Automatic monitor github cve using Github Actions
Last generated: 2024-07-03 01:59:21.212652
CVE | Name | Description | Date |
---|---|---|---|
CVE-2024-65230 | CBaekhyunC/cve-2024-65230 | no description | 2024-01-23T10:16:43Z |
CVE-2024-5522 | truonghuuphuc/CVE-2024-5522-Poc | CVE-2024-5522 HTML5 Video Player <= 2.5.26 - Unauthenticated SQL Injection | 2024-05-31T04:41:46Z |
CVE-2024-5326 | truonghuuphuc/CVE-2024-5326-Poc | CVE-2024-5326 Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX <= 4.1.2 - Missing Authorization to Arbitrary Options Update | 2024-06-01T04:23:54Z |
CVE-2024-5326 | cve-2024/CVE-2024-5326-Poc | no description | 2024-06-14T07:12:29Z |
CVE-2024-5084 | Chocapikk/CVE-2024-5084 | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | 2024-05-27T20:04:10Z |
CVE-2024-5084 | KTN1990/CVE-2024-5084 | WordPress Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | 2024-05-25T03:49:04Z |
CVE-2024-5084 | k3lpi3b4nsh33/CVE-2024-5084 | no description | 2024-06-06T03:25:44Z |
CVE-2024-4956 | gmh5225/CVE-2024-4956 | Unauthenticated Path Traversal in Nexus Repository 3 | 2024-05-24T12:45:45Z |
CVE-2024-4956 | erickfernandox/CVE-2024-4956 | Unauthenticated Path Traversal in Nexus Repository 3 | 2024-05-23T11:39:06Z |
CVE-2024-4956 | codeb0ss/CVE-2024-4956-PoC | CVE-2024-4956 - Nexus < Exploit | 2024-05-23T16:46:28Z |
CVE-2024-4956 | xungzzz/CVE-2024-4956 | CVE-2024-4956 Nuclei Template | 2024-05-23T08:15:08Z |
CVE-2024-4956 | thinhap/CVE-2024-4956-PoC | no description | 2024-05-27T03:09:36Z |
CVE-2024-4956 | banditzCyber0x/CVE-2024-4956 | Nexus Repository Manager 3 Unauthenticated Path Traversal | 2024-05-23T06:47:13Z |
CVE-2024-4956 | eoslvs/CVE-2024-4956 | no description | 2024-05-27T13:48:15Z |
CVE-2024-4956 | ifconfig-me/CVE-2024-4956-Bulk-Scanner | [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner | 2024-05-26T06:50:48Z |
CVE-2024-4956 | GoatSecurity/CVE-2024-4956 | CVE-2024-4956 : Nexus Repository Manager 3 poc exploit | 2024-05-28T15:05:31Z |
CVE-2024-4956 | TypicalModMaker/CVE-2024-4956 | Proof-Of-Concept (POC) for CVE-2024-4956 | 2024-05-28T21:20:53Z |
CVE-2024-4956 | Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager | Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0 | 2024-05-30T08:04:27Z |
CVE-2024-4956 | verylazytech/CVE-2024-4956 | POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal | 2024-06-09T10:57:29Z |
CVE-2024-4898 | cve-2024/CVE-2024-4898-Poc | no description | 2024-06-14T07:01:58Z |
CVE-2024-4898 | truonghuuphuc/CVE-2024-4898-Poc | CVE-2024-4898 InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.38 - Missing Authorization to Unauthenticated API setup/Arbitrary Options Update/Administrative User Creation | 2024-06-12T10:03:14Z |
CVE-2024-4875 | RandomRobbieBF/CVE-2024-4875 | HT Mega – Absolute Addons For Elementor <= 2.5.2 - Missing Authorization to Options Update | 2024-05-21T14:15:16Z |
CVE-2024-4761 | michredteam/CVE-2024-4761 | High CVE-2024-4761 Exploit | 2024-05-14T17:45:22Z |
CVE-2024-4701 | JoeBeeton/CVE-2024-4701-POC | POC for CVE-2024-4701 | 2024-05-13T11:58:19Z |
CVE-2024-4577 | Junp0/CVE-2024-4577 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC | 2024-06-07T09:42:40Z |
CVE-2024-4577 | 0x20c/CVE-2024-4577-nuclei | CVE-2024-4577 nuclei-templates | 2024-06-08T03:12:28Z |
CVE-2024-4577 | Yukiioz/CVE-2024-4577 | no description | 2024-06-07T20:10:49Z |
CVE-2024-4577 | Sysc4ll3r/CVE-2024-4577 | Nuclei Template for CVE-2024-4577 | 2024-06-07T17:01:20Z |
CVE-2024-4577 | WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP | no description | 2024-06-07T17:02:52Z |
CVE-2024-4577 | Wh02m1/CVE-2024-4577 | no description | 2024-06-07T12:49:20Z |
CVE-2024-4577 | taida957789/CVE-2024-4577 | no description | 2024-06-07T10:58:57Z |
CVE-2024-4577 | ohhhh693/CVE-2024-4577 | CVE-2024-4577 | 2024-06-07T09:42:31Z |
CVE-2024-4577 | zjhzjhhh/CVE-2024-4577 | CVE-2024-4577 | 2024-06-07T09:53:32Z |
CVE-2024-4577 | princew88/CVE-2024-4577 | no description | 2024-06-07T09:48:36Z |
CVE-2024-4577 | manuelinfosec/CVE-2024-4577 | Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands. | 2024-06-08T05:27:44Z |
CVE-2024-4577 | xcanwin/CVE-2024-4577-PHP-RCE | no description | 2024-06-08T13:04:45Z |
CVE-2024-4577 | bl4cksku11/CVE-2024-4577 | This is a PoC for PHP CVE-2024-4577. | 2024-06-11T15:11:56Z |
CVE-2024-4577 | TAM-K592/CVE-2024-4577 | CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters. | 2024-06-07T05:50:23Z |
CVE-2024-4577 | K3ysTr0K3R/CVE-2024-4577-EXPLOIT | A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE) | 2024-06-09T23:32:11Z |
CVE-2024-4577 | it-t4mpan/check_cve_2024_4577.sh | Bash script that checks if a PHP CGI setup is vulnerable to the CVE-2024-4577 argument injection vulnerability | 2024-06-10T07:28:44Z |
CVE-2024-4577 | 11whoami99/CVE-2024-4577 | POC & $BASH script for CVE-2024-4577 | 2024-06-07T09:51:39Z |
CVE-2024-4577 | Chocapikk/CVE-2024-4577 | PHP CGI Argument Injection vulnerability | 2024-06-09T14:18:21Z |
CVE-2024-4577 | dbyMelina/CVE-2024-4577 | python poc编写练手,可以对单个目标或批量检测 | 2024-06-09T13:46:46Z |
CVE-2024-4577 | zomasec/CVE-2024-4577 | CVE-2024-4577 Exploit POC | 2024-06-08T06:36:14Z |
CVE-2024-4577 | gotr00t0day/CVE-2024-4577 | Argument injection vulnerability in PHP | 2024-06-15T02:49:37Z |
CVE-2024-4577 | Sh0ckFR/CVE-2024-4577 | Fixed and minimalist PoC of the CVE-2024-4577 | 2024-06-13T14:25:04Z |
CVE-2024-4577 | hexedbyte/cve-2024-4577 | no description | 2024-06-13T11:28:33Z |
CVE-2024-4577 | nemu1k5ma/CVE-2024-4577 | php-cgi RCE快速检测 | 2024-06-12T02:16:09Z |
CVE-2024-4577 | XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE | no description | 2024-06-12T11:50:01Z |
CVE-2024-4577 | aaddmin1122345/CVE-2024-4577-POC | CVE-2024-4577 | 2024-06-12T04:50:25Z |
CVE-2024-4577 | d3ck4/Shodan-CVE-2024-4577 | POC for CVE-2024-4577 with Shodan integration | 2024-06-12T06:45:08Z |
CVE-2024-4484 | Abo5/CVE-2024-4484 | This script uses HTTParty to detect stored cross-site scripting (XSS) vulnerabilities in WordPress sites using the xai_username parameter. It sends a payload to the specified URL and checks if the payload is reflected in the response, indicating a vulnerability. | 2024-06-12T23:09:39Z |
CVE-2024-4443 | truonghuuphuc/CVE-2024-4443-Poc | CVE-2024-4443 Business Directory Plugin – Easy Listing Directories for WordPress <= 6.4.2 - Unauthenticated SQL Injection via listingfields Parameter | 2024-05-26T16:34:58Z |
CVE-2024-4439 | d0rb/CVE-2024-4439 | The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1. | 2024-05-06T09:07:36Z |
CVE-2024-4439 | MielPopsssssss/CVE-2024-4439 | CVE-2024-4439 PoC | 2024-05-06T08:50:23Z |
CVE-2024-4439 | xssor-dz/-CVE-2024-4439 | WordPress Core < 6.5.2 - Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block | 2024-05-20T23:39:54Z |
CVE-2024-4367 | s4vvysec/CVE-2024-4367-POC | CVE-2024-4367 arbitrary js execution in pdf js | 2024-05-20T22:56:10Z |
CVE-2024-4367 | avalahEE/pdfjs_disable_eval | CVE-2024-4367 mitigation for Odoo 14.0 | 2024-05-23T07:34:15Z |
CVE-2024-4367 | spaceraccoon/detect-cve-2024-4367 | YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js | 2024-05-22T18:05:47Z |
CVE-2024-4367 | LOURC0D3/CVE-2024-4367-PoC | CVE-2024-4367 & CVE-2024-34342 Proof of Concept | 2024-05-20T10:02:23Z |
CVE-2024-4367 | Zombie-Kaiser/cve-2024-4367-PoC-fixed | PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。 | 2024-06-13T15:14:47Z |
CVE-2024-4367 | clarkio/pdfjs-vuln-demo | This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367 | 2024-05-22T23:18:20Z |
CVE-2024-4358 | Harydhk7/CVE-2024-4358 | no description | 2024-06-04T16:07:36Z |
CVE-2024-4358 | RevoltSecurities/CVE-2024-4358 | An Vulnerability detection and Exploitation tool for CVE-2024-4358 | 2024-06-04T11:32:59Z |
CVE-2024-4358 | Sk1dr0wz/CVE-2024-4358_Mass_Exploit | no description | 2024-06-05T01:05:12Z |
CVE-2024-4358 | sinsinology/CVE-2024-4358 | Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800) | 2024-06-03T08:22:10Z |
CVE-2024-4358 | verylazytech/CVE-2024-4358 | Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024 | 2024-06-09T06:30:06Z |
CVE-2024-4352 | truonghuuphuc/CVE-2024-4352-Poc | CVE-2024-4352 Tutor LMS Pro <= 2.7.0 - Missing Authorization to SQL Injection | 2024-05-16T14:55:43Z |
CVE-2024-4323 | skilfoy/CVE-2024-4323-Exploit-POC | This proof-of-concept script demonstrates how to exploit CVE-2024-4323, a memory corruption vulnerability in Fluent Bit, enabling remote code execution. | 2024-05-20T15:04:13Z |
CVE-2024-4323 | d0rb/CVE-2024-4323 | Critical heap buffer overflow vulnerability in the handle_trace_request and parse_trace_request functions of the Fluent Bit HTTP server. | 2024-05-21T12:59:16Z |
CVE-2024-4323 | yuansec/CVE-2024-4323-dos_poc | no description | 2024-05-22T09:55:30Z |
CVE-2024-4295 | truonghuuphuc/CVE-2024-4295-Poc | CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash | 2024-06-05T09:29:20Z |
CVE-2024-4295 | cve-2024/CVE-2024-4295-Poc | no description | 2024-06-14T07:04:36Z |
CVE-2024-4040 | rbih-boulanouar/CVE-2024-4040 | no description | 2024-04-25T04:45:38Z |
CVE-2024-4040 | tucommenceapousser/CVE-2024-4040-Scanner | Scanner of vulnerability on crushftp instance | 2024-04-25T04:01:23Z |
CVE-2024-4040 | Mufti22/CVE-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | 2024-04-25T05:18:06Z |
CVE-2024-4040 | Mohammaddvd/CVE-2024-4040 | Exploit CrushFTP CVE-2024-4040 | 2024-04-30T13:27:34Z |
CVE-2024-4040 | Praison001/CVE-2024-4040-CrushFTP-server | Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms | 2024-04-29T10:21:53Z |
CVE-2024-4040 | jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability | no description | 2024-05-01T14:42:39Z |
CVE-2024-4040 | gotr00t0day/CVE-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | 2024-05-03T23:29:53Z |
CVE-2024-4040 | 1ncendium/CVE-2024-4040 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | 2024-05-13T17:33:36Z |
CVE-2024-4040 | Stuub/CVE-2024-4040-SSTI-LFI-PoC | CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass - Full Server Takeover - Wordlist Support | 2024-04-25T19:51:38Z |
CVE-2024-4040 | airbus-cert/CVE-2024-4040 | Scanner for CVE-2024-4040 | 2024-04-23T09:31:29Z |
CVE-2024-3922 | truonghuuphuc/CVE-2024-3922-Poc | Dokan Pro <= 3.10.3 - Unauthenticated SQL Injection | 2024-06-12T07:42:10Z |
CVE-2024-3867 | c4cnm/CVE-2024-3867 | This repository shows u some information on this vulnerability, which were found by me. | 2024-05-08T06:19:05Z |
CVE-2024-38396 | vin01/poc-cve-2024-38396 | PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution | 2024-06-16T09:43:46Z |
CVE-2024-3806 | truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc | CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta | 2024-05-10T16:13:07Z |
CVE-2024-37889 | uname-s/CVE-2024-37889 | no description | 2024-06-17T04:50:00Z |
CVE-2024-37393 | optistream/securenvoy-cve-2024-37393 | Vulnerability check script for CVE-2024-37393 (SecurEnvoy MFA 9.4.513) | 2024-06-10T12:42:57Z |
CVE-2024-37051 | LeadroyaL/CVE-2024-37051-EXP | CVE-2024-37051 poc and exploit | 2024-06-11T16:01:13Z |
CVE-2024-37051 | mrblackstar26/CVE-2024-37051 | Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) | 2024-06-13T09:15:58Z |
CVE-2024-36837 | phtcloud-dev/CVE-2024-36837 | CVE-2024-36837 POC | 2024-06-15T16:44:51Z |
CVE-2024-36821 | IvanGlinkin/CVE-2024-36821 | The public reference that contains the minimum require information for the vulnerability covered by CVE-2024-36821 | 2024-06-10T15:52:02Z |
CVE-2024-36416 | kva55/CVE-2024-36416 | Tool for validating / testing CVE-2024-36416 | 2024-06-09T07:18:54Z |
CVE-2024-36079 | DxRvs/vaultize_CVE-2024-36079 | no description | 2024-05-20T22:07:41Z |
CVE-2024-3552 | truonghuuphuc/CVE-2024-3552-Poc | CVE-2024-3552 Web Directory Free <= 1.6.9 - Unauthenticated SQL Injection | 2024-05-27T15:36:24Z |
CVE-2024-35511 | efekaanakkar/CVE-2024-35511 | Men Salon Management System Using PHP and MySQL | 2024-05-25T13:07:35Z |
CVE-2024-35475 | carsonchan12345/CVE-2024-35475 | no description | 2024-05-22T14:21:48Z |
CVE-2024-35469 | dovankha/CVE-2024-35469 | CVE-2024-35469 - SQL injection | 2024-05-11T07:27:31Z |
CVE-2024-35468 | dovankha/CVE-2024-35468 | CVE-2024-35468 - SQL injection | 2024-05-11T05:23:41Z |
CVE-2024-35333 | momo1239/CVE-2024-35333 | no description | 2024-05-14T13:02:36Z |
CVE-2024-35315 | ewilded/CVE-2024-35315-POC | Mitel Collab Local Privilege Escalation CVE-2024-35315 PoC | 2024-06-03T14:29:35Z |
CVE-2024-34958 | Gr-1m/CVE-2024-34958 | idccms CSRF poc | 2024-05-20T08:15:05Z |
CVE-2024-3495 | truonghuuphuc/CVE-2024-3495-Poc | CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection | 2024-05-23T02:41:15Z |
CVE-2024-3495 | zomasec/CVE-2024-3495-POC | The Country State City Dropdown CF7 WordPress plugin (versions up to 2.7.2) is vulnerable to SQL Injection via 'cnt' and 'sid' parameters. Insufficient escaping and lack of preparation in the SQL query allow unauthenticated attackers to append queries, potentially extracting sensitive database information. | 2024-05-28T02:57:12Z |
CVE-2024-34832 | julio-cfa/CVE-2024-34832 | CVE-2024-34832 | 2024-05-14T19:15:31Z |
CVE-2024-34716 | aelmokhtar/CVE-2024-34716_PoC | no description | 2024-05-14T18:48:41Z |
CVE-2024-34582 | silent6trinity/CVE-2024-34582 | no description | 2024-05-16T12:40:46Z |
CVE-2024-34474 | Alaatk/CVE-2024-34474 | Clario through 2024-04-11 for Windows Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM. | 2024-05-05T05:28:15Z |
CVE-2024-34472 | osvaldotenorio/CVE-2024-34472 | no description | 2024-05-05T00:54:56Z |
CVE-2024-34471 | osvaldotenorio/CVE-2024-34471 | no description | 2024-05-05T01:10:39Z |
CVE-2024-34470 | osvaldotenorio/CVE-2024-34470 | no description | 2024-05-05T00:31:31Z |
CVE-2024-34469 | Toxich4/CVE-2024-34469 | CVE-2024-34469 | 2024-05-07T07:47:20Z |
CVE-2024-34351 | Voorivex/CVE-2024-34351 | no description | 2024-05-12T10:49:41Z |
CVE-2024-3435 | ymuraki-csc/cve-2024-3435 | no description | 2024-05-20T02:17:44Z |
CVE-2024-34310 | 3309899621/CVE-2024-34310 | CVE-2024-34310 | 2024-05-10T13:36:19Z |
CVE-2024-34226 | dovankha/CVE-2024-34226 | CVE-2024-34226 - SQL injection | 2024-05-11T10:33:04Z |
CVE-2024-34225 | dovankha/CVE-2024-34225 | CVE-20240-34225 - Cross Site Scripting | 2024-05-11T10:20:52Z |
CVE-2024-34224 | dovankha/CVE-2024-34224 | CVE-2024-34224 - Cross Site Scripting | 2024-05-11T08:58:31Z |
CVE-2024-34223 | dovankha/CVE-2024-34223 | CVE-2024-34223 - Insecure permission | 2024-05-11T08:36:16Z |
CVE-2024-34222 | dovankha/CVE-2024-34222 | CVE-2024-34222 - SQL injection | 2024-05-11T08:20:55Z |
CVE-2024-34221 | dovankha/CVE-2024-34221 | CVE-2024-34221 - Insecure pemission | 2024-05-09T10:32:30Z |
CVE-2024-34220 | dovankha/CVE-2024-34220 | CVE-2024-34220 - SQL injection | 2024-04-27T10:32:10Z |
CVE-2024-3400 | Yuvvi01/CVE-2024-3400 | no description | 2024-04-13T05:16:21Z |
CVE-2024-3400 | CerTusHack/CVE-2024-3400-PoC | no description | 2024-04-13T11:55:53Z |
CVE-2024-3400 | MrR0b0t19/CVE-2024-3400 | Vulnerabilidad de palo alto | 2024-04-14T19:11:16Z |
CVE-2024-3400 | momika233/CVE-2024-3400 | no description | 2024-04-14T15:16:16Z |
CVE-2024-3400 | index2014/CVE-2024-3400-Checker | A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。 | 2024-04-17T04:58:42Z |
CVE-2024-3400 | h4x0r-dz/CVE-2024-3400 | CVE-2024-3400 Palo Alto OS Command Injection | 2024-04-16T14:18:08Z |
CVE-2024-3400 | CONDITIONBLACK/CVE-2024-3400-POC | no description | 2024-04-16T17:08:15Z |
CVE-2024-3400 | FoxyProxys/CVE-2024-3400 | no description | 2024-04-13T18:14:47Z |
CVE-2024-3400 | LoanVitor/CVE-2024-3400- | no description | 2024-04-16T07:31:22Z |
CVE-2024-3400 | AdaniKamal/CVE-2024-3400 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | 2024-04-16T01:43:24Z |
CVE-2024-3400 | 0x0d3ad/CVE-2024-3400 | CVE-2024-3400 | 2024-04-13T14:00:31Z |
CVE-2024-3400 | retkoussa/CVE-2024-3400 | CVE-2024-3400 : Palo Alto OS Command Injection - POC | 2024-04-17T22:28:10Z |
CVE-2024-3400 | phantomradar/cve-2024-3400-poc | Simple POC for CVE-2024-3400 | 2024-04-17T21:03:39Z |
CVE-2024-3400 | Chocapikk/CVE-2024-3400 | no description | 2024-04-16T21:21:41Z |
CVE-2024-3400 | ak1t4/CVE-2024-3400 | Global Protec Palo Alto File Write Exploit | 2024-04-17T16:01:20Z |
CVE-2024-3400 | ZephrFish/CVE-2024-3400-Canary | Have we not learnt from HoneyPoC? | 2024-04-17T11:41:01Z |
CVE-2024-3400 | ihebski/CVE-2024-3400 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | 2024-04-16T21:24:15Z |
CVE-2024-3400 | HackingLZ/panrapidcheck | Extract useful information from PANOS support file for CVE-2024-3400 | 2024-04-19T14:56:17Z |
CVE-2024-3400 | codeblueprint/CVE-2024-3400 | Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400 | 2024-04-18T16:35:29Z |
CVE-2024-3400 | pwnj0hn/CVE-2024-3400 | Finding Palo Alto devices vulnerable to CVE-2024-3400. | 2024-04-19T06:37:32Z |
CVE-2024-3400 | sxyrxyy/CVE-2024-3400-Check | no description | 2024-04-18T21:12:49Z |
CVE-2024-3400 | Ravaan21/CVE-2024-3400 | CVE-2024-3400 POC written in Rust and Python | 2024-04-18T21:14:15Z |
CVE-2024-3400 | swaybs/CVE-2024-3400 | Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts | 2024-04-18T16:45:51Z |
CVE-2024-3400 | hahasagined/CVE-2024-3400 | EDL for IPs attacking customers with CVE-2024-3400 | 2024-04-18T15:06:03Z |
CVE-2024-3400 | zam89/CVE-2024-3400-pot | Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability | 2024-04-24T14:21:26Z |
CVE-2024-3400 | W01fh4cker/CVE-2024-3400-RCE-Scan | CVE-2024-3400-RCE | 2024-04-16T16:18:56Z |
CVE-2024-3400 | schooldropout1337/CVE-2024-3400 | no description | 2024-04-18T10:16:22Z |
CVE-2024-3400 | Kr0ff/cve-2024-3400 | Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation | 2024-04-21T12:38:13Z |
CVE-2024-3400 | 0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection | no description | 2024-04-25T10:23:03Z |
CVE-2024-3400 | terminalJunki3/CVE-2024-3400-Checker | Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. | 2024-04-24T14:30:34Z |
CVE-2024-3400 | marconesler/CVE-2024-3400 | Exploit for GlobalProtect CVE-2024-3400 | 2024-04-27T18:58:41Z |
CVE-2024-3400 | MurrayR0123/CVE-2024-3400-Compromise-Checker | A simple bash script to check for evidence of compromise related to CVE-2024-3400 | 2024-04-15T03:28:22Z |
CVE-2024-3400 | andrelia-hacks/CVE-2024-3400 | no description | 2024-05-12T19:48:20Z |
CVE-2024-3400 | tk-sawada/IPLineFinder | Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400 | 2024-05-15T15:50:32Z |
CVE-2024-3400 | iwallarm/cve-2024-3400 | no description | 2024-05-19T12:38:04Z |
CVE-2024-33911 | xbz0n/CVE-2024-33911 | no description | 2024-05-05T11:14:47Z |
CVE-2024-33775 | Neo-XeD/CVE-2024-33775 | no description | 2024-05-01T15:46:32Z |
CVE-2024-33722 | fuzzlove/soplanning-1.52-exploits | SOPlanning 1.52.00 CSRF/SQLi/XSS (CVE-2024-33722, CVE-2024-33724) | 2024-04-22T19:51:18Z |
CVE-2024-33559 | absholi7ly/WordPress-XStore-theme-SQL-Injection | (CVE-2024-33559) The XStore theme for WordPress is vulnerable to SQL Injection due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query | 2024-05-17T04:15:34Z |
CVE-2024-33438 | julio-cfa/CVE-2024-33438 | CubeCart <= 6.5.4 is vulnerable to an arbitrary file upload that leads to remote code execution (RCE). | 2024-04-24T16:31:17Z |
CVE-2024-33339 | balckgu1/Poc | This repository is a proof of vulnerability for CVE-2024-33339 | 2024-04-28T01:56:40Z |
CVE-2024-33078 | HBLocker/CVE-2024-33078 | no description | 2024-05-01T15:45:45Z |
CVE-2024-3293 | truonghuuphuc/CVE-2024-3293-Poc | CVE-2024-3293 rtMedia for WordPress, BuddyPress and bbPress <= 4.6.18 - Authenticated (Contributor+) SQL Injection via rtmedia_gallery Shortcode | 2024-05-30T04:51:32Z |
CVE-2024-32766 | 3W1nd4r/CVE-2024-32766-RCE | writeup and PoC for CVE-2024-32766 (QNAP) OS command injection and auth bypass | 2024-05-02T23:39:18Z |
CVE-2024-3273 | adhikara13/CVE-2024-3273 | Exploit for CVE-2024-3273, supports single and multiple hosts | 2024-04-07T15:36:18Z |
CVE-2024-3273 | Chocapikk/CVE-2024-3273 | D-Link NAS CVE-2024-3273 Exploit Tool | 2024-04-07T03:09:13Z |
CVE-2024-3273 | ThatNotEasy/CVE-2024-3273 | D-Link NAS Command Execution Exploit | 2024-04-10T00:27:02Z |
CVE-2024-3273 | blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC | CVE-2024-30255 This repository contains a proof-of-concept (PoC) Python script to demonstrate the CPU exhaustion vulnerability in Envoy caused by a flood of CONTINUATION frames. | 2024-04-09T15:59:50Z |
CVE-2024-3273 | K3ysTr0K3R/CVE-2024-3273-EXPLOIT | A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE | 2024-04-09T12:26:37Z |
CVE-2024-3273 | LeopoldSkell/CVE-2024-3273 | no description | 2024-04-16T09:12:58Z |
CVE-2024-3273 | yarienkiva/honeypot-dlink-CVE-2024-3273 | Quick and dirty honeypot for CVE-2024-3273 | 2024-04-07T21:15:33Z |
CVE-2024-3273 | mrrobot0o/CVE-2024-3273- | no description | 2024-04-23T06:31:19Z |
CVE-2024-3273 | OIivr/Turvan6rkus-CVE-2024-3273 | no description | 2024-05-05T22:07:02Z |
CVE-2024-3272 | aliask/dinkleberry | Patch your D-Link device affected by CVE-2024-3272 | 2024-05-21T08:40:37Z |
CVE-2024-32709 | truonghuuphuc/CVE-2024-32709-Poc | CVE-2024-32709 WP-Recall – Registration, Profile, Commerce & More <= 16.26.5 - Unauthenticated SQL Injection | 2024-05-05T17:21:55Z |
CVE-2024-32651 | zcrosman/cve-2024-32651 | changedetection rce though ssti | 2024-05-26T21:24:14Z |
CVE-2024-32640 | Stuub/CVE-2024-32640-SQLI-MuraCMS | CVE-2024-32640 - Automated SQLi Exploitation PoC | 2024-05-16T01:02:32Z |
CVE-2024-32640 | 0x3f3c/CVE-2024-32640-SQLI-MuraCMS | no description | 2024-05-17T13:43:59Z |
CVE-2024-32640 | sammings/CVE-2024-32640 | sql延时注入poc | 2024-06-06T08:56:34Z |
CVE-2024-32523 | truonghuuphuc/CVE-2024-32523-Poc | CVE-2024-32523 Mailster <= 4.0.6 - Unauthenticated Local File Inclusion | 2024-05-11T18:16:31Z |
CVE-2024-32459 | absholi7ly/FreeRDP-Out-of-Bounds-Read-CVE-2024-32459- | The FreeRDP - Out-of-Bounds Read (CVE-2024-32459) vulnerability concerns FreeRDP, a free implementation of Remote Desktop Protocol. FreeRDP-based clients and servers using a version of FreeRDP prior to version 3.5.0 or 2.11.6 are vulnerable to out-of-bounds reading12. Versions 3.5.0 and 2.11.6 correct the problem | 2024-05-22T04:19:27Z |
CVE-2024-32399 | NN0b0dy/CVE-2024-32399 | no description | 2024-04-22T15:15:37Z |
CVE-2024-32371 | chucrutis/CVE-2024-32371 | no description | 2024-05-06T17:41:06Z |
CVE-2024-32370 | chucrutis/CVE-2024-32370 | no description | 2024-05-06T17:28:57Z |
CVE-2024-32369 | chucrutis/CVE-2024-32369 | no description | 2024-05-06T17:22:15Z |
CVE-2024-32258 | liyansong2018/CVE-2024-32258 | no description | 2024-04-18T17:07:07Z |
CVE-2024-32238 | asdfjkl11/CVE-2024-32238 | no description | 2024-04-20T03:55:21Z |
CVE-2024-32238 | FuBoLuSec/CVE-2024-32238 | H3C ER8300G2-X config download | 2024-04-20T16:23:10Z |
CVE-2024-32205 | Lucky-lm/CVE-2024-32205 | no description | 2024-04-20T04:11:19Z |
CVE-2024-3217 | BassamAssiri/CVE-2024-3217-POC | no description | 2024-04-17T13:43:57Z |
CVE-2024-32136 | xbz0n/CVE-2024-32136 | no description | 2024-05-05T10:49:08Z |
CVE-2024-32113 | Mr-xn/CVE-2024-32113 | Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104] | 2024-06-03T15:57:59Z |
CVE-2024-32004 | 10cks/CVE-2024-32004-POC | no description | 2024-05-20T14:59:16Z |
CVE-2024-32004 | Wadewfsssss/CVE-2024-32004 | no description | 2024-05-19T13:57:46Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-POC | no description | 2024-05-19T05:05:07Z |
CVE-2024-32002 | M507/CVE-2024-32002 | local poc for CVE-2024-32002 | 2024-05-18T02:42:33Z |
CVE-2024-32002 | safebuffer/CVE-2024-32002 | CVE-2024-32002 RCE PoC | 2024-05-18T15:05:28Z |
CVE-2024-32002 | markuta/hooky | A submodule for exploiting CVE-2024-32002 vulnerability. | 2024-05-17T15:37:42Z |
CVE-2024-32002 | 10cks/hook | CVE-2024-32002-hook | 2024-05-20T02:44:07Z |
CVE-2024-32002 | aitorcastel/poc_CVE-2024-32002 | no description | 2024-05-19T16:33:35Z |
CVE-2024-32002 | aitorcastel/poc_CVE-2024-32002_submodule | no description | 2024-05-19T16:34:11Z |
CVE-2024-32002 | amalmurali47/git_rce | Exploit PoC for CVE-2024-32002 | 2024-05-17T19:33:08Z |
CVE-2024-32002 | amalmurali47/hook | Hook for the PoC for exploiting CVE-2024-32002 | 2024-05-17T19:35:44Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-linux-submod | no description | 2024-05-19T05:32:08Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-linux-hulk | no description | 2024-05-19T05:31:41Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-linux-smash | no description | 2024-05-19T05:32:34Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-hulk | no description | 2024-05-19T05:08:08Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-submod | no description | 2024-05-19T05:08:22Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-smash | no description | 2024-05-19T05:08:36Z |
CVE-2024-32002 | KiranKumarK20/CVE-2024-32002 | no description | 2024-05-20T10:07:51Z |
CVE-2024-32002 | jweny/CVE-2024-32002_EXP | no description | 2024-05-20T02:58:57Z |
CVE-2024-32002 | CrackerCat/CVE-2024-32002_EXP | no description | 2024-05-20T06:12:02Z |
CVE-2024-32002 | jweny/CVE-2024-32002_HOOK | no description | 2024-05-20T02:52:42Z |
CVE-2024-32002 | Roronoawjd/hook | CVE-2024-32002 hook POC | 2024-05-21T12:31:57Z |
CVE-2024-32002 | Hector65432/cve-2024-32002-2 | no description | 2024-05-22T15:24:46Z |
CVE-2024-32002 | Hector65432/cve-2024-32002-1 | no description | 2024-05-22T15:24:19Z |
CVE-2024-32002 | 1mxml/CVE-2024-32002-poc | no description | 2024-05-22T10:01:58Z |
CVE-2024-32002 | YuanlooSec/CVE-2024-32002-poc | no description | 2024-05-22T02:51:36Z |
CVE-2024-32002 | JJoosh/CVE-2024-32002-Reverse-Shell | Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad. | 2024-05-21T13:45:58Z |
CVE-2024-32002 | vincepsh/CVE-2024-32002 | Repo for testing CVE-2024-32002 | 2024-05-22T18:43:36Z |
CVE-2024-32002 | vincepsh/CVE-2024-32002-hook | CVE-2024-32002-hook | 2024-05-22T18:50:56Z |
CVE-2024-32002 | bfengj/CVE-2024-32002-Exploit | no description | 2024-05-22T11:32:33Z |
CVE-2024-32002 | ycdxsb/CVE-2024-32002-submod | no description | 2024-05-22T11:27:14Z |
CVE-2024-32002 | ycdxsb/CVE-2024-32002-hulk | no description | 2024-05-22T11:26:30Z |
CVE-2024-32002 | bfengj/CVE-2024-32002-hook | no description | 2024-05-22T11:05:48Z |
CVE-2024-32002 | Roronoawjd/git_rce | CVE-2024-32002 POC | 2024-05-21T13:19:15Z |
CVE-2024-32002 | WOOOOONG/CVE-2024-32002 | PoC Exploit for CVE-2024-32002 | 2024-05-23T06:38:34Z |
CVE-2024-32002 | WOOOOONG/hook | PoC Exploit for CVE-2024-32002 | 2024-05-23T06:38:56Z |
CVE-2024-32002 | 10cks/CVE-2024-32002-EXP | no description | 2024-05-23T04:25:51Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-poc-rce | no description | 2024-05-18T11:23:43Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-poc-aw | A POC for CVE-2024-32002 demonstrating arbitrary write into the .git directory. | 2024-05-25T10:30:57Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-submodule-aw | A submodule to demonstrate CVE-2024-32002. Demonstrates arbitrary write into .git. | 2024-05-25T10:29:13Z |
CVE-2024-32002 | JakobTheDev/cve-2024-32002-submodule-rce | no description | 2024-05-18T11:20:31Z |
CVE-2024-32002 | fadhilthomas/poc-cve-2024-32002 | poc of git rce using cve-2024-32002 | 2024-05-23T07:56:05Z |
CVE-2024-32002 | fadhilthomas/hook | part of poc cve-2024-32002 | 2024-05-24T09:23:42Z |
CVE-2024-32002 | Goplush/CVE-2024-32002-git-rce | no description | 2024-05-28T05:27:23Z |
CVE-2024-32002 | AD-Appledog/CVE-2024-32002 | CVE-2024-32002wakuwaku | 2024-05-31T02:40:31Z |
CVE-2024-32002 | AD-Appledog/wakuwaku | cve-2024-32002yahhh | 2024-05-31T02:45:44Z |
CVE-2024-32002 | markuta/CVE-2024-32002 | A proof of concept for the git vulnerability CVE-2024-32002 | 2024-05-17T15:35:50Z |
CVE-2024-32002 | 431m/rcetest | CVE-2024-32002 poc test | 2024-05-30T06:08:33Z |
CVE-2024-32002 | Zhang-Yiiliin/test_cve_2024_32002 | no description | 2024-05-31T08:10:39Z |
CVE-2024-32002 | tobelight/cve_2024_32002 | https://www.cve.org/CVERecord?id=CVE-2024-32002 | 2024-06-01T12:27:50Z |
CVE-2024-32002 | tobelight/cve_2024_32002_hook | no description | 2024-06-01T12:25:04Z |
CVE-2024-32002 | Basyaact/CVE-2024-32002-PoC_Chinese | none | 2024-06-01T20:19:05Z |
CVE-2024-31974 | actuator/com.solarized.firedown | CVE-2024-31974 | 2024-05-17T02:02:00Z |
CVE-2024-31851 | GKalmus/referaat | CVE-2024-31851 | 2024-05-04T16:56:34Z |
CVE-2024-31848 | Stuub/CVE-2024-31848-PoC | PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal | 2024-05-07T10:42:03Z |
CVE-2024-31819 | Chocapikk/CVE-2024-31819 | Unauthenticated Remote Code Execution (RCE) Vulnerability in WWBNIndex Plugin of AVideo Platform from 12.4 to 14.2 | 2024-03-27T14:41:10Z |
CVE-2024-31777 | FreySolarEye/Exploit-CVE-2024-31777 | Public exploit for CVE-2024-31777 | 2024-04-11T13:48:19Z |
CVE-2024-31771 | restdone/CVE-2024-31771 | no description | 2024-04-10T17:09:34Z |
CVE-2024-31734 | HBLocker/CVE-2024-31734 | CVE-2024-31734 | 2024-04-15T07:19:10Z |
CVE-2024-31719 | VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability | no description | 2023-07-30T00:07:14Z |
CVE-2024-3154 | cdxiaodong/CVE-2024-3154-communication | how does it run? | 2024-04-29T04:03:11Z |
CVE-2024-31497 | sh1k4ku/CVE-2024-31497 | A script designed to uncover vulnerabilities in Putty by exploiting CVE-2024-31497. | 2024-04-17T04:00:20Z |
CVE-2024-31497 | edutko/cve-2024-31497 | no description | 2024-04-17T10:43:42Z |
CVE-2024-31497 | HugoBond/CVE-2024-31497-POC | Proof Of Concept that exploits PuTTy CVE-2024-31497. | 2024-05-10T14:30:50Z |
CVE-2024-31351 | KTN1990/CVE-2024-31351_wordpress_exploit | Wordpress - Copymatic – AI Content Writer & Generator <= 1.6 - Unauthenticated Arbitrary File Upload | 2024-05-25T04:02:23Z |
CVE-2024-31210 | Abo5/CVE-2024-31210 | This Ruby script checks if a given WordPress site is vulnerable to CVE-2024-31210, which allows administrator-level users on single-site installations and Super Admin-level users on Multisite installations to execute arbitrary PHP code via the plugin upload mechanism. | 2024-06-13T00:24:56Z |
CVE-2024-3116 | TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4 | Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4 | 2024-04-07T23:03:55Z |
CVE-2024-31025 | mortal-sec/CVE-2024-31025 | Vulnerability verification | 2024-03-28T23:50:30Z |
CVE-2024-30998 | efekaanakkar/CVE-2024-30998 | no description | 2024-03-30T11:18:21Z |
CVE-2024-30973 | Athos-Zago/CVE-2024-30973 | POC VIDEO - https://youtu.be/hNzmkJj-ImM?si=NF0yoSL578rNy7wN | 2024-04-24T16:10:22Z |
CVE-2024-3094 | Fractal-Tess/CVE-2024-3094 | no description | 2024-03-29T23:36:07Z |
CVE-2024-3094 | bioless/xz_cve-2024-3094_detection | Script to detect CVE-2024-3094. | 2024-03-29T23:20:22Z |
CVE-2024-3094 | lypd0/CVE-2024-3094-Vulnerabity-Checker | Verify that your XZ Utils version is not vulnerable to CVE-2024-3094 | 2024-03-29T20:52:27Z |
CVE-2024-3094 | OpensourceICTSolutions/xz_utils-CVE-2024-3094 | no description | 2024-03-29T21:41:42Z |
CVE-2024-3094 | ioprojecton/dir-3040_dos | CVE-2024-27619 | 2024-02-24T19:21:00Z |
CVE-2024-3094 | ashwani95/CVE-2024-3094 | no description | 2024-03-30T15:29:05Z |
CVE-2024-3094 | wgetnz/CVE-2024-3094-check | no description | 2024-03-30T07:38:39Z |
