoalcantara/CVE-2023-51801 | no description | 2024-01-11T17:14:33Z |
CVE-2023-51800 | geraldoalcantara/CVE-2023-51800 | Multiple cross-site scripting (XSS) vulnerabilities in School Fees Management System v1.0. | 2024-01-11T16:28:04Z |
CVE-2023-5178 | rockrid3r/CVE-2023-5178 | Exploit for CVE-2023-5178 | 2024-02-05T15:58:24Z |
CVE-2023-51764 | duy-31/CVE-2023-51764 | Postfix SMTP Smuggling - Expect Script POC | 2023-12-26T17:02:20Z |
CVE-2023-51764 | eeenvik1/CVE-2023-51764 | PoC CVE-2023-51764 | 2023-12-28T06:20:13Z |
CVE-2023-51764 | d4op/CVE-2023-51764-POC | just idea, no cp pls | 2023-12-31T14:33:26Z |
CVE-2023-51764 | Double-q1015/CVE-2023-51764 | CVE-2023-51764 poc | 2024-01-05T07:07:47Z |
CVE-2023-51518 | mbadanoiu/CVE-2023-51518 | CVE-2023-51518: Preauthenticated Java Deserialization via JMX in Apache James | 2024-06-03T19:48:53Z |
CVE-2023-51504 | Sybelle03/CVE-2023-51504 | This is a dockerized reproduction of the MotoCMS SQL injection (cf exploit db) | 2023-06-08T07:37:08Z |
CVE-2023-51467 | Chocapikk/CVE-2023-51467 | Apache OfBiz Auth Bypass Scanner for CVE-2023-51467 | 2023-12-29T15:01:46Z |
CVE-2023-51467 | SpiralBL0CK/cve2023-44372 | Under Work Please come Back Later | 2023-12-30T07:35:28Z |
CVE-2023-51467 | K3ysTr0K3R/CVE-2023-51467-EXPLOIT | A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass | 2023-12-29T17:47:54Z |
CVE-2023-51467 | JaneMandy/CVE-2023-51467 | CVE-2023-51467 POC | 2023-12-29T02:25:43Z |
CVE-2023-51467 | D0g3-8Bit/OFBiz-Attack | A Tool For CVE-2023-49070/CVE-2023-51467 Attack | 2024-01-04T12:31:49Z |
CVE-2023-51467 | Subha-BOO7/Exploit_CVE-2023-51467 | no description | 2024-01-04T12:44:43Z |
CVE-2023-51467 | JaneMandy/CVE-2023-51467-Exploit | Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具 | 2024-01-06T04:07:07Z |
CVE-2023-51467 | UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz | Authentication Bypass Vulnerability Apache OFBiz < 18.12.10. | 2024-01-08T03:13:43Z |
CVE-2023-51467 | vulncheck-oss/cve-2023-51467 | A go-exploit for Apache OFBiz CVE-2023-51467 | 2024-01-09T16:58:06Z |
CVE-2023-51467 | yukselberkay/CVE-2023-49070_CVE-2023-51467 | CVE-2023-49070 exploit and CVE-2023-49070 & CVE-2023-51467 vulnerability scanner | 2024-01-11T22:35:57Z |
CVE-2023-51467 | Jake123otte1/BadBizness-CVE-2023-51467 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | 2024-01-13T05:40:38Z |
CVE-2023-51467 | Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467 | This exploit scans whether the provided target is vulnerable to CVE-2023-49070/CVE-2023-51467 and also exploits it depending on the choice of the user. | 2024-01-17T07:31:26Z |
CVE-2023-51448 | jakabakos/CVE-2023-51448-cacti-sqli-poc | no description | 2024-03-06T11:23:11Z |
CVE-2023-51409 | RandomRobbieBF/CVE-2023-51409 | AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload | 2024-02-22T16:26:57Z |
CVE-2023-51409 | imhunterand/CVE-2023-51409 | AI Engine: ChatGPT Chatbot - Unauthenticated Arbitrary File Upload via rest_upload | 2024-04-23T09:25:37Z |
CVE-2023-51385 | Tachanka-zz/CVE-2023-51385_test | This is a test | 2023-12-25T07:43:57Z |
CVE-2023-51385 | FeatherStark/CVE-2023-51385 | no description | 2023-12-25T04:34:02Z |
CVE-2023-51385 | Le1a/CVE-2023-51385 | OpenSSH ProxyCommand RCE | 2023-12-25T12:51:05Z |
CVE-2023-51385 | Mudoleto/Broker_ApacheMQ | CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker | 2023-12-23T08:41:01Z |
CVE-2023-51385 | zls1793/CVE-2023-51385_test | 一个验证对CVE-2023-51385 | 2023-12-25T13:13:25Z |
CVE-2023-51385 | zhulin2/testCVE-2023-51385 | no description | 2023-12-27T07:41:38Z |
CVE-2023-51385 | WLaoDuo/CVE-2023-51385_poc-test | CVE-2023-51385;OpenSSH ProxyCommand RCE;OpenSSH <9.6 命令注入漏洞poc | 2023-12-26T09:01:02Z |
CVE-2023-51385 | watarium/poc-cve-2023-51385 | no description | 2023-12-25T07:43:29Z |
CVE-2023-51385 | N0rther/CVE-2023-51385_TT | CVE-2023-51385测试POC | 2023-12-29T02:31:42Z |
CVE-2023-51385 | power1314520/CVE-2023-51385_test | 一个验证对CVE-2023-51385 | 2023-12-30T01:08:29Z |