CVE-2024-3094 | Hacker-Hermanos/CVE-2024-3094_xz_check | This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the "xz" utility, as specified by CVE-2024-3094. | 2024-03-29T23:21:44Z |
CVE-2024-3094 | isuruwa/CVE-2024-3094 | CVE-2024-3094 | 2024-03-31T04:50:09Z |
CVE-2024-3094 | hazemkya/CVE-2024-3094-checker | no description | 2024-03-30T21:56:17Z |
CVE-2024-3094 | FabioBaroni/CVE-2024-3094-checker | Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094) | 2024-03-29T20:28:17Z |
CVE-2024-3094 | Horizon-Software-Development/CVE-2024-3094 | no description | 2024-03-30T20:05:13Z |
CVE-2024-3094 | harekrishnarai/xz-utils-vuln-checker | Checker for CVE-2024-3094 where malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. | 2024-03-30T16:25:50Z |
CVE-2024-3094 | zgimszhd61/cve-2024-3094-detect-tool | no description | 2024-04-01T04:28:24Z |
CVE-2024-3094 | galacticquest/cve-2024-3094-detect | no description | 2024-04-01T02:25:33Z |
CVE-2024-3094 | MrBUGLF/XZ-Utils_CVE-2024-3094 | XZ-Utils工具库恶意后门植入漏洞(CVE-2024-3094) | 2024-04-01T01:56:08Z |
CVE-2024-3094 | gayatriracha/CVE-2024-3094-Nmap-NSE-script | no description | 2024-03-31T17:53:11Z |
CVE-2024-3094 | Simplifi-ED/CVE-2024-3094-patcher | Ansible playbook for patching CVE-2024-3094 | 2024-03-31T14:09:28Z |
CVE-2024-3094 | teyhouse/CVE-2024-3094 | K8S and Docker Vulnerability Check for CVE-2024-3094 | 2024-03-30T17:35:49Z |
CVE-2024-3094 | krascovict/OSINT---CVE-2024-3094- | no description | 2024-03-31T12:21:34Z |
CVE-2024-3094 | Yuma-Tsushima07/CVE-2024-3094 | A script to detect if xz is vulnerable - CVE-2024-3094 | 2024-03-31T10:45:44Z |
CVE-2024-3094 | k4t3pr0/Check-CVE-2024-3094 | no description | 2024-03-31T08:14:41Z |
CVE-2024-3094 | devjanger/CVE-2024-3094-XZ-Backdoor-Detector | CVE-2024-3094 XZ Backdoor Detector | 2024-04-02T01:56:29Z |
CVE-2024-3094 | hackingetico21/revisaxzutils | Script en bash para revisar si tienes la vulnerabilidad CVE-2024-3094. | 2024-04-02T01:22:04Z |
CVE-2024-3094 | ackemed/detectar_cve-2024-3094 | no description | 2024-04-01T15:36:58Z |
CVE-2024-3094 | dah4k/CVE-2024-3094 | no description | 2024-04-01T16:42:47Z |
CVE-2024-3094 | byinarie/CVE-2024-3094-info | Information for CVE-2024-3094 | 2024-03-29T17:03:01Z |
CVE-2024-3094 | emirkmo/xz-backdoor-github | History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094. | 2024-03-30T10:48:54Z |
CVE-2024-3094 | brinhosa/CVE-2024-3094-One-Liner | no description | 2024-03-30T23:16:10Z |
CVE-2024-3094 | mesutgungor/xz-backdoor-vulnerability | CVE-2024-3094 | 2024-04-01T09:09:54Z |
CVE-2024-3094 | mightysai1997/CVE-2024-3094 | no description | 2024-04-01T09:06:25Z |
CVE-2024-3094 | mightysai1997/CVE-2024-3094-info | no description | 2024-04-01T09:05:47Z |
CVE-2024-3094 | Mustafa1986/CVE-2024-3094 | no description | 2024-03-31T18:46:58Z |
CVE-2024-3094 | amlweems/xzbot | notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) | 2024-04-01T14:28:09Z |
CVE-2024-3094 | gustavorobertux/CVE-2024-3094 | Checker - CVE-2024-3094 | 2024-04-01T15:15:16Z |
CVE-2024-3094 | pentestfunctions/CVE-2024-3094 | CVE-2024-3094 - Checker (fix for arch etc) | 2024-04-02T08:55:50Z |
CVE-2024-3094 | 0xlane/xz-cve-2024-3094 | XZ Backdoor Extract(Test on Ubuntu 23.10) | 2024-04-01T16:08:50Z |
CVE-2024-3094 | lockness-Ko/xz-vulnerable-honeypot | An ssh honeypot with the XZ backdoor. CVE-2024-3094 | 2024-03-30T22:07:24Z |
CVE-2024-3094 | ScrimForever/CVE-2024-3094 | Detectar CVE-2024-3094 | 2024-04-02T03:36:07Z |
CVE-2024-3094 | Bella-Bc/xz-backdoor-CVE-2024-3094-Check | Verify if your installed version of xz-utils is vulnerable to CVE-2024-3094 backdoor | 2024-04-03T13:09:32Z |
CVE-2024-3094 | MagpieRYL/CVE-2024-3094-backdoor-env-container | This is a container environment running CVE-2024-3094 sshd backdoor instance, working with https://github.com/amlweems/xzbot project. IT IS NOT Docker, just implemented by chroot. | 2024-04-03T10:50:47Z |
CVE-2024-3094 | Security-Phoenix-demo/CVE-2024-3094-fix-exploits | Collection of Detection, Fix, and exploit for CVE-2024-3094 | 2024-04-03T07:51:49Z |
CVE-2024-3094 | weltregie/liblzma-scan | Scans liblzma from xu-utils for backdoor (CVE-2024-3094) | 2024-04-04T11:29:41Z |
CVE-2024-3094 | CyberGuard-Foundation/CVE-2024-3094 | Our current information about the CVE-2024-3094 backdoor. | 2024-04-02T23:10:06Z |
CVE-2024-3094 | TheTorjanCaptain/CVE-2024-3094-Checker | The repository consists of a checker file that confirms if your xz version and xz-utils package is vulnerable to CVE-2024-3094. | 2024-04-03T19:10:43Z |
CVE-2024-3094 | crfearnworks/ansible-CVE-2024-3094 | Ansible playbooks designed to check and remediate CVE-2024-3094 (XZ Backdoor) | 2024-04-04T13:31:20Z |
CVE-2024-3094 | felipecosta09/cve-2024-3094 | A tutorial on how to detect the CVE 2024-3094 | 2024-04-04T06:40:56Z |
CVE-2024-3094 | robertdebock/ansible-playbook-cve-2024-3094 | A small repo with a single playbook. | 2024-04-04T14:52:09Z |
CVE-2024-3094 | iheb2b/CVE-2024-3094-Checker | The CVE-2024-3094 Checker is a Bash tool for identifying if Linux systems are at risk from the CVE-2024-3094 flaw in XZ/LZMA utilities. It checks XZ versions, SSHD's LZMA linkage, and scans for specific byte patterns, delivering results in a concise table format. | 2024-04-03T22:19:50Z |
CVE-2024-3094 | hackintoanetwork/ARC-Browser-Address-Bar-Spoofing-PoC | CVE-2024-25733 - ARC Browser Address Bar Spoofing PoC - iOS/iPadOS | 2024-04-06T20:18:15Z |
CVE-2024-3094 | r0binak/xzk8s | Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094 | 2024-04-02T20:07:14Z |
CVE-2024-3094 | jfrog/cve-2024-3094-tools | no description | 2024-03-31T10:46:33Z |
CVE-2024-3094 | alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer | Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook | 2024-03-30T19:23:30Z |
CVE-2024-3094 | Juul/xz-backdoor-scan | Scan for files containing the signature from the xz backdoor (CVE-2024-3094) |
2024-04-06T06:29:43Z |
CVE-2024-3094 | fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094- | La siguiente regla YARA ayuda a detectar la presencia del backdoor en la librería liblzma comprometida en sistemas que utilizan las versiones 5.6.0 y 5.6.1 de la herramienta de compresión XZ. | 2024-04-13T16:37:32Z |
CVE-2024-3094 | neuralinhibitor/xzwhy | XZ Utils CVE-2024-3094 POC for Kubernetes | 2024-04-18T13:08:05Z |
CVE-2024-3094 | przemoc/xz-backdoor-links | apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links | 2024-04-02T20:17:07Z |
CVE-2024-3094 | reuteras/CVE-2024-3094 | Obsidian notes about CVE-2024-3094 | 2024-04-01T12:41:00Z |
CVE-2024-3094 | robertdebock/ansible-role-cve_2024_3094 | Check xz vulnerability (cve_2024_3094) on your system. | 2024-04-02T08:31:40Z |
CVE-2024-3094 | buluma/ansible-role-cve_2024_3094 | Check xz vulnerability (cve_2024_3094) on your system. | 2024-04-20T06:15:57Z |
CVE-2024-3094 | shefirot/CVE-2024-3094 | Basic POC to test CVE-2024-3094 vulnerability inside K8s cluster | 2024-06-11T14:19:17Z |
CVE-2024-30896 | XenoM0rph97/CVE-2024-30896 | no description | 2024-03-22T16:50:40Z |
CVE-2024-30851 | chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc | Jasmin ransomware web panel path traversal PoC | 2024-04-04T22:59:55Z |
CVE-2024-30850 | chebuya/CVE-2024-30850-chaos-rat-rce-poc | CHAOS RAT web panel path RCE PoC | 2024-04-05T21:35:04Z |
CVE-2024-30737 | yashpatelphd/CVE-2024-30737 | Remote Command Execution Vulnerability in ROS Kinetic Kame | 2024-04-05T11:41:48Z |
CVE-2024-30736 | yashpatelphd/CVE-2024-30736 | Insecure Deserialization Vulnerability in ROS Kinetic Kame | 2024-04-05T11:37:53Z |
CVE-2024-30735 | yashpatelphd/CVE-2024-30735 | Arbitrary File Upload Vulnerability in ROS Kinetic Kame | 2024-04-05T11:35:13Z |
CVE-2024-30733 | yashpatelphd/CVE-2024-30733 | Buffer Overflow Vulnerability in ROS Kinetic Kame | 2024-04-05T11:30:30Z |
CVE-2024-30730 | yashpatelphd/CVE-2024-30730 | Insecure Logging Vulnerability in ROS Kinetic Kame | 2024-04-05T11:23:45Z |
CVE-2024-30729 | yashpatelphd/CVE-2024-30729 | OS Command Injection Vulnerability in ROS Kinetic Kame | 2024-04-05T11:20:26Z |
CVE-2024-30728 | yashpatelphd/CVE-2024-30728 | Security Misconfiguration in ROS Kinetic Kame | 2024-04-05T11:18:00Z |
CVE-2024-30727 | yashpatelphd/CVE-2024-30727 | Information Leakage in ROS Kinetic Kame via Plaintext Message Transmission | 2024-04-05T11:14:44Z |
CVE-2024-30726 | yashpatelphd/CVE-2024-30726 | Shell Injection Vulnerability in ROS Kinetic Kame | 2024-04-05T11:11:38Z |
CVE-2024-30724 | yashpatelphd/CVE-2024-30724 | Unauthorized Information Access Vulnerability in ROS Kinetic Kame | 2024-04-05T11:06:04Z |
CVE-2024-30723 | yashpatelphd/CVE-2024-30723 | Unauthorized Node Injection Vulnerability in ROS Kinetic Kame | 2024-04-05T11:02:29Z |
CVE-2024-30722 | yashpatelphd/CVE-2024-30722 | Denial-of-Service (DoS) Vulnerability in ROS Kinetic Kame | 2024-04-05T10:59:20Z |
CVE-2024-30721 | yashpatelphd/CVE-2024-30721 | Arbitrary File Upload Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:18:56Z |
CVE-2024-30719 | yashpatelphd/CVE-2024-30719 | Insecure Deserialization Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:13:48Z |
CVE-2024-30718 | yashpatelphd/CVE-2024-30718 | Remote Command Execution Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:10:33Z |
CVE-2024-30716 | yashpatelphd/CVE-2024-30716 | Insecure Logging Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:03:00Z |
CVE-2024-30715 | yashpatelphd/CVE-2024-30715 | Buffer Overflow Vulnerability in ROS2 Dashing Diademata | 2024-04-05T09:00:47Z |
CVE-2024-30713 | yashpatelphd/CVE-2024-30713 | OS Command Injection Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:55:12Z |
CVE-2024-30712 | yashpatelphd/CVE-2024-30712 | Shell Injection Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:51:04Z |
CVE-2024-30711 | yashpatelphd/CVE-2024-30711 | Security Misconfiguration in ROS2 Dashing Diademata | 2024-04-05T08:47:00Z |
CVE-2024-30710 | yashpatelphd/CVE-2024-30710 | Information Leakage in ROS2 Dashing Diademata via Plaintext Message Transmission | 2024-04-05T08:44:11Z |
CVE-2024-30708 | yashpatelphd/CVE-2024-30708 | Denial-of-Service (DoS) Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:35:00Z |
CVE-2024-30707 | yashpatelphd/CVE-2024-30707 | Unauthorized Node Injection Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:31:34Z |
CVE-2024-30706 | yashpatelphd/CVE-2024-30706 | Unauthorized Access Vulnerability in ROS2 Dashing Diademata | 2024-04-05T08:28:29Z |
CVE-2024-30704 | yashpatelphd/CVE-2024-30704 | Insecure Deserialization Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:53:14Z |
CVE-2024-30703 | yashpatelphd/CVE-2024-30703 | Arbitrary File Upload Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:50:36Z |
CVE-2024-30702 | yashpatelphd/CVE-2024-30702 | Remote Command Execution Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:47:50Z |
CVE-2024-30701 | yashpatelphd/CVE-2024-30701 | Insecure Logging Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:44:57Z |
CVE-2024-30699 | yashpatelphd/CVE-2024-30699 | Buffer Overflow Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:40:30Z |
CVE-2024-30697 | yashpatelphd/CVE-2024-30697 | Information Leakage in ROS2 Galactic Geochelone via Plaintext Message Transmission | 2024-04-05T07:34:53Z |
CVE-2024-30696 | yashpatelphd/CVE-2024-30696 | OS Command Injection Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:32:26Z |
CVE-2024-30695 | yashpatelphd/CVE-2024-30695 | Security Misconfiguration in ROS2 Galactic Geochelone | 2024-04-05T07:29:59Z |
CVE-2024-30694 | yashpatelphd/CVE-2024-30694 | Shell Injection Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:26:05Z |
CVE-2024-30692 | yashpatelphd/CVE-2024-30692 | Denial-of-Service (DoS) Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:21:20Z |
CVE-2024-30691 | yashpatelphd/CVE-2024-30691 | Unauthorized Access Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:18:11Z |
CVE-2024-30690 | yashpatelphd/CVE-2024-30690 | Unauthorized Node Injection Vulnerability in ROS2 Galactic Geochelone | 2024-04-05T07:13:52Z |
CVE-2024-30688 | yashpatelphd/CVE-2024-30688 | Arbitrary File Upload Vulnerability in ROS2 Iron Irwini | 2024-04-05T07:07:24Z |
CVE-2024-30687 | yashpatelphd/CVE-2024-30687 | Insecure Deserialization Vulnerability in ROS2 Iron Irwini | 2024-04-05T07:04:36Z |
CVE-2024-30686 | yashpatelphd/CVE-2024-30686 | Remote Command Execution Vulnerability in ROS2 Iron Irwini | 2024-04-05T07:00:40Z |
CVE-2024-30684 | yashpatelphd/CVE-2024-30684 | Insecure Logging Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:48:46Z |
CVE-2024-30683 | yashpatelphd/CVE-2024-30683 | Buffer Overflow Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:45:50Z |
CVE-2024-30681 | yashpatelphd/CVE-2024-30681 | OS Command Injection Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:39:18Z |
CVE-2024-30680 | yashpatelphd/CVE-2024-30680 | Shell Injection Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:36:11Z |
CVE-2024-30679 | yashpatelphd/CVE-2024-30679 | Security Misconfiguration in ROS2 Iron Irwini | 2024-04-05T06:33:28Z |
CVE-2024-30678 | yashpatelphd/CVE-2024-30678 | Information Leakage in ROS2 Iron Irwini via Plaintext Message Transmission | 2024-04-05T06:29:53Z |
CVE-2024-30676 | yashpatelphd/CVE-2024-30676 | Denial-of-Service (DoS) Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:24:24Z |
CVE-2024-30675 | yashpatelphd/CVE-2024-30675 | Unauthorized Node Injection Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:21:37Z |
CVE-2024-30674 | yashpatelphd/CVE-2024-30674 | Unauthorized Information Access Vulnerability in ROS2 Iron Irwini | 2024-04-05T06:17:48Z |
CVE-2024-30672 | yashpatelphd/CVE-2024-30672 | Arbitrary File Upload Vulnerability in ROS Melodic Morenia | 2024-04-05T06:07:36Z |
CVE-2024-30667 | yashpatelphd/CVE-2024-30667 | Insecure Deserialization Vulnerability in ROS Melodic Morenia | 2024-04-05T05:53:01Z |
CVE-2024-30666 | yashpatelphd/CVE-2024-30666 | Buffer Overflow Vulnerability in ROS Melodic Morenia | 2024-04-05T05:49:12Z |
CVE-2024-30665 | yashpatelphd/CVE-2024-30665 | OS Command Injection Vulnerability in ROS Melodic Morenia | 2024-04-05T05:45:12Z |
CVE-2024-30663 | yashpatelphd/CVE-2024-30663 | Security Misconfiguration in ROS Melodic Morenia | 2024-04-05T05:39:58Z |
CVE-2024-30662 | yashpatelphd/CVE-2024-30662 | Information Leakage in ROS Melodic Morenia via Plaintext Message Transmission | 2024-04-05T05:36:29Z |
CVE-2024-30661 | yashpatelphd/CVE-2024-30661 | Unauthorized Information Access Vulnerability in ROS Melodic Morenia | 2024-04-05T05:32:35Z |
CVE-2024-30659 | yashpatelphd/CVE-2024-30659 | Shell Injection Vulnerability in ROS Melodic Morenia | 2024-04-05T05:23:02Z |
CVE-2024-30658 | yashpatelphd/CVE-2024-30658 | Denial-of-Service (DoS) Vulnerability in ROS Melodic Morenia | 2024-04-05T05:17:00Z |
CVE-2024-30657 | yashpatelphd/CVE-2024-30657 | Unauthorized Node Injection Vulnerability in ROS Melodic Morenia | 2024-04-05T05:07:42Z |
CVE-2024-30657 | badsectorlabs/ludus_xz_backdoor | An Ansible Role that installs the xz backdoor (CVE-2024-3094) on a Debian host and optionally installs the xzbot tool. | 2024-04-05T01:44:26Z |
CVE-2024-30656 | Yashodhanvivek/Firebolt-wristphone-vulnerability | This repository is for Firebolt wristphone vulnerability for CVE ID CVE-2024-30656 suggested by MITRE. Mitre yet to confirm on ID | 2024-04-08T17:05:39Z |
CVE-2024-30614 | Lucky-lm/CVE-2024-30614 | no description | 2024-04-06T08:26:04Z |
CVE-2024-30491 | truonghuuphuc/CVE-2024-30491-Poc | CVE-2024-30491 ProfileGrid <= 5.7.8 - Authenticated (Subscriber+) SQL Injection | 2024-05-04T14:22:15Z |
CVE-2024-30212 | Fehr-GmbH/blackleak | CVE-2024-30212 | 2024-06-11T09:13:16Z |
CVE-2024-30056 | absholi7ly/Microsoft-Edge-Information-Disclosure | CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 2024-05-27T06:37:34Z |
CVE-2024-30043 | W01fh4cker/CVE-2024-30043-XXE | Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing | 2024-06-06T18:31:57Z |
CVE-2024-29988 | Sploitus/CVE-2024-29988-exploit | Exploit for Microsoft SmartScreen malicious execution (april 2024) | 2024-05-03T12:17:25Z |
CVE-2024-29895 | secunnix/CVE-2024-29895 | Cacti CVE-2024-29895 POC | 2024-05-16T06:29:21Z |
CVE-2024-29895 | Stuub/CVE-2024-29895-CactiRCE-PoC | CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds | 2024-05-15T13:11:45Z |
CVE-2024-29895 | ticofookfook/CVE-2024-29895.py | no description | 2024-05-16T20:03:03Z |
CVE-2024-29895 | Rubioo02/CVE-2024-29895 | CVE-2024-29895 - RCE on CACTI 1.3.X dev | 2024-05-17T22:03:29Z |
CVE-2024-29849 | sinsinology/CVE-2024-29849 | Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849) | 2024-06-10T06:12:20Z |
CVE-2024-29824 | horizon3ai/CVE-2024-29824 | Ivanti EPM SQL Injection Remote Code Execution Vulnerability | 2024-06-12T13:53:32Z |
CVE-2024-2961 | mattaperkins/FIX-CVE-2024-2961 | Quick mitigation script | 2024-04-24T07:32:08Z |
CVE-2024-2961 | rvizx/CVE-2024-2961 | CVE-2024–2961 Security Issue Mitigation Script | 2024-05-20T06:53:23Z |
CVE-2024-2961 | ambionics/cnext-exploits | Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() | 2024-05-27T08:30:06Z |
CVE-2024-2961 | absolutedesignltd/iconvfix | Bash script to patch for CVE-2024-2961 | 2024-05-30T13:45:43Z |
CVE-2024-2961 | exfil0/test_iconv | This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc. | 2024-06-03T23:53:43Z |
CVE-2024-2961 | kjdfklha/CVE-2024-2961_poc | no description | 2024-06-04T09:57:46Z |
CVE-2024-2961 | tnishiox/cve-2024-2961 | no description | 2024-06-04T08:05:09Z |
CVE-2024-29455 | yashpatelphd/CVE-2024-29455 | Arbitrary File Upload Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:54:01Z |
CVE-2024-29454 | yashpatelphd/CVE-2024-29454 | Remote Command Execution Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:49:26Z |
CVE-2024-29452 | yashpatelphd/CVE-2024-29452 | Insecure Deserialization Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:44:28Z |
CVE-2024-29450 | yashpatelphd/CVE-2024-29450 | Privilege Escalation in ROS2 Humble Hawksbill | 2024-03-21T14:37:07Z |
CVE-2024-29449 | yashpatelphd/CVE-2024-29449 | Cleartext Transmission Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:32:10Z |
CVE-2024-29448 | yashpatelphd/CVE-2024-29448 | Buffer Overflow Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:25:35Z |
CVE-2024-29447 | yashpatelphd/CVE-2024-29447 | Security Misconfiguration in ROS2 Humble Hawksbill | 2024-03-21T14:22:28Z |
CVE-2024-29445 | yashpatelphd/CVE-2024-29445 | Information Leakage in ROS2 Humble Hawksbill via Plaintext Message Transmission | 2024-03-21T14:17:57Z |
CVE-2024-29444 | yashpatelphd/CVE-2024-29444 | OS Command Injection Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:14:51Z |
CVE-2024-29443 | yashpatelphd/CVE-2024-29443 | Shell Injection Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T14:05:43Z |
CVE-2024-29442 | yashpatelphd/CVE-2024-29442 | Unauthorized Information Access Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:52:18Z |
CVE-2024-29441 | yashpatelphd/CVE-2024-29441 | Denial-of-Service (DoS) Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:31:50Z |
CVE-2024-29440 | yashpatelphd/CVE-2024-29440 | Unauthorized Access Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:48:01Z |
CVE-2024-29439 | yashpatelphd/CVE-2024-29439 | Unauthorized Node Injection Vulnerability in ROS2 Humble Hawksbill | 2024-03-21T13:43:22Z |
CVE-2024-29399 | ally-petitt/CVE-2024-29399 | CVE-2024-29399 reference | 2024-04-08T23:03:04Z |
CVE-2024-29375 | ismailcemunver/CVE-2024-29375 | CSV Injection in Addactis IBNRS 3.10.3.107 | 2024-03-11T16:32:41Z |
CVE-2024-29296 | ThaySolis/CVE-2024-29296 | CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4 | 2024-04-09T20:36:03Z |
CVE-2024-29296 | Lavender-exe/CVE-2024-29296-PoC | User Enumeration through response time difference | 2024-04-29T19:09:41Z |
CVE-2024-29272 | awjkjflkwlekfdjs/CVE-2024-29272 | no description | 2024-03-25T22:43:42Z |
CVE-2024-29269 | wutalent/CVE-2024-29269 | CVE-2024-29269 | 2024-04-03T02:02:27Z |
CVE-2024-29269 | YongYe-Security/CVE-2024-29269 | Telesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit | 2024-04-12T07:36:08Z |
CVE-2024-29269 | Chocapikk/CVE-2024-29269 | An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter. | 2024-05-19T19:05:00Z |
CVE-2024-29197 | mansploit/CVE-2024-29197-exploit | TENDA ROUTER AC10 - RCE (full research) | 2024-03-25T09:47:01Z |
CVE-2024-29194 | mansploit/CVE-2024-29194-POC | exploit for OneUptime - grab the master_key, escalate to admin | 2024-03-25T09:29:37Z |
CVE-2024-28995 | bigb0x/CVE-2024-28995 | CVE-2024-28995 POC Vulnerability Scanner | 2024-06-14T23:05:40Z |
CVE-2024-28995 | 0xc4t/CVE-2024-28995 | Exploit for CVE-2024-28995 | 2024-06-14T08:04:48Z |
CVE-2024-28995 | huseyinstif/CVE-2024-28995-Nuclei-Template | no description | 2024-06-14T08:01:13Z |
CVE-2024-28995 | ggfzx/CVE-2024-28995 | no description | 2024-06-14T07:56:03Z |
CVE-2024-28995 | krypton-kry/CVE-2024-28995 | CVE-2024-28995 PoC | 2024-06-14T04:06:58Z |
CVE-2024-2879 | herculeszxc/CVE-2024-2879 | CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection | 2024-04-08T18:50:02Z |
CVE-2024-2879 | nickswink/D-Link-NAS-Devices-Unauthenticated-RCE | UNTESTED exploit script for CVE-2024-3272 + CVE-2024-3273. The script exploits a backdoor authentication bypass + arbitrary command injection vulnerability. | 2024-04-08T13:54:07Z |
CVE-2024-2876 | c0d3zilla/CVE-2024-2876 | POC for SQLi vulnerability in Icegram express | 2024-04-25T09:53:22Z |
CVE-2024-28757 | krnidhi/expat_2.1.1_CVE-2024-28757 | no description | 2024-05-03T04:58:24Z |
CVE-2024-28757 | saurabh2088/expat_2_1_1_CVE-2024-28757 | no description | 2024-05-03T10:11:38Z |
CVE-2024-28757 | RenukaSelvar/expat_CVE-2024-28757 | no description | 2024-05-03T09:21:27Z |
CVE-2024-28757 | saurabh2088/expat_2_1_0_CVE-2024-28757 | no description | 2024-05-03T09:24:51Z |
CVE-2024-28741 | chebuya/CVE-2024-28741-northstar-agent-rce-poc | Agent RCE PoC for CVE-2024-28741, a stored XSS vulnerability in NorthStar C2. | 2024-03-12T01:40:35Z |
CVE-2024-28715 | Lq0ne/CVE-2024-28715 | no description | 2024-03-13T01:59:57Z |
CVE-2024-2865 | RobertSecurity/CVE-2024-2865-CRITICAL | [CRITICAL] Mergen Software QMS Exploit SQL injection to RFI (Remote File Inclusion) | 2024-03-26T08:20:07Z |
CVE-2024-28589 | Alaatk/CVE-2024-28589 | Local Privilege Escalation Vulnerability on Axigen for Windows | 2024-04-03T15:31:02Z |
CVE-2024-2856 | Schnaidr/CVE-2024-2856-Stack-overflow-EXP | Tenda AC10 Router exploit stack-based buffer overflow | 2024-03-25T14:34:26Z |
CVE-2024-2856 | codewhitesec/HttpRemotingObjRefLeak | Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059) | 2024-03-11T10:14:39Z |
CVE-2024-28515 | heshi906/CVE-2024-28515 | A vuln about csapp. | 2024-03-19T01:53:48Z |
CVE-2024-28515 | bsekercioglu/cve2024-3094-Checker | no description | 2024-03-30T11:49:27Z |
CVE-2024-28397 | Marven11/CVE-2024-28397 | to be released | 2024-03-22T04:29:34Z |
CVE-2024-28255 | YongYe-Security/CVE-2024-28255 | OpenMetadata_RCE (CVE-2024-28255) Batch scan/exploit | 2024-04-12T04:29:58Z |
CVE-2024-28247 | T0X1Cx/CVE-2024-28247-Pi-hole-Arbitrary-File-Read | This repository provides an exploit for CVE-2024-28247, highlighting a vulnerability that permits a remote attacker to read arbitrary files on the system. | 2024-03-31T15:25:15Z |
CVE-2024-28213 | 0x1x02/CVE-2024-28213 | Here's a brief description of CVE-2024-28213: "CVE-2024-28213 is a critical vulnerability affecting versions prior to 3.5.9 of nGrinder. It allows unauthenticated users to send serialized Java objects to the application, potentially leading to the execution of arbitrary code through unsafe Java object deserialization. | 2024-03-07T17:38:41Z |
CVE-2024-28213 | bsekercioglu/cve2024-21762-ShodanChecker | no description | 2024-03-07T13:13:21Z |
CVE-2024-28088 | levpachmanov/cve-2024-28088-poc | no description | 2024-03-14T07:02:11Z |
CVE-2024-28085 | skyler-ferrante/CVE-2024-28085 | WallEscape vulnerability in util-linux | 2024-03-11T00:15:03Z |
CVE-2024-27983 | lirantal/CVE-2024-27983-nodejs-http2 | CVE-2024-27983 this repository builds up a vulnerable HTTP2 Node.js server (server-nossl.js ) based on CVE-2024-27983 which exploits a continuation flood vulnerability in HTTP2 servers. |
2024-04-14T11:34:52Z |
CVE-2024-27972 | truonghuuphuc/CVE-2024-27972-Poc | CVE-2024-27972 WP Fusion Lite <= 3.41.24 - Authenticated (Contributor+) Remote Code Execution | 2024-05-18T14:17:34Z |
CVE-2024-27971 | truonghuuphuc/CVE-2024-27971-Note | CVE-2024-27971 WordPress Premmerce Permalink Manager for WooCommerce Plugin <= 2.3.10 is vulnerable to Local File Inclusion | 2024-05-03T13:38:33Z |
CVE-2024-27956 | truonghuuphuc/CVE-2024-27956 | CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection | 2024-04-27T11:03:36Z |
CVE-2024-27956 | X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN | CVE-2024-27956 WORDPRESS RCE PLUGIN | 2024-05-03T16:19:19Z |
CVE-2024-27956 | diego-tella/CVE-2024-27956-RCE | PoC for SQL Injection in CVE-2024-27956 | 2024-05-01T01:58:28Z |
CVE-2024-27956 | k3ppf0r/CVE-2024-27956 | CVE-2024-27956 | 2024-05-07T10:07:00Z |
CVE-2024-27956 | FoxyProxys/CVE-2024-27956 | no description | 2024-05-05T19:50:54Z |
CVE-2024-27956 | W3BW/CVE-2024-27956-RCE-File-Package | no description | 2024-05-15T07:48:54Z |
CVE-2024-27956 | AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956 | WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries | 2024-05-14T14:21:49Z |
CVE-2024-27956 | itzheartzz/MASS-CVE-2024-27956 | no description | 2024-06-09T07:21:44Z |
CVE-2024-27956 | cve-2024/CVE-2024-27956-RCE | no description | 2024-06-14T07:13:54Z |
CVE-2024-27956 | TadashiJei/Valve-Press-CVE-2024-27956-RCE | Valve Press - CVE-2024-27956-RCE - SQL Injection | 2024-06-13T02:05:31Z |
CVE-2024-27804 | R00tkitSMM/CVE-2024-27804 | POC for CVE-2024-27804 | 2024-05-14T14:17:06Z |
CVE-2024-27697 | SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697 | Arbitrary Code Execution on FuguHub 8.4 | 2024-03-09T22:24:03Z |
CVE-2024-27674 | Alaatk/CVE-2024-27674 | Macro Expert <= 4.9.4 - Insecure Permissions Privilege Escalation | 2024-04-03T15:16:09Z |
CVE-2024-27673 | Alaatk/CVE-2024-27673 | ASUS Control Center Express =< 01.06.15 - Unquoted Service Path | 2024-04-03T14:47:20Z |
CVE-2024-27665 | Thirukrishnan/CVE-2024-27665 | no description | 2024-03-11T04:46:19Z |
CVE-2024-27632 | ally-petitt/CVE-2024-27632 | CVE-2024–27632 Reference | 2024-04-06T23:42:30Z |
CVE-2024-27631 | ally-petitt/CVE-2024-27631 | CVE-2024–27631 Reference | 2024-04-06T23:30:01Z |
CVE-2024-27630 | ally-petitt/CVE-2024-27630 | CVE-2024–27630 Reference | 2024-04-07T00:13:13Z |
CVE-2024-27518 | secunnix/CVE-2024-27518 | SUPERAntiSpyware Professional X <=10.0.1264 LPE Vulnerability PoC | 2024-04-03T13:41:18Z |
CVE-2024-27462 | Alaatk/CVE-2024-27462 | Wondershare MobileTrans 4.5.6 - Unquoted Service Path | 2024-04-13T06:27:28Z |
CVE-2024-27460 | xct/CVE-2024-27460 | Plantronics Desktop Hub LPE | 2024-05-12T09:53:07Z |
CVE-2024-27460 | Alaatk/CVE-2024-27460 | HP Plantronics Hub 3.2.1 Updater Privilege Escalation | 2024-05-13T11:15:14Z |
CVE-2024-27460 | 10cks/CVE-2024-27460-installer | no description | 2024-05-18T02:25:11Z |
CVE-2024-27348 | kljunowsky/CVE-2024-27348 | Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit | 2024-06-03T19:08:24Z |
CVE-2024-27348 | Zeyad-Azima/CVE-2024-27348 | Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 ) | 2024-05-31T20:11:37Z |
CVE-2024-27348 | jakabakos/CVE-2024-27348-Apache-HugeGraph-RCE | no description | 2024-06-12T08:14:39Z |
CVE-2024-27316 | lockness-Ko/CVE-2024-27316 | Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested) | 2024-04-09T08:08:07Z |
CVE-2024-27316 | aeyesec/CVE-2024-27316_poc | no description | 2024-04-17T20:08:05Z |
CVE-2024-27282 | Abo5/CVE-2024-27282 | script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/ | 2024-06-12T23:54:03Z |
CVE-2024-27198 | W01fh4cker/CVE-2024-27198-RCE | CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4 | 2024-03-06T03:15:03Z |
CVE-2024-27198 | rampantspark/CVE-2024-27198 | A PoC for CVE-2024-27198 written in golang | 2024-03-07T15:12:56Z |
CVE-2024-27198 | K3ysTr0K3R/CVE-2024-27198-EXPLOIT | A PoC exploit for CVE-2024-27198 - JetBrains TeamCity Authentication Bypass | 2024-03-09T22:04:07Z |
CVE-2024-27198 | CharonDefalt/CVE-2024-27198-RCE | no description | 2024-03-09T04:04:23Z |
CVE-2024-27198 | passwa11/CVE-2024-27198-RCE | no description | 2024-03-08T12:40:09Z |
CVE-2024-27198 | yoryio/CVE-2024-27198 | Exploit for CVE-2024-27198 - TeamCity Server | 2024-03-05T05:43:06Z |
CVE-2024-27198 | Chocapikk/CVE-2024-27198 | Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4 | 2024-03-04T22:44:36Z |
CVE-2024-27198 | Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198- | Em fevereiro de 2024, foi identificado duas novas vulnerabilidades que afetam o servidor JetBrains TeamCity (CVE-2024-27198 e CVE-2024-27199) | 2024-04-02T09:46:51Z |
CVE-2024-27198 | Stuub/RCity-CVE-2024-27198 | CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information | 2024-04-22T22:14:24Z |
CVE-2024-27173 | Ieakd/0day-POC-for-CVE-2024-27173 | no description | 2024-06-14T07:04:46Z |
CVE-2024-27130 | watchtowrlabs/CVE-2024-27130 | PoC for CVE-2024-27130 | 2024-05-17T07:58:01Z |
CVE-2024-27130 | d0rb/CVE-2024-27130 | This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS | 2024-05-21T11:14:22Z |
CVE-2024-26817 | MaherAzzouzi/CVE-2024-26817-amdkfd | Potential Integer Overflow Leading To Heap Overflow in AMD KFD. | 2024-04-14T12:25:50Z |
CVE-2024-2667 | Puvipavan/CVE-2024-2667 | This is POC for CVE-2024-2667 (InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload) | 2024-04-28T17:14:47Z |
CVE-2024-26574 | Alaatk/CVE-2024-26574 | Wondershare Filmora v.13.0.51 - Insecure Permissions Privilege Escalation | 2024-04-04T13:44:08Z |
CVE-2024-26560 | sajaljat/CVE-2024-26560 | (XSS) | 2024-02-26T12:03:43Z |
CVE-2024-26535 | sajaljat/CVE-2024-26535 | (XSS) | 2024-02-26T12:02:10Z |
CVE-2024-26534 | sajaljat/CVE-2024-26534 | no description | 2024-02-26T11:59:59Z |
CVE-2024-26521 | hackervegas001/CVE-2024-26521 | Html Injection vulnearbility in CE-Phoenix-v1.0.8.20 where malicious HTML code is inserted into a website. This can lead to a variety of issues, from minor website defacement to serious data breaches. | 2024-02-16T05:40:33Z |
CVE-2024-26503 | RoboGR00t/Exploit-CVE-2024-26503 | Exploit for Open eClass – CVE-2024-26503: Unrestricted File Upload Leads to Remote Code Execution | 2024-03-15T13:01:43Z |
CVE-2024-26475 | TronciuVlad/CVE-2024-26475 | An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. | 2024-03-10T22:51:05Z |
CVE-2024-26304 | Roud-Roud-Agency/CVE-2024-26304-RCE-exploits | Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024) | 2024-05-04T10:09:24Z |
CVE-2024-26229 | RalfHacker/CVE-2024-26229-exploit | Windows LPE | 2024-06-11T08:03:29Z |
CVE-2024-26229 | team-MineDEV/CVE-2024-26229 | Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。 | 2024-06-16T05:06:31Z |
CVE-2024-26229 | apkc/CVE-2024-26229-BOF | BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel | 2024-06-13T11:57:50Z |
CVE-2024-26218 | exploits-forsale/CVE-2024-26218 | Proof-of-Concept for CVE-2024-26218 | 2024-04-26T16:41:04Z |
CVE-2024-26026 | passwa11/CVE-2024-26026 | CVE-2024-26026: BIG-IP Next Central Manager API UNAUTHENTICATED SQL INJECTION | 2024-05-09T03:14:14Z |