CVE-2023-51385 | WOOOOONG/CVE-2023-51385 | CVE-2023-51385 PoC Exploit | 2024-01-02T02:12:35Z |
CVE-2023-51385 | uccu99/CVE-2023-51385 | no description | 2024-01-03T06:28:34Z |
CVE-2023-51385 | julienbrs/malicious-exploit-CVE-2023-51385 | no description | 2024-01-03T19:08:28Z |
CVE-2023-51385 | julienbrs/exploit-CVE-2023-51385 | no description | 2024-01-03T18:40:44Z |
CVE-2023-51385 | Sonicrrrr/CVE-2023-51385 | no description | 2024-01-09T15:44:52Z |
CVE-2023-51385 | farliy-hacker/CVE-2023-51385 | CVE-2023-51385 | 2024-01-20T06:09:45Z |
CVE-2023-51385 | farliy-hacker/CVE-2023-51385-save | CVE-2023-51385-save | 2024-01-20T06:20:37Z |
CVE-2023-51385 | 2048JiaLi/CVE-2023-51385 | CVE-2023-51385 的exp | 2024-01-30T09:01:05Z |
CVE-2023-51385 | thinkliving2020/CVE-2023-51385- | CVE-2023-51385 | 2024-04-16T03:01:03Z |
CVE-2023-51385 | c0deur/CVE-2023-51385 | no description | 2024-05-27T19:29:55Z |
CVE-2023-51385 | endasugrue/CVE-2023-51385_poc | no description | 2024-06-12T19:38:42Z |
CVE-2023-51385 | MiningBot-eth/CVE-2023-51385-exploit | no description | 2024-06-15T08:27:46Z |
CVE-2023-51281 | geraldoalcantara/CVE-2023-51281 | Multiple cross-site scripting (XSS) vulnerabilities in /customer_support/ajax.php?action=save_customer in Customer Support System 1.0 allow authenticated attackers to execute to execute arbitrary web scripts or HTML via a crafted payload injected into the “firstname”, "lastname", "middlename", "contact" or “address” parameters. | 2023-12-22T15:51:43Z |
CVE-2023-51214 | chandraprarikraj/CVE-2023-51214 | no description | 2023-12-20T21:23:33Z |
CVE-2023-51208 | 16yashpatel/CVE-2023-51208 | Arbitrary File Upload Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T18:08:37Z |
CVE-2023-51204 | yashpatelphd/CVE-2023-51204 | Insecure Deserialization Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T17:54:59Z |
CVE-2023-51202 | yashpatelphd/CVE-2023-51202 | OS Command Injection Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T17:33:19Z |
CVE-2023-51201 | 16yashpatel/CVE-2023-51201 | Information Leakage in ROS2 Foxy Fitzroy via Plaintext Message Transmission | 2024-01-10T16:46:56Z |
CVE-2023-51200 | 16yashpatel/CVE-2023-51200 | Security Misconfiguration in ROS2 Foxy Fitzroy | 2024-01-10T16:17:59Z |
CVE-2023-51199 | 16yashpatel/CVE-2023-51199 | Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T15:53:14Z |
CVE-2023-51198 | yashpatelphd/CVE-2023-51198 | Privilege Escalation Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T15:39:19Z |
CVE-2023-51197 | yashpatelphd/CVE-2023-51197 | Shell Injection Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T15:25:10Z |
CVE-2023-51127 | risuxx/CVE-2023-51127 | no description | 2024-01-02T02:43:09Z |
CVE-2023-51126 | risuxx/CVE-2023-51126 | no description | 2024-01-02T02:31:06Z |
CVE-2023-51119 | OscarAkaElvis/CVE-2023-51119 | Improper Access Control on D-Link DIR-605L router | 2024-04-20T23:37:10Z |
CVE-2023-51073 | christopher-pace/CVE-2023-51073 | Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03 | 2024-01-05T05:16:18Z |
CVE-2023-51000 | Team-Byerus/CVE-2023-51000 | no description | 2024-02-12T12:06:07Z |
CVE-2023-50917 | Chocapikk/CVE-2023-50917 | MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques | 2023-10-29T05:10:09Z |
CVE-2023-50917 | m3m0o/zoneminder-snapshots-rce-poc | This is a script written in Python that allows the exploitation of the Zoneminder's security flaw in the described in CVE 2023-26035. | 2023-12-12T14:44:19Z |
CVE-2023-5089 | Cappricio-Securities/CVE-2023-5089 | Defender Security < 4.1.0 - Protection Bypass (Hidden Login Page) | 2024-05-24T07:14:55Z |
CVE-2023-50868 | Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack | This project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. | 2024-03-19T16:13:14Z |
CVE-2023-5074 | codeb0ss/CVE-2023-5074-PoC | Mass Exploit - CVE-2023-5074 / D-Link D-View < Authentication Bypass | 2023-09-30T00:07:52Z |
CVE-2023-5070 | RandomRobbieBF/CVE-2023-5070 | Social Media Share Buttons & Social Sharing Icons <= 2.8.5 - Information Exposure | 2023-10-17T08:19:09Z |