CVE-2024-26026 | GRTMALDET/Big-IP-Next-CVE-2024-26026 | no description | 2024-05-13T22:04:01Z |
CVE-2024-25832 | 0xNslabs/CVE-2024-25832-PoC | PoC Script for CVE-2024-25832: Exploit chain reverse shell, information disclosure (root password leak) + unrestricted file upload in DataCube3 | 2024-03-06T04:11:59Z |
CVE-2024-25809 | sajaljat/CVE-2024-25809 | (XSS) | 2024-02-17T12:16:29Z |
CVE-2024-25735 | codeb0ss/CVE-2024-25735-PoC | CVE-2024-25735 - WyreStorm Apollo VX20 - Information Disclosure | 2024-02-16T12:03:20Z |
CVE-2024-25731 | actuator/com.cn.dq.ipc | CVE-2024-25731 | 2024-02-06T04:38:12Z |
CVE-2024-25723 | david-botelho-mariano/exploit-CVE-2024-25723 | no description | 2024-03-20T01:28:09Z |
CVE-2024-25600 | Tornad0007/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands. | 2024-02-22T10:53:45Z |
CVE-2024-25600 | Christbowel/CVE-2024-25600_Nuclei-Template | Nuclei template and information about the POC for CVE-2024-25600 | 2024-02-21T00:27:33Z |
CVE-2024-25600 | Chocapikk/CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 | 2024-02-20T20:16:09Z |
CVE-2024-25600 | hy011121/CVE-2024-25600-wordpress-Exploit-RCE | (Mirorring) | 2024-02-29T20:53:42Z |
CVE-2024-25600 | K3ysTr0K3R/CVE-2024-25600-EXPLOIT | A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE) | 2024-03-01T09:28:08Z |
CVE-2024-25600 | 0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands. | 2024-04-17T15:21:01Z |
CVE-2024-25600 | X-Projetion/WORDPRESS-CVE-2024-25600-EXPLOIT-RCE | WORDPRESS-CVE-2024-25600-EXPLOIT-RCE - WordPress Bricks Builder Remote Code Execution (RCE) | 2024-04-20T06:36:22Z |
CVE-2024-25600 | RHYru9/CVE-2024-25600-mass | no description | 2024-05-05T02:18:00Z |
CVE-2024-25600 | ivanbg2004/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress | 0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit | 2024-06-02T10:49:03Z |
CVE-2024-25600 | k3lpi3b4nsh33/CVE-2024-25600 | no description | 2024-06-06T02:13:06Z |
CVE-2024-25600 | WanLiChangChengWanLiChang/CVE-2024-25600 | no description | 2024-06-06T03:59:06Z |
CVE-2024-25466 | FixedOctocat/CVE-2024-25466 | Description for CVE-2024-25466 | 2024-02-15T07:47:14Z |
CVE-2024-25423 | DriverUnload/cve-2024-25423 | Cinema 4D out-of-bounds write vulnerability when parsing c4d files | 2024-02-18T06:35:31Z |
CVE-2024-25381 | Ox130e07d/CVE-2024-25381 | no description | 2024-02-01T11:42:48Z |
CVE-2024-25376 | ewilded/CVE-2024-25376-POC | CVE-2024-25376 - Local Privilege Escalation in TUSBAudio | 2024-02-24T09:30:45Z |
CVE-2024-25281 | sajaljat/CVE-2024-25281 | (XSS) | 2024-02-17T12:14:56Z |
CVE-2024-25280 | sajaljat/CVE-2024-25280 | Broken Access control | 2024-02-17T12:11:58Z |
CVE-2024-25279 | sajaljat/CVE-2024-25279 | (XSS) | 2024-02-17T12:10:12Z |
CVE-2024-25278 | sajaljat/CVE-2024-25278 | no description | 2024-02-17T11:59:51Z |
CVE-2024-25277 | maen08/CVE-2024-25277 | Resources and PoCs | 2024-02-25T16:54:33Z |
CVE-2024-25270 | fbkcs/CVE-2024-25270 | for future article of research vulnerability in MIRAPOLIS LMS | 2024-02-22T08:18:47Z |
CVE-2024-25270 | W01fh4cker/ScreenConnect-AuthBypass-RCE | ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!! | 2024-02-21T09:42:04Z |
CVE-2024-25251 | ASR511-OO7/CVE-2024-25251 | no description | 2024-02-20T10:03:29Z |
CVE-2024-25250 | ASR511-OO7/CVE-2024-25250. | no description | 2024-03-06T11:11:24Z |
CVE-2024-25249 | intbjw/CVE-2024-25249 | An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. | 2024-02-21T08:19:00Z |
CVE-2024-25227 | thetrueartist/ABO.CMS-Login-SQLi-CVE-2024-25227 | no description | 2024-02-23T16:46:54Z |
CVE-2024-25227 | thetrueartist/ABO.CMS-EXPLOIT-Unauthenticated-Login-Bypass-CVE-2024-25227 | no description | 2024-03-13T17:58:41Z |
CVE-2024-25202 | Agampreet-Singh/CVE-2024-25202 | A vulnerability was found in PHPgurukul visitor management system 1.0. it has been rated as problemic. Affected by the issue is some unknown functionality of the file search bar that called search-result.php and search-visitor.php . The vulnerability is Cross-Site-Scripting (XSS). | 2024-02-20T18:19:53Z |
CVE-2024-25175 | jet-pentest/CVE-2024-25175 | no description | 2024-03-22T11:54:36Z |
CVE-2024-25170 | shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 | no description | 2024-02-25T12:28:49Z |
CVE-2024-25169 | shenhav12/CVE-2024-25169-Mezzanine-v6.0.0 | no description | 2024-02-25T12:21:40Z |
CVE-2024-25153 | rainbowhatrkn/CVE-2024-25153 | Proof-of-concept exploit for CVE-2024-25153. | 2024-03-18T09:02:56Z |
CVE-2024-25153 | nettitude/CVE-2024-25153 | Proof-of-concept exploit for CVE-2024-25153. | 2024-03-12T17:26:10Z |
CVE-2024-25092 | RandomRobbieBF/CVE-2024-25092 | NextMove Lite < 2.18.0 - Subscriber+ Arbitrary Plugin Installation/Activation | 2024-02-14T11:30:59Z |
CVE-2024-24919 | P3wc0/CVE-2024-24919 | no description | 2024-05-31T01:14:19Z |
CVE-2024-24919 | am-eid/CVE-2024-24919 | no description | 2024-05-30T23:52:53Z |
CVE-2024-24919 | Bytenull00/CVE-2024-24919 | Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT | 2024-05-30T20:14:19Z |
CVE-2024-24919 | emanueldosreis/CVE-2024-24919 | POC exploit for CVE-2024-24919 information leakage | 2024-05-30T14:41:32Z |
CVE-2024-24919 | LucasKatashi/CVE-2024-24919 | CVE-2024-24919 Exploit PoC | 2024-05-30T16:23:18Z |
CVE-2024-24919 | hendprw/CVE-2024-24919 | no description | 2024-05-30T15:40:11Z |
CVE-2024-24919 | c3rrberu5/CVE-2024-24919 | Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN. | 2024-05-30T07:55:53Z |
CVE-2024-24919 | nexblade12/CVE-2024-24919 | no description | 2024-05-31T17:41:08Z |
CVE-2024-24919 | GlobalsecureAcademy/CVE-2024-24919 | Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs | 2024-05-31T17:14:48Z |
CVE-2024-24919 | GoatSecurity/CVE-2024-24919 | CVE-2024-24919 exploit | 2024-05-31T13:11:40Z |
CVE-2024-24919 | smackerdodi/CVE-2024-24919-nuclei-templater | Nuclei template for CVE-2024-24919 | 2024-05-31T12:33:34Z |
CVE-2024-24919 | Vulnpire/CVE-2024-24919 | no description | 2024-05-31T11:29:03Z |
CVE-2024-24919 | satriarizka/CVE-2024-24919 | A simple bash and python script to check for the vulnerability CVE-2024-24919 | 2024-05-31T08:01:13Z |
CVE-2024-24919 | zam89/CVE-2024-24919 | Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point) | 2024-05-31T07:59:17Z |
CVE-2024-24919 | 0x3f3c/CVE-2024-24919 | no description | 2024-05-31T12:08:28Z |
CVE-2024-24919 | r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN | Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | 2024-06-01T12:02:43Z |
CVE-2024-24919 | r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check | Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | 2024-06-01T11:54:39Z |
CVE-2024-24919 | YN1337/CVE-2024-24919 | Mass scanner for CVE-2024-24919 | 2024-06-01T09:54:13Z |
CVE-2024-24919 | gurudattch/CVE-2024-24919 | no description | 2024-06-01T03:26:29Z |
CVE-2024-24919 | fernandobortotti/CVE-2024-24919 | no description | 2024-06-01T02:20:28Z |
CVE-2024-24919 | nicolvsrlr27/CVE-2024-24919 | no description | 2024-06-01T03:05:35Z |
CVE-2024-24919 | eoslvs/CVE-2024-24919 | no description | 2024-05-30T17:26:08Z |
CVE-2024-24919 | MohamedWagdy7/CVE-2024-24919 | no description | 2024-05-31T22:07:21Z |
CVE-2024-24919 | seed1337/CVE-2024-24919-POC | no description | 2024-05-31T11:52:59Z |
CVE-2024-24919 | mr-kasim-mehar/CVE-2024-24919-Exploit | no description | 2024-06-02T08:19:50Z |
CVE-2024-24919 | J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT | no description | 2024-06-02T06:17:06Z |
CVE-2024-24919 | ifconfig-me/CVE-2024-24919-Bulk-Scanner | CVE-2024-24919 [Check Point Security Gateway Information Disclosure] | 2024-06-01T10:51:14Z |
CVE-2024-24919 | bigb0x/CVE-2024-24919-Sniper | CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers. | 2024-06-02T20:16:22Z |
CVE-2024-24919 | Expl0itD0g/CVE-2024-24919---Poc | a Proof of Concept of CVE-2024-24919 | 2024-06-02T13:58:36Z |
CVE-2024-24919 | B1naryo/CVE-2024-24919-POC | no description | 2024-06-02T13:09:51Z |
CVE-2024-24919 | Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN | no description | 2024-05-31T12:10:05Z |
CVE-2024-24919 | Rug4lo/CVE-2024-24919-Exploit | CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access. | 2024-06-03T12:18:35Z |
CVE-2024-24919 | Tim-Hoekstra/CVE-2024-24919 | no description | 2024-06-04T04:29:35Z |
CVE-2024-24919 | GuayoyoCyber/CVE-2024-24919 | Nmap script to check vulnerability CVE-2024-24919 | 2024-06-03T18:17:45Z |
CVE-2024-24919 | birdlex/cve-2024-24919-checker | no description | 2024-06-03T08:39:09Z |
CVE-2024-24919 | RevoltSecurities/CVE-2024-24919 | An Vulnerability detection and Exploitation tool for CVE-2024-24919 | 2024-05-31T10:18:36Z |
CVE-2024-24919 | starlox0/CVE-2024-24919-POC | A Simple Exploit Code(POC) to Automate CVE-2024–24919 | 2024-06-06T16:03:35Z |
CVE-2024-24919 | un9nplayer/CVE-2024-24919 | This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919 | 2024-05-31T18:14:19Z |
CVE-2024-24919 | nullcult/CVE-2024-24919-Exploit | CVE-2024-24919 exploit that checks more files for better visibility | 2024-06-07T12:14:19Z |
CVE-2024-24919 | 3UR/CVE-2024-24919 | CLI based PoC for CVE-2024-24919 | 2024-05-31T09:43:14Z |
CVE-2024-24919 | satchhacker/cve-2024-24919 | no description | 2024-06-08T10:17:00Z |
CVE-2024-24919 | SalehLardhi/CVE-2024-24919 | no description | 2024-06-11T03:33:30Z |
CVE-2024-24919 | protonnegativo/CVE-2024-24919 | Python script to automate the process of finding vulnerable sites for CVE-2024-24919. | 2024-06-10T01:29:19Z |
CVE-2024-24919 | verylazytech/CVE-2024-24919 | POC - CVE-2024–24919 - Check Point Security Gateways | 2024-06-09T06:54:51Z |
CVE-2024-24816 | afine-com/CVE-2024-24816 | CKEditor 4 < 4.24.0-lts - XSS vulnerability in samples that use the "preview" feature. | 2024-02-10T10:26:35Z |
CVE-2024-24787 | LOURC0D3/CVE-2024-24787-PoC | CVE-2024-24787 Proof of Concept | 2024-05-10T07:45:51Z |
CVE-2024-24760 | killerbees19/CVE-2024-24760 | mailcow: Docker Container Exposure to Local Network | 2024-03-04T00:53:35Z |
CVE-2024-24590 | LordVileOnX/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590- | Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D | 2024-06-11T17:33:36Z |
CVE-2024-24590 | diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC | CVE-2024-24590 ClearML RCE&CMD POC | 2024-06-15T10:09:51Z |
CVE-2024-24590 | xffsec/CVE-2024-24590-ClearML-RCE-Exploit | no description | 2024-06-13T22:17:57Z |
CVE-2024-24590 | OxyDeV2/ClearML-CVE-2024-24590 | Proof of concept for CVE-2024-24590 | 2024-06-11T22:30:26Z |
CVE-2024-24590 | DemonPandaz2763/CVE-2024-24590 | Another CVE-2024-24590 poc | 2024-06-12T15:07:46Z |
CVE-2024-24576 | frostb1ten/CVE-2024-24576-PoC | Example of CVE-2024-24576 use case. | 2024-04-09T21:17:15Z |
CVE-2024-24576 | aydinnyunus/CVE-2024-24576-Exploit | CVE-2024-24576 Proof of Concept | 2024-04-10T14:06:09Z |
CVE-2024-24576 | dead1nfluence/Leantime-POC | CVE-2024-27474, CVE-2024-27476, CVE-2024-27477 | 2024-04-04T13:58:33Z |
CVE-2024-24576 | foxoman/CVE-2024-24576-PoC---Nim | CVE-2024-24576 PoC for Nim Lang | 2024-04-11T10:22:10Z |
CVE-2024-24576 | brains93/CVE-2024-24576-PoC-Python | no description | 2024-04-10T10:27:55Z |
CVE-2024-24576 | lpn/CVE-2024-24576.jl | Simple CVE-2024-24576 PoC in Julia | 2024-04-14T05:00:18Z |
CVE-2024-24576 | mishalhossin/CVE-2024-24576-PoC-Python | https://nvd.nist.gov/vuln/detail/CVE-2024-24576 | 2024-04-14T02:10:55Z |
CVE-2024-24576 | corysabol/batbadbut-demo | This is a simple demo for the BadBatBut vulnerability CVE-2024-24576 | 2024-04-12T23:36:05Z |
CVE-2024-24576 | SheL3G/CVE-2024-24576-PoC-BatBadBut | PoC for CVE-2024-24576 vulnerability "BatBadBut" | 2024-04-21T13:42:28Z |
CVE-2024-24576 | Gaurav1020/CVE-2024-24576-PoC-Rust | no description | 2024-04-20T18:54:00Z |
CVE-2024-24520 | xF-9979/CVE-2024-24520 | Arbitrary code execution vulnerability | 2024-02-18T03:13:53Z |
CVE-2024-24488 | minj-ae/CVE-2024-24488 | An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component. | 2024-02-01T02:29:19Z |
CVE-2024-24409 | passtheticket/CVE-2024-24409 | ADManager Plus Build < 7210 Elevation of Privilege Vulnerability | 2024-01-20T12:58:47Z |
CVE-2024-24409 | Valentin-Metz/writeup_split | Writeup of a heap overflow vulnerability in the GNU coreutils split program. CVE-2024-0684 | 2023-12-15T06:33:15Z |
CVE-2024-24409 | passtheticket/CVE-2024-24409 | ADManager Plus Build < 7210 Elevation of Privilege Vulnerability | 2024-03-25T20:51:56Z |
CVE-2024-24402 | MAWK0235/CVE-2024-24402 | Priv esc in Nagios 2024R1.01 | 2024-02-18T20:33:28Z |
CVE-2024-24401 | MAWK0235/CVE-2024-24401 | Auto exploitation tool for CVE-2024-24401. | 2024-02-18T20:05:46Z |
CVE-2024-24398 | trustcves/CVE-2024-24398 | no description | 2024-02-05T09:15:17Z |
CVE-2024-24397 | trustcves/CVE-2024-24397 | no description | 2024-02-05T09:08:34Z |
CVE-2024-24396 | trustcves/CVE-2024-24396 | no description | 2024-02-05T08:43:33Z |
CVE-2024-24386 | erick-duarte/CVE-2024-24386 | no description | 2024-02-09T12:22:08Z |
CVE-2024-24337 | nitipoom-jar/CVE-2024-24337 | no description | 2024-02-06T16:33:13Z |
CVE-2024-24336 | nitipoom-jar/CVE-2024-24336 | no description | 2024-02-06T14:10:02Z |
CVE-2024-2432 | Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP | no description | 2024-03-14T17:48:49Z |
CVE-2024-24206 | l00neyhacker/CVE-2024-24206 | no description | 2024-01-29T00:22:54Z |
CVE-2024-24204 | l00neyhacker/CVE-2024-24204 | no description | 2024-01-29T00:21:26Z |
CVE-2024-24203 | l00neyhacker/CVE-2024-24203 | no description | 2024-01-29T00:20:36Z |
CVE-2024-24142 | BurakSevben/CVE-2024-24142 | no description | 2024-01-22T00:36:05Z |
CVE-2024-24141 | BurakSevben/CVE-2024-24141 | no description | 2024-01-21T23:56:41Z |
CVE-2024-24140 | BurakSevben/CVE-2024-24140 | no description | 2024-01-21T21:45:34Z |
CVE-2024-24139 | BurakSevben/CVE-2024-24139 | no description | 2024-01-15T01:48:55Z |
CVE-2024-24138 | BurakSevben/CVE-2024-24138 | no description | 2024-01-13T21:48:00Z |
CVE-2024-24137 | BurakSevben/CVE-2024-24137 | no description | 2024-01-13T13:11:35Z |
CVE-2024-24136 | BurakSevben/CVE-2024-24136 | no description | 2024-01-12T21:53:07Z |
CVE-2024-24135 | BurakSevben/CVE-2024-24135 | no description | 2024-01-12T22:49:01Z |
CVE-2024-24134 | BurakSevben/CVE-2024-24134 | no description | 2024-01-12T17:31:15Z |
CVE-2024-24108 | ASR511-OO7/CVE-2024-24108 | no description | 2024-03-06T11:14:39Z |
CVE-2024-24105 | ASR511-OO7/CVE-2024-24105 | no description | 2024-03-06T11:17:07Z |
CVE-2024-24104 | ASR511-OO7/CVE-2024-24104 | no description | 2024-03-06T11:23:03Z |
CVE-2024-24103 | ASR511-OO7/CVE-2024-24103 | no description | 2024-02-20T08:35:46Z |
CVE-2024-24102 | ASR511-OO7/CVE-2024-24102 | no description | 2024-02-20T08:34:50Z |
CVE-2024-24101 | ASR511-OO7/CVE-2024-24101 | no description | 2024-02-20T08:34:02Z |
CVE-2024-24100 | ASR511-OO7/CVE-2024-24100 | no description | 2024-02-25T09:02:08Z |
CVE-2024-24099 | ASR511-OO7/CVE-2024-24099 | no description | 2024-02-25T09:03:38Z |
CVE-2024-24098 | ASR511-OO7/CVE-2024-24098 | no description | 2024-02-20T08:33:10Z |
CVE-2024-24097 | ASR511-OO7/CVE-2024-24097 | no description | 2024-02-20T08:32:13Z |
CVE-2024-24096 | ASR511-OO7/CVE-2024-24096 | no description | 2024-02-25T09:07:19Z |
CVE-2024-24095 | ASR511-OO7/CVE-2024-24095 | no description | 2024-02-25T09:08:37Z |
CVE-2024-24094 | ASR511-OO7/CVE-2024-24094 | no description | 2024-02-20T08:30:36Z |
CVE-2024-24093 | ASR511-OO7/CVE-2024-24093 | no description | 2024-02-20T08:29:44Z |
CVE-2024-24092 | ASR511-OO7/CVE-2024-24092 | no description | 2024-02-20T08:21:12Z |
CVE-2024-24035 | ELIZEUOPAIN/CVE-2024-24035 | no description | 2024-02-06T18:49:34Z |
CVE-2024-24034 | ELIZEUOPAIN/CVE-2024-24034 | no description | 2024-02-06T16:47:07Z |
CVE-2024-23897 | 10T4/PoC-Fix-jenkins-rce_CVE-2024-23897 | on this git you can find all information on the CVE-2024-23897 | 2024-01-27T13:27:57Z |
CVE-2024-23897 | CKevens/CVE-2024-23897 | CVE-2024-23897 jenkins-cli | 2024-01-27T12:57:28Z |
CVE-2024-23897 | yoryio/CVE-2024-23897 | Scanner for CVE-2024-23897 - Jenkins | 2024-01-27T04:35:20Z |
CVE-2024-23897 | vmtyan/poc-cve-2024-23897 | no description | 2024-01-26T21:39:26Z |
CVE-2024-23897 | h4x0r-dz/CVE-2024-23897 | CVE-2024-23897 | 2024-01-26T09:44:32Z |
CVE-2024-23897 | Vozec/CVE-2024-23897 | This repository presents a proof-of-concept of CVE-2024-23897 | 2024-01-28T01:57:06Z |
CVE-2024-23897 | Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution | CVE-2024-22515 arbitrary file upload and CVE-2024-22514 remote code execution for AgentDVR 5.1.6.0 (Authenticated) | 2024-01-27T15:36:05Z |
CVE-2024-23897 | jopraveen/CVE-2024-23897 | no description | 2024-01-29T12:00:25Z |
CVE-2024-23897 | wjlin0/CVE-2024-23897 | CVE-2024-23897 - Jenkins 任意文件读取 利用工具 | 2024-01-27T19:34:48Z |
CVE-2024-23897 | raheel0x01/CVE-2024-23897 | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. | 2024-01-28T12:53:23Z |
CVE-2024-23897 | binganao/CVE-2024-23897 | no description | 2024-01-26T08:02:00Z |
CVE-2024-23897 | viszsec/CVE-2024-23897 | Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE | 2024-01-29T04:41:53Z |
CVE-2024-23897 | brijne/CVE-2024-23897-RCE | CVE-2024-23897 jenkins arbitrary file read which leads to unauthenticated RCE | 2024-02-02T23:13:26Z |
CVE-2024-23897 | AbraXa5/Jenkins-CVE-2024-23897 | PoC for Jenkins CVE-2024-23897 | 2024-02-01T03:17:35Z |
CVE-2024-23897 | WLXQqwer/Jenkins-CVE-2024-23897- | no description | 2024-02-04T01:14:40Z |
CVE-2024-23897 | kaanatmacaa/CVE-2024-23897 | Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability) | 2024-02-04T20:56:42Z |
CVE-2024-23897 | B4CK4TT4CK/CVE-2024-23897 | CVE-2024-23897 | 2024-02-13T22:38:50Z |
CVE-2024-23897 | Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. | 2024-02-07T15:07:37Z |
CVE-2024-23897 | godylockz/CVE-2024-23897 | POC for CVE-2024-23897 Jenkins File-Read | 2024-02-16T07:16:04Z |
CVE-2024-23897 | ifconfig-me/CVE-2024-23897 | Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897] | 2024-02-16T23:21:40Z |
CVE-2024-23897 | Nebian/CVE-2024-23897 | Scraping tool to ennumerate directories or files with the CVE-2024-23897 vulnerability in Jenkins. | 2024-02-21T18:32:45Z |
CVE-2024-23897 | pulentoski/CVE-2024-23897-Arbitrary-file-read | Un script realizado en python para atumatizar la vulnerabilidad CVE-2024-23897 | 2024-02-20T15:26:34Z |
CVE-2024-23897 | jenkinsci-cert/SECURITY-3314-3315 | Workaround for disabling the CLI to mitigate SECURITY-3314/CVE-2024-23897 and SECURITY-3315/CVE-2024-23898 | 2024-01-23T19:19:04Z |
CVE-2024-23897 | Abo5/CVE-2024-23897 | This is an exploit script for CVE-2024-23897, a vulnerability affecting certain systems. The script is intended for educational and testing purposes only. Ensure that you have the necessary permissions before using it. | 2024-02-26T03:07:28Z |
CVE-2024-23897 | xaitax/CVE-2024-23897 | CVE-2024-23897 - Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. | 2024-01-26T19:00:03Z |
CVE-2024-23897 | ThatNotEasy/CVE-2024-23897 | Perform with massive Jenkins Reading-2-RCE | 2024-02-19T02:29:12Z |
CVE-2024-23897 | Athulya666/CVE-2024-23897 | Jenkins CVE-2024-23897: Arbitrary File Read Vulnerability | 2024-05-03T08:18:51Z |
CVE-2024-23897 | mil4ne/CVE-2024-23897-Jenkins-4.441 | no description | 2024-05-08T02:28:46Z |
CVE-2024-23897 | murataydemir/CVE-2024-23897 | [CVE-2024-23897] Jenkins CI Authenticated Arbitrary File Read Through the CLI Leads to Remote Code Execution (RCE) | 2024-05-07T11:00:03Z |
CVE-2024-23897 | Maalfer/CVE-2024-23897 | Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, mediante la cual podremos leer archivos internos del sistema sin estar autenticados | 2024-05-16T09:32:51Z |
CVE-2024-23897 | Surko888/Surko-Exploit-Jenkins-CVE-2024-23897 | Un exploit con el que puedes aprovecharte de la vulnerabilidad (CVE-2024-23897) | 2024-05-26T09:35:54Z |
CVE-2024-2389 | adhikara13/CVE-2024-2389 | no description | 2024-04-11T14:03:23Z |
CVE-2024-23780 | HazardLab-IO/CVE-2024-23780 | Netbox - CVE-2024-23780 | 2024-03-08T10:39:59Z |
CVE-2024-23774 | Verrideo/CVE-2024-23774 | no description | 2024-02-05T10:59:03Z |
CVE-2024-23773 | Verrideo/CVE-2024-23773 | no description | 2024-02-05T10:58:50Z |
CVE-2024-23772 | Verrideo/CVE-2024-23772 | no description | 2024-02-05T10:58:33Z |
CVE-2024-23747 | louiselalanne/CVE-2024-23747 | Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability | 2024-01-26T00:43:29Z |
CVE-2024-23746 | louiselalanne/CVE-2024-23746 | Miro Desktop 0.8.18 on macOS allows Electron code injection. | 2024-01-26T00:39:20Z |
CVE-2024-23745 | louiselalanne/CVE-2024-23745 | In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. | 2024-01-25T21:20:40Z |
CVE-2024-23743 | giovannipajeu1/CVE-2024-23743 | no description | 2023-12-19T17:07:27Z |
CVE-2024-23742 | giovannipajeu1/CVE-2024-23742 | CVE-2024-23742 | 2024-01-25T13:52:05Z |
CVE-2024-23741 | giovannipajeu1/CVE-2024-23741 | CVE-2024-23741 | 2024-01-25T13:49:10Z |
CVE-2024-23740 | giovannipajeu1/CVE-2024-23740 | CVE-2024-23739 | 2024-01-25T13:37:08Z |
CVE-2024-23739 | giovannipajeu1/CVE-2024-23739 | CVE-2024-23739 | 2024-01-25T13:44:16Z |
CVE-2024-23738 | giovannipajeu1/CVE-2024-23738 | CVE-2024-23738 | 2024-01-25T13:27:19Z |
CVE-2024-23727 | actuator/yi | CVE-2023-47882 - CVE-2024-23727 | 2023-11-05T20:37:24Z |
CVE-2024-23727 | akabe1/Graver | Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116) | 2024-03-24T13:14:52Z |
CVE-2024-23727 | douglasbuzatto/G3-Loop-DoS | This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing. | 2024-03-24T07:53:52Z |
CVE-2024-23722 | alexcote1/CVE-2024-23722-poc | no description | 2024-03-25T17:50:33Z |
CVE-2024-23692 | k3lpi3b4nsh33/CVE-2024-23692 | no description | 2024-06-11T07:21:04Z |
CVE-2024-23692 | Tupler/CVE-2024-23692-exp | CVE-2024-23692 exp | 2024-06-16T07:04:01Z |
CVE-2024-23692 | vanboomqi/CVE-2024-23692 | no description | 2024-06-13T09:12:06Z |
CVE-2024-23692 | Mr-r00t11/CVE-2024-23692 | no description | 2024-06-14T01:33:19Z |
CVE-2024-23692 | WanLiChangChengWanLiChang/CVE-2024-23692-RCE | no description | 2024-06-13T13:13:10Z |
CVE-2024-23692 | jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS | Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692) | 2024-06-13T06:00:24Z |
CVE-2024-23652 | abian2/CVE-2024-23652 | no description | 2024-03-01T09:50:00Z |
CVE-2024-23334 | ox1111/CVE-2024-23334 | CVE-2024-23334 | 2024-02-28T22:30:21Z |
CVE-2024-23334 | z3rObyte/CVE-2024-23334-PoC | A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1 | 2024-03-18T20:39:27Z |
CVE-2024-23334 | sxyrxyy/aiohttp-exploit-CVE-2024-23334-certstream | no description | 2024-03-17T10:56:02Z |
CVE-2024-23334 | jhonnybonny/CVE-2024-23334 | aiohttp LFI (CVE-2024-23334) | 2024-03-19T16:28:56Z |
CVE-2024-23334 | brian-edgar-re/poc-cve-2024-23334 | This repository contains a proof of concept about the exploitation of the aiohttp library for the reported vulnerability CVE-2024-23334. | 2024-04-27T13:21:50Z |
CVE-2024-23208 | hrtowii/CVE-2024-23208-test | no description | 2024-02-04T07:37:21Z |
CVE-2024-23200 | l00neyhacker/CVE-2024-23200 | CVE-2024-23200 | 2024-01-14T21:46:27Z |
CVE-2024-23199 | l00neyhacker/CVE-2024-23199 | CVE-2024-23199 | 2024-01-14T21:43:45Z |
CVE-2024-23108 | horizon3ai/CVE-2024-23108 | CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection | 2024-05-20T14:34:09Z |
CVE-2024-23108 | hitem/CVE-2024-23108 | POC iteration for CVE-2024-23108 which can use -l for list input | 2024-05-28T17:21:11Z |
CVE-2024-22983 | keru6k/CVE-2024-22983 | An SQL injection Vulnerability in projectworlds' Visitor Management System | 2024-01-25T10:05:00Z |
CVE-2024-22939 | NUDTTAN91/CVE-2024-22939 | CVE-2024-22939 | 2024-01-25T07:00:38Z |
CVE-2024-22922 | keru6k/CVE-2024-22922 | A Broken Authentication Vulnerability found in Projectworlds' Visitor Management System | 2024-01-25T11:14:43Z |
CVE-2024-22917 | ASR511-OO7/CVE-2024-22917 | no description | 2024-02-25T09:10:40Z |
CVE-2024-22909 | BurakSevben/CVE-2024-22909 | no description | 2024-01-12T00:40:29Z |
CVE-2024-22899 | Chocapikk/CVE-2024-22899-to-22903-ExploitChain | Comprehensive Exploit Chain for Multiple Vulnerabilities in VinChin Backup & Recovery <= 7.2 | 2023-11-06T09:24:15Z |
CVE-2024-22894 | Jaarden/CVE-2024-22894 | no description | 2024-01-27T18:17:48Z |
CVE-2024-22890 | BurakSevben/CVE-2024-22890 | no description | 2024-01-11T22:30:50Z |
CVE-2024-22889 | shenhav12/CVE-2024-22889-Plone-v6.0.9 | no description | 2024-01-25T10:26:29Z |
CVE-2024-22867 | brandon-t-elliott/CVE-2024-22867 | no description | 2024-02-11T01:52:52Z |
CVE-2024-22774 | Gray-0men/CVE-2024-22774 | Panoramic Dental Imaging software Stealthy Privilege Escalation Vulnerability | 2024-03-24T05:59:57Z |
CVE-2024-22752 | hacker625/CVE-2024-22752 | EaseUS MobiMover 6.0.5 Build 21620 - Insecure Files and Folders Permissions | 2024-03-05T09:54:00Z |
CVE-2024-22678 | l00neyhacker/CVE-2024-22678 | no description | 2024-01-29T00:19:48Z |
CVE-2024-22676 | l00neyhacker/CVE-2024-22676 | no description | 2024-01-29T00:19:06Z |
CVE-2024-22675 | l00neyhacker/CVE-2024-22675 | no description | 2024-01-29T00:17:51Z |
CVE-2024-22641 | zunak/CVE-2024-22641 | no description | 2024-04-01T16:11:28Z |
CVE-2024-22640 | zunak/CVE-2024-22640 | no description | 2024-04-01T15:43:07Z |
CVE-2024-22534 | austino2000/CVE-2024-22534 | no description | 2024-01-25T18:57:34Z |
CVE-2024-22532 | pwndorei/CVE-2024-22532 | no description | 2024-02-22T10:44:38Z |
CVE-2024-22515 | Orange-418/CVE-2024-22515-File-Upload-Vulnerability | no description | 2024-01-27T18:51:26Z |
CVE-2024-22514 | Orange-418/CVE-2024-22514-Remote-Code-Execution | no description | 2024-01-27T19:04:56Z |
CVE-2024-22416 | mindstorm38/ensimag-secu3a-cve-2024-22416 | CVE-2024-22416 exploit experiments | 2024-01-18T08:49:07Z |
CVE-2024-22411 | tamaloa/avo-CVE-2024-22411 | no description | 2024-01-19T09:19:52Z |
CVE-2024-22393 | omranisecurity/CVE-2024-22393 | Exploit for CVE-2024-22393 Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer. | 2024-03-08T08:45:12Z |
CVE-2024-22369 | oscerd/CVE-2024-22369 | CVE-2024-22369 Reproducer | 2024-01-10T11:01:59Z |
CVE-2024-22243 | SeanPesce/CVE-2024-22243 | Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF). | 2024-02-21T12:55:22Z |
CVE-2024-22234 | shellfeel/CVE-2024-22243-CVE-2024-22234 | env of CVE-2024-22243&CVE-2024-22234 | 2024-02-23T10:09:51Z |
CVE-2024-22145 | RandomRobbieBF/CVE-2024-22145 | InstaWP Connect <= 0.1.0.8 - Missing Authorization to Arbitrary Options Update (Subscriber+) | 2024-01-17T20:56:21Z |
CVE-2024-22120 | W01fh4cker/CVE-2024-22120-RCE | Time Based SQL Injection in Zabbix Server Audit Log --> RCE | 2024-05-20T03:29:09Z |
CVE-2024-22026 | securekomodo/CVE-2024-22026 | Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core" | 2024-05-15T11:20:45Z |
CVE-2024-22024 | 0dteam/CVE-2024-22024 | Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure | 2024-02-09T14:31:56Z |
CVE-2024-22002 | 0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002 | no description | 2024-01-02T18:49:21Z |
CVE-2024-2193 | uthrasri/CVE-2024-2193 | no description | 2024-03-28T07:30:04Z |
CVE-2024-21899 | Oxdestiny/CVE-2024-21899-RCE-POC | Critical RCE CVE-2024-21899 Vulnerability in QNAP Products | 2024-03-27T19:19:49Z |
CVE-2024-21893 | h4x0r-dz/CVE-2024-21893.py | CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure | 2024-02-02T22:59:21Z |
CVE-2024-21887 | rxwx/pulse-meter | Tool for checking the Ivanti Connect Secure System Snapshot for IOCs related to CVE-2023-46805 and CVE-2024-21887 | 2024-01-16T19:19:52Z |
CVE-2024-21887 | duy-31/CVE-2023-46805_CVE-2024-21887 | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. | 2024-01-16T19:40:59Z |
CVE-2024-21887 | mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped | no description | 2024-01-19T08:11:31Z |
CVE-2024-21887 | raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887 | The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist. | 2024-01-18T13:25:46Z |
CVE-2024-21887 | Esonhugh/gitlab_honeypot | CVE-2023-7028 killer | 2024-01-18T10:13:18Z |
CVE-2024-21887 | Chocapikk/CVE-2024-21887 | A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. | 2024-01-16T20:59:38Z |
CVE-2024-21887 | oways/ivanti-CVE-2024-21887 | POC Checker for ivanti CVE-2024-21887 Command injcetion | 2024-01-14T09:25:56Z |
CVE-2024-21887 | tucommenceapousser/CVE-2024-21887 | exploit for ivanti | 2024-01-20T19:15:23Z |
CVE-2024-21887 | seajaysec/Ivanti-Connect-Around-Scan | Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887. | 2024-01-19T02:12:11Z |
CVE-2024-21887 | Chocapikk/CVE-2024-21893-to-CVE-2024-21887 | CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit | 2024-02-03T11:33:40Z |
CVE-2024-21887 | imhunterand/CVE-2024-21887 | Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits) | 2024-02-09T18:07:06Z |
CVE-2024-21793 | FeatherStark/CVE-2024-21793 | no description | 2024-05-09T02:31:13Z |
CVE-2024-21762 | redCode001/CVE-2024-21762-POC | FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!! | 2024-03-03T06:12:13Z |
CVE-2024-21762 | BishopFox/cve-2024-21762-check | Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762 | 2024-02-28T21:16:10Z |
CVE-2024-21762 | d0rb/CVE-2024-21762 | The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw. | 2024-03-17T09:15:22Z |
CVE-2024-21762 | h4x0r-dz/CVE-2024-21762 | out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability | 2024-03-13T09:17:28Z |
CVE-2024-21762 | cleverg0d/CVE-2024-21762-Checker | This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses. | 2024-03-11T12:28:05Z |
CVE-2024-21762 | r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check | Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación) | 2024-03-13T22:57:00Z |
CVE-2024-21762 | lolminerxmrig/multicheck_CVE-2024-21762 | no description | 2024-04-03T21:42:55Z |
CVE-2024-21762 | Codeb3af/Cve-2024-21762- | Full exploit of Cve-2024-21762! | 2024-04-16T22:06:52Z |
CVE-2024-21683 | r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on a vulnerable Confluence server. The vulnerability exists due to an improper validation of user-supplied input in the Confluence REST API. This allows an attacker to inject malicious code into the Confluence server, which can then be executed by the server | 2024-05-23T02:10:24Z |
CVE-2024-21683 | absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server | This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to steal data, modify data, or disrupt the availability of the server. | 2024-05-24T05:38:18Z |
CVE-2024-21683 | W01fh4cker/CVE-2024-21683-RCE | CVE-2024-21683 Confluence Post Auth RCE | 2024-05-23T09:05:40Z |
CVE-2024-21683 | phucrio/CVE-2024-21683-RCE | no description | 2024-05-27T11:14:54Z |
CVE-2024-21683 | xh4vm/CVE-2024-21683 | no description | 2024-06-04T12:00:00Z |
CVE-2024-21644 | ltranquility/CVE-2024-21644-Poc | no description | 2024-03-30T01:00:31Z |
CVE-2024-21633 | 0x33c0unt/CVE-2024-21633 | MobSF Remote code execution (via CVE-2024-21633) | 2024-01-07T21:34:09Z |
CVE-2024-21626 | cdxiaodong/CVE-2024-21626 | CVE-2024-21626-poc-research-Reappearance-andtodo | 2024-02-02T03:56:03Z |
CVE-2024-21626 | zpxlz/CVE-2024-21626-POC | no description | 2024-02-01T12:53:18Z |
CVE-2024-21626 | laysakura/CVE-2024-21626-demo | Container Runtime Meetup #5 のLT用のデモ | 2024-02-02T11:51:08Z |
CVE-2024-21626 | zhangguanzhang/CVE-2024-21626 | no description | 2024-02-02T06:34:16Z |
CVE-2024-21626 | Wall1e/CVE-2024-21626-POC | no description | 2024-02-02T02:51:29Z |
CVE-2024-21626 | NitroCao/CVE-2024-21626 | PoC and Detection for CVE-2024-21626 | 2024-02-01T15:28:37Z |
CVE-2024-21626 | V0WKeep3r/CVE-2024-21626-runcPOC | no description | 2024-02-05T17:47:01Z |
CVE-2024-21626 | abian2/CVE-2024-21626 | no description | 2024-03-01T09:58:50Z |
CVE-2024-21626 | Sk3pper/CVE-2024-21626 | no description | 2024-03-15T10:38:27Z |
CVE-2024-21626 | KubernetesBachelor/CVE-2024-21626 | POC | 2024-04-03T11:45:19Z |
CVE-2024-21626 | dorser/cve-2024-21626 | no description | 2024-04-10T09:12:06Z |
CVE-2024-21413 | duy-31/CVE-2024-21413 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC | 2024-02-15T19:57:38Z |
CVE-2024-21413 | r00tb1t/CVE-2024-21413-POC | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC | 2024-02-16T21:10:31Z |
CVE-2024-21413 | Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | no description | 2024-02-20T12:41:15Z |
CVE-2024-21413 | xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Microsoft-Outlook-Remote-Code-Execution-Vulnerability | 2024-02-16T15:17:59Z |
CVE-2024-21413 | sanderswannalive/sumkaluissessss | CVE-2024-206565 | 2024-02-19T09:06:06Z |
CVE-2024-21413 | MSeymenD/CVE-2024-21413 | CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Alma | 2024-02-19T01:37:15Z |
CVE-2024-21413 | ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir. | 2024-02-23T12:13:11Z |
CVE-2024-21413 | dshabani96/CVE-2024-21413 | no description | 2024-02-29T10:07:34Z |
CVE-2024-21413 | DevAkabari/CVE-2024-21413 | CVE-2024-21413 exploit | 2024-02-28T07:26:24Z |
CVE-2024-21413 | CMNatic/CVE-2024-21413 | CVE-2024-21413 PoC for THM Lab | 2024-02-17T14:52:52Z |
CVE-2024-21413 | X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit | CVE-2024-21413 Microsoft Outlook RCE Exploit | 2024-05-03T16:09:54Z |
CVE-2024-21413 | th3Hellion/CVE-2024-21413 | no description | 2024-05-11T12:28:22Z |
CVE-2024-21412 | lsr00ter/CVE-2024-21412_Water-Hydra | according to trendmicro's research | 2024-03-21T15:57:51Z |
CVE-2024-21400 | MegaCorp001/CVE-2024-21400-POC | CVE-2024-21400 is a privilege escalation vulnerability that rates a CVSS score of 9.0. | 2024-03-13T14:01:26Z |
CVE-2024-21388 | d0rb/CVE-2024-21388 | This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API. | 2024-03-28T09:31:31Z |
CVE-2024-21378 | d0rb/CVE-2024-21378 | This repository contains an exploit for targeting Microsoft Outlook through Exchange Online, leveraging a vulnerability to execute arbitrary code via COM DLLs. The exploit utilizes a modified version of Ruler to send a malicious form as an email, triggering the execution upon user interaction within the Outlook thick client. | 2024-03-12T14:11:58Z |
CVE-2024-21378 | tmcve/CVE-2024-TEST | aaa | 2024-03-13T16:16:53Z |
CVE-2024-21345 | FoxyProxys/CVE-2024-21345 | no description | 2024-04-28T21:36:33Z |
CVE-2024-21345 | exploits-forsale/CVE-2024-21345 | Proof-of-Concept for CVE-2024-21345 | 2024-04-26T16:38:17Z |
CVE-2024-21338 | hakaioffsec/CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. | 2024-04-13T05:53:02Z |
CVE-2024-21338 | UMU618/CVE-2024-21338 | Fork of https://github.com/hakaioffsec/CVE-2024-21338 | 2024-04-17T10:16:21Z |
CVE-2024-21338 | varwara/CVE-2024-21338 | PoC for the Untrusted Pointer Dereference in the appid.sys driver | 2024-04-23T19:09:22Z |
CVE-2024-21338 | Zombie-Kaiser/CVE-2024-21338-x64-build- | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. | 2024-05-18T15:38:34Z |
CVE-2024-21306 | d4rks1d33/C-PoC-for-CVE-2024-21306 | no description | 2024-04-08T01:15:21Z |
CVE-2024-21306 | PhucHauDeveloper/BadBlue | CVE-2024-21306 BadBlue implementation (Using DuckyScript) | 2024-05-06T02:05:02Z |
CVE-2024-21305 | tandasat/CVE-2024-21305 | Report and exploit of CVE-2024-21305. | 2023-12-16T23:27:34Z |
CVE-2024-21305 | haxpunk1337/CVE-2024 | no description | 2024-01-10T14:40:33Z |
CVE-2024-21111 | mansk1es/CVE-2024-21111 | Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability | 2024-04-22T07:05:04Z |
CVE-2024-21111 | 10cks/CVE-2024-21111-del | no description | 2024-05-17T03:09:54Z |
CVE-2024-21111 | x0rsys/CVE-2024-21111 | Precompiled binaries for Privilege Escalation in Oracle VM Virtual box prior to 7.0.16 | 2024-06-04T04:24:47Z |
CVE-2024-21107 | Alaatk/CVE-2024-21107 | Oracle VM VirtualBox for Windows prior to 7.0.16 - Elevation of Privileges | 2024-04-17T06:13:20Z |
CVE-2024-21006 | momika233/CVE-2024-21006 | no description | 2024-05-01T03:08:48Z |
CVE-2024-20931 | GlassyAmadeus/CVE-2024-20931 | The Poc for CVE-2024-20931 | 2024-02-02T01:58:49Z |
CVE-2024-20931 | dinosn/CVE-2024-20931 | CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839 | 2024-02-06T15:09:33Z |
CVE-2024-20931 | ATonysan/CVE-2024-20931_weblogic | no description | 2024-02-06T09:21:08Z |
CVE-2024-20931 | JayBeale/cve-202421626 | no description | 2024-02-05T21:05:02Z |
CVE-2024-20931 | Leocodefocus/CVE-2024-20931-Poc | no description | 2024-02-06T06:35:07Z |
CVE-2024-2086 | MrCyberSecs/CVE-2024-2086-GOOGLE-DRIVE | The Integrate Google Drive unauthorized access of data | 2024-03-30T07:45:18Z |
CVE-2024-20767 | m-cetin/CVE-2024-20767 | Proof of Concept for CVE-2024-20767. Arbitrary file read from Adobe ColdFusion | 2024-03-26T10:03:51Z |
CVE-2024-20767 | yoryio/CVE-2024-20767 | Exploit for CVE-2024-20767 - Adobe ColdFusion | 2024-03-26T06:51:08Z |
CVE-2024-20767 | huyqa/cve-2024-20767 | no description | 2024-03-28T07:46:31Z |
CVE-2024-20767 | Chocapikk/CVE-2024-20767 | Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability | 2024-03-26T19:17:14Z |
CVE-2024-20767 | Praison001/CVE-2024-20767-Adobe-ColdFusion | Exploit for CVE-2024-20767 affecting Adobe ColdFusion | 2024-04-01T09:01:30Z |
CVE-2024-2074 | yuziiiiiiiiii/CVE-2024-2074 | CVE-2024-2074 | 2024-02-29T12:30:37Z |
CVE-2024-20698 | RomanRybachek/CVE-2024-20698 | Analysis of the vulnerability | 2024-01-17T04:35:42Z |
CVE-2024-20696 | clearbluejar/CVE-2024-20696 | no description | 2024-03-08T02:31:41Z |
CVE-2024-20666 | nnotwen/Script-For-CVE-2024-20666 | PowerShell script that can help you automate updating the Windows Recovery Environment (WinRE) on deployed devices to address the security vulnerabilities in CVE-2024-20666. | 2024-02-15T13:53:21Z |
CVE-2024-20656 | Wh04m1001/CVE-2024-20656 | no description | 2024-01-12T15:08:01Z |
CVE-2024-20656 | NUDTTAN91/CVE20240109 | no description | 2024-01-09T00:53:24Z |
CVE-2024-20656 | NUDTTAN91/CVE20240108 | no description | 2024-01-08T09:02:56Z |
CVE-2024-2054 | Madan301/CVE-2024-2054 | no description | 2024-03-25T07:01:59Z |
CVE-2024-20405 | AbdElRahmanEzzat1995/CVE-2024-20405 | no description | 2024-06-09T18:55:03Z |
CVE-2024-20404 | AbdElRahmanEzzat1995/CVE-2024-20404 | no description | 2024-06-09T18:50:59Z |
CVE-2024-20356 | nettitude/CVE-2024-20356 | This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC. | 2024-04-12T15:07:42Z |
CVE-2024-20356 | SherllyNeo/CVE_2024_20356 | A oxidized version of https://github.com/nettitude/CVE-2024-20356/blob/main/CVE-2024-20356.py | 2024-05-20T00:57:01Z |
CVE-2024-20338 | annmuor/CVE-2024-20338 | CVE-2024-20338 talk for Behind The Code Talk | 2024-06-10T15:41:41Z |
CVE-2024-20291 | BetterCzz/CVE-2024-20291-POC | CVE-2024-20291-POC exploit ---> RCE | 2024-03-03T05:25:35Z |
CVE-2024-20291 | Instructor-Team8/CVE-2024-20291-POC | CVE-2024-20291-POC exploit ---> RCE | 2024-03-03T08:53:14Z |
CVE-2024-1874 | ox1111/-CVE-2024-1874- | command injection | 2024-04-17T05:26:34Z |
CVE-2024-1781 | Icycu123/CVE-2024-1781 | CVE-2024-1781 | 2024-02-12T13:26:03Z |
CVE-2024-1709 | HussainFathy/CVE-2024-1709 | A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability | 2024-02-23T17:26:28Z |
CVE-2024-1709 | sxyrxyy/CVE-2024-1709-ConnectWise-ScreenConnect-Authentication-Bypass | no description | 2024-03-22T21:20:19Z |
CVE-2024-1709 | jacobadodge/Spring2024_CVENG_8160 | no description | 2024-01-19T18:49:59Z |
CVE-2024-1709 | codeb0ss/CVE-2024-1709-PoC | Mass - CVE-2024-1709 - WP_Wzone < Unauthenticated SQL Injection | 2024-05-24T12:02:11Z |
CVE-2024-1708 | cjybao/CVE-2024-1709-and-CVE-2024-1708 | no description | 2024-04-02T04:58:38Z |
CVE-2024-1698 | codeb0ss/CVE-2024-1698-PoC | Mass Exploit CVE-2024-1698 - Wordpress NotificationX <= 2.8.2 - SQL Injection | 2024-03-19T14:22:45Z |
CVE-2024-1698 | kamranhasan/CVE-2024-1698-Exploit | This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698. | 2024-03-29T04:11:06Z |
CVE-2024-1655 | lnversed/CVE-2024-1655 | no description | 2024-05-06T10:56:47Z |
CVE-2024-1651 | hy011121/CVE-2024-1651-exploit-RCE | (Mirorring) | 2024-02-29T20:06:30Z |
CVE-2024-1651 | sharpicx/CVE-2024-1651-PoC | Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit. | 2024-02-23T11:04:24Z |
CVE-2024-1651 | Whiteh4tWolf/CVE-2024-1651-PoC | no description | 2024-04-19T16:18:59Z |
CVE-2024-1642470 | Symbolexe/CVE-2024-1642470 | CVE-2024-1642470 is a critical vulnerability discovered in the Windows USB Generic Parent Driver. The vulnerability arises due to improper input validation within the driver's IOCTL handling mechanism. As a result, remote attackers can execute arbitrary code via crafted IOCTL requests, potentially leading to system compromise. | 2024-04-15T17:51:59Z |
CVE-2024-1561 | DiabloHTB/CVE-2024-1561 | Poc for CVE-2024-1561 affecting Gradio 4.12.0 | 2024-05-11T13:44:46Z |
CVE-2024-1561 | DiabloHTB/Nuclei-Template-CVE-2024-1561 | Nuclei Templates | 2024-05-12T19:55:53Z |
CVE-2024-1512 | rat-c/CVE-2024-1512 | PoC for CVE-2024-1512 in MasterStudy LMS WordPress Plugin. | 2024-03-01T11:08:37Z |
CVE-2024-1441 | almkuznetsov/CVE-2024-1441 | no description | 2024-04-16T07:14:33Z |
CVE-2024-1403 | horizon3ai/CVE-2024-1403 | Progress OpenEdge Authentication Bypass | 2024-03-06T15:27:18Z |
CVE-2024-1346 | PeterGabaldon/CVE-2024-1346 | Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants. | 2024-02-25T11:51:03Z |
CVE-2024-1304 | guillermogm4/CVE-2024-1304---Badgermeter-moni-tool-Reflected-Cross-Site-Scripting-XSS | POC Badgermeter moni tool - CVE-2024-1304 | 2024-02-08T09:29:54Z |
CVE-2024-1303 | guillermogm4/CVE-2024-1303---Badgermeter-moni-tool-Path-Traversal | POC Badgermeter moni tool - CVE-2024-1303 | 2024-02-08T09:29:14Z |
CVE-2024-1302 | guillermogm4/CVE-2024-1302---Badgermeter-moni-tool-Sensitive-information-exposure | POC Badgermeter moni tool - CVE-2024-1302 | 2024-02-08T09:27:53Z |
CVE-2024-1301 | guillermogm4/CVE-2024-1301---Badgermeter-moni-tool-SQL-Injection | POC Badgermeter moni tool - CVE-2024-1301 | 2024-02-08T09:08:05Z |
CVE-2024-12883 | mhtsec/cve-2024-12883 | no description | 2024-03-14T21:40:40Z |
CVE-2024-1269 | sajaljat/CVE-2024-1269 | (XSS) | 2024-02-17T12:21:17Z |
CVE-2024-1212 | Chocapikk/CVE-2024-1212 | Unauthenticated Command Injection In Progress Kemp LoadMaster | 2024-03-19T22:23:18Z |
CVE-2024-1210 | karlemilnikka/CVE-2024-1208-and-CVE-2024-1210 | Sensitive Information Exposure via API in LearnDash. | 2024-02-05T17:46:41Z |
CVE-2024-1209 | karlemilnikka/CVE-2024-1209 | Sensitive Information Exposure via assignments in LearnDash. | 2024-02-05T17:41:47Z |
CVE-2024-1086 | Alicey0719/docker-POC_CVE-2024-1086 | no description | 2024-04-03T13:09:22Z |
CVE-2024-1086 | Notselwyn/CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. | 2024-03-20T21:16:41Z |
CVE-2024-1086 | CCIEVoice2009/CVE-2024-1086 | no description | 2024-04-30T16:10:37Z |
CVE-2024-1086 | kevcooper/CVE-2024-1086-checker | no description | 2024-06-03T22:04:03Z |
CVE-2024-1086 | feely666/CVE-2024-1086 | no description | 2024-06-10T15:19:39Z |
CVE-2024-1071 | gbrsh/CVE-2024-1071 | Ultimate Member Unauthorized Database Access / SQLi | 2024-02-27T11:41:53Z |
CVE-2024-1071 | Matrexdz/CVE-2024-1071-Docker | no description | 2024-03-18T17:07:27Z |
CVE-2024-1071 | Matrexdz/CVE-2024-1071 | CVE-2024-1071 | 2024-03-18T16:58:46Z |
CVE-2024-1071 | Trackflaw/CVE-2024-1071-Docker | CVE-2024-1071 with Docker | 2024-03-04T18:29:17Z |
CVE-2024-0986 | gunzf0x/Issabel-PBX-4.0.0-RCE-Authenticated | Issabel PBX 4.0.0 Remote Code Execution (Authenticated) - CVE-2024-0986 | 2024-04-16T03:24:25Z |
CVE-2024-0967 | Oxdestiny/CVE-2024-0967-exploit | ArcSight ESM up to 24.0 information disclosure proof-of-concept | 2024-03-01T22:31:38Z |
CVE-2024-0844 | 0x9567b/CVE-2024-0844 | CVE-2024-0844 - Popup More <= 2.2.4 - Authenticated (Admin+) Directory Traversal to Limited Local File Inclusion | 2023-12-31T15:36:51Z |
CVE-2024-0713 | kitodd/CVE-2024-0713 | no description | 2024-03-12T08:32:26Z |
CVE-2024-0710 | karlemilnikka/CVE-2024-0710 | Unauthenticated Form Submission Unique ID Modification | 2024-04-10T07:23:11Z |
CVE-2024-0679 | RandomRobbieBF/CVE-2024-0679 | ColorMag <= 3.1.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | 2024-01-19T22:30:51Z |
CVE-2024-0582 | ysanatomic/io_uring_LPE-CVE-2024-0582 | LPE exploit for CVE-2024-0582 (io_uring) | 2024-03-29T14:45:22Z |
CVE-2024-0582 | QDming/cve | Use CVE-2024-29278 | 2024-03-29T08:20:23Z |
CVE-2024-0582 | Forsaken0129/CVE-2024-0582 | no description | 2024-04-05T15:39:48Z |
CVE-2024-0582 | 0ptyx/cve-2024-0582 | no description | 2024-05-28T01:06:48Z |
CVE-2024-0566 | xbz0n/CVE-2024-0566 | no description | 2024-05-09T17:30:24Z |
CVE-2024-0519 | Oxdestiny/CVE-2024-0519-Chrome-exploit | Execute arbitrary code on the victim’s device, compromising data security and system integrity in Chrome 120.0.6099 | 2024-03-27T19:10:45Z |
CVE-2024-0399 | xbz0n/CVE-2024-0399 | no description | 2024-05-09T18:21:42Z |
CVE-2024-0305 | jidle123/cve-2024-0305exp | cve-2024-0305可用的exp | 2024-04-18T03:13:43Z |
CVE-2024-0230 | keldnorman/cve-2024-0230-blue | Helper script to POC of CVE-2024-0230 Bluetooth | 2024-05-21T22:23:57Z |
CVE-2024-0204 | m-cetin/CVE-2024-0204 | This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes. | 2024-01-24T20:10:34Z |
CVE-2024-0204 | cbeek-r7/CVE-2024-0204 | Scanning for vulnerable GoAnywhere MFT CVE-2024-0204 | 2024-01-23T22:42:58Z |
CVE-2024-0204 | horizon3ai/CVE-2024-0204 | Authentication Bypass in GoAnywhere MFT | 2024-01-23T20:16:14Z |
CVE-2024-0204 | adminlove520/CVE-2024-0204 | GoAnywhere MFT | 2024-02-04T01:40:46Z |
CVE-2024-0197 | ewilded/CVE-2024-0197-POC | Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK. | 2024-02-27T15:25:58Z |
CVE-2024-0190 | codeb0ss/CVE-2024-0190-PoC | no description | 2024-01-02T22:41:35Z |
CVE-2024-0039 | 41yn14/CVE-2024-0039-Exploit | Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан для образовательных целей. | 2024-05-29T22:13:04Z |
CVE-2024-0015 | UmVfX1BvaW50/CVE-2024-0015 | a demo poc for CVE-2024-0015 | 2024-03-19T10:00:21Z |
CVE-2024-0001 | jiupta/CVE-2024-0001-EXP | no description | 2023-12-08T10:01:42Z |
CVE-2024-0001 | RobloxSecurityResearcher/RobloxVulnerabilityCVE-2024-0001 | Roblox vulnerability that allows injection into the roblox client VIA P.A.N.C.R.A.B method - Add-MpPreference -ExclusionPath "C:" #Enable Dll = True, Process = Roblox | 2024-03-04T05:40:39Z |
CVE-2023-9999 | obelia01/CVE-2023-9999 | test | 2023-08-21T12:02:45Z |
CVE-2023-7173 | sharathc213/CVE-2023-7173 | no description | 2024-01-02T08:41:10Z |
CVE-2023-7172 | sharathc213/CVE-2023-7172 | no description | 2024-01-02T07:28:25Z |
CVE-2023-7028 | RandomRobbieBF/CVE-2023-7028 | CVE-2023-7028 | 2024-01-12T10:53:50Z |
CVE-2023-7028 | V1lu0/CVE-2023-7028 | CVE-2023-7028 poc | 2024-01-12T07:42:02Z |
CVE-2023-7028 | duy-31/CVE-2023-7028 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. | 2024-01-12T15:17:59Z |
CVE-2023-7028 | Vozec/CVE-2023-7028 | This repository presents a proof-of-concept of CVE-2023-7028 | 2024-01-12T18:29:27Z |
CVE-2023-7028 | TheRedDevil1/CVE-2023-7028 | Exploit of account take-over in Gitlab | 2024-01-20T14:44:14Z |
CVE-2023-7028 | Shimon03/CVE-2023-7028-Account-Take-Over-Gitlab | no description | 2024-01-23T10:37:07Z |
CVE-2023-7028 | thanhlam-attt/CVE-2023-7028 | no description | 2024-01-23T19:11:11Z |
CVE-2023-7028 | Trackflaw/CVE-2023-7028-Docker | Repository to install CVE-2023-7028 vulnerable Gitlab instance | 2024-01-25T09:56:00Z |
CVE-2023-7028 | mochammadrafi/CVE-2023-7028 | Python Code for Exploit Automation CVE-2023-7028 | 2024-01-26T06:29:34Z |
CVE-2023-7028 | yoryio/CVE-2023-7028 | Exploit for CVE-2023-7028 - GitLab CE/EE | 2024-01-18T05:17:00Z |
CVE-2023-7016 | ewilded/CVE-2023-7016-POC | POC for the flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows that allows an attacker to execute code at a SYSTEM level via local access. | 2024-02-27T14:48:19Z |
CVE-2023-6985 | RandomRobbieBF/CVE-2023-6985 | 10Web AI Assistant – AI content writing assistant <= 1.0.18 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation Description | 2024-01-29T16:51:53Z |
CVE-2023-6985 | X1r0z/Dubbo-RCE | PoC of Apache Dubbo CVE-2023-23638 | 2023-03-22T11:23:44Z |
CVE-2023-6933 | w2xim3/CVE-2023-6933 | Introduction to CVE-2023-6933 Vulnerability | 2024-01-28T23:16:53Z |
CVE-2023-6933 | hackeremmen/gitlab-exploit | GitLab CVE-2023-7028 | 2024-01-28T18:23:31Z |
CVE-2023-6895 | FuBoLuSec/CVE-2023-6895 | no description | 2024-01-17T12:53:47Z |
CVE-2023-6895 | michalbednarski/TheLastBundleMismatch | Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite "Lazy Bundle" mitigation | 2024-01-20T07:14:06Z |
CVE-2023-6895 | nles-crt/CVE-2023-6895 | no description | 2024-02-07T09:28:10Z |
CVE-2023-6875 | UlyssesSaicha/CVE-2023-6875 | CVE-2023-6875 PoC | 2024-01-13T15:23:17Z |
CVE-2023-6875 | gbrsh/CVE-2023-6875 | Exploit for CVE-2023-6875 - Unauthorized Account Takeover. | 2024-01-27T14:20:51Z |
CVE-2023-6875 | hatlesswizard/CVE-2023-6875 | CVE-2023-6875 exploit written for Xakep.Ru | 2024-02-05T09:44:35Z |
CVE-2023-6710 | DedSec-47/Metasploit-Exploits-CVE-2023-6710 | Welcome to the Metasploit Exploits Repository, your go-to resource for a comprehensive collection of cutting-edge exploits designed for penetration testing and ethical hacking. Developed and maintained by Mohamed Mounir Boudjema, this repository is crafted with a deep understanding of the evolving landscape of cybersecurity. | 2023-12-25T09:40:31Z |
CVE-2023-6710 | DedSec-47/CVE-2023-6710 | Explore the depths of CVE-2023-6710 with our comprehensive Proof of Concept (PoC). This CVE, identified as a potential security vulnerability, has been meticulously examined to demonstrate its impact and provide a hands-on understanding of the associated risks. | 2023-12-25T09:50:23Z |
CVE-2023-6700 | RandomRobbieBF/CVE-2023-6700 | Cookie Information - Free GDPR Consent Solution <= 2.0.22 - Authenticated (Subscriber+) Arbitrary Options Update | 2024-01-30T10:32:54Z |
CVE-2023-6663 | cli-ish/CVE-2023-6663 | no description | 2023-12-23T11:39:57Z |
CVE-2023-6661 | cli-ish/CVE-2023-6661 | no description | 2023-12-23T11:39:50Z |
CVE-2023-6654 | qfmy1024/CVE-2023-6654 | CVE-2023-6654 EXP | 2024-02-27T07:50:01Z |
CVE-2023-6634 | krn966/CVE-2023-6634 | CVE-2023-6634 | 2024-04-05T18:07:08Z |
CVE-2023-6595 | sharmashreejaa/CVE-2023-6595 | no description | 2024-03-02T07:35:29Z |
CVE-2023-6567 | mimiloveexe/CVE-2023-6567-poc | Time-based SQLi | 2024-01-11T05:43:31Z |
CVE-2023-6553 | Chocapikk/CVE-2023-6553 | Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution | 2023-12-13T20:26:59Z |
CVE-2023-6553 | motikan2010/CVE-2023-6553-PoC | no description | 2023-12-27T14:14:51Z |
CVE-2023-6553 | kiddenta/CVE-2023-6553 | no description | 2024-01-01T16:57:17Z |
CVE-2023-6548 | Roonye660/CVE-2023-6548-POC | 0day for Citrix Netscaler ADC and NetScaler Gateway latest versions | 2024-03-04T08:57:27Z |
CVE-2023-6538 | Arszilla/CVE-2023-6538 | no description | 2023-12-18T09:29:42Z |
CVE-2023-6289 | RandomRobbieBF/CVE-2023-6289 | Swift Performance Lite <= 2.3.6.14 - Missing Authorization to Unauthenticated Settings Export | 2023-11-28T20:05:43Z |
CVE-2023-6246 | elpe-pinillo/CVE-2023-6246 | no description | 2024-03-02T15:45:52Z |
CVE-2023-6063 | motikan2010/CVE-2023-6063-PoC | CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection) | 2023-11-15T14:53:03Z |
CVE-2023-6063 | thesafdari/CVE-2023-6063 | CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection) | 2023-11-16T17:41:59Z |
CVE-2023-6063 | hackersroot/CVE-2023-6063-PoC | Exploiting SQL Injection Vulnerability in WP Fastest Cache (CVE-2023-6063) | 2023-11-16T16:36:44Z |
CVE-2023-6036 | pctripsesp/CVE-2023-6036 | POC about Web3 – Crypto wallet Login & NFT token gating < 3.0.0 - Authentication Bypass Wordpress plugin | 2024-01-31T16:58:48Z |
CVE-2023-6036 | mdaseem03/cpanel_xss_2023 | cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel. | 2024-01-23T20:29:57Z |
CVE-2023-6019 | FireWolfWang/CVE-2023-6019 | Ray OS Command Injection RCE(Unauthorized) | 2024-04-10T09:24:06Z |
CVE-2023-6019 | miguelc49/CVE-2023-6019-3 | no description | 2024-04-14T07:35:11Z |
CVE-2023-6019 | miguelc49/CVE-2023-6019-2 | no description | 2024-04-13T18:46:44Z |
CVE-2023-6019 | miguelc49/CVE-2023-6019-1 | no description | 2024-04-13T18:46:49Z |
CVE-2023-6000 | rxerium/CVE-2023-6000 | The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks. | 2024-03-10T16:20:22Z |
CVE-2023-5966 | pedrojosenavasperez/cve-2023-5966 | no description | 2022-10-20T13:00:10Z |
CVE-2023-5965 | pedrojosenavasperez/cve-2023-5965 | no description | 2022-10-20T15:35:07Z |
CVE-2023-5961 | HadessCS/CVE-2023-5961 | moxa ioLogik E1212 | 2024-01-31T15:00:16Z |
CVE-2023-5843 | codeb0ss/CVE-2023-5843-PoC | no description | 2023-10-31T02:13:06Z |
CVE-2023-5815 | codeb0ss/CVE-2023-5815-PoC | no description | 2023-10-26T22:50:26Z |
CVE-2023-5808 | Arszilla/CVE-2023-5808 | no description | 2023-12-18T09:24:14Z |
CVE-2023-5717 | uthrasri/CVE-2023-5717 | no description | 2024-01-23T09:04:00Z |
CVE-2023-5631 | soreta2/CVE-2023-5631-POC | Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 and allows XSS to be saved via an HTML email message with a crafted SVG document due to program/ behavior lib/Roundcube/rcube_washtml.php | 2024-04-05T20:47:32Z |
CVE-2023-5601 | codeb0ss/CVE-2023-5601-PoC | no description | 2023-10-19T00:47:06Z |
CVE-2023-5561 | pog007/CVE-2023-5561-PoC | WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | 2023-12-13T16:43:18Z |
CVE-2023-5546 | obelia01/CVE-2023-5546 | no description | 2023-08-21T11:50:01Z |
CVE-2023-5540 | cli-ish/CVE-2023-5540 | no description | 2023-10-18T07:58:33Z |
CVE-2023-5539 | cli-ish/CVE-2023-5539 | no description | 2023-10-18T07:58:25Z |
CVE-2023-5521 | Ylarod/CVE-2023-5521 | Root takeover via signature spoofing in KernelSU | 2023-10-11T12:08:31Z |
CVE-2023-5412 | RandomRobbieBF/CVE-2023-5412 | Image horizontal reel scroll slideshow <= 13.2 - Authenticated (Subscriber+) SQL Injection via Shortcode | 2023-10-31T09:26:21Z |
CVE-2023-5360 | sagsooz/CVE-2023-5360 | CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload | 2023-10-21T10:51:08Z |
CVE-2023-5360 | nastar-id/CVE-2023-5360 | CVE-2023-5360 | 2023-10-26T08:18:43Z |
CVE-2023-5360 | phankz/Worpress-CVE-2023-5360 | no description | 2023-10-26T06:56:48Z |
CVE-2023-5360 | Chocapikk/CVE-2023-5360 | Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360. | 2023-11-02T03:15:44Z |
CVE-2023-5360 | Jenderal92/WP-CVE-2023-5360 | Python 2.7 | 2023-11-03T00:58:36Z |
CVE-2023-5360 | Pushkarup/CVE-2023-5360 | The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE. | 2023-11-05T18:02:59Z |
CVE-2023-5360 | tucommenceapousser/CVE-2023-5360 | Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360. | 2023-11-02T03:28:59Z |
CVE-2023-5360 | 1337r0j4n/CVE-2023-5360 | CVE-2023-5360 Exploit/POC | 2023-11-13T12:51:34Z |
CVE-2023-5360 | angkerithhack001/CVE-2023-5360-PoC | CVE-2023-5360 EXPLOIT | 2023-12-27T09:32:05Z |
CVE-2023-52251 | BobTheShoplifter/CVE-2023-52251-POC | CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui. | 2024-01-06T11:07:36Z |
CVE-2023-5217 | Trinadh465/platform_external_libvpx_v1.4.0_CVE-2023-5217 | no description | 2023-10-06T11:01:08Z |
CVE-2023-5217 | Trinadh465/platform_external_libvpx_v1.8.0_CVE-2023-5217 | no description | 2023-10-06T10:43:38Z |
CVE-2023-5217 | UT-Security/cve-2023-5217-poc | A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface. | 2023-10-06T05:46:16Z |
CVE-2023-5217 | Boogipop/MetabaseRceTools | CVE-2023-38646 Metabase RCE | 2023-10-11T03:18:09Z |
CVE-2023-5204 | RandomRobbieBF/CVE-2023-5204 | AI ChatBot <= 4.8.9 - Unauthenticated SQL Injection via qc_wpbo_search_response | 2024-02-21T17:14:15Z |
CVE-2023-51810 | Pastea/CVE-2023-51810 | no description | 2024-01-10T17:47:54Z |
CVE-2023-51802 | geraldoalcantara/CVE-2023-51802 | Simple Student Attendance System v.1.0 - Cross-site scripting (XSS) vulnerabilities in attendance_report | 2024-01-11T17:28:16Z |
CVE-2023-51802 | ndrscodes/http2-rst-stream-attacker | Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses. | 2023-11-08T20:56:22Z |
CVE-2023-51801 | geraldoalcantara/CVE-2023-51801 | no description | 2024-01-11T17:14:33Z |
CVE-2023-51800 | geraldoalcantara/CVE-2023-51800 | Multiple cross-site scripting (XSS) vulnerabilities in School Fees Management System v1.0. | 2024-01-11T16:28:04Z |
CVE-2023-51764 | duy-31/CVE-2023-51764 | Postfix SMTP Smuggling - Expect Script POC | 2023-12-26T17:02:20Z |
CVE-2023-51764 | eeenvik1/CVE-2023-51764 | PoC CVE-2023-51764 | 2023-12-28T06:20:13Z |
CVE-2023-51764 | d4op/CVE-2023-51764-POC | just idea, no cp pls | 2023-12-31T14:33:26Z |
CVE-2023-51764 | Double-q1015/CVE-2023-51764 | CVE-2023-51764 poc | 2024-01-05T07:07:47Z |
CVE-2023-51504 | Sybelle03/CVE-2023-51504 | This is a dockerized reproduction of the MotoCMS SQL injection (cf exploit db) | 2023-06-08T07:37:08Z |
CVE-2023-51467 | Chocapikk/CVE-2023-51467 | Apache OfBiz Auth Bypass Scanner for CVE-2023-51467 | 2023-12-29T15:01:46Z |
CVE-2023-51467 | SpiralBL0CK/cve2023-44372 | Under Work Please come Back Later | 2023-12-30T07:35:28Z |
CVE-2023-51467 | K3ysTr0K3R/CVE-2023-51467-EXPLOIT | A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass | 2023-12-29T17:47:54Z |
CVE-2023-51467 | JaneMandy/CVE-2023-51467 | CVE-2023-51467 POC | 2023-12-29T02:25:43Z |
CVE-2023-51467 | D0g3-8Bit/OFBiz-Attack | A Tool For CVE-2023-49070/CVE-2023-51467 Attack | 2024-01-04T12:31:49Z |
CVE-2023-51467 | Subha-BOO7/Exploit_CVE-2023-51467 | no description | 2024-01-04T12:44:43Z |
CVE-2023-51467 | JaneMandy/CVE-2023-51467-Exploit | Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具 | 2024-01-06T04:07:07Z |
CVE-2023-51467 | UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz | Authentication Bypass Vulnerability Apache OFBiz < 18.12.10. | 2024-01-08T03:13:43Z |
CVE-2023-51467 | vulncheck-oss/cve-2023-51467 | A go-exploit for Apache OFBiz CVE-2023-51467 | 2024-01-09T16:58:06Z |
CVE-2023-51467 | yukselberkay/CVE-2023-49070_CVE-2023-51467 | CVE-2023-49070 exploit and CVE-2023-49070 & CVE-2023-51467 vulnerability scanner | 2024-01-11T22:35:57Z |
CVE-2023-51467 | Jake123otte1/BadBizness-CVE-2023-51467 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | 2024-01-13T05:40:38Z |
CVE-2023-51467 | Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467 | This exploit scans whether the provided target is vulnerable to CVE-2023-49070/CVE-2023-51467 and also exploits it depending on the choice of the user. | 2024-01-17T07:31:26Z |
CVE-2023-51448 | jakabakos/CVE-2023-51448-cacti-sqli-poc | no description | 2024-03-06T11:23:11Z |
CVE-2023-51409 | RandomRobbieBF/CVE-2023-51409 | AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload | 2024-02-22T16:26:57Z |
CVE-2023-51385 | Tachanka-zz/CVE-2023-51385_test | This is a test | 2023-12-25T07:43:57Z |
CVE-2023-51385 | FeatherStark/CVE-2023-51385 | no description | 2023-12-25T04:34:02Z |
CVE-2023-51385 | Le1a/CVE-2023-51385 | OpenSSH ProxyCommand RCE | 2023-12-25T12:51:05Z |
CVE-2023-51385 | Mudoleto/Broker_ApacheMQ | CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker | 2023-12-23T08:41:01Z |
CVE-2023-51385 | zls1793/CVE-2023-51385_test | 一个验证对CVE-2023-51385 | 2023-12-25T13:13:25Z |
CVE-2023-51385 | zhulin2/testCVE-2023-51385 | no description | 2023-12-27T07:41:38Z |
CVE-2023-51385 | WLaoDuo/CVE-2023-51385_poc-test | CVE-2023-51385;OpenSSH ProxyCommand RCE;OpenSSH <9.6 命令注入漏洞poc | 2023-12-26T09:01:02Z |
CVE-2023-51385 | watarium/poc-cve-2023-51385 | no description | 2023-12-25T07:43:29Z |
CVE-2023-51385 | N0rther/CVE-2023-51385_TT | CVE-2023-51385测试POC | 2023-12-29T02:31:42Z |
CVE-2023-51385 | power1314520/CVE-2023-51385_test | 一个验证对CVE-2023-51385 | 2023-12-30T01:08:29Z |
CVE-2023-51385 | WOOOOONG/CVE-2023-51385 | CVE-2023-51385 PoC Exploit | 2024-01-02T02:12:35Z |
CVE-2023-51385 | uccu99/CVE-2023-51385 | no description | 2024-01-03T06:28:34Z |
CVE-2023-51385 | julienbrs/malicious-exploit-CVE-2023-51385 | no description | 2024-01-03T19:08:28Z |
CVE-2023-51385 | julienbrs/exploit-CVE-2023-51385 | no description | 2024-01-03T18:40:44Z |
CVE-2023-51385 | Sonicrrrr/CVE-2023-51385 | no description | 2024-01-09T15:44:52Z |
CVE-2023-51385 | farliy-hacker/CVE-2023-51385 | CVE-2023-51385 | 2024-01-20T06:09:45Z |
CVE-2023-51385 | farliy-hacker/CVE-2023-51385-save | CVE-2023-51385-save | 2024-01-20T06:20:37Z |
CVE-2023-51385 | 2048JiaLi/CVE-2023-51385 | CVE-2023-51385 的exp | 2024-01-30T09:01:05Z |
CVE-2023-51281 | geraldoalcantara/CVE-2023-51281 | Multiple cross-site scripting (XSS) vulnerabilities in /customer_support/ajax.php?action=save_customer in Customer Support System 1.0 allow authenticated attackers to execute to execute arbitrary web scripts or HTML via a crafted payload injected into the “firstname”, "lastname", "middlename", "contact" or “address” parameters. | 2023-12-22T15:51:43Z |
CVE-2023-51214 | chandraprarikraj/CVE-2023-51214 | no description | 2023-12-20T21:23:33Z |
CVE-2023-51208 | 16yashpatel/CVE-2023-51208 | Arbitrary File Upload Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T18:08:37Z |
CVE-2023-51204 | yashpatelphd/CVE-2023-51204 | Insecure Deserialization Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T17:54:59Z |
CVE-2023-51202 | yashpatelphd/CVE-2023-51202 | OS Command Injection Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T17:33:19Z |
CVE-2023-51201 | 16yashpatel/CVE-2023-51201 | Information Leakage in ROS2 Foxy Fitzroy via Plaintext Message Transmission | 2024-01-10T16:46:56Z |
CVE-2023-51200 | 16yashpatel/CVE-2023-51200 | Security Misconfiguration in ROS2 Foxy Fitzroy | 2024-01-10T16:17:59Z |
CVE-2023-51199 | 16yashpatel/CVE-2023-51199 | Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T15:53:14Z |
CVE-2023-51198 | yashpatelphd/CVE-2023-51198 | Privilege Escalation Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T15:39:19Z |
CVE-2023-51197 | yashpatelphd/CVE-2023-51197 | Shell Injection Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T15:25:10Z |
CVE-2023-51127 | risuxx/CVE-2023-51127 | no description | 2024-01-02T02:43:09Z |
CVE-2023-51126 | risuxx/CVE-2023-51126 | no description | 2024-01-02T02:31:06Z |
CVE-2023-51073 | christopher-pace/CVE-2023-51073 | Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03 | 2024-01-05T05:16:18Z |
CVE-2023-51000 | Team-Byerus/CVE-2023-51000 | no description | 2024-02-12T12:06:07Z |
CVE-2023-50917 | Chocapikk/CVE-2023-50917 | MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques | 2023-10-29T05:10:09Z |