CVE-2023-50685 | UnderwaterCoder/Hipcam-RTSP-Format-Validation-Vulnerability | This POC exploits a format validation vulnerability in the RTSP service of the Hipcam RealServer/V1.0, inducing a crash for approximately 45 seconds by injecting random data into the 'client_port' parameter during the RTSP SETUP request. Hipcam RealServer/V1.0 is used in many Hipcam Cameras. - CVE-2023-50685 | 2023-12-10T13:21:43Z |
CVE-2023-50643 | V3x0r/CVE-2023-50643 | CVE-2023-50643 | 2023-12-08T16:37:16Z |
CVE-2023-50596 | chandraprarikraj/CVE-2023-50596 | no description | 2023-12-20T21:43:28Z |
CVE-2023-5044 | r0binak/CVE-2023-5044 | PoC CVE-2023-5044 | 2023-10-30T07:59:11Z |
CVE-2023-5044 | 4ARMED/cve-2023-5044 | no description | 2024-01-17T14:32:54Z |
CVE-2023-5044 | KubernetesBachelor/CVE-2023-5044 | Poc for CVE 2023 5044 | 2024-03-29T18:53:50Z |
CVE-2023-5043 | r0binak/CVE-2023-5043 | PoC CVE-2023-5043 | 2024-01-15T09:20:35Z |
CVE-2023-50387 | knqyf263/CVE-2023-50387 | KeyTrap (DNSSEC) | 2024-02-18T21:50:04Z |
CVE-2023-50387 | Meirelez/SSR-DNSSEC | In this repository you can find the files used to try to produce a POC for the CVE-2023-50387 | 2024-05-23T14:41:50Z |
CVE-2023-50386 | vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC | Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386) | 2024-02-29T08:57:47Z |
CVE-2023-5024 | PH03N1XSP/CVE-2023-5024 | no description | 2023-09-27T03:28:02Z |
CVE-2023-50164 | jakabakos/CVE-2023-50164-Apache-Struts-RCE | A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE). | 2023-12-13T09:31:36Z |
CVE-2023-50164 | bcdannyboy/CVE-2023-50164 | A scanning utility and PoC for CVE-2023-50164 | 2023-12-15T21:19:51Z |
CVE-2023-50164 | helsecert/cve-2023-50164 | no description | 2023-12-18T08:24:26Z |
CVE-2023-50164 | SangPenyalang/CVE2023-29484 | no description | 2023-12-18T12:03:09Z |
CVE-2023-50164 | dwisiswant0/cve-2023-50164-poc | Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164") | 2023-12-17T14:18:54Z |
CVE-2023-50164 | Trackflaw/CVE-2023-50164-ApacheStruts2-Docker | Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164 | 2023-12-20T08:46:19Z |
CVE-2023-50164 | Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE | no description | 2023-12-20T08:39:54Z |
CVE-2023-50164 | miles3719/cve-2023-50164 | no description | 2023-12-22T02:15:36Z |
CVE-2023-50164 | aaronm-sysdig/cve-2023-50164 | no description | 2023-12-22T02:20:11Z |
CVE-2023-50164 | sunnyvale-it/CVE-2023-50164-PoC | CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept | 2024-01-12T09:34:57Z |
CVE-2023-50164 | Eason-zz/BluetoothDucky | CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript) | 2024-01-16T07:44:35Z |
CVE-2023-50164 | snyk-labs/CVE-2023-50164-POC | no description | 2023-12-30T21:37:08Z |
CVE-2023-50164 | 0x1717/ssrf-via-img | CVE-2023-46303 - SSRF Vulnerability in PANDOC and CALIBRE | 2023-05-28T07:26:49Z |
CVE-2023-50164 | AsfandAliMemon25/CVE-2023-50164Analysis- | CVE-2023-50164 An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. | 2024-04-16T16:20:04Z |
CVE-2023-50164 | minhbao15677/CVE-2023-50164 | no description | 2022-12-22T07:49:13Z |
CVE-2023-50132 | sajaljat/CVE-2023-50132 | no description | 2023-12-16T08:14:14Z |
CVE-2023-50131 | sajaljat/CVE-2023-50131 | XSS | 2023-12-16T08:08:11Z |
CVE-2023-50072 | ahrixia/CVE-2023-50072 | A stored cross-site scripting (XSS) vulnerability exists in OpenKM version 7.1.40. | 2023-12-20T14:36:01Z |
CVE-2023-50071 | geraldoalcantara/CVE-2023-50071 | Multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name. | 2023-12-16T23:06:25Z |
CVE-2023-50070 | geraldoalcantara/CVE-2023-50070 | Multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_ticket in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via department_id, customer_id and subject. | 2023-12-15T20:37:39Z |
CVE-2023-50029 | absholi7ly/PHP-Injection-in-M4-PDF-Extensions | CVE-2023-50029: PHP Injection Vulnerability in M4 PDF Extensions Module | 2024-06-24T23:26:05Z |
CVE-2023-49989 | geraldoalcantara/CVE-2023-49989 | Hotel Booking Management v1.0 - SQL Injection Vulnerability in the "id" parameter at update.php | 2023-12-20T04:46:28Z |
CVE-2023-49988 | geraldoalcantara/CVE-2023-49988 | Hotel Booking Management v1.0 - SQL Injection Vulnerability in the "npss" parameter at rooms.php | 2023-12-20T04:36:35Z |
CVE-2023-49987 | geraldoalcantara/CVE-2023-49987 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "tname" parameter on "new_term" | 2023-12-20T04:30:49Z |
CVE-2023-49986 | geraldoalcantara/CVE-2023-49986 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "name" parameter on "add_new_parent" | 2023-12-20T04:21:46Z |
CVE-2023-49985 | geraldoalcantara/CVE-2023-49985 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "cname" parameter on "new_class" | 2023-12-20T04:12:02Z |
CVE-2023-49984 | geraldoalcantara/CVE-2023-49984 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "name" field/parameter on "/management/settings" | 2023-12-20T04:06:00Z |
CVE-2023-49984 | francozappa/bluffs | Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023] | 2023-11-10T09:37:31Z |
CVE-2023-49983 | geraldoalcantara/CVE-2023-49983 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "name" field/parameter on "/management/class" | 2023-12-20T03:56:16Z |
CVE-2023-49982 | geraldoalcantara/CVE-2023-49982 | School Fees Management System v1.0 - Incorrect Access Control - Privilege Escalation | 2023-12-20T03:44:16Z |
CVE-2023-49981 | geraldoalcantara/CVE-2023-49981 | School Fees Management System v1.0 - Incorrect Access Control - Directory Listing | 2023-12-20T03:19:09Z |
CVE-2023-49980 | geraldoalcantara/CVE-2023-49980 | Best Student Result Management System 1.0 - Directory Listing CVE-2023-49980 | 2023-11-28T13:40:06Z |
CVE-2023-49979 | geraldoalcantara/CVE-2023-49979 | Best Student Management System v1.0 - Incorrect Access Control - Directory Listing | 2023-12-20T03:01:53Z |
CVE-2023-49978 | geraldoalcantara/CVE-2023-49978 | Customer Support System 1.0 - Incorrect Access Control | 2023-12-20T01:51:28Z |
CVE-2023-49977 | geraldoalcantara/CVE-2023-49977 | Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in "Address" field/parameter on "customer_list" Page | 2023-12-20T01:43:06Z |
CVE-2023-49976 | geraldoalcantara/CVE-2023-49976 | Customer Support System 1.0 is vulnerable to stored XSS. A XSS vulnerability exists in version 1 of the Customer Support System. A malicious actor can insert JavaScript code through the "subject" field when editing/creating a ticket. | 2023-11-28T13:53:45Z |
CVE-2023-49974 | geraldoalcantara/CVE-2023-49974 | Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in "contact" field/parameter on "customer_list" Page | 2023-12-20T01:31:08Z |
CVE-2023-49973 | geraldoalcantara/CVE-2023-49973 | Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in "email" field/parameter on "customer_list" Page | 2023-12-20T01:26:22Z |
CVE-2023-49971 | geraldoalcantara/CVE-2023-49971 | Customer Support System 1.0 - (XSS) Cross-Site Scripting Vulnerability in the "firstname" parameter at "customer_list | 2023-12-20T00:55:22Z |
CVE-2023-49970 | geraldoalcantara/CVE-2023-49970 | Customer Support System 1.0 - SQL Injection Vulnerability in the "subject" Parameter During "save_ticket" Operation | 2023-12-19T23:12:29Z |
CVE-2023-49969 | geraldoalcantara/CVE-2023-49969 | Customer Support System 1.0 - SQL Injection Vulnerability in edit_customer via "id" URL Parameter | 2023-12-19T23:02:09Z |
CVE-2023-49968 | geraldoalcantara/CVE-2023-49968 | Customer Support System 1.0 - SQL Injection Vulnerability in manage_department.php via "id" URL Parameter | 2023-12-19T22:45:22Z |
CVE-2023-49965 | hackintoanetwork/SpaceX-Starlink-Router-Gen-2-XSS | CVE-2023-49965 - SpaceX / Starlink Router Gen 2 XSS | 2024-01-17T01:24:15Z |
CVE-2023-49964 | mbadanoiu/CVE-2023-49964 | CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco | 2023-12-08T20:47:52Z |
CVE-2023-49954 | CVE-2023-49954/CVE-2023-49954.github.io | SQL Injection in 3CX CRM Integration | 2023-12-14T18:38:28Z |