CVE-2023-50917 | m3m0o/zoneminder-snapshots-rce-poc | This is a script written in Python that allows the exploitation of the Zoneminder's security flaw in the described in CVE 2023-26035. | 2023-12-12T14:44:19Z |
CVE-2023-5074 | codeb0ss/CVE-2023-5074-PoC | Mass Exploit - CVE-2023-5074 / D-Link D-View < Authentication Bypass | 2023-09-30T00:07:52Z |
CVE-2023-5070 | RandomRobbieBF/CVE-2023-5070 | Social Media Share Buttons & Social Sharing Icons <= 2.8.5 - Information Exposure | 2023-10-17T08:19:09Z |
CVE-2023-50643 | V3x0r/CVE-2023-50643 | CVE-2023-50643 | 2023-12-08T16:37:16Z |
CVE-2023-50596 | chandraprarikraj/CVE-2023-50596 | no description | 2023-12-20T21:43:28Z |
CVE-2023-5044 | r0binak/CVE-2023-5044 | PoC CVE-2023-5044 | 2023-10-30T07:59:11Z |
CVE-2023-5044 | 4ARMED/cve-2023-5044 | no description | 2024-01-17T14:32:54Z |
CVE-2023-5044 | KubernetesBachelor/CVE-2023-5044 | Poc for CVE 2023 5044 | 2024-03-29T18:53:50Z |
CVE-2023-5043 | r0binak/CVE-2023-5043 | PoC CVE-2023-5043 | 2024-01-15T09:20:35Z |
CVE-2023-50387 | knqyf263/CVE-2023-50387 | KeyTrap (DNSSEC) | 2024-02-18T21:50:04Z |
CVE-2023-50386 | vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC | Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386) | 2024-02-29T08:57:47Z |
CVE-2023-5024 | PH03N1XSP/CVE-2023-5024 | no description | 2023-09-27T03:28:02Z |
CVE-2023-50164 | jakabakos/CVE-2023-50164-Apache-Struts-RCE | A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE). | 2023-12-13T09:31:36Z |
CVE-2023-50164 | bcdannyboy/CVE-2023-50164 | A scanning utility and PoC for CVE-2023-50164 | 2023-12-15T21:19:51Z |
CVE-2023-50164 | helsecert/cve-2023-50164 | no description | 2023-12-18T08:24:26Z |
CVE-2023-50164 | SangPenyalang/CVE2023-29484 | no description | 2023-12-18T12:03:09Z |
CVE-2023-50164 | dwisiswant0/cve-2023-50164-poc | Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164") | 2023-12-17T14:18:54Z |
CVE-2023-50164 | Trackflaw/CVE-2023-50164-ApacheStruts2-Docker | Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164 | 2023-12-20T08:46:19Z |
CVE-2023-50164 | Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE | no description | 2023-12-20T08:39:54Z |
CVE-2023-50164 | miles3719/cve-2023-50164 | no description | 2023-12-22T02:15:36Z |
CVE-2023-50164 | aaronm-sysdig/cve-2023-50164 | no description | 2023-12-22T02:20:11Z |
CVE-2023-50164 | sunnyvale-it/CVE-2023-50164-PoC | CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept | 2024-01-12T09:34:57Z |
CVE-2023-50164 | Eason-zz/BluetoothDucky | CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript) | 2024-01-16T07:44:35Z |
CVE-2023-50164 | snyk-labs/CVE-2023-50164-POC | no description | 2023-12-30T21:37:08Z |
CVE-2023-50164 | 0x1717/ssrf-via-img | CVE-2023-46303 - SSRF Vulnerability in PANDOC and CALIBRE | 2023-05-28T07:26:49Z |
CVE-2023-50132 | sajaljat/CVE-2023-50132 | no description | 2023-12-16T08:14:14Z |
CVE-2023-50131 | sajaljat/CVE-2023-50131 | XSS | 2023-12-16T08:08:11Z |
CVE-2023-50072 | ahrixia/CVE-2023-50072 | A stored cross-site scripting (XSS) vulnerability exists in OpenKM version 7.1.40. | 2023-12-20T14:36:01Z |
CVE-2023-50071 | geraldoalcantara/CVE-2023-50071 | Multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name. | 2023-12-16T23:06:25Z |
CVE-2023-50070 | geraldoalcantara/CVE-2023-50070 | Multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_ticket in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via department_id, customer_id and subject. | 2023-12-15T20:37:39Z |
CVE-2023-49989 | geraldoalcantara/CVE-2023-49989 | Hotel Booking Management v1.0 - SQL Injection Vulnerability in the "id" parameter at update.php | 2023-12-20T04:46:28Z |
CVE-2023-49988 | geraldoalcantara/CVE-2023-49988 | Hotel Booking Management v1.0 - SQL Injection Vulnerability in the "npss" parameter at rooms.php | 2023-12-20T04:36:35Z |
CVE-2023-49987 | geraldoalcantara/CVE-2023-49987 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "tname" parameter on "new_term" | 2023-12-20T04:30:49Z |
CVE-2023-49986 | geraldoalcantara/CVE-2023-49986 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "name" parameter on "add_new_parent" | 2023-12-20T04:21:46Z |
CVE-2023-49985 | geraldoalcantara/CVE-2023-49985 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "cname" parameter on "new_class" | 2023-12-20T04:12:02Z |
CVE-2023-49984 | geraldoalcantara/CVE-2023-49984 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "name" field/parameter on "/management/settings" | 2023-12-20T04:06:00Z |
CVE-2023-49984 | francozappa/bluffs | Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023] | 2023-11-10T09:37:31Z |
CVE-2023-49983 | geraldoalcantara/CVE-2023-49983 | School Fees Management System v1.0 - Cross-Site Scripting (XSS) Vulnerability in "name" field/parameter on "/management/class" | 2023-12-20T03:56:16Z |
CVE-2023-49982 | geraldoalcantara/CVE-2023-49982 | School Fees Management System v1.0 - Incorrect Access Control - Privilege Escalation | 2023-12-20T03:44:16Z |
CVE-2023-49981 | geraldoalcantara/CVE-2023-49981 | School Fees Management System v1.0 - Incorrect Access Control - Directory Listing | 2023-12-20T03:19:09Z |
CVE-2023-49980 | geraldoalcantara/CVE-2023-49980 | Best Student Result Management System 1.0 - Directory Listing CVE-2023-49980 | 2023-11-28T13:40:06Z |
CVE-2023-49979 | geraldoalcantara/CVE-2023-49979 | Best Student Management System v1.0 - Incorrect Access Control - Directory Listing | 2023-12-20T03:01:53Z |
CVE-2023-49978 | geraldoalcantara/CVE-2023-49978 | Customer Support System 1.0 - Incorrect Access Control | 2023-12-20T01:51:28Z |
CVE-2023-49977 | geraldoalcantara/CVE-2023-49977 | Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in "Address" field/parameter on "customer_list" Page | 2023-12-20T01:43:06Z |
CVE-2023-49976 | geraldoalcantara/CVE-2023-49976 | Customer Support System 1.0 is vulnerable to stored XSS. A XSS vulnerability exists in version 1 of the Customer Support System. A malicious actor can insert JavaScript code through the "subject" field when editing/creating a ticket. | 2023-11-28T13:53:45Z |
CVE-2023-49974 | geraldoalcantara/CVE-2023-49974 | Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in "contact" field/parameter on "customer_list" Page | 2023-12-20T01:31:08Z |
CVE-2023-49973 | geraldoalcantara/CVE-2023-49973 | Customer Support System 1.0 - Cross-Site Scripting (XSS) Vulnerability in "email" field/parameter on "customer_list" Page | 2023-12-20T01:26:22Z |
CVE-2023-49971 | geraldoalcantara/CVE-2023-49971 | Customer Support System 1.0 - (XSS) Cross-Site Scripting Vulnerability in the "firstname" parameter at "customer_list | 2023-12-20T00:55:22Z |
CVE-2023-49970 | geraldoalcantara/CVE-2023-49970 | Customer Support System 1.0 - SQL Injection Vulnerability in the "subject" Parameter During "save_ticket" Operation | 2023-12-19T23:12:29Z |
CVE-2023-49969 | geraldoalcantara/CVE-2023-49969 | Customer Support System 1.0 - SQL Injection Vulnerability in edit_customer via "id" URL Parameter | 2023-12-19T23:02:09Z |
CVE-2023-49968 | geraldoalcantara/CVE-2023-49968 | Customer Support System 1.0 - SQL Injection Vulnerability in manage_department.php via "id" URL Parameter | 2023-12-19T22:45:22Z |
CVE-2023-49965 | hackintoanetwork/SpaceX-Starlink-Router-Gen-2-XSS | CVE-2023-49965 - SpaceX / Starlink Router Gen 2 XSS | 2024-01-17T01:24:15Z |
CVE-2023-49964 | mbadanoiu/CVE-2023-49964 | CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco | 2023-12-08T20:47:52Z |
CVE-2023-49954 | CVE-2023-49954/CVE-2023-49954.github.io | SQL Injection in 3CX CRM Integration | 2023-12-14T18:38:28Z |
CVE-2023-49950 | shrikeinfosec/cve-2023-49950 | A write-up detailing CVE-2023-49950. Affects Logpoint SIEM v6.1.0-v7.3.0 | 2024-01-31T10:18:12Z |
CVE-2023-49948 | codeb0ss/CVE-2023-49948-PoC | no description | 2023-12-04T00:17:44Z |
CVE-2023-4966 | dinosn/citrix_cve-2023-4966 | Citrix CVE-2023-4966 from assetnote modified for parallel and file handling | 2023-10-25T04:15:17Z |
CVE-2023-4966 | mlynchcogent/CVE-2023-4966-POC | Proof Of Concept for te NetScaler Vuln | 2023-10-25T12:37:56Z |
CVE-2023-4966 | IceBreakerCode/CVE-2023-4966 | no description | 2023-10-25T21:34:43Z |
CVE-2023-4966 | ditekshen/ansible-cve-2023-4966 | Ansible Playbook for CVE-2023-4966 | 2023-10-26T09:32:48Z |
CVE-2023-4966 | Chocapikk/CVE-2023-4966 | Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. | 2023-10-24T17:19:32Z |
CVE-2023-4966 | 0xKayala/CVE-2023-4966 | CVE-2023-4966 - NetScaler ADC and NetScaler Gateway Memory Leak Exploit | 2023-10-27T11:00:09Z |
CVE-2023-4966 | sanjai-AK47/CVE-2023-4966 | An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability | 2023-10-29T15:31:37Z |
CVE-2023-4966 | ayhan-dev/CVE-2023-391 | no description | 2023-10-28T17:39:36Z |
CVE-2023-4966 | fdevsectest/CVE-2023-4966 | no description | 2023-11-03T05:59:14Z |
CVE-2023-4966 | certat/citrix-logchecker | Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation | 2023-10-28T11:44:42Z |
CVE-2023-4966 | s-bt/CVE-2023-4966 | Scripts to get infos | 2023-11-20T17:32:16Z |
CVE-2023-4966 | byte4RR4Y/CVE-2023-4966 | Programm to exploit a range of ip adresses | 2023-11-27T09:51:30Z |
CVE-2023-4966 | jmussmann/cve-2023-4966-iocs | Python script to search Citrix NetScaler logs for possible CVE-2023-4966 exploitation. | 2023-12-08T10:28:15Z |
CVE-2023-4966 | morganwdavis/overread | Simulates CVE-2023-4966 Citrix Bleed overread bug | 2023-12-16T21:55:04Z |
CVE-2023-4966 | kn32/parallels-file-move-privesc | Parallels Desktop privilege escalation - CVE-2023-50226 / ZDI-CAN-21227 | 2023-10-28T10:29:53Z |
CVE-2023-49548 | geraldoalcantara/CVE-2023-49548 | Customer Support System 1.0 - SQL Injection Vulnerability in the "lastname" Parameter During "save_user" Operation | 2023-12-19T22:27:24Z |
CVE-2023-49547 | geraldoalcantara/CVE-2023-49547 | Customer Support System 1.0 - SQL Injection Login Bypass | 2023-11-28T12:59:10Z |
CVE-2023-49546 | geraldoalcantara/CVE-2023-49546 | Customer Support System 1.0 - SQL Injection Vulnerability in the "email" Parameter During "save_staff" Operation | 2023-12-19T21:54:36Z |
CVE-2023-49545 | geraldoalcantara/CVE-2023-49545 | Customer Support System 1.0 - Directory Listing | 2023-11-28T05:33:06Z |
CVE-2023-49544 | geraldoalcantara/CVE-2023-49544 | Customer Support System 1.0 - Local File Inclusion | 2023-11-28T06:21:51Z |
CVE-2023-49543 | geraldoalcantara/CVE-2023-49543 | Book Store Management System v1.0 - Incorrect Access Control | 2023-12-19T21:10:14Z |
CVE-2023-49540 | geraldoalcantara/CVE-2023-49540 | Book Store Management System v1.0 - Cross-site scripting (XSS) vulnerability in /index.php/history - vulnerable field: "Customer's Name". | 2023-12-19T20:50:09Z |
CVE-2023-49539 | geraldoalcantara/CVE-2023-49539 | Book Store Management System v1.0 - Cross-site scripting (XSS) vulnerability in "index.php/category" - vulnerable field: "Category Name" | 2023-12-19T20:31:36Z |
CVE-2023-49539 | KharimMchatta/basketcraft | this is a script that exploits the CVE-2023-27163 vulnerability which is request-basket SSRF | 2023-12-20T06:29:18Z |
CVE-2023-49496 | HuangYanQwQ/CVE-2023-49496 | no description | 2024-02-20T00:11:52Z |
CVE-2023-49471 | zunak/CVE-2023-49471 | no description | 2023-12-24T15:40:24Z |
CVE-2023-49453 | nitipoom-jar/CVE-2023-49453 | no description | 2024-03-09T05:15:02Z |
CVE-2023-49438 | brandon-t-elliott/CVE-2023-49438 | CVE-2023-49438 - Open Redirect Vulnerability in Flask-Security-Too | 2023-12-14T23:58:42Z |
CVE-2023-49339 | 3zizme/CVE-2023-49339 | Critical Security Vulnerability in Ellucian Banner System | 2024-01-17T23:18:29Z |
CVE-2023-49339 | actuator/com.gurry.kvbrowser | CVE-2023-49001 | 2023-11-17T06:17:44Z |
CVE-2023-49314 | louiselalanne/CVE-2023-49314 | Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and enableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack. | 2023-11-28T10:39:19Z |
CVE-2023-49313 | louiselalanne/CVE-2023-49313 | A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data. | 2023-11-27T23:59:35Z |
CVE-2023-4911 | Green-Avocado/CVE-2023-4911 | https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt | 2023-10-04T11:58:58Z |
CVE-2023-4911 | leesh3288/CVE-2023-4911 | PoC for CVE-2023-4911 | 2023-10-04T14:12:16Z |
CVE-2023-4911 | RickdeJager/CVE-2023-4911 | CVE-2023-4911 proof of concept | 2023-10-04T14:32:49Z |
CVE-2023-4911 | xiaoQ1z/CVE-2023-4911 | no description | 2023-10-08T03:26:24Z |
CVE-2023-4911 | silent6trinity/looney-tuneables | CVE-2023-4911 | 2023-10-10T13:29:11Z |
CVE-2023-4911 | ruycr4ft/CVE-2023-4911 | CVE-2023-4911 | 2023-10-11T14:49:22Z |
CVE-2023-4911 | guffre/CVE-2023-4911 | PoC for CVE-2023-4911 LooneyTuneables | 2023-10-14T02:24:52Z |
CVE-2023-4911 | hadrian3689/looney-tunables-CVE-2023-4911 | no description | 2023-10-10T22:04:23Z |
CVE-2023-4911 | KernelKrise/CVE-2023-4911 | Looney Tunables Local privilege escalation (CVE-2023-4911) workshop | 2023-10-25T11:59:34Z |
CVE-2023-4911 | Diego-AltF4/CVE-2023-4911 | Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit | 2023-10-28T20:05:30Z |
CVE-2023-4911 | puckiestyle/CVE-2023-4911 | no description | 2023-12-23T11:54:40Z |
CVE-2023-4911 | yanfernandess/Looney-Tunables-CVE-2023-4911 | no description | 2024-01-19T18:20:05Z |
CVE-2023-4911 | NishanthAnand21/CVE-2023-4911-PoC | Repository containing a Proof of Concept (PoC) demonstrating the impact of CVE-2023-4911, a vulnerability in glibc's ld.so dynamic loader, exposing risks related to Looney Tunables. | 2024-01-20T18:47:07Z |
CVE-2023-49105 | ambionics/owncloud-exploits | ownCloud exploits for CVE-2023-49105 | 2023-12-05T11:35:12Z |
CVE-2023-49103 | creacitysec/CVE-2023-49103 | PoC for the CVE-2023-49103 | 2023-11-22T17:00:23Z |
CVE-2023-49103 | TLWebdesign/Joomla-3.10.12-languagehelper-hotfix | Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12 | 2023-11-29T19:46:15Z |
CVE-2023-49103 | ditekshen/ansible-cve-2023-49103 | Ansible Playbook for CVE-2023-49103 | 2023-11-29T18:46:54Z |
CVE-2023-49103 | MixColumns/CVE-2023-49103 | CVE-2023-49103 scanner for shodan.io downloaded json files | 2023-12-02T11:03:19Z |
CVE-2023-49103 | CUCUMBERanOrSNCompany/SealSecurityAssignment | Researching on the vulnrability CVE-2023-26136 | 2023-12-04T13:01:29Z |
CVE-2023-49103 | Romanc9/Gui-poc-test | A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432 | 2023-12-03T13:45:34Z |
CVE-2023-49103 | merlin-ke/OwnCloud-CVE-2023-49103 | OwnCloud CVE-2023-49103 | 2023-12-19T07:56:18Z |
CVE-2023-49070 | abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC | no description | 2023-12-14T09:32:41Z |
CVE-2023-49070 | 0xrobiul/CVE-2023-49070 | Exploit Of Pre-auth RCE in Apache Ofbiz!! | 2023-12-17T22:56:10Z |
CVE-2023-49052 | Cyber-Wo0dy/CVE-2023-49052 | Microweber version 2.0.4 vulnerable to "Uploading Malicious Files" | 2023-11-27T14:29:32Z |
CVE-2023-49038 | christopher-pace/CVE-2023-49038 | Command Injection in Ping Utility on Buffalo LS210D Version 1.78-0.03 | 2023-12-14T01:49:52Z |
CVE-2023-48984 | l00neyhacker/CVE-2023-48984 | no description | 2023-11-30T02:50:23Z |
CVE-2023-48983 | tristao-marinho/CVE-2023-48983 | POC CVE-2023-48983 | 2024-01-01T13:19:54Z |
CVE-2023-48982 | tristao-marinho/CVE-2023-48982 | POC CVE-2023-48982 | 2024-01-01T13:14:49Z |
CVE-2023-48981 | tristao-marinho/CVE-2023-48981 | POC CVE-2023-48981 | 2024-01-01T13:06:39Z |
CVE-2023-48974 | vinnie1717/CVE-2023-48974 | no description | 2023-12-28T23:24:22Z |
CVE-2023-48866 | nitipoom-jar/CVE-2023-48866 | no description | 2023-11-30T15:59:16Z |
CVE-2023-48858 | Shumerez/CVE-2023-48858 | PoC for CVE-2023-48858 | 2024-01-17T09:59:39Z |
CVE-2023-48858 | febinrev/atril_cbt-inject-exploit | CVE-2023-44452, CVE-2023-51698: CBT File Parsing Argument Injection that affected Popular Linux Distros | 2024-01-17T09:26:16Z |
CVE-2023-48858 | StanleyJobsonAU/GhostTown | Proof of Concept script to exploit CVE-2023-42793 (TeamCity) | 2024-01-15T13:25:49Z |
CVE-2023-48849 | delsploit/CVE-2023-48849 | no description | 2023-12-01T11:24:26Z |
CVE-2023-48842 | creacitysec/CVE-2023-48842 | no description | 2023-12-02T23:21:44Z |
CVE-2023-48788 | horizon3ai/CVE-2023-48788 | Fortinet FortiClient EMS SQL Injection | 2024-03-18T20:50:48Z |
CVE-2023-48777 | AkuCyberSec/Elementor-3.18.0-Upload-Path-Traversal-RCE-CVE-2023-48777 | no description | 2024-02-16T19:36:50Z |
CVE-2023-4863 | talbeerysec/BAD-WEBP-CVE-2023-4863 | BAD-WEBP-CVE-2023-4863 | 2023-09-25T22:10:32Z |
CVE-2023-4863 | bbaranoff/CVE-2023-4863 | no description | 2023-09-25T10:33:09Z |
CVE-2023-4863 | mistymntncop/CVE-2023-4863 | no description | 2023-09-21T05:22:51Z |
CVE-2023-4863 | caoweiquan322/NotEnough | This tool calculates tricky canonical huffman histogram for CVE-2023-4863. | 2023-12-19T01:32:45Z |
CVE-2023-4863 | LiveOverflow/webp-CVE-2023-4863 | no description | 2023-12-18T23:12:25Z |
CVE-2023-4863 | CrackerCat/CVE-2023-4863- | Triggering the famous libweb 0day vuln with libfuzzer | 2024-02-04T01:33:53Z |
CVE-2023-4863 | alsaeroth/CVE-2023-4863-POC | C implementation of libwebp 0-click vulnerability | 2024-02-07T06:58:16Z |
CVE-2023-48200 | nitipoom-jar/CVE-2023-48200 | no description | 2023-11-14T17:02:07Z |
CVE-2023-48199 | nitipoom-jar/CVE-2023-48199 | no description | 2023-11-14T16:50:31Z |
CVE-2023-48198 | nitipoom-jar/CVE-2023-48198 | no description | 2023-11-14T16:40:03Z |
CVE-2023-48197 | nitipoom-jar/CVE-2023-48197 | no description | 2023-11-14T16:34:21Z |
CVE-2023-48123 | NHPT/CVE-2023-48123 | CVE-2023-54436 Exp | 2023-11-17T02:56:26Z |
CVE-2023-48104 | E1tex/CVE-2023-48104 | HTML Injection in Alinto/SOGo Web Client | 2024-01-10T15:49:48Z |
CVE-2023-48084 | Hamibubu/CVE-2023-48084 | Python program to dump all the databases, exploiting NagiosXI sqli vulnerability | 2024-03-01T04:06:15Z |
CVE-2023-48084 | bucketcat/CVE-2023-48084 | Fixes broken syntax in the POC, automates the API_Token retrieval, stores the token as a variable and pipes into the fixed POC. | 2024-03-23T00:31:37Z |
CVE-2023-48034 | aprkr/CVE-2023-48034 | Weak encryption in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject wireless arbitrary keystrokes. | 2023-11-20T16:04:24Z |
CVE-2023-48031 | nitipoom-jar/CVE-2023-48031 | no description | 2023-11-16T17:57:20Z |
CVE-2023-48029 | nitipoom-jar/CVE-2023-48029 | no description | 2023-11-16T18:42:12Z |
CVE-2023-48028 | nitipoom-jar/CVE-2023-48028 | no description | 2023-11-16T19:22:30Z |
CVE-2023-48022 | 0x656565/CVE-2023-48022 | CVE-2023-48022 exploit modified from Bishop Fox work | 2024-01-10T06:26:01Z |
CVE-2023-48022 | jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022 | ShadowRay RCE POC (CVE-2023-48022) | 2024-03-29T09:54:31Z |
CVE-2023-4800 | b0marek/CVE-2023-4800 | Repository for CVE-2023-4800 vulnerability. | 2023-09-24T12:11:58Z |
CVE-2023-47840 | RandomRobbieBF/CVE-2023-47840 | Qode Essential Addons <= 1.5.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | 2023-11-29T20:14:39Z |
CVE-2023-47668 | RandomRobbieBF/CVE-2023-47668 | Restrict Content <= 3.2.7 - Information Exposure via legacy log file | 2023-11-14T08:40:49Z |
CVE-2023-4762 | buptsb/CVE-2023-4762 | no description | 2023-09-27T09:43:20Z |
CVE-2023-4762 | sherlocksecurity/CVE-2023-4762-Code-Review | no description | 2023-09-27T14:29:43Z |
CVE-2023-47564 | C411e/CVE-2023-47564 | CVE-2023-47564 | 2024-02-04T13:25:58Z |
CVE-2023-47529 | RandomRobbieBF/CVE-2023-47529 | Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File | 2023-11-13T10:50:25Z |
CVE-2023-47489 | nitipoom-jar/CVE-2023-47489 | no description | 2023-11-15T16:07:02Z |
CVE-2023-47488 | nitipoom-jar/CVE-2023-47488 | no description | 2023-11-15T16:32:01Z |
CVE-2023-47464 | HadessCS/CVE-2023-47464 | CVE-2023-47464 POC | 2024-02-14T15:39:34Z |
CVE-2023-47460 | aleksey-vi/CVE-2023-47460 | no description | 2023-11-10T15:38:01Z |
CVE-2023-47460 | AIex-3/confluence-hack | CVE-2023-22515 | 2023-10-30T00:17:45Z |
CVE-2023-47459 | aleksey-vi/CVE-2023-47459 | no description | 2023-11-10T15:20:48Z |
CVE-2023-47437 | herombey/CVE-2023-47437 | Vulnerability Disclosure | 2023-11-15T18:55:03Z |
CVE-2023-4741 | wudidike/CVE-2023-4741 | no description | 2023-08-22T06:00:57Z |
CVE-2023-47400 | LucasVanHaaren/CVE-2023-47400 | Proof of Concept for the CVE-2023-47400 | 2024-01-26T09:35:47Z |
CVE-2023-47246 | tucommenceapousser/CVE-2023-47246 | no description | 2023-11-22T08:18:11Z |
CVE-2023-47246 | rainbowhatrkn/CVE-2023-47246 | exploit for cve-2023-47246 SysAid RCE (shell upload) | 2023-11-22T08:13:51Z |
CVE-2023-47246 | rothilion26/cve2023-data | no description | 2023-11-21T18:16:34Z |
CVE-2023-47246 | W01fh4cker/CVE-2023-47246-EXP | exploit for cve-2023-47246 SysAid RCE (shell upload) | 2023-11-17T07:03:06Z |
CVE-2023-47218 | passwa11/CVE-2023-47218 | CVE-2023-47218: QNAP QTS and QuTS Hero Unauthenticated Command Injection (FIXED) | 2024-02-19T02:15:21Z |
CVE-2023-47184 | cont1nuum/CVE-2023-47184 | Exploit Title: WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - "Dashboard Redirect" field Stored Cross-Site Scripting (XSS) | 2023-11-01T19:19:36Z |
CVE-2023-47179 | RandomRobbieBF/CVE-2023-47179 | WooODT Lite <= 2.4.6 - Missing Authorization to Arbitrary Options Update (Subscriber+) | 2023-11-03T09:39:30Z |
CVE-2023-47129 | Cyber-Wo0dy/CVE-2023-47129 | Statamic CMS versions <4.33.0 vulnerable to "Remote Code Execution" | 2023-11-13T12:21:52Z |
CVE-2023-47119 | BaadMaro/CVE-2023-47119 | A POC for CVE-2023-47119 | 2023-11-12T23:34:07Z |
CVE-2023-47119 | Cristiano100/CVE-2023-47119 | no description | 2023-12-20T04:43:15Z |
CVE-2023-47102 | quantiano/cve-2023-47102 | no description | 2023-10-31T04:03:02Z |
CVE-2023-47102 | nitipoom-jar/CVE-2023-47102 | no description | 2023-11-18T10:52:40Z |
CVE-2023-47014 | emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS | no description | 2023-11-14T08:08:08Z |
CVE-2023-46998 | soy-oreocato/CVE-2023-46998 | no description | 2023-11-01T19:36:38Z |
CVE-2023-46980 | sajaljat/CVE-2023-46980 | no description | 2023-11-02T16:05:23Z |
CVE-2023-4698 | mnqazi/CVE-2023-4698 | no description | 2023-09-01T09:24:08Z |
CVE-2023-46974 | yte121/CVE-2023-46974 | POC | 2023-11-02T16:08:19Z |
CVE-2023-4696 | mnqazi/CVE-2023-4696 | https://medium.com/@mnqazi/cve-2023-4696-account-takeover-due-to-improper-handling-of-jwt-tokens-in-memos-v0-13-2-13104e1412f3 | 2023-09-01T09:02:03Z |
CVE-2023-46954 | jakedmurphy1/CVE-2023-46954 | no description | 2023-11-02T13:09:52Z |
CVE-2023-46948 | AzraelsBlade/CVE-2023-46948 | no description | 2023-10-25T13:50:41Z |
CVE-2023-46865 | asylumdx/Crater-CVE-2023-46865-RCE | Crater <=6.0.6, CVE-2023-46865 Post-Auth RCE (Superadmin) | 2023-11-09T21:22:47Z |
CVE-2023-4683 | Songg45/CVE-2023-4683-Test | CVE-2023-4683 - Test | 2023-09-28T20:49:33Z |
CVE-2023-46813 | Freax13/cve-2023-46813-poc | no description | 2023-05-29T15:10:43Z |
CVE-2023-46805 | cbeek-r7/CVE-2023-46805 | Simple scanner for scanning a list of ip-addresses for vulnerable Ivanti Pulse Secure devices | 2024-01-16T08:05:58Z |
CVE-2023-46805 | Chocapikk/CVE-2023-46805 | Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research | 2024-01-19T02:23:13Z |
CVE-2023-46805 | yoryio/CVE-2023-46805 | Scanner for CVE-2023-46805 - Ivanti Connect Secure | 2024-01-14T18:30:11Z |
CVE-2023-46805 | w2xim3/CVE-2023-46805 | CVE-2023-46805 Ivanti POC RCE - Ultra fast scanner. | 2024-01-25T14:53:16Z |
CVE-2023-46747 | AliBrTab/CVE-2023-46747-POC | F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability! | 2023-10-30T15:50:46Z |
CVE-2023-46747 | bijaysenihang/CVE-2023-46747-Mass-RCE | CVE-2023-46747 (F5 BIG-IP) RCE | 2023-11-01T07:05:18Z |
CVE-2023-46747 | 0xInfection/EPScalate | Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497). | 2023-04-09T05:26:40Z |
CVE-2023-46747 | y4v4z/CVE-2023-46747-POC | no description | 2023-11-01T16:28:28Z |
CVE-2023-46747 | fu2x2000/CVE-2023-46747 | CVE-2023-46747 Criticle Auth Bypass | 2023-11-01T13:16:13Z |
CVE-2023-46747 | nvansluis/test_cve-2023-46747 | no description | 2023-11-02T16:03:35Z |
CVE-2023-46747 | trganda/ActiveMQ-RCE | CVE-2023-46604 | 2023-10-26T03:25:05Z |
CVE-2023-46747 | sanjai-AK47/CVE-2023-46747 | An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producs | 2023-11-03T13:31:11Z |
CVE-2023-46747 | JaneMandy/ActiveMQ_RCE_Pro_Max | CVE-2023-46604 | 2023-10-27T12:22:43Z |
CVE-2023-46747 | maniak-academy/Mitigate-CVE-2023-46747 | no description | 2023-11-01T14:57:20Z |
CVE-2023-46747 | W01fh4cker/CVE-2023-46747-RCE | exploit for f5-big-ip RCE cve-2023-46747 | 2023-11-01T09:31:05Z |
CVE-2023-46747 | vidura2/cve-2023-46747 | no description | 2024-02-11T14:38:37Z |
CVE-2023-46747 | rainbowhatrkn/CVE-2023-46747-RCE | exploit for f5-big-ip RCE cve-2023-46747 | 2024-03-15T22:45:31Z |
CVE-2023-46694 | invisiblebyte/CVE-2023-46694 | CVE-2023-46694 proof-of-concept | 2024-03-01T11:00:19Z |
CVE-2023-46615 | RandomRobbieBF/CVE-2023-46615 | KD Coming Soon <= 1.7 - Unauthenticated PHP Object Injection via cetitle | 2023-11-30T14:46:21Z |
CVE-2023-46604 | SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ | Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) | 2023-11-03T22:06:09Z |
CVE-2023-46604 | evkl1d/CVE-2023-46604 | no description | 2023-11-04T11:58:21Z |
CVE-2023-46604 | justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp | CVE-2023-46604 Apache ActiveMQ RCE exp 基于python | 2023-11-08T07:48:00Z |
CVE-2023-46604 | jhonnybonny/Bitrix24DoS | This Python script is designed to exploit a security vulnerability in Bitrix24, leading to a Denial of Service (DoS) attack. The vulnerability, identified as CVE-2023-1718, allows an attacker to disrupt the normal operation of a Bitrix24 instance. | 2023-11-08T07:45:54Z |
CVE-2023-46604 | h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up | no description | 2023-11-09T11:27:20Z |
CVE-2023-46604 | duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell | This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol. | 2023-11-12T11:26:46Z |
CVE-2023-46604 | sule01u/CVE-2023-46604 | CVE-2023-46604 ActiveMQ RCE vulnerability verification/exploitation tool | 2023-11-06T04:05:51Z |
CVE-2023-46604 | LuizGustavoP/EP3_Redes | Implementações de servidores HTML em GO para análise da vulnerabilidade CVE-2023-29406. | 2023-11-11T16:28:22Z |
CVE-2023-46604 | k4but0/Ubuntu-LPE | One-Liner CVE-2023-32629/CVE-2023-2640 Ubuntu Privilege Escalation | 2023-11-11T14:33:38Z |
CVE-2023-46604 | LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence | CVE-2023-46604环境复现包 | 2023-11-16T02:36:07Z |
CVE-2023-46604 | nitzanoligo/CVE-2023-46604-demo | no description | 2023-11-20T11:57:24Z |
CVE-2023-46604 | minhangxiaohui/ActiveMQ_CVE-2023-46604 | PY | 2023-11-20T02:24:47Z |
CVE-2023-46604 | NKeshawarz/CVE-2023-46604-RCE | no description | 2023-11-18T12:51:03Z |
CVE-2023-46604 | vjayant93/CVE-2023-46604-POC | POC repo for CVE-2023-46604 | 2023-11-15T19:11:01Z |
CVE-2023-46604 | tomasmussi-mulesoft/activemq-cve-2023-46604 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | 2023-11-29T18:30:02Z |
CVE-2023-46604 | mrpentst/CVE-2023-46604 | Exploit for CVE-2023-46604 | 2023-12-09T19:19:03Z |
CVE-2023-46604 | dcm2406/CVE-2023-46604 | no description | 2023-12-16T13:50:58Z |
CVE-2023-46604 | hh-hunter/cve-2023-46604 | no description | 2024-01-09T03:18:19Z |
CVE-2023-46604 | ST3G4N05/ExploitScript-CVE-2023-46604 | no description | 2024-02-14T18:39:49Z |
CVE-2023-46604 | Arlenhiack/ActiveMQ-RCE-Exploit | ActiveMQ RCE (CVE-2023-46604) 回显利用工具 | 2024-03-05T07:09:21Z |
CVE-2023-46501 | Cyber-Wo0dy/CVE-2023-46501 | BoltWire v6.03 vulnerable to "Improper Access Control" | 2023-10-31T12:40:14Z |
CVE-2023-46480 | shahzaibak96/CVE-2023-46480 | OwnCast SSRF | 2023-10-28T09:36:31Z |
CVE-2023-46478 | mr-xmen786/CVE-2023-46478 | no description | 2023-10-30T11:28:43Z |
CVE-2023-46474 | Xn2/CVE-2023-46474 | PoC for CVE-2023-46474. | 2023-12-06T13:05:22Z |
CVE-2023-46474 | Xn2/CVE-2023-46474 | Technical details for CVE-2023-46474 | 2024-01-11T08:35:18Z |
CVE-2023-46456 | cyberaz0r/GL.iNet-Multiple-Vulnerabilities | Exploits for GL.iNet CVE-2023-46454, CVE-2023-46455 and CVE-2023-46456 | 2023-12-08T01:45:16Z |
CVE-2023-46451 | sajaljat/CVE-2023-46451 | no description | 2023-10-26T12:34:03Z |
CVE-2023-46450 | yte121/-CVE-2023-46450 | CVE-2023-46450 reference | 2023-10-26T12:30:21Z |
CVE-2023-46449 | sajaljat/CVE-2023-46449 | no description | 2023-10-26T12:03:29Z |
CVE-2023-46404 | windecks/CVE-2023-46404 | PoC and Writeup for CVE-2023-46404. | 2023-10-26T15:01:32Z |
CVE-2023-4636 | ThatNotEasy/CVE-2023-4636 | Unauthenticated Remote Code Execution with default Imagick | 2023-12-13T17:59:02Z |
CVE-2023-46344 | vinnie1717/CVE-2023-46344 | no description | 2023-12-28T23:29:53Z |
CVE-2023-46344 | r1yaz/winDED | Exploit Development using python for CVE-2023-38831 (POC) | 2023-12-26T01:36:32Z |
CVE-2023-4634 | Patrowl/CVE-2023-4634 | CVE-2023-4634 | 2023-09-05T07:44:15Z |
CVE-2023-4634 | actuator/wave.ai.browser | CVE-2023-42471 | 2023-08-28T05:34:04Z |
CVE-2023-4634 | actuator/imou | CVE-2023-42470 | 2023-08-17T02:12:24Z |
CVE-2023-4631 | b0marek/CVE-2023-4631 | Repository for CVE-2023-4631 vulnerability. | 2023-09-24T08:38:58Z |
CVE-2023-46304 | jselliott/CVE-2023-46304 | Authenticated Remote Code Execution in in VTiger Open Source CRM v7.5 | 2024-04-03T17:57:23Z |
CVE-2023-4622 | nidhi7598/linux-4.19.72_net_CVE-2023-4622 | no description | 2023-11-21T11:53:18Z |
CVE-2023-46197 | RandomRobbieBF/CVE-2023-46197 | Popup by Supsystic <= 1.10.19 - Missing Authorization to Sensitive Information Exposure | 2023-10-23T12:38:37Z |
CVE-2023-46022 | ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability | no description | 2023-11-11T10:54:25Z |
CVE-2023-46021 | ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability | no description | 2023-11-11T09:14:56Z |
CVE-2023-46020 | ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability | no description | 2023-11-11T08:37:57Z |
CVE-2023-46019 | ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability | no description | 2023-11-11T08:23:30Z |
CVE-2023-46018 | ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability | no description | 2023-11-11T07:37:57Z |
CVE-2023-46017 | ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability | no description | 2023-11-10T20:46:29Z |
CVE-2023-46016 | ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability | no description | 2023-11-10T20:24:40Z |
CVE-2023-46015 | ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability | no description | 2023-11-10T19:40:49Z |
CVE-2023-46014 | ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability | no description | 2023-11-10T17:40:37Z |
CVE-2023-46003 | leekenghwa/CVE-2023-46003 | no description | 2023-10-19T08:17:53Z |
CVE-2023-45992 | harry935/CVE-2023-45992 | no description | 2023-10-19T15:26:59Z |
CVE-2023-45966 | jet-pentest/CVE-2023-45966 | Blind SSRF in umputun/remark42 <= 1.12.1 | 2023-10-18T18:18:25Z |
CVE-2023-4596 | E1A/CVE-2023-4596 | PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads. | 2023-08-30T22:40:10Z |
CVE-2023-45866 | jjjjjjjj987/cve-2023-45866-py | no description | 2024-01-23T21:39:41Z |
CVE-2023-45857 | valentin-panov/CVE-2023-45857 | no description | 2023-10-18T12:19:34Z |
CVE-2023-45857 | intercept6/CVE-2023-45857-Demo | CVE-2023-45857の挙動を確認するデモ | 2023-10-26T04:18:03Z |
CVE-2023-45857 | fuyuooumi1027/CVE-2023-45857-Demo | no description | 2023-11-24T22:42:56Z |