CVE-2023-49950 | shrikeinfosec/cve-2023-49950 | A write-up detailing CVE-2023-49950. Affects Logpoint SIEM v6.1.0-v7.3.0 | 2024-01-31T10:18:12Z |
CVE-2023-49948 | codeb0ss/CVE-2023-49948-PoC | no description | 2023-12-04T00:17:44Z |
CVE-2023-4966 | dinosn/citrix_cve-2023-4966 | Citrix CVE-2023-4966 from assetnote modified for parallel and file handling | 2023-10-25T04:15:17Z |
CVE-2023-4966 | mlynchcogent/CVE-2023-4966-POC | Proof Of Concept for te NetScaler Vuln | 2023-10-25T12:37:56Z |
CVE-2023-4966 | IceBreakerCode/CVE-2023-4966 | no description | 2023-10-25T21:34:43Z |
CVE-2023-4966 | ditekshen/ansible-cve-2023-4966 | Ansible Playbook for CVE-2023-4966 | 2023-10-26T09:32:48Z |
CVE-2023-4966 | Chocapikk/CVE-2023-4966 | Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. | 2023-10-24T17:19:32Z |
CVE-2023-4966 | 0xKayala/CVE-2023-4966 | CVE-2023-4966 - NetScaler ADC and NetScaler Gateway Memory Leak Exploit | 2023-10-27T11:00:09Z |
CVE-2023-4966 | sanjai-AK47/CVE-2023-4966 | An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability | 2023-10-29T15:31:37Z |
CVE-2023-4966 | ayhan-dev/CVE-2023-391 | no description | 2023-10-28T17:39:36Z |
CVE-2023-4966 | fdevsectest/CVE-2023-4966 | no description | 2023-11-03T05:59:14Z |
CVE-2023-4966 | certat/citrix-logchecker | Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation | 2023-10-28T11:44:42Z |
CVE-2023-4966 | s-bt/CVE-2023-4966 | Scripts to get infos | 2023-11-20T17:32:16Z |
CVE-2023-4966 | byte4RR4Y/CVE-2023-4966 | Programm to exploit a range of ip adresses | 2023-11-27T09:51:30Z |
CVE-2023-4966 | jmussmann/cve-2023-4966-iocs | Python script to search Citrix NetScaler logs for possible CVE-2023-4966 exploitation. | 2023-12-08T10:28:15Z |
CVE-2023-4966 | morganwdavis/overread | Simulates CVE-2023-4966 Citrix Bleed overread bug | 2023-12-16T21:55:04Z |
CVE-2023-4966 | kn32/parallels-file-move-privesc | Parallels Desktop privilege escalation - CVE-2023-50226 / ZDI-CAN-21227 | 2023-10-28T10:29:53Z |
CVE-2023-4966 | senpaisamp/Netscaler-CVE-2023-4966-POC | Proof Of Concept for te NetScaler Vuln | 2023-10-25T07:17:54Z |
CVE-2023-49606 | d0rb/CVE-2023-49606 | Critical use-after-free vulnerability discovered in Tinyproxy | 2024-05-07T10:03:01Z |
CVE-2023-49548 | geraldoalcantara/CVE-2023-49548 | Customer Support System 1.0 - SQL Injection Vulnerability in the "lastname" Parameter During "save_user" Operation | 2023-12-19T22:27:24Z |
CVE-2023-49547 | geraldoalcantara/CVE-2023-49547 | Customer Support System 1.0 - SQL Injection Login Bypass | 2023-11-28T12:59:10Z |
CVE-2023-49546 | geraldoalcantara/CVE-2023-49546 | Customer Support System 1.0 - SQL Injection Vulnerability in the "email" Parameter During "save_staff" Operation | 2023-12-19T21:54:36Z |
CVE-2023-49545 | geraldoalcantara/CVE-2023-49545 | Customer Support System 1.0 - Directory Listing | 2023-11-28T05:33:06Z |
CVE-2023-49544 | geraldoalcantara/CVE-2023-49544 | Customer Support System 1.0 - Local File Inclusion | 2023-11-28T06:21:51Z |
CVE-2023-49543 | geraldoalcantara/CVE-2023-49543 | Book Store Management System v1.0 - Incorrect Access Control | 2023-12-19T21:10:14Z |
CVE-2023-49540 | geraldoalcantara/CVE-2023-49540 | Book Store Management System v1.0 - Cross-site scripting (XSS) vulnerability in /index.php/history - vulnerable field: "Customer's Name". | 2023-12-19T20:50:09Z |
CVE-2023-49539 | geraldoalcantara/CVE-2023-49539 | Book Store Management System v1.0 - Cross-site scripting (XSS) vulnerability in "index.php/category" - vulnerable field: "Category Name" | 2023-12-19T20:31:36Z |
CVE-2023-49539 | KharimMchatta/basketcraft | this is a script that exploits the CVE-2023-27163 vulnerability which is request-basket SSRF | 2023-12-20T06:29:18Z |
CVE-2023-49496 | HuangYanQwQ/CVE-2023-49496 | no description | 2024-02-20T00:11:52Z |
CVE-2023-49471 | zunak/CVE-2023-49471 | no description | 2023-12-24T15:40:24Z |
CVE-2023-49453 | nitipoom-jar/CVE-2023-49453 | no description | 2024-03-09T05:15:02Z |
CVE-2023-49438 | brandon-t-elliott/CVE-2023-49438 | CVE-2023-49438 - Open Redirect Vulnerability in Flask-Security-Too | 2023-12-14T23:58:42Z |
CVE-2023-49339 | 3zizme/CVE-2023-49339 | Critical Security Vulnerability in Ellucian Banner System | 2024-01-17T23:18:29Z |
CVE-2023-49339 | actuator/com.gurry.kvbrowser | CVE-2023-49001 | 2023-11-17T06:17:44Z |
CVE-2023-49314 | louiselalanne/CVE-2023-49314 | Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and enableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack. | 2023-11-28T10:39:19Z |
CVE-2023-49313 | louiselalanne/CVE-2023-49313 | A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data. | 2023-11-27T23:59:35Z |
CVE-2023-4911 | Green-Avocado/CVE-2023-4911 | https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt | 2023-10-04T11:58:58Z |
CVE-2023-4911 | leesh3288/CVE-2023-4911 | PoC for CVE-2023-4911 | 2023-10-04T14:12:16Z |
CVE-2023-4911 | RickdeJager/CVE-2023-4911 | CVE-2023-4911 proof of concept | 2023-10-04T14:32:49Z |
CVE-2023-4911 | xiaoQ1z/CVE-2023-4911 | no description | 2023-10-08T03:26:24Z |
CVE-2023-4911 | silent6trinity/looney-tuneables | CVE-2023-4911 | 2023-10-10T13:29:11Z |
CVE-2023-4911 | ruycr4ft/CVE-2023-4911 | CVE-2023-4911 | 2023-10-11T14:49:22Z |
CVE-2023-4911 | guffre/CVE-2023-4911 | PoC for CVE-2023-4911 LooneyTuneables | 2023-10-14T02:24:52Z |
CVE-2023-4911 | hadrian3689/looney-tunables-CVE-2023-4911 | no description | 2023-10-10T22:04:23Z |
CVE-2023-4911 | KernelKrise/CVE-2023-4911 | Looney Tunables Local privilege escalation (CVE-2023-4911) workshop | 2023-10-25T11:59:34Z |
CVE-2023-4911 | Diego-AltF4/CVE-2023-4911 | Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit | 2023-10-28T20:05:30Z |
CVE-2023-4911 | puckiestyle/CVE-2023-4911 | no description | 2023-12-23T11:54:40Z |
CVE-2023-4911 | yanfernandess/Looney-Tunables-CVE-2023-4911 | no description | 2024-01-19T18:20:05Z |
CVE-2023-4911 | NishanthAnand21/CVE-2023-4911-PoC | Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. | 2024-01-20T18:47:07Z |
CVE-2023-49105 | ambionics/owncloud-exploits | ownCloud exploits for CVE-2023-49105 | 2023-12-05T11:35:12Z |
CVE-2023-49103 | creacitysec/CVE-2023-49103 | PoC for the CVE-2023-49103 | 2023-11-22T17:00:23Z |
CVE-2023-49103 | TLWebdesign/Joomla-3.10.12-languagehelper-hotfix | Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12 | 2023-11-29T19:46:15Z |
CVE-2023-49103 | ditekshen/ansible-cve-2023-49103 | Ansible Playbook for CVE-2023-49103 | 2023-11-29T18:46:54Z |
CVE-2023-49103 | MixColumns/CVE-2023-49103 | CVE-2023-49103 scanner for shodan.io downloaded json files | 2023-12-02T11:03:19Z |
CVE-2023-49103 | CUCUMBERanOrSNCompany/SealSecurityAssignment | Researching on the vulnrability CVE-2023-26136 | 2023-12-04T13:01:29Z |
CVE-2023-49103 | Romanc9/Gui-poc-test | A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432 | 2023-12-03T13:45:34Z |
CVE-2023-49103 | merlin-ke/OwnCloud-CVE-2023-49103 | OwnCloud CVE-2023-49103 | 2023-12-19T07:56:18Z |
CVE-2023-49103 | d0rb/CVE-2023-49103 | This is a simple proof of concept for CVE-2023-49103. | 2024-06-27T13:46:46Z |
CVE-2023-49070 | abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC | no description | 2023-12-14T09:32:41Z |
CVE-2023-49070 | 0xrobiul/CVE-2023-49070 | Exploit Of Pre-auth RCE in Apache Ofbiz!! | 2023-12-17T22:56:10Z |
CVE-2023-49052 | Cyber-Wo0dy/CVE-2023-49052 | Microweber version 2.0.4 vulnerable to "Uploading Malicious Files" | 2023-11-27T14:29:32Z |
CVE-2023-49038 | christopher-pace/CVE-2023-49038 | Command Injection in Ping Utility on Buffalo LS210D Version 1.78-0.03 | 2023-12-14T01:49:52Z |
CVE-2023-48984 | l00neyhacker/CVE-2023-48984 | no description | 2023-11-30T02:50:23Z |
CVE-2023-48983 | tristao-marinho/CVE-2023-48983 | POC CVE-2023-48983 | 2024-01-01T13:19:54Z |
CVE-2023-48982 | tristao-marinho/CVE-2023-48982 | POC CVE-2023-48982 | 2024-01-01T13:14:49Z |
CVE-2023-48981 | tristao-marinho/CVE-2023-48981 | POC CVE-2023-48981 | 2024-01-01T13:06:39Z |
CVE-2023-48974 | vinnie1717/CVE-2023-48974 | no description | 2023-12-28T23:24:22Z |