CVE-2023-45857 | terrorist/HTTP-2-Rapid-Reset-Client | A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487). | 2023-11-24T18:26:36Z |
CVE-2023-45828 | RandomRobbieBF/CVE-2023-45828 | RumbleTalk Live Group Chat <= 6.1.9 - Missing Authorization via handleRequest | 2023-10-17T08:41:54Z |
CVE-2023-45779 | metaredteam/rtx-cve-2023-45779 | Proof-of-concept code for the Android APEX key reuse vulnerability described in https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html | 2024-01-26T21:17:38Z |
CVE-2023-45657 | RandomRobbieBF/CVE-2023-45657 | Nexter <= 2.0.3 - Authenticated (Subscriber+) SQL Injection via 'to' and 'from' | 2023-10-20T12:01:15Z |
CVE-2023-45603 | codeb0ss/CVE-2023-45603-PoC | Mass Exploit - CVE-2023-45603 - Wordpress/plugin/user-submitted-posts < Unauthenticated Arbitrary File Upload/Exploit | 2023-10-15T01:57:25Z |
CVE-2023-45542 | ahrixia/CVE-2023-45542 | mooSocial v3.1.8 is vulnerable to cross-site scripting on search function. | 2023-09-26T12:59:31Z |
CVE-2023-45540 | soundarkutty/CVE-2023-45540 | CVE-2023-45540 Jorani Leave Management System v1.0.3 – HTML Injection | 2023-10-06T12:43:54Z |
CVE-2023-45503 | ally-petitt/CVE-2023-45503 | CVE-2023-45503 Reference | 2024-04-07T23:43:39Z |
CVE-2023-4549 | b0marek/CVE-2023-4549 | Repository for CVE-2023-4549 vulnerability. | 2023-09-24T11:57:46Z |
CVE-2023-45471 | itsAptx/CVE-2023-45471 | no description | 2023-10-14T15:20:37Z |
CVE-2023-45185 | afine-com/CVE-2023-45185 | IBM i Access Client Solutions < 1.1.9.4 - Remote code execution via insecure deserialisation | 2024-01-24T13:53:36Z |
CVE-2023-45184 | afine-com/CVE-2023-45184 | IBM i Access Client Solution < 1.1.9.4 - Local server broken access control. | 2023-12-15T14:04:32Z |
CVE-2023-45182 | afine-com/CVE-2023-45182 | IBM i Access Client Solutions < 1.1.9.4 - Weak password encryption | 2024-01-23T16:05:55Z |
CVE-2023-45158 | Evan-Zhangyf/CVE-2023-45158 | no description | 2023-11-04T21:14:09Z |
CVE-2023-44962 | ggb0n/CVE-2023-44962 | PoC for CVE-2023-44962 | 2023-10-05T07:43:07Z |
CVE-2023-44961 | ggb0n/CVE-2023-44961 | PoC for CVE-2023-44961 | 2023-10-05T07:27:45Z |
CVE-2023-44813 | ahrixia/CVE-2023-44813 | mooSocial v3.1.8 is vulnerable to cross-site scripting on Invite Friend function. | 2023-09-26T16:16:46Z |
CVE-2023-44812 | ahrixia/CVE-2023-44812 | mooSocial v3.1.8 is vulnerable to cross-site scripting on Admin redirect function. | 2023-09-26T15:47:50Z |
CVE-2023-44811 | ahrixia/CVE-2023-44811 | mooSocial v3.1.8 is vulnerable to Cross Site Request Forgery (CSRF) which allows attacker to change admin password. | 2023-09-26T15:25:42Z |
CVE-2023-44796 | Hebing123/CVE-2023-44796 | CVE-2023-44796 | 2023-11-17T06:50:16Z |
CVE-2023-44771 | sromanhu/CVE-2023-44771_ZenarioCMS--Stored-XSS---Page-Layout | Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Layout | 2023-09-28T23:02:00Z |
CVE-2023-44770 | sromanhu/CVE-2023-44770_ZenarioCMS--Reflected-XSS---Organizer-Alias | Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Spare alias from organizer. | 2023-09-28T23:18:07Z |
CVE-2023-44769 | sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias | Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Spare aliases from Alias. | 2023-09-28T23:08:12Z |
CVE-2023-44767 | sromanhu/CVE-2023-44767_RiteCMS-File-Upload--XSS---Filemanager | RiteCMS 3.0 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up | 2023-09-22T13:31:18Z |
CVE-2023-44766 | sromanhu/CVE-2023-44766_ConcreteCMS-Stored-XSS---SEO | Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Header Extra Content from Page Settings. | 2023-09-25T21:48:07Z |
CVE-2023-44765 | sromanhu/CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations | Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Plural Handle of the Data Objects from System & Settings | 2023-09-25T21:11:14Z |
CVE-2023-44764 | sromanhu/CVE-2023-44764_ConcreteCMS-Stored-XSS---Site_Installation | Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE from installation or Settings. | 2023-09-25T21:52:16Z |
CVE-2023-44763 | sromanhu/CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail | ConcreteCMS v.9.2.1 is affected by Arbitrary File Upload vulnerability that allows Cross-Site Scriting (XSS) Stored. | 2023-09-25T21:56:34Z |
CVE-2023-44762 | sromanhu/CVE-2023-44762_ConcreteCMS-Reflected-XSS---Tags | Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags | 2023-09-25T21:43:57Z |
CVE-2023-44761 | sromanhu/CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms | Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Form of the Data Objects. | 2023-09-25T21:21:10Z |
CVE-2023-44760 | sromanhu/CVE-2023-44760_ConcreteCMS-Stored-XSS---TrackingCodes | Multiple Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics | 2023-09-25T13:39:24Z |
CVE-2023-44758 | sromanhu/CVE-2023-44758_GDidees-CMS-Stored-XSS---Title | GDidees CMS 3.9.2 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title | 2023-09-25T13:07:05Z |
CVE-2023-4460 | daniloalbuqrque/poc-cve-xss-uploading-svg | CVE-2023-4460 | 2023-08-11T00:11:45Z |
CVE-2023-4460 | dnkhack/fixcve2023_39526_2023_39527 | Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527 | 2023-08-10T16:51:56Z |
CVE-2023-4450 | ilikeoyt/CVE-2023-4450-Attack | no description | 2024-02-07T03:51:34Z |
CVE-2023-44487 | ByteHackr/CVE-2023-44487 | Test Script for CVE-2023-44487 | 2023-10-12T03:14:34Z |
CVE-2023-44487 | imabee101/CVE-2023-44487 | Proof of concept for DoS exploit | 2023-10-11T01:59:47Z |
CVE-2023-44487 | bcdannyboy/CVE-2023-44487 | Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487 | 2023-10-10T14:20:42Z |
CVE-2023-44487 | studiogangster/CVE-2023-44487 | A python based exploit to test out rapid reset attack (CVE-2023-44487) | 2023-10-16T11:07:50Z |
CVE-2023-44487 | ReToCode/golang-CVE-2023-44487 | no description | 2023-10-25T09:11:46Z |
CVE-2023-44487 | sigridou/CVE-2023-44487 | HTTP/2 RAPID RESET | 2023-11-04T22:34:23Z |
CVE-2023-44487 | nxenon/cve-2023-44487 | Examples for Implementing cve-2023-44487 ( HTTP/2 Rapid Reset Attack ) Concept | 2023-11-10T08:38:51Z |
CVE-2023-44487 | sigridou/CVE-2023-44487- | no description | 2023-12-11T23:12:03Z |
CVE-2023-44487 | spotlightishere/inputcontrol | proof-of-concept for CVE-2023-28197 | 2023-12-11T20:55:21Z |
CVE-2023-44353 | JC175/CVE-2023-44353-Nuclei-Template | no description | 2023-11-23T20:15:00Z |
CVE-2023-4427 | tianstcht/CVE-2023-4427 | no description | 2024-02-06T02:29:06Z |
CVE-2023-44227 | codeb0ss/CVE-2023-44227-PoC | no description | 2023-10-19T01:33:08Z |
CVE-2023-4415 | thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415 | Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415 | 2023-10-16T05:08:06Z |
CVE-2023-44061 | soundarkutty/CVE-2023-44061 | CVE-2023-44061 - Simple and Nice Shopping Cart Script V1.0 | 2023-09-23T06:45:32Z |
CVE-2023-44061 | soundarkutty/Stored-xss | Got My CVE Published CVE-2023-41575 | 2023-08-26T09:26:35Z |
CVE-2023-43879 | sromanhu/CVE-2023-43879-RiteCMS-Stored-XSS---GlobalContent | About RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Global Content Blocks in the Administration Menu | 2023-09-22T13:14:02Z |
CVE-2023-43878 | sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu | RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Main Menu - Items in the Administration Menu | 2023-09-22T13:07:44Z |
CVE-2023-43877 | sromanhu/CVE-2023-43877-RiteCMS-Stored-XSS---Home | RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Home settings page in the Administration Menu | 2023-09-22T12:47:49Z |
CVE-2023-43876 | sromanhu/CVE-2023-43876-October-CMS-Reflected-XSS---Installation | October CMS 3.4.16 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process. | 2023-09-19T23:05:11Z |
CVE-2023-43875 | sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation | Subrion CMS 4.2.1 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process. | 2023-09-19T22:58:33Z |
CVE-2023-43874 | sromanhu/CVE-2023-43874-e107-CMS-Stored-XSS---MetaCustomTags | e107 2.3.2 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Copyright and Author field in the Meta & Custom Tags Menu. | 2023-09-19T10:23:08Z |
CVE-2023-43873 | sromanhu/CVE-2023-43873-e107-CMS-Stored-XSS---Manage | e107 2.3.2 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Name field in the Manage Menu. | 2023-09-19T10:10:13Z |
CVE-2023-43872 | sromanhu/CVE-2023-43872-CMSmadesimple-Arbitrary-File-Upload--XSS---File-Manager | CMSmadesimple 2.2.18 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up | 2023-09-19T09:54:42Z |
CVE-2023-43871 | sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media | WBCE 1.6.1 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up | 2023-09-19T10:02:34Z |
CVE-2023-43838 | rootd4ddy/CVE-2023-43838 | Public disclosure for CVE-2023-31584. | 2023-10-02T15:27:07Z |
CVE-2023-43804 | JawadPy/CVE-2023-43804-Exploit | Example of how CVE-2023-43804 works with real python code. | 2023-10-13T06:15:45Z |
CVE-2023-43786 | jfrog/jfrog-CVE-2023-43786-libX11_DoS | no description | 2024-01-16T20:04:05Z |
CVE-2023-43786 | actuator/com.altamirano.fabricio.tvbrowser | CVE-2023-47883 | 2023-09-17T21:01:22Z |
CVE-2023-43770 | knight0x07/CVE-2023-43770-PoC | PoC for Stored XSS (CVE-2023-43770) Vulnerability | 2023-09-28T13:43:25Z |
CVE-2023-43770 | s3cb0y/CVE-2023-43770-POC | A Proof-Of-Concept for the CVE-2023-43770 vulnerability. | 2023-09-27T17:08:23Z |
CVE-2023-43757 | sharmashreejaa/CVE-2023-43757 | no description | 2024-02-28T08:58:31Z |
CVE-2023-43654 | OligoCyberSecurity/ShellTorchChecker | A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654 | 2023-10-02T11:33:37Z |
CVE-2023-4357 | xcanwin/CVE-2023-4357-Chrome-XXE | 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors. | 2023-11-17T10:32:31Z |
CVE-2023-4357 | passwa11/CVE-2023-4357-APT-Style-exploitation | no description | 2023-11-21T05:39:15Z |
CVE-2023-4357 | OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation | Apt style exploitation of Chrome 0day CVE-2023-4357 | 2023-11-19T22:20:10Z |
CVE-2023-4357 | sunu11/chrome-CVE-2023-4357 | poc | 2023-11-29T09:52:36Z |
CVE-2023-4357 | WinnieZy/CVE-2023-4357 | no description | 2024-01-09T07:31:29Z |
CVE-2023-4350 | 0nyx-hkr/cve-2023-4350 | creating an hack for that cve as a research and attack | 2023-09-11T14:09:48Z |
CVE-2023-43482 | Mr-xn/CVE-2023-43482 | TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability | 2024-03-31T02:04:34Z |
CVE-2023-43360 | sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory in the File Picker Menu. | 2023-09-17T12:06:56Z |
CVE-2023-43359 | sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to Page Specific Metadata and Smarty data in the Content Manager Menu. | 2023-09-17T11:58:54Z |
CVE-2023-43358 | sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title in the Content - News Menu. | 2023-09-17T12:17:49Z |
CVE-2023-43357 | sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title in the My Preferences - Manage Shortcuts | 2023-09-17T12:25:24Z |
CVE-2023-43356 | sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata in the Settings- Global Settings Menu. | 2023-09-17T11:50:00Z |
CVE-2023-43355 | sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again in the My Preferences - Add user | 2023-09-17T12:28:23Z |
CVE-2023-43355 | yinsel/CVE-H3C-Report | CVE-2023-5142 | 2023-09-07T15:10:28Z |
CVE-2023-43354 | sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profile in the MicroTIny Menu. | 2023-09-17T12:10:54Z |
CVE-2023-43353 | sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra | Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Extrain the Content - News Menu. | 2023-09-17T12:21:12Z |
CVE-2023-43352 | sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content | SSTI vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to use native template syntax to inject a malicious payload into a template, which is then executed server-side | 2023-09-17T12:35:39Z |
CVE-2023-43346 | sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend | Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Backend- Dashboard in the Languages Menu. | 2023-09-18T07:55:10Z |
CVE-2023-43345 | sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content | Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Content- Name in the Pages Menu. | 2023-09-18T07:41:33Z |
CVE-2023-43344 | sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description | Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the SEO- Meta description in the Pages Menu. | 2023-09-18T07:46:02Z |
CVE-2023-43343 | sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files | Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Files - Description in the Pages Menu. | 2023-09-18T07:16:18Z |
CVE-2023-43342 | sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend | Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Frontend- Pages in the Languages Menu. | 2023-09-18T07:51:26Z |
CVE-2023-43341 | sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection- | Evolution CMS 3.2.3 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation/connection process. | 2023-09-18T06:39:38Z |
CVE-2023-43340 | sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options | Evolution CMS 3.2.3 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation/options process. | 2023-09-18T06:58:39Z |
CVE-2023-43339 | sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation | CMSmadesimple 2.2.18 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process. | 2023-09-16T13:35:49Z |
CVE-2023-43326 | ahrixia/CVE-2023-43326 | mooSocial v3.1.8 is vulnerable to cross-site scripting on Multiple URLs. | 2023-09-19T03:38:25Z |
CVE-2023-43325 | ahrixia/CVE-2023-43325 | mooSocial v3.1.8 is vulnerable to cross-site scripting on user login function. | 2023-09-16T01:05:16Z |
CVE-2023-43323 | ahrixia/CVE-2023-43323 | mooSocial v3.1.8 is vulnerable to external service interaction on post function. | 2023-09-16T01:28:58Z |
CVE-2023-43318 | str2ver/CVE-2023-43318 | JetStream Smart Switch - TL-SG2210P v5.0/ Improper Access Control / CVE-2023-43318 | 2024-03-01T11:35:47Z |
CVE-2023-43317 | amjadali-110/CVE-2023-43317 | Vertical Privilege Escalation via Session Storage by Amjad Ali (CVE-2023-43317) | 2024-01-23T07:27:30Z |
CVE-2023-43292 | ASR511-OO7/CVE-2023-43292 | no description | 2024-02-20T08:20:18Z |
CVE-2023-43284 | MateusTesser/CVE-2023-43284 | DLink DIR-846 Authenticated Remote Code Execution | 2023-10-04T13:07:37Z |
CVE-2023-43263 | b0marek/CVE-2023-43263 | Repository for CVE-2023-43263 vulnerability. | 2023-09-26T08:24:16Z |
CVE-2023-43261 | win3zz/CVE-2023-43261 | CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption | 2023-09-28T08:45:55Z |
CVE-2023-43261 | nomis/eero-zero-length-ipv6-options-header-dos | eeroOS Ethernet Interface Denial of Service Vulnerability (CVE-2023-5324) | 2023-09-30T20:32:51Z |
CVE-2023-43208 | K3ysTr0K3R/CVE-2023-43208-EXPLOIT | A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE) | 2024-03-15T12:03:51Z |
CVE-2023-43208 | jakabakos/CVE-2023-43208-mirth-connect-rce-poc | no description | 2024-03-17T08:44:14Z |
CVE-2023-43177 | the-emmons/CVE-2023-43177 | CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis | 2023-12-27T00:06:20Z |
CVE-2023-43154 | ally-petitt/CVE-2023-43154-PoC | PoC for the type confusion vulnerability in Mac's CMS that results in authentication bypass and administrator account takeover. | 2023-09-09T00:21:58Z |
CVE-2023-43149 | MinoTauro2020/CVE-2023-43149 | CVE-2023-43149 | 2023-10-12T16:11:39Z |
CVE-2023-43148 | MinoTauro2020/CVE-2023-43148 | CVE CSRF DELETE ACCOUNT | 2023-09-16T11:48:44Z |
CVE-2023-43147 | MinoTauro2020/CVE-2023-43147 | CVE-2023-43148 | 2023-10-11T18:55:40Z |
CVE-2023-43144 | Pegasus0xx/CVE-2023-43144 | Assets Management System 1.0 is vulnerable to SQL injection via the id parameter in delete.php | 2023-10-13T18:19:22Z |
CVE-2023-43115 | jostaub/ghostscript-CVE-2023-43115 | A small write-up with examples to understand CVE-2023-43115 | 2023-09-28T17:30:06Z |
CVE-2023-43115 | skulkarni-mv/goIssue_kirkstone | go CVE-2023-24538 patch issue resolver - Kirkstone | 2023-09-29T17:18:42Z |
CVE-2023-4294 | b0marek/CVE-2023-4294 | Repository for CVE-2023-4294 vulnerability. | 2023-09-24T10:16:03Z |
CVE-2023-42931 | d0rb/CVE-2023-42931 | The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma. | 2024-03-26T11:01:54Z |
CVE-2023-42820 | wh-gov/CVE-2023-42820 | CVE-2023-42820 | 2023-09-27T08:06:28Z |
CVE-2023-42820 | Startr4ck/cve-2023-42820 | JumpServer | 2023-10-11T03:15:30Z |
CVE-2023-42820 | C1ph3rX13/CVE-2023-42820 | CVE-2023-42820 | 2023-10-10T06:32:51Z |
CVE-2023-42819 | C1ph3rX13/CVE-2023-42819 | CVE-2023-42819 | 2023-10-12T08:45:46Z |
CVE-2023-4281 | b0marek/CVE-2023-4281 | Repository for CVE-2023-4281 vulnerability. | 2023-09-24T12:21:19Z |
CVE-2023-42793 | H454NSec/CVE-2023-42793 | CVE-2023-42793 | 2023-09-29T06:43:35Z |
CVE-2023-42793 | OITApps/Find-VulnerableElectronVersion | Scans an executable and determines if it was wrapped in an Electron version vulnerable to the Chromium vulnerability CVE-2023-4863/ CVE-2023-5129 | 2023-09-29T00:42:37Z |
CVE-2023-42793 | WhiteOwl-Pub/PoC-JetBrains-TeamCity-CVE-2023-42793 | TeamCity JetBrains PoC (CVE-2023-42793) | 2023-10-07T10:23:12Z |
CVE-2023-42793 | Zenmovie/CVE-2023-42793 | PoC of CVE-2023-42793 | 2023-10-05T18:12:25Z |
CVE-2023-42793 | johnossawy/CVE-2023-42793_POC | no description | 2024-01-07T22:29:18Z |
CVE-2023-4279 | b0marek/CVE-2023-4279 | Repository for CVE-2023-4279 vulnerability. | 2023-09-24T08:26:37Z |
CVE-2023-42789 | jhonnybonny/CVE-2023-42789 | Check CVE-2023-42789 | 2024-03-28T08:59:12Z |
CVE-2023-4278 | revan-ar/CVE-2023-4278 | Wordpress Plugin Masterstudy LMS <= 3.0.17 - Unauthenticated Instructor Account Creation | 2023-09-04T14:16:32Z |
CVE-2023-42468 | actuator/com.cutestudio.colordialer | CVE-2023-42468 | 2023-09-02T14:48:07Z |
CVE-2023-42442 | HolyGu/CVE-2023-42442 | no description | 2023-09-27T05:09:20Z |
CVE-2023-42442 | C1ph3rX13/CVE-2023-42442 | CVE-2023-42442 | 2023-10-20T08:33:17Z |
CVE-2023-42426 | b0marek/CVE-2023-42426 | Repository for CVE-2023-42426 vulnerability. | 2023-09-24T07:34:05Z |
CVE-2023-42413 | chenghao-hao/cve-2023-42413 | ecology_9_sql | 2023-09-24T06:17:33Z |
CVE-2023-4238 | codeb0ss/CVE-2023-4238-PoC | Mass Exploit - CVE-2023-4238 / Wordpress Prevent files/Access Plugin Upload_Webshell.php | 2023-09-11T23:53:11Z |
CVE-2023-4238 | actuator/com.full.dialer.top.secure.encrypted | CVE-2023-42469 | 2023-09-02T17:11:58Z |
CVE-2023-42362 | Mr-n0b3dy/CVE-2023-42362 | no description | 2023-09-12T10:46:12Z |
CVE-2023-42308 | ASR511-OO7/CVE-2023-42308 | no description | 2024-02-20T08:18:59Z |
CVE-2023-42307 | ASR511-OO7/CVE-2023-42307 | no description | 2024-02-20T08:17:57Z |
CVE-2023-42284 | andreysanyuk/CVE-2023-42284 | Proof of concept for CVE-2023-42284 in Tyk Gateway | 2023-10-30T19:24:48Z |
CVE-2023-42283 | andreysanyuk/CVE-2023-42283 | Proof of concept for CVE-2023-42283 in Tyk Gateway | 2023-10-30T19:05:41Z |
CVE-2023-42222 | itssixtyn3in/CVE-2023-42222 | no description | 2023-09-27T17:36:30Z |
CVE-2023-4208 | hshivhare67/Kernel_4.1.15_CVE-2023-4206_CVE-2023-4207_CVE-2023-4208 | no description | 2023-12-15T05:13:24Z |
CVE-2023-4208 | GhostBalladw/wuhaozhe-s-CVE | CVE-2023-41623 | 2023-12-08T04:15:06Z |
CVE-2023-4207 | nidhi7598/linux-4.19.72_net_CVE-2023-4207 | no description | 2023-11-23T04:50:24Z |
CVE-2023-41993 | hrtowii/cve-2023-41993-test | testing poc | 2023-10-16T15:43:50Z |
CVE-2023-41993 | po6ix/POC-for-CVE-2023-41993 | no description | 2023-10-15T12:14:18Z |
CVE-2023-41993 | Mangaia/cve-test | testing cve-2023-41993-test | 2023-10-20T22:04:40Z |
CVE-2023-41993 | ZZY3312/CVE-2023-41993 | no description | 2023-11-28T00:55:11Z |
CVE-2023-41993 | J3Ss0u/CVE-2023-41993 | no description | 2024-02-28T08:27:43Z |
CVE-2023-41991 | ZZY3312/CVE-2023-41991 | no description | 2023-11-28T00:38:43Z |
CVE-2023-41991 | Zenyith/CVE-2023-41991 | no description | 2023-11-28T23:59:40Z |
CVE-2023-41892 | zaenhaxor/CVE-2023-41892 | CVE-2023-41892 - Craft CMS Remote Code Execution (RCE) | 2023-10-06T01:40:34Z |
CVE-2023-41892 | Faelian/CraftCMS_CVE-2023-41892 | Exploit for CVE-2023-41892 | 2023-12-26T18:31:27Z |
CVE-2023-41892 | diegaccio/Craft-CMS-Exploit | CVE-2023-41892 Reverse Shell | 2024-01-29T09:12:59Z |
CVE-2023-41892 | acesoyeo/CVE-2023-41892 | A Craft CMS vulnerability that allows Remote Code Execution (RCE). | 2024-02-26T18:31:46Z |
CVE-2023-41892 | Helica-core/eap_pwn | poc of CVE-2023-52160 | 2024-02-26T12:48:07Z |
CVE-2023-41772 | R41N3RZUF477/CVE-2023-41772 | no description | 2023-12-19T11:21:12Z |
CVE-2023-4174 | d0rb/CVE-2023-4174 | CVE-2023-4174 PoC | 2023-08-11T08:48:02Z |
CVE-2023-4174 | codeb0ss/CVE-2023-4174 | CVE-2023-4174 - mooSocial 3.1.6 - Reflected Cross Site Scripting (XSS) | 2023-08-17T02:44:49Z |
CVE-2023-41717 | federella/CVE-2023-41717 | This repository is to provide a write-up and PoC for CVE-2023-41717. | 2023-08-31T08:10:22Z |
CVE-2023-4166 | mvpyyds/CVE-2023-4166 | no description | 2023-09-01T05:33:38Z |
CVE-2023-4165 | mvpyyds/CVE-2023-4165 | no description | 2023-09-01T03:55:23Z |
CVE-2023-41646 | tristao-marinho/CVE-2023-41646 | no description | 2023-09-01T16:46:07Z |
CVE-2023-41613 | Eafz/cve-2023-41613 | no description | 2023-08-28T14:45:23Z |
CVE-2023-41592 | miguelc49/CVE-2023-41592-2 | no description | 2024-04-13T18:46:32Z |
CVE-2023-41592 | miguelc49/CVE-2023-41592-1 | no description | 2024-04-13T18:46:36Z |
CVE-2023-41538 | codeb0ss/CVE-2023-41538-PoC | Mass exploit - CVE-2023-41538 < phpjabbers PHP Forum < Cross Site Scripting (XSS) | 2023-09-05T04:26:52Z |
CVE-2023-41535 | Sh33talUmath/CVE-2023-41535 | no description | 2023-09-07T11:01:04Z |
CVE-2023-41534 | Sh33talUmath/CVE-2023-41534 | no description | 2023-09-07T10:58:32Z |
CVE-2023-41533 | Sh33talUmath/CVE-2023-41533 | no description | 2023-09-07T10:50:03Z |
CVE-2023-41508 | redblueteam/CVE-2023-41508 | CVE-2023-41508 - A hard-coded password in Super Store Finder v3.6 allows attackers to access the administration panel. | 2023-09-05T03:29:37Z |
CVE-2023-41507 | redblueteam/CVE-2023-41507 | CVE-2023-41507 A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. | 2023-09-05T03:26:15Z |
CVE-2023-41506 | ASR511-OO7/CVE-2023-41506 | no description | 2024-02-25T09:11:36Z |
CVE-2023-41505 | ASR511-OO7/CVE-2023-41505 | no description | 2024-02-25T09:12:31Z |
CVE-2023-41504 | ASR511-OO7/CVE-2023-41504 | no description | 2024-02-25T09:13:57Z |
CVE-2023-41503 | ASR511-OO7/CVE-2023-41503 | no description | 2024-02-25T09:14:58Z |
CVE-2023-41501 | ASR511-OO7/CVE-2023-41501 | no description | 2024-02-20T08:16:19Z |
CVE-2023-41500 | ASR511-OO7/CVE-2023-41500 | no description | 2024-02-20T08:15:32Z |
CVE-2023-41499 | ASR511-OO7/CVE-2023-41499 | no description | 2024-02-20T08:14:00Z |
CVE-2023-41498 | ASR511-OO7/CVE-2023-41498 | no description | 2024-02-20T08:13:10Z |
CVE-2023-41497 | ASR511-OO7/CVE-2023-41497 | no description | 2024-02-20T08:12:08Z |
CVE-2023-41474 | JBalanza/CVE-2023-41474 | Public disclosure of Ivanti's Avalanche Path Traversal vulnerability | 2024-01-08T08:21:39Z |
CVE-2023-4145 | miguelc49/CVE-2023-4145-1 | no description | 2024-04-14T07:39:04Z |
CVE-2023-4145 | miguelc49/CVE-2023-4145-3 | no description | 2024-04-14T07:39:09Z |
CVE-2023-4145 | miguelc49/CVE-2023-4145-2 | no description | 2024-04-14T07:39:01Z |
CVE-2023-41436 | sromanhu/CVE-2023-41436-CSZ-CMS-Stored-XSS---Pages-Content | CSZ CMS 1.3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Additional Meta Tag parameter in the Pages Content Menu. | 2023-08-23T11:34:30Z |
CVE-2023-41425 | prodigiousMind/CVE-2023-41425 | WonderCMS Authenticated RCE - CVE-2023-41425 | 2023-11-05T15:06:43Z |
CVE-2023-41362 | SorceryIE/CVE-2023-41362_MyBB_ACP_RCE | no description | 2023-09-11T07:49:38Z |
CVE-2023-41320 | Guilhem7/CVE_2023_41320 | POC for cve 2023 41320 GLPI | 2023-11-16T16:21:51Z |
CVE-2023-4128 | Trinadh465/linux-4.1.15_CVE-2023-4128 | no description | 2023-09-19T06:45:47Z |
CVE-2023-4128 | OpenL2D/moc3ingbird | MOC3ingbird Exploit for Live2D (CVE-2023-27566) | 2023-03-03T01:57:28Z |
CVE-2023-4128 | amirzargham/CVE-2023-08-21-exploit | Axigen < 10.3.3.47, 10.2.3.12 - Reflected XSS | 2023-09-13T05:59:02Z |
CVE-2023-4128 | nidhi7598/linux-4.19.72_CVE-2023-4128 | no description | 2023-09-20T04:43:28Z |
CVE-2023-41105 | JawadPy/CVE-2023-41105-Exploit | Example of CVE-2023-41105 | 2023-10-05T00:32:31Z |
CVE-2023-41080 | shiomiyan/CVE-2023-41080 | no description | 2023-08-26T15:11:31Z |
CVE-2023-41080 | errorfiathck/MOVEit-Exploit | an exploit of POC for CVE-2023-34362 affecting MOVEit Transfer | 2023-08-31T13:25:53Z |
CVE-2023-41064 | MrR0b0t19/CVE-2023-41064 | no description | 2023-11-13T17:07:02Z |
CVE-2023-41064 | teraGL/looneyCVE | Looney Tunables CVE-2023-4911 | 2023-11-08T09:34:04Z |
CVE-2023-41064 | MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064 | longitudes de código para desencadenar esta vulnerabilidad | 2023-10-30T17:03:24Z |
CVE-2023-41064 | alsaeroth/CVE-2023-41064-POC | C implementation of Image I/O 0-click vulnerability | 2024-02-07T07:11:41Z |
CVE-2023-41015 | ASR511-OO7/CVE-2023-41015 | no description | 2024-02-25T09:15:54Z |
CVE-2023-41014 | ASR511-OO7/CVE-2023-41014 | no description | 2024-02-25T09:16:50Z |
CVE-2023-40989 | Zone1-Z/CVE-2023-40989 | SQL injection vulnerbility in jeecgboot jeecg-boot v. allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component. | 2023-09-20T12:43:23Z |
CVE-2023-40930 | NSnidie/CVE-2023-40930 | CVE-2023-40930 Repetition Enviroment | 2023-09-07T16:50:02Z |
CVE-2023-40924 | Yobing1/CVE-2023-40924 | SolarView vuln | 2023-08-15T15:44:58Z |
CVE-2023-40869 | MinoTauro2020/CVE-2023-40869 | Cross Site Scripting vulnerability in mooSocial mooSocial Software v.3.1.6 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functions | 2023-09-02T00:47:37Z |
CVE-2023-40868 | MinoTauro2020/CVE-2023-40868 | Cross Site Request Forgery vulnerability in mooSocial MooSocial Software v.Demo allows a remote attacker to execute arbitrary code via the Delete Account and Deactivate functions. | 2023-09-02T00:24:22Z |
CVE-2023-40600 | RandomRobbieBF/CVE-2023-40600 | EWWW Image Optimizer <= 7.2.0 - Unauthenticated Sensitive Information Exposure via Debug Log | 2023-11-20T19:05:50Z |
CVE-2023-40477 | wildptr-io/Winrar-CVE-2023-40477-POC | CVE-2023-40477 PoC by Wild-Pointer | 2023-08-29T16:29:48Z |
CVE-2023-40477 | SugiB3o/Keylog_CVE2023-38831 | no description | 2023-08-30T10:48:04Z |
CVE-2023-40459 | majidmc2/CVE-2023-40459 | PoC of CVE-2023-40459 (DoS on ACEmanager) | 2024-01-31T12:11:34Z |
CVE-2023-40429 | biscuitehh/cve-2023-40429-ez-device-name | CVE-2023-40429: An app may be able to access sensitive user data. | 2023-10-09T21:52:56Z |
CVE-2023-40362 | ally-petitt/CVE-2023-40362 | CVE-2023-40362 Vulnerabilitiy details and proof of concept | 2023-08-26T01:35:43Z |
CVE-2023-40361 | vianic/CVE-2023-40361 | Security Vulnerability - SECUDOS Qiata | 2023-10-16T08:49:25Z |
CVE-2023-40297 | sahar042/CVE-2023-40297 | Stakater Forecastle 1.0.127 allows directory traversal in the website component | 2023-08-14T06:18:48Z |
CVE-2023-40296 | Halcy0nic/CVE-2023-40296 | Proof of Concept for CVE-2023-40296 | 2023-08-14T05:21:27Z |
CVE-2023-40295 | Halcy0nic/CVE-2023-40294-and-CVE-2023-40295 | Proof of concept for CVE-2023-40294 and CVE-2023-40295 | 2023-08-14T05:12:05Z |
CVE-2023-40280 | BugBountyHunterCVE/CVE-2023-40280 | no description | 2024-03-16T06:25:42Z |
CVE-2023-40279 | BugBountyHunterCVE/CVE-2023-40279 | no description | 2024-03-16T06:30:03Z |
CVE-2023-40278 | BugBountyHunterCVE/CVE-2023-40278 | no description | 2024-03-16T06:12:56Z |
CVE-2023-40277 | BugBountyHunterCVE/CVE-2023-40277 | no description | 2024-03-16T03:52:54Z |
CVE-2023-40276 | BugBountyHunterCVE/CVE-2023-40276 | no description | 2024-03-16T06:06:12Z |
CVE-2023-40275 | BugBountyHunterCVE/CVE-2023-40275 | no description | 2024-03-16T06:20:30Z |
CVE-2023-40140 | hshivhare67/platform_frameworks_base_android-4.2.2_r1_CVE-2023-40140 | no description | 2024-01-24T12:42:48Z |
CVE-2023-40140 | hshivhare67/platform_frameworks_base_AOSP6_r22_CVE-2023-40140 | no description | 2024-02-01T07:21:01Z |
CVE-2023-40133 | uthrasri/frame_CVE-2023-40133_136_137 | no description | 2024-04-03T06:44:22Z |
CVE-2023-40127 | Trinadh465/CVE-2023-40127 | no description | 2024-04-09T09:35:25Z |
CVE-2023-40127 | Trinadh465/platform_packages_providers_MediaProvider_CVE-2023-40127 | no description | 2024-04-09T05:35:00Z |
CVE-2023-40121 | hshivhare67/platform_framework_base_android-4.2.2_r1_CVE-2023-40121 | no description | 2023-12-29T12:13:45Z |
CVE-2023-40121 | hshivhare67/platform_framework_base_AOSP6_r22_CVE-2023-40121 | no description | 2023-12-27T12:19:41Z |
CVE-2023-40121 | nidhi7598/frameworks_base_AOSP10_r33_core_CVE-2023-40121 | no description | 2023-12-26T10:02:13Z |
CVE-2023-40109 | uthrasri/CVE-2023-40109 | no description | 2024-01-23T13:03:31Z |
CVE-2023-40084 | Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084 | no description | 2024-01-05T10:20:57Z |
CVE-2023-40044 | kenbuckler/WS_FTP-CVE-2023-40044 | Analysis of WS_FTP CVE | 2023-10-02T14:55:38Z |
CVE-2023-40037 | mbadanoiu/CVE-2023-40037 | CVE-2023-40037: Incomplete Validation of JDBC and JNDI Connection URLs in Apache NiFi | 2023-11-23T22:26:21Z |
CVE-2023-40031 | webraybtl/CVE-2023-40031 | notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现 | 2023-09-08T05:43:12Z |
CVE-2023-40028 | 0xyassine/CVE-2023-40028 | no description | 2024-03-23T15:25:49Z |
CVE-2023-40000 | rxerium/CVE-2023-40000 | LiteSpeed Cache plugin for WordPress that could enable unauthenticated users to escalate their privileges | 2024-02-28T19:36:40Z |
CVE-2023-39725 | anky-123/CVE-2023-39725 | no description | 2023-09-02T12:29:59Z |
CVE-2023-39714 | Arajawat007/CVE-2023-39714 | no description | 2023-08-19T18:47:27Z |
CVE-2023-39712 | Arajawat007/CVE-2023-39712 | no description | 2023-08-19T18:42:28Z |
CVE-2023-39711 | Arajawat007/CVE-2023-39711 | no description | 2023-08-19T18:13:14Z |
CVE-2023-39710 | Arajawat007/CVE-2023-39710 | no description | 2023-08-19T18:09:59Z |
CVE-2023-3971 | ashangp923/CVE-2023-3971 | To find HTML injection and XSS | 2023-10-20T18:11:22Z |
CVE-2023-39709 | Arajawat007/CVE-2023-39709 | no description | 2023-08-19T18:35:44Z |
CVE-2023-39708 | Arajawat007/CVE-2023-39708 | no description | 2023-08-19T19:02:23Z |
CVE-2023-39707 | Arajawat007/CVE-2023-39707 | no description | 2023-08-19T17:35:39Z |
CVE-2023-39539 | AdamWen230/CVE-2023-39539-PoC | PoC for CVE-2023-39539 in Cacti 1.2.22 | 2023-11-15T21:39:54Z |
CVE-2023-39362 | jakabakos/CVE-2023-39362-cacti-snmp-command-injection-poc | no description | 2024-02-28T16:07:37Z |
CVE-2023-39320 | ayrustogaru/cve-2023-39320 | no description | 2024-02-24T08:27:57Z |
CVE-2023-39144 | cduram/CVE-2023-39144 | Vulnerability in Element55 Maketime | 2023-07-27T18:32:16Z |
CVE-2023-39143 | codeb0ss/CVE-2023-39143 | CVE-2023-39143 < PaperCut < Path Traversal (PT) | 2023-08-17T02:57:48Z |
CVE-2023-39141 | codeb0ss/CVE-2023-39141-PoC | Mass Exploit - CVE-2023-39141 < Aria2 WebUI < Path traversal | 2023-08-30T02:35:14Z |
CVE-2023-39115 | Raj789-sec/CVE-2023-39115 | Campcodes Online Matrimonial Website System 3.3 Cross Site Scripting | 2023-08-07T16:04:49Z |