CVE-2023-48866 | nitipoom-jar/CVE-2023-48866 | no description | 2023-11-30T15:59:16Z |
CVE-2023-48858 | Shumerez/CVE-2023-48858 | PoC for CVE-2023-48858 | 2024-01-17T09:59:39Z |
CVE-2023-48858 | febinrev/atril_cbt-inject-exploit | CVE-2023-44452, CVE-2023-51698: CBT File Parsing Argument Injection that affected Popular Linux Distros | 2024-01-17T09:26:16Z |
CVE-2023-48858 | StanleyJobsonAU/GhostTown | Proof of Concept script to exploit CVE-2023-42793 (TeamCity) | 2024-01-15T13:25:49Z |
CVE-2023-48849 | delsploit/CVE-2023-48849 | no description | 2023-12-01T11:24:26Z |
CVE-2023-48842 | creacitysec/CVE-2023-48842 | no description | 2023-12-02T23:21:44Z |
CVE-2023-48788 | horizon3ai/CVE-2023-48788 | Fortinet FortiClient EMS SQL Injection | 2024-03-18T20:50:48Z |
CVE-2023-48777 | AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777 | no description | 2024-02-16T19:36:50Z |
CVE-2023-4863 | talbeerysec/BAD-WEBP-CVE-2023-4863 | BAD-WEBP-CVE-2023-4863 | 2023-09-25T22:10:32Z |
CVE-2023-4863 | bbaranoff/CVE-2023-4863 | no description | 2023-09-25T10:33:09Z |
CVE-2023-4863 | mistymntncop/CVE-2023-4863 | no description | 2023-09-21T05:22:51Z |
CVE-2023-4863 | caoweiquan322/NotEnough | This tool calculates tricky canonical huffman histogram for CVE-2023-4863. | 2023-12-19T01:32:45Z |
CVE-2023-4863 | LiveOverflow/webp-CVE-2023-4863 | no description | 2023-12-18T23:12:25Z |
CVE-2023-4863 | CrackerCat/CVE-2023-4863- | Triggering the famous libweb 0day vuln with libfuzzer | 2024-02-04T01:33:53Z |
CVE-2023-4863 | alsaeroth/CVE-2023-4863-POC | C implementation of libwebp 0-click vulnerability | 2024-02-07T06:58:16Z |
CVE-2023-4863 | huiwen-yayaya/CVE-2023-4863 | no description | 2023-11-11T06:51:03Z |
CVE-2023-48200 | nitipoom-jar/CVE-2023-48200 | no description | 2023-11-14T17:02:07Z |
CVE-2023-48199 | nitipoom-jar/CVE-2023-48199 | no description | 2023-11-14T16:50:31Z |
CVE-2023-48198 | nitipoom-jar/CVE-2023-48198 | no description | 2023-11-14T16:40:03Z |
CVE-2023-48197 | nitipoom-jar/CVE-2023-48197 | no description | 2023-11-14T16:34:21Z |
CVE-2023-48194 | zt20xx/CVE-2023-48194 | no description | 2024-07-06T12:37:56Z |
CVE-2023-4813 | tnishiox/cve-2023-4813 | no description | 2024-06-06T12:12:57Z |
CVE-2023-48123 | NHPT/CVE-2023-48123 | CVE-2023-54436 Exp | 2023-11-17T02:56:26Z |
CVE-2023-48104 | E1tex/CVE-2023-48104 | HTML Injection in Alinto/SOGo Web Client | 2024-01-10T15:49:48Z |
CVE-2023-48084 | Hamibubu/CVE-2023-48084 | Python program to dump all the databases, exploiting NagiosXI sqli vulnerability | 2024-03-01T04:06:15Z |
CVE-2023-48084 | bucketcat/CVE-2023-48084 | Fixes broken syntax in the POC, automates the API_Token retrieval, stores the token as a variable and pipes into the fixed POC. | 2024-03-23T00:31:37Z |
CVE-2023-48034 | aprkr/CVE-2023-48034 | Weak encryption in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject wireless arbitrary keystrokes. | 2023-11-20T16:04:24Z |
CVE-2023-48031 | nitipoom-jar/CVE-2023-48031 | no description | 2023-11-16T17:57:20Z |
CVE-2023-48029 | nitipoom-jar/CVE-2023-48029 | no description | 2023-11-16T18:42:12Z |
CVE-2023-48028 | nitipoom-jar/CVE-2023-48028 | no description | 2023-11-16T19:22:30Z |
CVE-2023-48022 | 0x656565/CVE-2023-48022 | CVE-2023-48022 exploit modified from Bishop Fox work | 2024-01-10T06:26:01Z |
CVE-2023-48022 | jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022 | ShadowRay RCE POC (CVE-2023-48022) | 2024-03-29T09:54:31Z |
CVE-2023-4800 | b0marek/CVE-2023-4800 | Repository for CVE-2023-4800 vulnerability. | 2023-09-24T12:11:58Z |
CVE-2023-47840 | RandomRobbieBF/CVE-2023-47840 | Qode Essential Addons <= 1.5.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | 2023-11-29T20:14:39Z |
CVE-2023-4771 | sahar042/CVE-2023-4771 | CVE-2023-4771 PoC CKEditor 4 Cross-site scripting (XSS) vulnerability in AJAX sample | 2024-06-10T08:19:24Z |
CVE-2023-47668 | RandomRobbieBF/CVE-2023-47668 | Restrict Content <= 3.2.7 - Information Exposure via legacy log file | 2023-11-14T08:40:49Z |
CVE-2023-4762 | buptsb/CVE-2023-4762 | no description | 2023-09-27T09:43:20Z |
CVE-2023-4762 | sherlocksecurity/CVE-2023-4762-Code-Review | no description | 2023-09-27T14:29:43Z |
CVE-2023-47564 | C411e/CVE-2023-47564 | CVE-2023-47564 | 2024-02-04T13:25:58Z |
CVE-2023-47529 | RandomRobbieBF/CVE-2023-47529 | Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File | 2023-11-13T10:50:25Z |
CVE-2023-47504 | davidxbors/CVE-2023-47504-POC | no description | 2024-06-19T18:07:56Z |
CVE-2023-47489 | nitipoom-jar/CVE-2023-47489 | no description | 2023-11-15T16:07:02Z |
CVE-2023-47488 | nitipoom-jar/CVE-2023-47488 | no description | 2023-11-15T16:32:01Z |
CVE-2023-47464 | HadessCS/CVE-2023-47464 | CVE-2023-47464 POC | 2024-02-14T15:39:34Z |
CVE-2023-47460 | aleksey-vi/CVE-2023-47460 | no description | 2023-11-10T15:38:01Z |
CVE-2023-47460 | AIex-3/confluence-hack | CVE-2023-22515 | 2023-10-30T00:17:45Z |
CVE-2023-47459 | aleksey-vi/CVE-2023-47459 | no description | 2023-11-10T15:20:48Z |
CVE-2023-47437 | herombey/CVE-2023-47437 | Vulnerability Disclosure | 2023-11-15T18:55:03Z |
CVE-2023-4741 | wudidike/CVE-2023-4741 | no description | 2023-08-22T06:00:57Z |
CVE-2023-47400 | LucasVanHaaren/CVE-2023-47400 | Proof of Concept for the CVE-2023-47400 | 2024-01-26T09:35:47Z |
CVE-2023-47246 | tucommenceapousser/CVE-2023-47246 | no description | 2023-11-22T08:18:11Z |
CVE-2023-47246 | rainbowhatrkn/CVE-2023-47246 | exploit for cve-2023-47246 SysAid RCE (shell upload) | 2023-11-22T08:13:51Z |
CVE-2023-47246 | rothilion26/cve2023-data | no description | 2023-11-21T18:16:34Z |
CVE-2023-47246 | W01fh4cker/CVE-2023-47246-EXP | exploit for cve-2023-47246 SysAid RCE (shell upload) | 2023-11-17T07:03:06Z |
CVE-2023-47218 | passwa11/CVE-2023-47218 | CVE-2023-47218: QNAP QTS and QuTS Hero Unauthenticated Command Injection (FIXED) | 2024-02-19T02:15:21Z |
CVE-2023-47184 | cont1nuum/CVE-2023-47184 | Exploit Title: WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - "Dashboard Redirect" field Stored Cross-Site Scripting (XSS) | 2023-11-01T19:19:36Z |
CVE-2023-47179 | RandomRobbieBF/CVE-2023-47179 | WooODT Lite <= 2.4.6 - Missing Authorization to Arbitrary Options Update (Subscriber+) | 2023-11-03T09:39:30Z |
CVE-2023-47129 | Cyber-Wo0dy/CVE-2023-47129 | Statamic CMS versions <4.33.0 vulnerable to "Remote Code Execution" | 2023-11-13T12:21:52Z |
CVE-2023-47119 | BaadMaro/CVE-2023-47119 | A POC for CVE-2023-47119 | 2023-11-12T23:34:07Z |
CVE-2023-47119 | Cristiano100/CVE-2023-47119 | no description | 2023-12-20T04:43:15Z |
CVE-2023-47108 | bahe-msft/govuln-CVE-2023-47108 | no description | 2024-06-25T05:05:26Z |
CVE-2023-47102 | quantiano/cve-2023-47102 | no description | 2023-10-31T04:03:02Z |
CVE-2023-47102 | nitipoom-jar/CVE-2023-47102 | no description | 2023-11-18T10:52:40Z |
CVE-2023-47014 | emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS | no description | 2023-11-14T08:08:08Z |
CVE-2023-46998 | soy-oreocato/CVE-2023-46998 | no description | 2023-11-01T19:36:38Z |
CVE-2023-46980 | sajaljat/CVE-2023-46980 | no description | 2023-11-02T16:05:23Z |
CVE-2023-4698 | mnqazi/CVE-2023-4698 | no description | 2023-09-01T09:24:08Z |
CVE-2023-46974 | yte121/CVE-2023-46974 | POC | 2023-11-02T16:08:19Z |
CVE-2023-4696 | mnqazi/CVE-2023-4696 | https://medium.com/@mnqazi/cve-2023-4696-account-takeover-due-to-improper-handling-of-jwt-tokens-in-memos-v0-13-2-13104e1412f3 | 2023-09-01T09:02:03Z |
CVE-2023-46954 | jakedmurphy1/CVE-2023-46954 | no description | 2023-11-02T13:09:52Z |
CVE-2023-46948 | AzraelsBlade/CVE-2023-46948 | no description | 2023-10-25T13:50:41Z |
CVE-2023-46870 | Chapoly1305/CVE-2023-46870 | no description | 2024-05-10T22:18:53Z |
CVE-2023-46865 | asylumdx/Crater-CVE-2023-46865-RCE | Crater <=6.0.6, CVE-2023-46865 Post-Auth RCE (Superadmin) | 2023-11-09T21:22:47Z |
CVE-2023-4683 | Songg45/CVE-2023-4683-Test | CVE-2023-4683 - Test | 2023-09-28T20:49:33Z |
CVE-2023-46813 | Freax13/cve-2023-46813-poc | no description | 2023-05-29T15:10:43Z |
CVE-2023-46805 | cbeek-r7/CVE-2023-46805 | Simple scanner for scanning a list of |