CVE-2023-39063 | AndreGNogueira/CVE-2023-39063 | POC of the CVE-2023-39063 | 2023-08-24T20:57:27Z |
CVE-2023-39062 | afine-com/CVE-2023-39062 | Spipu Html2Pdf < 5.2.8 - XSS vulnerabilities in example files | 2023-08-23T21:07:24Z |
CVE-2023-38891 | jselliott/CVE-2023-38891 | Authenticated SQL Injection Vulnerability in VTiger Open Source CRM v7.5 | 2023-09-12T22:58:41Z |
CVE-2023-38890 | akshadjoshi/CVE-2023-38890 | poc | 2023-08-18T16:37:39Z |
CVE-2023-38836 | 1337kid/CVE-2023-38836 | Exploit for file upload vulnerability in BoidCMS version <=2.0.0 | 2023-08-16T14:30:30Z |
CVE-2023-38836 | TuanLeDevelopment/CVE-2023-MDM0001-Vulnerability-Forced-MDM-Profiles-Removal-Exploit | no description | 2023-09-05T20:39:32Z |
CVE-2023-38836 | mind2hex/MICS_Hunter | Script to exploit CVE-2023-38035 | 2023-09-05T01:58:39Z |
CVE-2023-38836 | m3ssap0/cacti-rce-snmp-options-vulnerable-application | WARNING: This is a vulnerable application to test the exploit for the Cacti command injection (CVE-2023-39362). Run it at your own risk! | 2023-07-03T09:43:21Z |
CVE-2023-38831 | BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc | lazy way to create CVE-2023-38831 winrar file for testing | 2023-08-24T16:03:07Z |
CVE-2023-38831 | IR-HuntGuardians/CVE-2023-38831-HUNT | no description | 2023-08-27T08:42:24Z |
CVE-2023-38831 | Garck3h/cve-2023-38831 | 一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。 | 2023-08-27T14:08:36Z |
CVE-2023-38831 | my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc | CVE-2023-38831 winrar exploit generator and get reverse shell | 2023-08-28T22:08:31Z |
CVE-2023-38831 | HDCE-inc/CVE-2023-38831 | CVE-2023-38831 PoC (Proof Of Concept) | 2023-08-28T04:56:10Z |
CVE-2023-38831 | PascalAsch/CVE-2023-38831-KQL | KQL Hunting for WinRAR CVE-2023-38831 | 2023-08-28T15:26:14Z |
CVE-2023-38831 | akhomlyuk/cve-2023-38831 | CVE-2023-38831 WinRAR | 2023-08-28T14:48:35Z |
CVE-2023-38831 | knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831 | Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) | 2023-08-28T14:48:22Z |
CVE-2023-38831 | ignis-sec/CVE-2023-38831-RaRCE | An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23 | 2023-08-27T21:49:37Z |
CVE-2023-38831 | MortySecurity/CVE-2023-38831-Exploit-and-Detection | This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. | 2023-08-29T16:12:20Z |
CVE-2023-38831 | winkler-winsen/Scan_WinRAR | Scan for WinRAR files affected to CVE-2023-40477 | 2023-08-29T14:41:58Z |
CVE-2023-38831 | thegr1ffyn/CVE-2023-38831 | Proof of Concept (POC) for CVE-2023-38831 WinRAR | 2023-08-29T06:11:42Z |
CVE-2023-38831 | Mich-ele/CVE-2023-38831-winrar | CVE-2023-38831 winrar exploit builder | 2023-09-01T16:45:42Z |
CVE-2023-38831 | z3r0sw0rd/CVE-2023-38831-PoC | Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR | 2023-08-30T11:52:23Z |
CVE-2023-38831 | MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC | This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code. | 2023-08-30T19:55:11Z |
CVE-2023-38831 | Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE | Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23. | 2023-08-28T08:56:16Z |
CVE-2023-38831 | nhman-python/CVE-2023-38831 | winrar exploit 6.22 <= | 2023-08-30T10:11:16Z |
CVE-2023-38831 | bingtangbanli/VulnerabilityTools | [CVE_2023_28432漏洞 、CVE_2023_32315漏洞、 ThinkPHP 2.x 任意代码执行漏洞 、ThinkPHP5 5.0.22/5.1.29 远程代码执行漏洞、 ThinkPHP5 5.0.23 远程代码执行漏洞 ThinkPHP 多语言本地文件包含漏洞] | 2023-08-31T03:22:09Z |
CVE-2023-38831 | BeniBeastt/CVE-2023-38831_ReverseShell_Winrar | no description | 2023-08-30T15:49:01Z |
CVE-2023-38831 | Fa1c0n35/CVE-2023-38831-winrar-exploit | no description | 2023-09-03T14:53:42Z |
CVE-2023-38831 | K3rnel-Dev/WinrarExploit | CVE-2023-38831-WINRAR-EXPLOIT GENERATOR | 2023-09-03T14:03:45Z |
CVE-2023-38831 | asepsaepdin/CVE-2023-38831 | no description | 2023-09-03T09:18:56Z |
CVE-2023-38831 | GOTonyGO/CVE-2023-38831-winrar | Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23. | 2023-09-07T06:42:36Z |
CVE-2023-38831 | xaitax/WinRAR-CVE-2023-38831 | This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution. | 2023-09-03T21:14:05Z |
CVE-2023-38831 | Malwareman007/CVE-2023-38831 | CVE-2023-38831 WinRaR Exploit Generator | 2023-09-12T14:07:00Z |
CVE-2023-38831 | ameerpornillos/CVE-2023-38831-WinRAR-Exploit | Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability | 2023-09-12T16:01:17Z |
CVE-2023-38831 | an040702/CVE-2023-38831 | no description | 2023-09-17T05:21:30Z |
CVE-2023-38831 | b1tg/CVE-2023-38831-winrar-exploit | CVE-2023-38831 winrar exploit generator | 2023-08-25T09:44:08Z |
CVE-2023-38831 | IMHarman/CVE-2023-38831 | no description | 2023-09-15T12:58:55Z |
CVE-2023-38831 | malvika-thakur/CVE-2023-38831 | Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR | 2023-09-21T06:08:30Z |
CVE-2023-38831 | elefantesagradodeluzinfinita/cve-2023-38831 | DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores. | 2023-09-19T12:47:12Z |
CVE-2023-38831 | ruycr4ft/CVE-2023-38831 | no description | 2023-10-12T12:46:35Z |
CVE-2023-38831 | kehrijksen/CVE-2023-38831 | CVE-2023-38831 is an RCE in WinRAR (<6.23) | 2023-10-24T01:14:03Z |
CVE-2023-38831 | Nielk74/CVE-2023-38831 | no description | 2023-10-21T17:03:48Z |
CVE-2023-38831 | h3xecute/SideCopy-Exploits-CVE-2023-38831 | SideCopy APT Group exploits CVE-2023-38831 | 2023-11-01T08:57:15Z |
CVE-2023-38831 | s4m98/winrar-cve-2023-38831-poc-gen | WinRAR cve-2023-38831-poc-generator | 2023-11-07T04:14:04Z |
CVE-2023-38831 | xk-mt/WinRAR-Vulnerability-recurrence-tutorial | WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现 | 2023-11-15T07:01:05Z |
CVE-2023-38831 | MyStuffYT/CVE-2023-38831-POC | Proof-of-concept of CVE-2023-38831 | 2023-12-04T11:13:43Z |
CVE-2023-38831 | 80r1ng/CVE-2023-38831-EXP | no description | 2023-12-10T07:13:38Z |
CVE-2023-38831 | SpamixOfficial/CVE-2023-38831 | CVE-2023-38831 Proof-of-concept code | 2023-12-12T14:54:30Z |
CVE-2023-38831 | youmulijiang/evil-winrar | evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework) | 2024-03-25T14:05:24Z |
CVE-2023-38831 | RomainBayle08/CVE-2023-38831 | no description | 2024-04-06T16:55:29Z |
CVE-2023-38829 | adhikara13/CVE-2023-38829-NETIS-WF2409E | no description | 2023-07-11T21:57:36Z |
CVE-2023-38822 | TraiLeR2/Corsair---DLL-Planting-CVE-2023-38822 | DLL Planting in the Corsair iCUE v.5.3.102 CVE-2023-38822 | 2023-08-05T13:48:36Z |
CVE-2023-38821 | TraiLeR2/CoD-MW-Warzone-2---CVE-2023-38821 | DLL Planting in the CoD MW Warzone 2 - CVE-2023-38821 | 2023-08-05T13:57:42Z |
CVE-2023-38820 | TraiLeR2/DLL-Planting-Slack-4.33.73-CVE-2023-38820 | DLL Planting in the Slack 4.33.73 - CVE-2023-38820 | 2023-08-05T14:30:24Z |
CVE-2023-38814 | actuator/BSIDES-Security-Rochester-2023 | Hardware Hacking: A Brief Primer on Reverse Engineering Bluetooth Transmissions - CVE-2023-38814 | 2023-03-18T05:27:36Z |
CVE-2023-38743 | PetrusViet/CVE-2023-38743 | ManageEngine ADManager Command Injection | 2023-10-02T02:14:23Z |
CVE-2023-38646 | 0xrobiul/CVE-2023-38646 | Metabase Pre-auth RCE (CVE-2023-38646)!! | 2023-07-29T13:07:00Z |
CVE-2023-38646 | Pumpkin-Garden/POC_Metabase_CVE-2023-38646 | For educational purposes only | 2023-07-28T11:43:06Z |
CVE-2023-38646 | adriyansyah-mf/CVE-2023-38646--Metabase- | no description | 2023-07-28T03:39:07Z |
CVE-2023-38646 | Zenmovie/CVE-2023-38646 | Proof of Concept for CVE-2023-38646 | 2023-07-31T11:18:21Z |
CVE-2023-38646 | sbaresearch/stop-zenbleed-win | PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows | 2023-07-26T20:03:11Z |
CVE-2023-38646 | securezeron/CVE-2023-38646 | POC for CVE-2023-38646 | 2023-07-30T09:56:52Z |
CVE-2023-38646 | Xuxfff/CVE-2023-38646-Poc | no description | 2023-07-30T09:33:28Z |
CVE-2023-38646 | shamo0/CVE-2023-38646-PoC | Metabase Pre-auth RCE | 2023-08-02T13:21:58Z |
CVE-2023-38646 | Okaytc/Superset_auth_bypass_check | Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具 | 2023-04-27T06:21:00Z |
CVE-2023-38646 | fidjiw/CVE-2023-38646-POC | CVE-2023-38646-POC | 2023-08-03T08:06:10Z |
CVE-2023-38646 | Any3ite/cve-2023-38646-metabase-ReverseShell | no description | 2023-08-09T05:07:11Z |
CVE-2023-38646 | robotmikhro/CVE-2023-38646 | Automatic Tools For Metabase Exploit Known As CVE-2023-38646 | 2023-08-09T14:05:24Z |
CVE-2023-38646 | ncusi/secret_life_of_CVEs | Scripts and code for "The Secret Life of CVEs", presented at MSR 2023 Challenge: https://conf.researchr.org/track/msr-2023/msr-2023-mining-challenge | 2023-03-17T10:24:09Z |
CVE-2023-38646 | LazyySec/CVE-2023-38646 | Tools to exploit metabase CVE-2023-38646 | 2023-07-31T05:25:37Z |
CVE-2023-38646 | kh4sh3i/CVE-2023-38646 | Metabase Pre-auth RCE (CVE-2023-38646) | 2023-08-19T11:47:08Z |
CVE-2023-38646 | alexandre-pecorilla/CVE-2023-38646 | CVE-2023-38646 Pre-Auth RCE in Metabase | 2023-10-08T14:52:35Z |
CVE-2023-38646 | yxl2001/CVE-2023-38646 | no description | 2023-10-08T07:36:57Z |
CVE-2023-38646 | CN016/Metabase-H2-CVE-2023-38646- | Metabase H2 远程代码执行漏洞(CVE-2023-38646) | 2023-10-10T08:45:14Z |
CVE-2023-38646 | joaoviictorti/CVE-2023-38646 | CVE-2023-38646 (Pre-Auth RCE in Metabase) | 2023-10-08T00:21:07Z |
CVE-2023-38646 | passwa11/CVE-2023-38646 | no description | 2023-10-12T02:24:12Z |
CVE-2023-38646 | juweihuitao/MpOperationLogs | CVE-2023-5538 - MpOperationLogs <= 1.0.1 - 未经身份验证的存储跨站点脚本 | 2023-10-12T01:15:09Z |
CVE-2023-38646 | m3m0o/metabase-pre-auth-rce-poc | This is a script written in Python that allows the exploitation of the Metabase's software security flaw in the described in CVE 2023-38646. | 2023-10-09T00:26:38Z |
CVE-2023-38646 | SUT0L/CVE-2023-38646 | CVE-2023-38646 Metabase 0.46.6 exploit | 2023-10-11T15:18:25Z |
CVE-2023-38646 | nickswink/CVE-2023-38646 | CVE-2023-38646 Unauthenticated RCE vulnerability in Metabase | 2023-10-11T20:17:14Z |
CVE-2023-38646 | asepsaepdin/CVE-2023-38646 | no description | 2023-10-14T15:56:18Z |
CVE-2023-38646 | Pyr0sec/CVE-2023-38646 | Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646) | 2023-10-15T01:29:37Z |
CVE-2023-38646 | tarimoe/blackjump | JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 / CVE-2023-42820 Exploit | 2023-10-14T09:35:07Z |
CVE-2023-38646 | birdm4nw/CVE-2023-38646 | Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2. | 2023-10-17T07:43:58Z |
CVE-2023-38646 | threatHNTR/CVE-2023-38646 | no description | 2023-10-12T14:32:17Z |
CVE-2023-38646 | junnythemarksman/CVE-2023-38646 | Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2. | 2023-10-26T10:37:23Z |
CVE-2023-38646 | Red4mber/CVE-2023-38646 | Python script to exploit CVE-2023-38646 Metabase Pre-Auth RCE via SQL injection | 2023-10-25T17:10:53Z |
CVE-2023-38646 | AnvithLobo/CVE-2023-38646 | RCE Exploit for CVE-2023-38646 | 2023-10-20T15:21:08Z |
CVE-2023-38646 | Mrunalkaran/CVE-2023-38646 | Metabase Pre-Auth RCE POC | 2023-11-07T03:57:15Z |
CVE-2023-38646 | j0yb0y0h/CVE-2023-38646 | Code to detect/exploit vulnerable metabase application | 2023-11-09T13:13:25Z |
CVE-2023-38646 | aaaademo/Confluence-EvilJar | 配合 CVE-2023-22515 后台上传jar包实现RCE | 2023-11-09T12:55:25Z |
CVE-2023-38646 | Ego1stoo/CVE-2023-38646 | Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2. | 2023-11-25T17:22:22Z |
CVE-2023-38646 | 0utl4nder/Another-Metabase-RCE-CVE-2023-38646 | Metabase postgres (org.h2.Driver) RCE without INIT | 2023-12-10T21:07:10Z |
CVE-2023-38646 | acesoyeo/METABASE-RCE-CVE-2023-38646- | no description | 2024-02-20T01:51:47Z |
CVE-2023-38646 | Shisones/MetabaseRCE_CVE-2023-38646 | no description | 2024-01-28T15:01:40Z |
CVE-2023-38646 | UserConnecting/Exploit-CVE-2023-38646-Metabase | Exploit for the Remote Code Execution (RCE) vulnerability identified in Metabase versions before 0.46.6.1 (open source) and 1.46.6.1 (Enterprise). Authentication is not required for exploitation. | 2024-02-22T02:55:55Z |
CVE-2023-38632 | Halcy0nic/CVE-2023-38632 | Proof of concept for CVE-2023-38632 | 2023-07-21T05:03:57Z |
CVE-2023-38609 | mc-17/CVE-2023-38609 | SIP bypass using package scripts | 2023-10-20T14:34:27Z |
CVE-2023-38571 | gergelykalman/CVE-2023-38571-a-macOS-TCC-bypass-in-Music-and-TV | Exploit for CVE-2023-38571 | 2023-09-27T13:21:43Z |
CVE-2023-38545 | UTsweetyfish/CVE-2023-38545 | Simple PoC causing overflow | 2023-10-11T08:11:56Z |
CVE-2023-38545 | imfht/CVE-2023-38545 | 😄 CVE-2023-38545堆溢出的POC和分析文章 | 2023-10-12T07:16:49Z |
CVE-2023-38545 | vanigori/CVE-2023-38545-sample | Dockerfile containing all the necessary setup files to demo the exploit | 2023-10-12T16:48:26Z |
CVE-2023-38545 | fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow | Simple PoC causing overflow | 2023-10-12T07:39:15Z |
CVE-2023-38545 | dbrugman/CVE-2023-38545-POC | CVE-2023-38545 POC for the curl command line tool | 2023-10-16T10:04:19Z |
CVE-2023-38545 | d0rb/CVE-2023-38545 | socks5 heap buffer overflow | 2023-10-17T09:03:15Z |
CVE-2023-38545 | bcdannyboy/CVE-2023-38545 | A proof of concept for testing CVE-2023-38545 against local curl | 2023-10-16T15:55:32Z |
CVE-2023-38545 | LeHeron/TC_test | Test repo pour la CVE-2023-42793 de TeamCity | 2023-10-16T12:52:17Z |
CVE-2023-38545 | Yang-Shun-Yu/CVE-2023-38545 | no description | 2024-03-19T13:45:09Z |
CVE-2023-38501 | codeb0ss/CVE-2023-38501-Exploit | Mass exploit - CVE-2023-38501 - Copyparty < Cross-Site Scripting [XSS] | 2023-10-06T02:55:05Z |
CVE-2023-38499 | miguelc49/CVE-2023-38499-1 | no description | 2024-04-13T18:46:07Z |
CVE-2023-38490 | Acceis/exploit-CVE-2023-38490 | Kirby < 3.9.6 XML External Entity exploit | 2023-07-28T09:19:23Z |
CVE-2023-38434 | Halcy0nic/CVE-2023-38434 | Proof of Concept for CVE-2023-38434 | 2023-07-18T16:09:04Z |
CVE-2023-38408 | snowcra5h/CVE-2023-38408 | CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent | 2023-07-21T01:53:10Z |
CVE-2023-38408 | hktalent/TOP | TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things | 2022-03-19T01:54:15Z |
CVE-2023-38408 | kali-mx/CVE-2023-38408 | PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2 | 2023-08-09T19:56:07Z |
CVE-2023-38408 | LucasPDiniz/CVE-2023-38408 | Takeover Account OpenSSH | 2023-11-09T04:34:39Z |
CVE-2023-38408 | wxrdnx/CVE-2023-38408 | no description | 2024-02-16T18:20:12Z |
CVE-2023-38389 | codeb0ss/CVE-2023-38389-PoC | CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover | 2023-08-27T00:30:16Z |
CVE-2023-38388 | codeb0ss/CVE-2023-38388 | Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload | 2023-08-26T05:51:06Z |
CVE-2023-3836 | codeb0ss/CVE-2023-3836 | no description | 2023-08-20T03:16:31Z |
CVE-2023-3836 | zh-byte/CVE-2023-3836 | 大华智慧园区综合管理平台publishing文件上传 | 2023-08-30T12:11:42Z |
CVE-2023-3824 | StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | no description | 2024-03-18T02:19:03Z |
CVE-2023-3824 | jhonnybonny/CVE-2023-3824 | Vulnerability in PHP Phar files, due to buffer overflow, arises from insufficient length checks on file names within the Phar archive. Malicious actors can craft Phar files with long file names, leading to buffer overflow and potential execution of malicious code or data leakage. This vulnerability can be exploited for code execution CVE-2023-3824 | 2024-03-18T10:45:33Z |
CVE-2023-38146 | Jnnshschl/CVE-2023-38146 | PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket | 2023-10-13T15:33:42Z |
CVE-2023-38146 | Durge5/ThemeBleedPy | A proof of concept using python for the CVE-2023-38146 "ThemeBleed" | 2023-12-12T19:11:10Z |
CVE-2023-38120 | warber0x/CVE-2023-38120 | Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability | 2023-10-19T04:00:47Z |
CVE-2023-3812 | nidhi7598/linux-4.19.72_CVE-2023-3812 | no description | 2023-09-06T06:03:40Z |
CVE-2023-38041 | ewilded/CVE-2023-38041-POC | Ivanti Pulse Secure Client Connect Local Privilege Escalation CVE-2023-38041 Proof of Concept | 2024-02-25T08:09:17Z |
CVE-2023-38035 | horizon3ai/CVE-2023-38035 | Ivanti Sentry CVE-2023-38035 | 2023-08-23T17:34:36Z |
CVE-2023-37988 | codeb0ss/CVE-2023-37988-PoC | CVE-2023-37988 - Wordpress/Plugin - Contact Form Generator < Reflected Cross-Site Scripting [RXSS] | 2023-10-07T23:40:53Z |
CVE-2023-37979 | Fire-Null/CVE-2023-37979 | CVE-2023-37979 | 2023-08-01T11:13:29Z |
CVE-2023-37979 | Mehran-Seifalinia/CVE-2023-37979 | no description | 2023-08-01T11:40:14Z |
CVE-2023-37979 | dhmosfunk/HTTP3ONSTEROIDS | HTTP3ONSTEROIDS - A research on CVE-2023-25950 where HAProxy's HTTP/3 implementation fails to block a malformed HTTP header field name. | 2023-07-31T23:57:02Z |
CVE-2023-37979 | codeb0ss/CVE-2023-37979 | CVE-2023-37979 - WordPress Authenticated XSS in Ninja-forms Plugin + Upload File | 2023-08-17T02:24:42Z |
CVE-2023-37979 | d0rb/CVE-2023-37979 | CVE-2023-37979 PoC and Checker | 2023-08-04T10:31:53Z |
CVE-2023-37903 | 7h3h4ckv157/CVE-2023-37903 | Exploit for CVE-2023-37903 | 2023-11-05T11:23:15Z |
CVE-2023-37800 | TraiLeR2/CVE-2023-37800 | Unquoted Service Path in the Fortect - 5.0.0.7 CVE-2023-37800 | 2023-08-02T20:54:54Z |
CVE-2023-37790 | kaizensecurity/CVE-2023-37790 | no description | 2024-01-30T06:51:37Z |
CVE-2023-37786 | Phamchie/CVE-2023-37786 | no description | 2023-07-23T13:05:04Z |
CVE-2023-37779 | jyoti818680/CVE-2023-37779 | no description | 2023-07-28T13:07:45Z |
CVE-2023-37778 | jyoti818680/CVE-2023-37778 | no description | 2023-07-28T11:18:21Z |
CVE-2023-37772 | anky-123/CVE-2023-37772 | no description | 2023-07-27T18:48:10Z |
CVE-2023-37771 | anky-123/CVE-2023-37771 | CVE | 2023-07-19T14:51:04Z |
CVE-2023-37756 | leekenghwa/CVE-2023-37756-CWE-521-lead-to-malicious-plugin-upload-in-the-i-doit-Pro-25-and-below | no description | 2023-07-24T03:11:05Z |
CVE-2023-37755 | leekenghwa/CVE-2023-37755---Hardcoded-Admin-Credential-in-i-doit-Pro-25-and-below | no description | 2023-07-24T02:42:27Z |
CVE-2023-37739 | leekenghwa/CVE-2023-37739---Path-Traversal-in-i-doit-Pro-25-and-below | no description | 2023-07-24T01:57:31Z |
CVE-2023-37625 | benjaminpsinclair/Netbox-CVE-2023-37625 | no description | 2023-07-01T21:02:11Z |
CVE-2023-37621 | MY0723/CNVD-2022-27366__CVE-2023-37621 | no description | 2023-06-29T01:36:10Z |
CVE-2023-37621 | GREENHAT7/Hvv2023 | HW2023@POC@EXP@CVE-2023-2023 | 2023-08-13T05:54:17Z |
CVE-2023-37599 | sahiloj/CVE-2023-37599 | Directory Listing vulnerability in issabel-pbx 4.0.0-6 exposing application sensitive files | 2023-07-10T16:34:22Z |
CVE-2023-37598 | sahiloj/CVE-2023-37598 | CSRF vulnerability in issabel-pbx v.4.0.0-6 to delete any new virtual fax of users | 2023-07-10T16:30:34Z |
CVE-2023-37597 | sahiloj/CVE-2023-37597 | CSRF vulnerability in issabel-pbx 4.0.0-6 to delete any user group | 2023-07-10T16:28:29Z |
CVE-2023-37596 | sahiloj/CVE-2023-37596 | CSRF vulnerability in issabel-pbx 4.0.0-6 to delete any user | 2023-07-10T16:23:40Z |
CVE-2023-37582 | Malayke/CVE-2023-37582_EXPLOIT | Apache RocketMQ Arbitrary File Write Vulnerability Exploit | 2023-07-14T12:22:45Z |
CVE-2023-37478 | TrevorGKann/CVE-2023-37478_npm_vs_pnpm | CVE-2023-37478 showcases how a difference in npm and pnpm install packages that could be exploited by a well crafted tar.gz packge. This repo shows a demo. | 2023-10-24T18:32:30Z |
CVE-2023-37478 | li-minhao/CVE-2023-37478-Demo | no description | 2023-11-03T18:26:52Z |
CVE-2023-37474 | ilqarli27/CVE-2023-37474 | no description | 2023-07-27T08:10:01Z |
CVE-2023-37250 | ewilded/CVE-2023-37250 | PoC | 2023-07-02T05:37:51Z |
CVE-2023-37191 | sahiloj/CVE-2023-37191 | no description | 2023-07-07T17:11:10Z |
CVE-2023-37190 | sahiloj/CVE-2023-37190 | no description | 2023-07-07T17:26:42Z |
CVE-2023-37189 | sahiloj/CVE-2023-37189 | no description | 2023-07-07T17:39:19Z |
CVE-2023-37164 | ilqarli27/CVE-2023-37164 | no description | 2023-07-27T21:08:37Z |
CVE-2023-3712 | vpxuser/CVE-2023-3712-POC | no description | 2023-07-03T01:51:11Z |
CVE-2023-3711 | vpxuser/CVE-2023-3711-POC | no description | 2023-07-03T02:10:42Z |
CVE-2023-3710 | vpxuser/CVE-2023-3710-POC | no description | 2023-07-03T01:14:02Z |
CVE-2023-3710 | Mahdi22228/CVE-2023-3710 | no description | 2023-10-14T12:18:15Z |
CVE-2023-3710 | CwEeR313/CVE-2023-3710 | exploit for CVE-2023-3710 | 2023-10-14T18:31:51Z |
CVE-2023-37073 | Hamza0X/CVE-2023-37073 | Telnet default credentials can lead to information disclosure and denial-of-service (DoS) attacks. | 2023-09-28T19:26:33Z |
CVE-2023-36900 | RomanRybachek/CVE-2023-36900 | Denial-of-Service PoC - Writeup - Header with CLFS structures - Imhex pattern for .blf extension | 2023-11-08T10:39:19Z |
CVE-2023-36899 | d0rb/CVE-2023-36899 | CVE-2023-36899 PoC | 2023-08-11T14:33:19Z |
CVE-2023-36899 | midisec/CVE-2023-36899 | CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。 | 2023-08-15T23:36:17Z |
CVE-2023-36899 | OllaPapito/gameoverlay | CVE-2023-2640 CVE-2023-32629 | 2023-08-15T19:07:02Z |
CVE-2023-36884 | Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline | The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty. | 2023-07-12T14:13:20Z |
CVE-2023-36884 | ToddMaxey/CVE-2023-36884 | PowerShell Script for initial mitigation of vulnerability | 2023-07-20T21:10:49Z |
CVE-2023-36884 | tarraschk/CVE-2023-36884-Checker | Script to check for CVE-2023-36884 hardening | 2023-07-17T14:02:40Z |
CVE-2023-36884 | or2me/CVE-2023-36884_patcher | CVE-2023-36884 临时补丁 | 2023-07-18T06:22:36Z |
CVE-2023-36884 | zerosorai/CVE-2023-36884 | This is an emergency solution while Microsoft addresses the vulnerability. | 2023-07-15T16:56:18Z |
CVE-2023-36884 | ridsoliveira/Fix-CVE-2023-36884 | no description | 2023-07-28T20:39:37Z |
CVE-2023-36884 | raresteak/CVE-2023-36884 | #comeonits2023 #ie9 #Storm-0978 | 2023-07-30T14:53:25Z |
CVE-2023-36884 | jakabakos/CVE-2023-36884-MS-Office-HTML-RCE | MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit | 2023-09-28T11:53:44Z |
CVE-2023-36874 | d0rb/CVE-2023-36874 | CVE-2023-36874 PoC | 2023-08-20T13:50:42Z |
CVE-2023-36874 | Wh04m1001/CVE-2023-36874 | no description | 2023-08-23T12:07:40Z |
CVE-2023-36874 | crisprss/CVE-2023-36874 | CVE-2023-36874 Proof of Concept | 2023-08-22T16:27:30Z |
CVE-2023-36874 | Octoberfest7/CVE-2023-36874_BOF | Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE | 2023-08-24T22:24:34Z |
CVE-2023-36846 | Dreamy-elfland/CVE-2023-36846 | 批量检测CVE-2023-36846漏洞 | 2023-09-21T14:15:50Z |
CVE-2023-36846 | vulncheck-oss/fetch-broker-conf | A tool to fetch the RocketMQ broker configuration in order to discover indicators of compromise for CVE-2023-33246 | 2023-09-04T11:18:28Z |
CVE-2023-36845 | vulncheck-oss/cve-2023-36845-scanner | A tool to discover Juniper firewalls vulnerable to CVE-2023-36845 | 2023-09-16T09:11:21Z |
CVE-2023-36845 | toanln-cov/CVE-2023-36845 | PoC CVE-2023-36845 on Juniper Device | 2023-09-27T09:50:56Z |
CVE-2023-36845 | kljunowsky/CVE-2023-36845 | Juniper Firewalls CVE-2023-36845 - RCE | 2023-09-26T17:56:55Z |
CVE-2023-36845 | halencarjunior/CVE-2023-36845 | no description | 2023-09-27T23:56:07Z |
CVE-2023-36845 | cyberh3als/CVE-2023-36845-POC | CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution. | 2023-10-02T06:28:07Z |
CVE-2023-36845 | WhiteOwl-Pub/PoC-Vuln-Detector-juniper-cve-2023-36845 | PoC & vulnerability detector for Juniper EX switches and SRX firewalls | 2023-10-01T18:05:21Z |
CVE-2023-36845 | simrotion13/CVE-2023-36845 | no description | 2023-10-01T03:41:40Z |
CVE-2023-36845 | GTGalaxi/ElectronVulnerableVersion | Find Electron Apps Vulnerable to CVE-2023-4863 / CVE-2023-5129 | 2023-09-30T02:47:16Z |
CVE-2023-36845 | zaenhaxor/CVE-2023-36845 | CVE-2023-36845 - Juniper Firewall Remote code execution (RCE) | 2023-09-29T03:11:37Z |
CVE-2023-36845 | murphysecurity/libwebp-checker | A tool for finding vulnerable libwebp(CVE-2023-4863) | 2023-10-05T03:28:23Z |
CVE-2023-36845 | ditekshen/ansible-cve-2023-36845 | Ansible Playbook for CVE-2023-36845 | 2023-11-14T16:36:29Z |
CVE-2023-36845 | jahithoque/Juniper-CVE-2023-36845-Mass-Hunting | Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device. | 2024-01-30T08:00:23Z |
CVE-2023-36845 | Asbawy/Automation-for-Juniper-cve-2023-36845 | Simple Automation script for juniper cve-2023-36845 | 2024-01-29T18:53:22Z |
CVE-2023-36845 | cyb3rzest/Juniper-Bug-Automation-CVE-2023-36845 | no description | 2024-02-01T03:54:18Z |
CVE-2023-36845 | CharonDefalt/Juniper-exploit-CVE-2023-36845 | no description | 2024-02-03T06:09:30Z |
CVE-2023-36845 | 0xNehru/CVE-2023-36845-Juniper-Vulnerability | This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection. | 2024-02-14T12:47:21Z |
CVE-2023-36845 | ak1t4/CVE-2023-36845 | CVES | 2024-02-13T20:59:34Z |
CVE-2023-36845 | iveresk/CVE-2023-36845-6- | CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCE | 2024-02-13T14:59:59Z |
CVE-2023-36845 | e11i0t4lders0n/CVE-2023-36845 | CVE-2023-36845 – Unauthenticated Juniper Remote Code Execution Vulnerability Scanner | 2024-02-18T15:37:58Z |
CVE-2023-36845 | imhunterand/CVE-2023-36845 | Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploits | 2024-02-15T20:17:33Z |
CVE-2023-36845 | ifconfig-me/CVE-2023-36845 | A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. | 2024-02-17T08:15:30Z |
CVE-2023-36844 | watchtowrlabs/juniper-rce_cve-2023-36844 | no description | 2023-08-25T07:28:06Z |
CVE-2023-36844 | LeakIX/sentryexploit | CVE-2023-38035 Recon oriented exploit, extract company name contact information | 2023-08-24T19:26:57Z |
CVE-2023-36844 | Pari-Malam/CVE-2023-36844 | Perform With Massive Juniper Remote Code Execution | 2023-09-20T02:32:56Z |
CVE-2023-36844 | r3dcl1ff/CVE-2023-36844_Juniper_RCE | A Proof of Concept for chaining the CVEs [CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847] to achieve Remote Code Execution (phpinfo) in Juniper JunOS within SRX and EX Series products.Modified from original exploit developed by @watchTowr . | 2023-09-24T13:30:09Z |
CVE-2023-36802 | chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802 | LPE exploit for CVE-2023-36802 | 2023-10-09T17:32:15Z |
CVE-2023-36802 | 4zur-0312/CVE-2023-36802 | CVE-2023-36802 ITW case | 2023-10-19T23:34:37Z |
CVE-2023-36802 | x0rb3l/CVE-2023-36802-MSKSSRV-LPE | PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy | 2023-10-20T02:05:27Z |
CVE-2023-36802 | Nero22k/cve-2023-36802 | Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver | 2023-10-23T18:33:41Z |
CVE-2023-36745 | N1k0la-T/CVE-2023-36745 | no description | 2023-10-23T19:06:36Z |
CVE-2023-36723 | Wh04m1001/CVE-2023-36723 | no description | 2023-09-28T21:20:23Z |
CVE-2023-36664 | jakabakos/CVE-2023-36664-Ghostscript-command-injection | Ghostscript command injection vulnerability PoC (CVE-2023-36664) | 2023-08-12T18:33:57Z |
CVE-2023-36664 | MATRIXDEVIL/CVE | CVE-2023-41593 | 2023-09-07T06:59:09Z |
CVE-2023-36664 | JeanChpt/CVE-2023-36664 | Proof of concept developed for the CVE-2023-36664 | 2023-12-02T10:28:10Z |
CVE-2023-36664 | churamanib/CVE-2023-36664-Ghostscript-command-injection | no description | 2024-04-09T22:05:29Z |
CVE-2023-36645 | caffeinated-labs/CVE-2023-36645 | no description | 2024-03-31T16:52:48Z |
CVE-2023-36644 | caffeinated-labs/CVE-2023-36644 | no description | 2024-03-31T16:50:25Z |
CVE-2023-36643 | caffeinated-labs/CVE-2023-36643 | no description | 2024-03-31T16:55:17Z |
CVE-2023-36544 | KOwloid/cve-2023-36544 | no description | 2023-06-14T01:00:07Z |
CVE-2023-36531 | RandomRobbieBF/CVE-2023-36531 | LiquidPoll – Advanced Polls for Creators and Brands <= 3.3.68 - Missing Authorization via activate_addon | 2023-07-06T08:55:42Z |
CVE-2023-36427 | tandasat/CVE-2023-36427 | Report and exploit of CVE-2023-36427 | 2023-10-09T16:55:18Z |
CVE-2023-36424 | Nassim-Asrir/CVE-2023-36424 | Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation | 2024-03-21T21:39:24Z |
CVE-2023-36407 | zha0/CVE-2023-36407 | no description | 2024-03-09T06:10:53Z |
CVE-2023-36407 | pwndorei/CVE-2023-36407 | PoC - CVE-2023-36407 | 2024-04-07T16:59:55Z |
CVE-2023-3640 | pray77/CVE-2023-3640 | SCTF 2023 kernel pwn && CVE-2023-3640 | 2023-06-20T06:21:04Z |
CVE-2023-36319 | Lowalu/CVE-2023-36319 | exp4CVE-2023-36319 | 2023-09-19T08:17:21Z |
CVE-2023-36281 | tagomaru/CVE-2023-36281 | PoC of CVE-2023-36281 | 2023-08-31T21:31:43Z |
CVE-2023-36281 | miguelc49/CVE-2023-36281-2 | no description | 2024-04-14T07:39:18Z |
CVE-2023-36281 | miguelc49/CVE-2023-36281-1 | no description | 2024-04-14T07:39:20Z |
CVE-2023-36250 | BrunoTeixeira1996/CVE-2023-36250 | no description | 2023-09-01T23:06:33Z |
CVE-2023-36167 | TraiLeR2/CVE-2023-36167 | An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component | 2023-07-08T20:40:05Z |
CVE-2023-36166 | TraiLeR2/CVE-2023-36166 | An issue in SlySoft Game Jackal Pro v.5.2.0.0 allows an attacker to execute arbitrary code via the server.exe component | 2023-07-08T20:38:51Z |
CVE-2023-36165 | TraiLeR2/CVE-2023-36165 | An issue in MiniTool Partition Wizard ShadowMaker v.12.7 allows an attacker to execute arbitrary code and gain privileges via the SchedulerService.exe component. | 2023-07-08T20:37:38Z |
CVE-2023-36164 | TraiLeR2/CVE-2023-36164 | An issue in MiniTool Partition Wizard ShadowMaker v.12.7 allows an attacker to execute arbitrary code via the MTAgentService component | 2023-07-08T20:36:19Z |
CVE-2023-36163 | TraiLeR2/CVE-2023-36163 | Cross Site Scripting vulnerability in IP-DOT BuildaGate v.BuildaGate5 allows a remote attacker to execute arbitrary code via a crafted script to the mc parameter of the URL | 2023-07-08T20:28:57Z |
CVE-2023-36159 | unknown00759/CVE-2023-36159 | no description | 2023-08-02T07:44:36Z |
CVE-2023-36158 | unknown00759/CVE-2023-36158 | Cross Site Scripting (XSS) vulnerability in sourcecodester Toll Tax Management System 1.0 allows remote attackers to run arbitrary code via the First Name and Last Name fields on the My Account page | 2023-08-02T07:31:49Z |
CVE-2023-36146 | leonardobg/CVE-2023-36146 | no description | 2023-06-22T22:06:21Z |
CVE-2023-36144 | leonardobg/CVE-2023-36144 | no description | 2023-06-22T22:00:30Z |
CVE-2023-36143 | leonardobg/CVE-2023-36143 | no description | 2023-06-22T21:56:16Z |
CVE-2023-36143 | RobinTrigon/CVE-2023-36143 | Maxprint Maxlink 1200G v3.4.11E has an OS command injection vulnerability in the "Diagnostic tool" functionality of the device. | 2023-09-04T05:08:28Z |
CVE-2023-36123 | 9Bakabaka/CVE-2023-36123 | The PoC of CVE-2023-36123 | 2023-09-06T14:29:18Z |
CVE-2023-36109 | Limesss/CVE-2023-36109 | a poc for cve-2023-36109 | 2023-09-20T06:26:32Z |
CVE-2023-3609 | nidhi7598/linux-4.19.72_CVE-2023-3609 | no description | 2023-09-01T10:44:56Z |
CVE-2023-36076 | deIndra/CVE-2023-36076 | no description | 2023-10-17T07:37:24Z |
CVE-2023-36025 | J466Y/test_CVE-2023-36025 | test repo for CVE-2023-36025 | 2023-11-28T10:34:50Z |
CVE-2023-36025 | ka7ana/CVE-2023-36025 | Quick test for CVE-2023-26025 behaviours | 2023-11-17T15:46:44Z |
CVE-2023-36025 | coolman6942o/-EXPLOIT-CVE-2023-36025 | Windows SmartScreen Security Feature Bypass Vulnerability | 2023-12-28T23:29:04Z |
CVE-2023-36003 | m417z/CVE-2023-36003-POC | Privilege escalation using the XAML diagnostics API (CVE-2023-36003) | 2024-01-11T19:17:13Z |
CVE-2023-36003 | baph0m3th/CVE-2023-36003 | Privilege escalation using the XAML diagnostics API | 2024-01-15T08:19:32Z |
CVE-2023-36003 | mirrr/NVD_Vul_Detection | Vul detection system based on NVD CVEs Jan 2023-onwards | 2024-01-07T23:51:17Z |
CVE-2023-360003 | s3mPr1linux/CVE_2023_360003_POC | no description | 2024-01-14T18:15:17Z |
CVE-2023-35985 | SpiralBL0CK/-CVE-2023-35985 | CVE-2023-35985 reproduction | 2023-12-30T06:35:21Z |
CVE-2023-35885 | datackmy/FallingSkies-CVE-2023-35885 | Cloudpanel 0-day Exploit | 2023-06-08T09:20:22Z |
CVE-2023-35844 | Szlein/CVE-2023-35844 | Lightdash文件读取漏洞(CVE-2023-35844) | 2023-06-26T10:14:29Z |
CVE-2023-35843 | b3nguang/CVE-2023-35843 | CVE-2023-35843 NocoDB 任意文件读取漏洞 | 2023-07-09T04:10:44Z |
CVE-2023-35843 | Szlein/CVE-2023-35843 | NocoDB任意文件读取CVE-2023-35843 | 2023-06-27T16:14:54Z |
CVE-2023-35840 | afine-com/CVE-2023-35840 | elFinder < 2.1.62 - Path Traversal vulnerability in PHP LocalVolumeDriver connector | 2023-06-22T09:34:49Z |
CVE-2023-35828 | Trinadh465/linux-4.19.72_CVE-2023-35828 | no description | 2023-08-01T11:31:25Z |
CVE-2023-35828 | nidhi7598/linux-4.19.72_CVE-2023-35828 | no description | 2023-08-04T05:18:02Z |
CVE-2023-35813 | aalexpereira/CVE-2023-35813 | Exploit for CVE-2023-35813 POC | 2023-12-31T05:23:09Z |
CVE-2023-35813 | BagheeraAltered/CVE-2023-35813-PoC | An exploit for the Sitecore Remote Code Execution Vulnerability | 2024-01-15T14:14:42Z |
CVE-2023-35803 | lachlan2k/CVE-2023-35803 | PoC Exploit for CVE-2023-35803 Unauthenticated Buffer Overflow in Aerohive HiveOS/Extreme Networks IQ Engine | 2023-07-10T19:58:22Z |
CVE-2023-35801 | trustcves/CVE-2023-35801 | no description | 2023-07-24T10:40:26Z |
CVE-2023-35794 | Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking | Repository contains description for CVE-2023-35794 discovered by Dodge Industrial Team for Dodge OPTIFY platfrom. | 2023-10-23T09:51:34Z |
CVE-2023-35793 | Dodge-MPTC/CVE-2023-35793-CSRF-On-Web-SSH | Repository contains description for CVE-2023-35793 | 2023-09-26T11:39:05Z |
CVE-2023-35744 | ADSSA-IT/CVE-2023-35744 | no description | 2023-07-12T07:28:54Z |
CVE-2023-35679 | pazhanivel07/frameworks_av_AOSP_10_r33_CVE-2023-35687_CVE-2023-35679 | no description | 2023-09-21T06:07:57Z |
CVE-2023-35674 | Thampakon/CVE-2023-35674 | ช่องโหว่ CVE-2023-35674 สถานะ: ยังไม่เสร็จ | 2023-09-11T05:34:43Z |
CVE-2023-35671 | MrTiz/CVE-2023-35671 | Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet | 2023-09-01T20:16:28Z |
CVE-2023-3567 | nidhi7598/linux-4.1.15_CVE-2023-3567 | no description | 2023-09-01T05:53:45Z |
CVE-2023-3567 | nidhi7598/linux-4.19.72_CVE-2023-3567 | no description | 2023-09-06T11:16:22Z |
CVE-2023-35636 | duy-31/CVE-2023-35636 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC | 2024-01-29T17:08:05Z |
CVE-2023-3519 | d0rb/CVE-2023-3519 | CVE-2023-3519 | 2023-07-21T11:02:21Z |
CVE-2023-3519 | securekomodo/citrixInspector | Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519 | 2023-07-20T16:05:07Z |
CVE-2023-3519 | CVEProject/cvelist | Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023 | 2020-11-02T19:30:55Z |
CVE-2023-3519 | telekom-security/cve-2023-3519-citrix-scanner | Citrix Scanner for CVE-2023-3519 | 2023-07-20T13:16:38Z |
CVE-2023-3519 | mr-r3b00t/CVE-2023-3519 | no description | 2023-07-21T08:55:28Z |
CVE-2023-3519 | dorkerdevil/CitrixFall | nse script to identify server vulnerable to CVE-2023-3519 | 2023-07-21T15:44:14Z |
CVE-2023-3519 | KR0N-SECURITY/CVE-2023-3519 | NetScaler (Citrix ADC) CVE-2023-3519 Scanner | 2023-07-21T23:48:11Z |
CVE-2023-3519 | SalehLardhi/CVE-2023-3519 | CVE-2023-3519 vuln for nuclei scanner | 2023-07-21T22:10:03Z |
CVE-2023-3519 | passwa11/CVE-2023-3519 | no description | 2023-08-05T01:43:16Z |
CVE-2023-3519 | ViperM4sk/cpanel-xss-177 | Mass Exploitation For (CVE-2023-29489) | 2023-08-04T22:21:57Z |
CVE-2023-3519 | rwincey/cve-2023-3519 | no description | 2023-08-06T23:17:18Z |
CVE-2023-3519 | Dlux-cyber-projects/cve-search-2023 | no description | 2023-08-09T13:17:22Z |
CVE-2023-3519 | BishopFox/CVE-2023-3519 | RCE exploit for CVE-2023-3519 | 2023-07-21T20:17:43Z |
CVE-2023-3519 | mandiant/citrix-ioc-scanner-cve-2023-3519 | no description | 2023-08-10T18:22:57Z |
CVE-2023-3519 | JonaNeidhart/CVE-2023-3519-BackdoorCheck | Script for checking CVE-2023-3519 for Backdoors | 2023-08-31T09:10:30Z |
CVE-2023-3519 | Aicks/Citrix-CVE-2023-3519 | exploit CVE-2023-3519 | 2023-10-12T15:11:55Z |
CVE-2023-3519 | Mohammaddvd/CVE-2023-3519 | Stack-Overflow on Citrix | 2023-10-27T18:39:31Z |
CVE-2023-35086 | tin-z/CVE-2023-35086-POC | POC of CVE-2023-35086 only DoS | 2023-07-25T01:36:07Z |
CVE-2023-35080 | HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation | no description | 2024-02-10T16:12:52Z |
CVE-2023-35078 | synfinner/CVE-2023-35078 | Easy and non-intrusive script to check for CVE-2023-35078 | 2023-07-31T18:21:40Z |
CVE-2023-35078 | lager1/CVE-2023-35078 | Proof of concept script to check if the site is vulnerable to CVE-2023-35078 | 2023-07-29T19:58:33Z |
CVE-2023-35078 | vchan-in/CVE-2023-35078-Exploit-POC | CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC | 2023-07-29T05:06:27Z |
CVE-2023-35078 | emanueldosreis/nmap-CVE-2023-35078-Exploit | Nmap script to exploit CVE-2023-35078 - Mobile Iron Core | 2023-08-01T15:41:12Z |
CVE-2023-35078 | LazyySec/CVE-2023-35078 | Tools to scanner & exploit cve-2023-35078 | 2023-07-31T02:24:24Z |
CVE-2023-35078 | Blue-number/CVE-2023-35078 | Ivanti Endpoint Manager Mobile (EPMM) POC | 2023-08-30T02:36:20Z |
CVE-2023-35078 | 0nsec/CVE-2023-35078 | CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. | 2024-03-29T14:15:49Z |
CVE-2023-35001 | synacktiv/CVE-2023-35001 | Pwn2Own Vancouver 2023 Ubuntu LPE exploit | 2023-09-01T07:41:23Z |
CVE-2023-35001 | syedhafiz1234/nftables-oob-read-write-exploit-CVE-2023-35001- | nftables oob read/write exploit (CVE-2023-35001) | 2023-09-04T03:25:01Z |
CVE-2023-35001 | mrbrelax/Exploit_CVE-2023-35001 | Exploit CVE-2023-35001 | 2024-01-18T08:24:07Z |
CVE-2023-34965 | AgentY0/CVE-2023-34965 | SSPanel UIM is a multi-purpose agency service sales management system specially designed for Shadowsocks / V2Ray / Trojan protocols. SSPanel-Uim version before 2023.3 does not restrict access to the /link/ interface,which can lead to a leak of user subscription information. | 2023-06-12T12:42:48Z |
CVE-2023-34965 | Chal13W1zz/BadParcel | CVE-2023-20963 PoC (Android WorkSource parcel/unparcel logic mismatch) | 2023-06-12T10:44:59Z |
CVE-2023-34960 | MzzdToT/Chamilo__CVE-2023-34960_RCE | Chamilo__CVE-2023-34960_RCE批量扫描poc、exp | 2023-07-18T03:39:44Z |
CVE-2023-34960 | YongYe-Security/Chamilo_CVE-2023-34960-EXP | no description | 2023-07-09T11:24:33Z |
CVE-2023-34960 | Jenderal92/CHAMILO-CVE-2023-34960 | Python 2.7 | 2023-07-03T11:17:42Z |
CVE-2023-34960 | Aituglo/CVE-2023-34960 | CVE-2023-34960 Chamilo PoC | 2023-06-09T10:32:22Z |
CVE-2023-34960 | Mantodkaz/CVE-2023-34960 | no description | 2023-07-24T20:51:15Z |
CVE-2023-34960 | Pari-Malam/CVE-2023-34960 | Perform with Massive Command Injection (Chamilo) | 2023-07-22T05:27:45Z |
CVE-2023-34960 | tucommenceapousser/CVE-2023-34960-ex | Perform with Massive Command Injection (Chamilo) | 2023-08-01T08:09:51Z |
CVE-2023-34924 | ChrisL0tus/CVE-2023-34924 | no description | 2023-06-15T03:12:35Z |
CVE-2023-34853 | risuxx/CVE-2023-34853 | no description | 2023-08-16T15:13:49Z |
CVE-2023-34852 | funny-kill/CVE-2023-34852 | no description | 2023-06-15T01:23:08Z |
CVE-2023-34845 | r4vanan/CVE-2023-34845 | Vulnerability POC for CVE-2023-34845 | 2024-03-03T10:50:16Z |
CVE-2023-34843 | hheeyywweellccoommee/CVE-2023-34843-illrj | no description | 2023-07-01T03:01:38Z |
CVE-2023-34843 | rootd4ddy/CVE-2023-34843 | Public disclosure for CVE-2023-34843. | 2023-06-27T20:45:32Z |
CVE-2023-34840 | Xh4H/CVE-2023-34840 | XSS in angular-ui-notification | 2023-06-27T08:20:20Z |
CVE-2023-34839 | sahiloj/CVE-2023-34839 | no description | 2023-06-23T11:51:46Z |
CVE-2023-34838 | sahiloj/CVE-2023-34838 | no description | 2023-06-23T11:51:21Z |
CVE-2023-34837 | sahiloj/CVE-2023-34837 | no description | 2023-06-23T11:50:45Z |
CVE-2023-34836 | sahiloj/CVE-2023-34836 | no description | 2023-06-23T11:50:12Z |
CVE-2023-34835 | sahiloj/CVE-2023-34835 | no description | 2023-06-23T11:49:37Z |
CVE-2023-34830 | leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below | no description | 2023-06-16T08:43:35Z |
CVE-2023-34747 | codeb0ss/CVE-2023-34747-PoC | Mass Exploit - CVE-2023-34747 - Ujcms - Arbitrary File Upload | 2023-09-05T04:36:42Z |
CVE-2023-34634 | radman404/CVE-2023-34634 | Python rewrite of the POC for CVE-2023-34634 | 2023-08-18T09:00:44Z |
CVE-2023-3460 | diego-tella/CVE-2023-3460 | Exploit and scanner for CVE-2023-3460 | 2023-07-11T20:15:20Z |
CVE-2023-3460 | Fire-Null/CVE-2023-3460 | CVE-2023-3460 | 2023-07-11T13:44:18Z |
CVE-2023-3460 | hheeyywweellccoommee/CVE-2023-3460-obgen | CVE-2023-3460 | 2023-07-11T13:01:05Z |
CVE-2023-3460 | yon3zu/Mass-CVE-2023-3460 | Mass CVE-2023-3460. | 2023-07-09T16:46:17Z |
CVE-2023-3460 | rizqimaulanaa/CVE-2023-3460 | no description | 2023-07-07T12:40:37Z |
CVE-2023-3460 | gbrsh/CVE-2023-3460 | Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7 | 2023-07-05T13:44:50Z |
CVE-2023-3460 | Rajneeshkarya/CVE-2023-3460 | Exploit for the vulnerability of Ultimate Member Plugin. | 2023-07-27T15:19:16Z |
CVE-2023-3460 | BlackReaperSK/CVE-2023-3460_POC | GitHub repository for CVE-2023-3460 POC | 2023-08-15T16:56:53Z |
CVE-2023-3460 | ollie-blue/CVE_2023_3460 | Exploit wp capabilities and wordPress ultimate member plugin to create admnistrator account | 2023-10-19T07:35:03Z |
CVE-2023-3460 | julienbrs/exploit-CVE-2023-3460 | no description | 2024-01-04T22:43:19Z |
CVE-2023-34599 | hheeyywweellccoommee/CVE-2023-34599-xsddo | no description | 2023-07-01T04:00:46Z |
CVE-2023-34599 | maddsec/CVE-2023-34599 | Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code. | 2023-06-23T20:10:33Z |
CVE-2023-34598 | hheeyywweellccoommee/CVE-2023-34598-ghonc | no description | 2023-07-01T03:01:36Z |
CVE-2023-34598 | Szlein/CVE-2023-34598 | Gibbon本地文件包含漏洞(CVE-2023-34598) | 2023-06-26T15:14:47Z |
CVE-2023-34598 | maddsec/CVE-2023-34598 | Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it's possible to include the content of several files present in the installation folder in the server's response. | 2023-06-23T19:49:38Z |
CVE-2023-34584 | fu2x2000/-CVE-2023-34584 | no description | 2023-06-20T20:17:13Z |
CVE-2023-34537 | leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5 | no description | 2023-06-13T09:10:35Z |
CVE-2023-3452 | leoanggal1/CVE-2023-3452-PoC | Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE) | 2023-11-05T16:33:32Z |
CVE-2023-3450 | yuanjinyuyuyu/CVE-2023-3450 | no description | 2023-08-31T17:32:27Z |
CVE-2023-3450 | caopengyan/CVE-2023-3450 | no description | 2023-09-10T12:09:05Z |
CVE-2023-34468 | mbadanoiu/CVE-2023-34468 | CVE-2023-34468: Remote Code Execution via DB Components in Apache NiFi | 2023-11-25T12:21:48Z |
CVE-2023-34362 | toorandom/moveit-payload-decrypt-CVE-2023-34362 | This shellscript given the OrgKey 0 will parse the header of the base64 artifacts found in MOVEit Logs and decrypt the Serialized object used a payload | 2023-07-18T15:58:00Z |
CVE-2023-34362 | Malwareman007/CVE-2023-34362 | POC for CVE-2023-34362 affecting MOVEit Transfer | 2023-07-09T18:44:22Z |
CVE-2023-34362 | horizon3ai/CVE-2023-34362 | MOVEit CVE-2023-34362 | 2023-06-09T19:07:32Z |
CVE-2023-34362 | kenbuckler/MOVEit-CVE-2023-34362 | Repository with everything I have tracking the impact of MOVEit CVE-2023-34362 | 2023-06-16T00:39:37Z |
CVE-2023-34362 | hheeyywweellccoommee/CVE-2023-34362-zcial | no description | 2023-06-15T23:01:53Z |
CVE-2023-34362 | sfewer-r7/CVE-2023-34362 | CVE-2023-34362: MOVEit Transfer Unauthenticated RCE | 2023-06-12T12:56:12Z |
CVE-2023-34362 | lithuanian-g/cve-2023-34362-iocs | CSV File Containing CVE-2023-34362 IOCs | 2023-06-12T09:58:25Z |
CVE-2023-34362 | hheeyywweellccoommee/CVE-2023-34362-nhjxn | An investigation into CVE-2023-34362. | 2023-06-07T04:00:35Z |
CVE-2023-34362 | deepinstinct/MOVEit_CVE-2023-34362_IOCs | CVE-2023-34362-IOCs. More information on Deep Instinct's blog site. | 2023-06-06T15:33:49Z |
CVE-2023-34362 | Chinyemba-ck/MOVEit-CVE-2023-34362 | A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project) | 2024-01-01T00:55:07Z |
CVE-2023-34312 | lan1oc/CVE-2023-34312-exp | 复现CVE-2023-34312所需的两个恶意dll文件 | 2023-08-07T13:09:11Z |
CVE-2023-34212 | mbadanoiu/CVE-2023-34212 | CVE-2023-34212: Java Deserialization via JNDI Components in Apache NiFi | 2023-11-23T22:14:49Z |
CVE-2023-3420 | paulsery/CVE_2023_3420 | V8 type confusion allows chrome sandbox escape | 2024-01-24T19:21:19Z |
CVE-2023-3420 | keowu/BadRentdrv2 | A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976). | 2023-10-01T18:24:38Z |
CVE-2023-34152 | overgrowncarrot1/ImageTragick_CVE-2023-34152 | CVE-2023-34152 | 2023-09-27T03:37:25Z |
CVE-2023-34096 | galoget/Thruk-CVE-2023-34096 | Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal). | 2023-06-09T02:17:25Z |
CVE-2023-34092 | FlapyPan/test-cve-2023-34092 | test-cve-2023-34092 | 2024-01-20T08:46:11Z |
CVE-2023-34092 | Hkhanbing/cve-2023-poc | no description | 2024-01-20T08:06:17Z |
CVE-2023-34051 | horizon3ai/CVE-2023-34051 | VMware Aria Operations for Logs CVE-2023-34051 | 2023-10-20T14:59:45Z |
CVE-2023-34040 | Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040 | POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040 | 2023-08-30T12:09:15Z |
CVE-2023-34040 | pyn3rd/CVE-2023-34040 | Spring-Kafka-Deserialization-Remote-Code-Execution | 2023-09-28T11:18:35Z |
CVE-2023-34039 | sinsinology/CVE-2023-34039 | VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039) | 2023-09-01T16:17:10Z |
CVE-2023-34039 | ayhan-dev/CVE | CVE-2023 | 2023-08-28T15:53:25Z |
CVE-2023-34039 | CharonDefalt/CVE-2023-34039 | VMware exploit | 2023-09-02T07:56:06Z |
CVE-2023-34039 | Cyb3rEnthusiast/CVE-2023-34039 | Here it is, the VMware newest exploit | 2023-09-03T10:03:36Z |
CVE-2023-34039 | syedhafiz1234/CVE-2023-34039 | CVE-2023-34039 | 2023-09-04T03:27:56Z |
CVE-2023-34039 | adminxb/CVE-2023-34039 | exp | 2023-11-10T07:23:11Z |
CVE-2023-34035 | mouadk/CVE-2023-34035-Poc | no description | 2023-05-16T18:26:59Z |
CVE-2023-34035 | jzheaux/cve-2023-34035-mitigations | no description | 2023-08-01T21:15:01Z |
CVE-2023-34034 | hotblac/cve-2023-34034 | Demonstration of CVE-2023-24034 authorization bypass in Spring Security | 2023-12-02T10:51:39Z |
CVE-2023-33977 | mnqazi/CVE-2023-33977 | Read more at Medium | 2023-06-01T13:10:31Z |
CVE-2023-33902 | uthrasri/CVE-2023-33902_single_file | no description | 2024-01-19T13:17:16Z |
CVE-2023-33831 | codeb0ss/CVE-2023-33831-PoC | CVE-2023-33831 - FUXA < Unauthenticated Remote Code Execution [RCE] | 2023-10-04T01:12:10Z |
CVE-2023-33831 | markuta/bw-dump | A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault. | 2022-09-18T21:03:07Z |
CVE-2023-33831 | rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831 | Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software. | 2023-09-03T19:25:15Z |
CVE-2023-33829 | CKevens/CVE-2023-33829-POC | SCM Manager XSS | 2023-06-07T04:20:54Z |
CVE-2023-33829 | n3gox/CVE-2023-33829 | Proof of Concept about a XSS Stored in SCM Manager 1.2 <= 1.60 | 2023-05-19T13:11:50Z |
CVE-2023-33829 | thatonesecguy/Wordpress-Vulnerability-Identification-Scripts | Identifies domains which run WordPress and tests against vulnerabilities (CVE-2023-32243) / #VU76395 / etc... | 2023-05-29T11:42:35Z |
CVE-2023-33817 | leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5 | no description | 2023-06-13T08:07:00Z |
CVE-2023-33802 | CDACesec/CVE-2023-33802 | no description | 2023-05-18T08:23:38Z |
CVE-2023-33802 | GREENHAT7/pxplan | CVE-2023-2023 | 2021-11-22T12:57:22Z |
CVE-2023-33782 | s0tr/CVE-2023-33782 | no description | 2023-06-03T11:24:29Z |
CVE-2023-33781 | s0tr/CVE-2023-33781 | no description | 2023-06-03T11:47:02Z |
CVE-2023-33768 | purseclab/CVE-2023-33768 | DoS against Belkin smart plugs via crafted firmware injection | 2023-06-23T18:28:18Z |
CVE-2023-33768 | Fr0stM0urne/CVE-2023-33768 | DoS against Belkin smart plugs via crafted firmware injection | 2023-07-29T01:11:34Z |
CVE-2023-33747 | 0xWhoami35/CloudPanel-CVE-2023-33747 | no description | 2024-03-18T13:56:17Z |
CVE-2023-33733 | c53elyas/CVE-2023-33733 | CVE-2023-33733 reportlab RCE | 2023-05-30T22:22:50Z |
CVE-2023-33733 | hoangbui24/CVE-2023-33733 | Reportlab Library - Remote Code Execution | 2024-03-15T03:52:05Z |
CVE-2023-33732 | sahiloj/CVE-2023-33732 | no description | 2023-05-30T18:36:03Z |
CVE-2023-33731 | sahiloj/CVE-2023-33731 | no description | 2023-05-30T17:58:38Z |
CVE-2023-33730 | sahiloj/CVE-2023-33730 | no description | 2023-05-30T16:22:59Z |
CVE-2023-33730 | nguyendinhmanh1111/CVE2023 | no description | 2023-05-30T12:57:00Z |
CVE-2023-33677 | ASR511-OO7/CVE-2023-33677 | no description | 2024-02-25T09:17:48Z |
CVE-2023-33676 | ASR511-OO7/CVE-2023-33676 | no description | 2024-02-25T09:18:38Z |
CVE-2023-33668 | lodi-g/CVE-2023-33668 | no description | 2023-07-08T08:56:21Z |
CVE-2023-33668 | lrh2000/StackRot | CVE-2023-3269: Linux kernel privilege escalation vulnerability | 2023-06-28T13:22:26Z |
CVE-2023-33668 | hansengentle/CVE-2023 | no description | 2023-07-07T20:16:50Z |
CVE-2023-33592 | Acous7icwav3/CVE-2023-33592 | CVE-2023-33592批量漏洞利用程序 | 2023-07-14T03:15:13Z |
CVE-2023-33592 | deepinstinct/Storm0978-RomCom-Campaign | Recent Campaign abusing CVE-2023-36884 | 2023-07-13T12:54:00Z |
CVE-2023-33580 | sudovivek/My-CVE | Explore CVE-2023-33580 (XSS) & CVE-2023-33584 (SQLI) discovered by me. Dive into vulnerabilities and exploits for insights. | 2023-06-04T11:27:20Z |
CVE-2023-33567 | 16yashpatel/CVE-2023-33567 | Unauthorized Access Vulnerability in ROS2 Foxy Fitzroy | 2023-06-22T16:39:52Z |
CVE-2023-33566 | 16yashpatel/CVE-2023-33566 | Unauthorized Node Injection Vulnerability in ROS2 Foxy Fitzroy | 2023-06-22T16:36:33Z |
CVE-2023-33565 | 16yashpatel/CVE-2023-33565 | Denial-of-Service (DoS) Vulnerability in ROS2 Foxy Fitzroy | 2023-06-22T16:26:55Z |
CVE-2023-33517 | wushigudan/CVE-2023-33517 | no description | 2023-10-19T02:08:39Z |
CVE-2023-33477 | Skr11lex/CVE-2023-33477 | no description | 2023-06-05T16:40:00Z |
CVE-2023-33476 | mellow-hype/cve-2023-33476 | Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476) | 2023-06-20T01:13:17Z |
CVE-2023-33410 | Thirukrishnan/CVE-2023-33410 | no description | 2023-06-02T06:18:01Z |
CVE-2023-33409 | Thirukrishnan/CVE-2023-33409 | no description | 2023-06-02T06:09:05Z |
CVE-2023-33408 | Thirukrishnan/CVE-2023-33408 | no description | 2023-06-02T05:30:25Z |
CVE-2023-33405 | hacip/CVE-2023-33405 | no description | 2023-06-20T18:37:44Z |
CVE-2023-33404 | hacip/CVE-2023-33404 | no description | 2023-06-20T18:14:58Z |
CVE-2023-33381 | duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC | CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC | 2023-05-31T22:30:20Z |
CVE-2023-3338 | TurtleARM/CVE-2023-3338-DECPwn | Linux kernel LPE practice with an NPD vulnerability | 2023-06-29T10:12:18Z |
CVE-2023-3338 | TechinsightsPro/ShodanFortiOS | Search vulnerable FortiOS devices via Shodan (CVE-2023-27997) | 2023-07-11T20:41:03Z |
CVE-2023-33253 | Toxich4/CVE-2023-33253 | no description | 2023-06-08T14:34:16Z |
CVE-2023-33246 | Devil0ll/CVE-2023-33246 | CVE-2023-33246 | 2023-06-13T03:51:32Z |
CVE-2023-33246 | hheeyywweellccoommee/CVE-2023-33246-dgjfd | CVE-2023-33246 | 2023-06-13T04:01:11Z |
CVE-2023-33246 | Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT | CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit | 2023-06-01T14:48:26Z |
CVE-2023-33246 | hheeyywweellccoommee/CVE-2023-33246-rnkku | Apache RocketMQ 漏洞利用工具 | 2023-06-07T01:01:26Z |
CVE-2023-33246 | Le1a/CVE-2023-33246 | Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit | 2023-06-01T02:17:20Z |
CVE-2023-33246 | hau-zy/KeePass-dump-py | Re-write of original KeePass 2.X Master Password Dumper (CVE-2023-32784) POC in python. | 2023-06-04T08:24:15Z |
CVE-2023-33246 | vdohney/keepass-password-dumper | Original PoC for CVE-2023-32784 | 2023-05-01T17:08:55Z |
CVE-2023-33246 | CKevens/CVE-2023-33246 | CVE-2023-33246:Apache RocketMQ 远程命令执行漏洞检测工具 | 2023-06-02T01:41:12Z |
CVE-2023-33246 | SuperZero/CVE-2023-33246 | Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit | 2023-06-01T06:27:09Z |
CVE-2023-33246 | yizhimanpadewoniu/CVE-2023-33246-Copy | no description | 2023-05-31T07:28:46Z |
CVE-2023-33246 | I5N0rth/CVE-2023-33246 | no description | 2023-05-30T02:18:29Z |
CVE-2023-33246 | d0rb/CVE-2023-33246 | CVE-2023-33246 POC | 2023-08-11T08:45:29Z |
CVE-2023-33246 | 0xKayala/CVE-2023-33246 | CVE-2023-33246 - Apache RocketMQ config RCE | 2023-10-28T07:08:19Z |
CVE-2023-33246 | MkJos/CVE-2023-33246_RocketMQ_RCE_EXP | no description | 2023-12-26T12:41:30Z |
CVE-2023-33246 | hanch7274/CVE-2023-33246 | no description | 2024-03-14T04:29:15Z |
CVE-2023-33243 | RedTeamPentesting/CVE-2023-33243 | PoC for login with password hash in STARFACE | 2023-05-26T08:32:38Z |
CVE-2023-33242 | d0rb/CVE-2023-33242 | CVE-2023-33242 PoC | 2023-08-15T13:46:48Z |
CVE-2023-33137 | JaqueMalman/CVE-2023-33137 | Tentando desesperadamente simular uma cve para o trabalho da disciplina de segurança da pós. | 2024-01-06T22:40:19Z |
CVE-2023-33137 | ayhan-dev/CVE-LIST | list CVE - 2023 | 2023-11-28T06:54:25Z |
CVE-2023-32961 | LOURC0D3/CVE-2023-32961 | PoC of CVE-2023-32961 | 2023-07-06T02:37:29Z |
CVE-2023-32784 | CTM1/CVE-2023-32784-keepass-linux | KeePass Master Password Extraction PoC for Linux | 2023-05-17T20:15:13Z |
CVE-2023-32784 | dawnl3ss/CVE-2023-32784 | Retrieve the master password of a keepass database <= 2.53.1 | 2023-08-30T16:42:19Z |
CVE-2023-32784 | ValentinPundikov/poc-CVE-2023-32784 | no description | 2023-10-17T13:17:08Z |
CVE-2023-32784 | z-jxy/keepass_dump | KeePass 2.X dumper (CVE-2023-32784) | 2023-05-22T00:11:42Z |
CVE-2023-32784 | mister-turtle/cve-2023-32784 | no description | 2024-02-01T09:41:24Z |
CVE-2023-32707 | 9xN/CVE-2023-32707 | An improved POC exploit based on the reported CVE on exploitdb | 2023-11-14T04:06:08Z |
CVE-2023-32681 | hardikmodha/POC-CVE-2023-32681 | POC for the CVE-2023-32681 | 2023-07-22T05:24:58Z |
CVE-2023-32681 | codeb0ss/cve-202335843 | no description | 2023-07-22T04:02:01Z |
CVE-2023-32629 | kaotickj/Check-for-CVE-2023-32629-GameOver-lay | Check for CVE-2023-32629 "GameOver(lay)" vulnerability | 2023-08-11T21:08:38Z |
CVE-2023-32629 | johnlettman/juju-scripts | Juju: GameOver(lay) CVE-2023-2640 and CVE-2023-32629 patcher | 2023-08-04T18:28:52Z |
CVE-2023-32629 | g1vi/CVE-2023-2640-CVE-2023-32629 | GameOver(lay) Ubuntu Privilege Escalation | 2023-10-09T22:02:42Z |
CVE-2023-32629 | vinetsuicide/CVE-2023-2640-CVE-2023-32629 | no description | 2023-11-02T20:19:57Z |
CVE-2023-3262 | SanjayRagavendar/Ubuntu-GameOver-Lay | Escalating Privilege using CVE-2023-2640 CVE-2023-3262 | 2024-02-29T16:04:58Z |
CVE-2023-32571 | Tris0n/CVE-2023-32571-POC | no description | 2023-11-18T04:35:37Z |
CVE-2023-32571 | vert16x/CVE-2023-32571-POC | no description | 2023-11-18T06:12:12Z |
CVE-2023-32560 | x0rb3l/CVE-2023-32560 | Ivanti Avalanche v6.4.0.0 RCE POC | 2023-08-17T03:39:37Z |
CVE-2023-3244 | drnull03/POC-CVE-2023-3244 | This is a Proof of Concept (PoC) for CVE-2023-3244, a vulnerability in comment-like-dislike. The PoC demonstrates the exploitability of this vulnerability and serves as a reference for security researchers and developers to better understand and mitigate the risk associated with this issue. | 2023-09-13T11:52:36Z |
CVE-2023-3244 | gabe-k/themebleed | Proof-of-Concept for CVE-2023-38146 ("ThemeBleed") | 2023-09-13T04:00:14Z |
CVE-2023-32422 | gergelykalman/CVE-2023-32422-a-macOS-TCC-bypass-in-sqlite | no description | 2023-11-15T18:21:20Z |
CVE-2023-32407 | gergelykalman/CVE-2023-32407-a-macOS-TCC-bypass-in-Metal | no description | 2023-11-14T20:45:31Z |
CVE-2023-32364 | gergelykalman/CVE-2023-32364-macos-app-sandbox-escape | Exploit for CVE-2023-32364 | 2023-09-26T14:42:00Z |
CVE-2023-32353 | 86x/CVE-2023-32353-PoC | Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows | 2023-06-08T20:43:03Z |
CVE-2023-32315 | izzz0/CVE-2023-32315-POC | CVE-2023-32315-Openfire-Bypass | 2023-07-07T07:48:24Z |
CVE-2023-32315 | Pari-Malam/CVE-2023-32315 | no description | 2023-07-02T20:38:14Z |
CVE-2023-32315 | miko550/CVE-2023-32315 | Openfire Console Authentication Bypass Vulnerability with RCE plugin | 2023-06-18T15:42:00Z |
CVE-2023-32315 | tangxiaofeng7/CVE-2023-32315-Openfire-Bypass | rce | 2023-06-14T09:43:31Z |
CVE-2023-32315 | 5rGJ5aCh5oCq5YW9/CVE-2023-32315exp | no description | 2023-06-15T01:11:56Z |
CVE-2023-32315 | ohnonoyesyes/CVE-2023-32315 | no description | 2023-06-14T09:17:25Z |
CVE-2023-32315 | gibran-abdillah/CVE-2023-32315 | Tool for CVE-2023-32315 exploitation | 2023-08-31T08:43:44Z |
CVE-2023-32315 | CN016/Openfire-RCE-CVE-2023-32315- | Openfire未授权到RCE(CVE-2023-32315)复现 | 2023-10-10T08:48:42Z |
CVE-2023-32315 | K3ysTr0K3R/CVE-2023-32315-EXPLOIT | A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass | 2023-12-15T16:30:51Z |
CVE-2023-32314 | AdarkSt/Honeypot_Smart_Infrastructure | This Repository Includes Kubernetes manifest files for configuration of Honeypot system and Falco IDS in K8s environment. There are also Demo Application written with Node.js which is containing Remote Code Execution Vulnerability (CVE-2023-32314) for demonstrating all addvantages of this architecture to manage Honeypot systems | 2024-04-02T08:32:05Z |
CVE-2023-32243 | Jenderal92/WP-CVE-2023-32243 | Python 2.7 | 2023-07-03T04:16:16Z |
CVE-2023-32243 | manavvedawala/CVE-2023-32243-proof-of-concept | no description | 2023-06-26T08:17:47Z |
CVE-2023-32243 | RandomRobbieBF/CVE-2023-32243 | CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation | 2023-05-15T09:39:45Z |
CVE-2023-32243 | gbrsh/CVE-2023-32243 | Exploit for CVE-2023-32243 - Unauthorized Account Takeover. | 2023-05-14T19:32:50Z |
CVE-2023-32243 | shaoyu521/Mass-CVE-2023-32243 | Mass-CVE-2023-32243 | 2023-07-29T20:43:16Z |
CVE-2023-32235 | VEEXH/Ghost-Path-Traversal-CVE-2023-32235- | A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. | 2023-07-09T20:01:11Z |
CVE-2023-32233 | oferchen/POC-CVE-2023-32233 | Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233 | 2023-05-16T05:58:03Z |
CVE-2023-32233 | RogelioPumajulca/TEST-CVE-2023-32233 | CVE-2023-32233 | 2024-02-04T02:24:34Z |
CVE-2023-32233 | void0red/CVE-2023-32233 | no description | 2024-04-01T01:20:21Z |
CVE-2023-32117 | RandomRobbieBF/CVE-2023-32117 | Integrate Google Drive <= 1.1.99 - Missing Authorization via REST API Endpoints | 2023-07-17T10:59:17Z |
CVE-2023-32031 | Avento/CVE-2023-32031 | CVE-2023-32031 MS Exchange PowerShell backend RCE | 2023-11-10T09:32:27Z |
CVE-2023-31853 | CalfCrusher/CVE-2023-31853 | no description | 2023-04-23T23:32:31Z |
CVE-2023-31852 | CalfCrusher/CVE-2023-31852 | no description | 2023-04-23T23:36:31Z |
CVE-2023-31851 | CalfCrusher/CVE-2023-31851 | no description | 2023-04-23T23:12:54Z |
CVE-2023-31756 | StanleyJobsonAU/LongBow | CVE-2023-31756 Proof of Concept - Remote Code Execution for Archer V1/V2 Routers | 2024-01-15T13:32:38Z |
CVE-2023-31756 | febinrev/slippy-book-exploit | CVE-2023-44451, CVE-2023-52076: RCE Vulnerability affected popular Linux Distros including Mint, Kali, Parrot, Manjaro etc. EPUB File Parsing Directory Traversal Remote Code Execution | 2024-01-17T05:50:38Z |
CVE-2023-31756 | TheRedDevil1/Check-Vulns-Script | Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887 | 2024-01-17T10:29:02Z |
CVE-2023-31753 | khmk2k/CVE-2023-31753 | Proof of Concept for CVE-2023-31753 - eNdonesia Portal 8.7 | 2023-07-20T13:56:13Z |
CVE-2023-31719 | MateusTesser/CVE-2023-31719 | no description | 2023-09-21T00:28:16Z |
CVE-2023-31718 | MateusTesser/CVE-2023-31718 | no description | 2023-09-21T00:27:10Z |
CVE-2023-31717 | MateusTesser/CVE-2023-31717 | no description | 2023-09-21T00:25:52Z |
CVE-2023-31716 | MateusTesser/CVE-2023-31716 | no description | 2023-09-21T00:24:25Z |
CVE-2023-31714 | msd0pe-1/CVE-2023-31714 | no description | 2023-04-16T20:20:32Z |
CVE-2023-31711 | HritikThapa7/CVE-2023-31711 | Zero-day Vulnerability in ZKTEco biometric fingerprint reader. | 2023-02-16T04:27:52Z |
CVE-2023-31705 | d34dun1c02n/CVE-2023-31705 | Reflected XSS | 2023-07-13T01:12:35Z |
CVE-2023-31704 | d34dun1c02n/CVE-2023-31704 | no description | 2023-07-13T01:16:37Z |
CVE-2023-3163 | George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention | A simple and quick way to check if your SQL Developer by Oracle is vulnerable to SQL Injection (CVE-2023-3163), most commonly occurs when SQL Developer version < 23.1.0. | 2023-06-09T18:43:05Z |
CVE-2023-31606 | e23e/CVE-2023-31606 | no description | 2023-06-03T14:13:48Z |
CVE-2023-31546 | ran9ege/CVE-2023-31546 | no description | 2023-12-12T07:41:07Z |
CVE-2023-31541 | DreamD2v/CVE-2023-31541 | no description | 2023-06-10T14:59:15Z |
CVE-2023-31446 | Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution | Repository contains description for CVE-2023-31446 | 2024-01-06T12:23:50Z |
CVE-2023-31419 | sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419 | Elasticsearch Stack Overflow Vulnerability | 2023-09-22T02:15:54Z |
CVE-2023-31419 | ayhan-dev/p0ropc | CVE-2023-29336 | 2023-07-27T17:28:41Z |
CVE-2023-31419 | u238/Elasticsearch-CVE-2023-31419 | Elasticsearch DoS CVE-2023-31419 exploit | 2023-10-03T13:51:37Z |
CVE-2023-31320 | whypet/CVE-2023-31320 | DoS vulnerability in AMD driver that corrupts the display. | 2023-08-22T21:15:46Z |
CVE-2023-31320 | Scottzxor/Citrix-Bleed-Buffer-Overread-Demo | This code functionally approximates the Citrix Bleed vulnerability (CVE-2023-4699). | 2023-11-17T19:55:30Z |
CVE-2023-3124 | AmirWhiteHat/CVE-2023-3124 | CVE-2023-3124 PoC | 2023-09-05T12:32:50Z |
CVE-2023-3106 | nidhi7598/linux-4.1.15_CVE-2023-3106 | no description | 2023-08-03T05:15:34Z |
CVE-2023-3106 | iralabdisco/cvemp-2023 | no description | 2023-08-02T08:43:44Z |
CVE-2023-30943 | d0rb/CVE-2023-30943 | CVE-2023-30943 RCE PoC | 2023-08-31T08:18:17Z |
CVE-2023-30943 | Chocapikk/CVE-2023-30943 | A Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders. | 2023-09-07T13:25:55Z |
CVE-2023-30943 | lucas-cauhe/cargo-perm | Cargo exploit from CVE-2023-38497 | 2023-08-04T16:36:10Z |
CVE-2023-30943 | RubyCat1337/CVE-2023-30943 | CVE-2023-30943 (Moodle XSS) | 2024-03-21T08:08:52Z |
CVE-2023-30861 | JawadPy/CVE-2023-30861-Exploit | Explaining how to exploit CVE-2023-30861 | 2023-10-13T08:27:03Z |
CVE-2023-30845 | himori123/-CVE-2023-30845 | Explore CVE 2023-30845 automatically across multiple subdomains | 2023-09-22T01:14:20Z |
CVE-2023-3079 | mistymntncop/CVE-2023-3079 | no description | 2023-08-15T04:16:46Z |
CVE-2023-30777 | Alucard0x1/CVE-2023-30777 | Proof of Concept (PoC) URL generator for a reflected XSS vulnerability in the Advanced Custom Fields WordPress plugin. | 2023-06-17T12:43:51Z |
CVE-2023-30765 | 0xfml/CVE-2023-30765 | CVE-2023-30765 / ZDI-23-905 - Delta Electronics Infrasuite Device Master Privilege Escalation | 2023-07-19T14:21:15Z |
CVE-2023-30547 | rvizx/CVE-2023-30547 | PoC Exploit for VM2 Sandbox Escape Vulnerability | 2023-12-10T08:32:26Z |
CVE-2023-30547 | user0x1337/CVE-2023-30547 | PoC to CVE-2023-30547 (Library vm2) | 2024-02-08T07:03:32Z |
CVE-2023-30547 | Cur1iosity/CVE-2023-30547 | Tool for exploring CVE-2023-30547 | 2024-02-14T13:05:57Z |
CVE-2023-30533 | BenEdridge/CVE-2023-30533 | CVE-2023-30533 | 2023-08-09T06:48:32Z |
CVE-2023-3047 | Phamchie/CVE-2023-3047 | no description | 2024-03-07T14:46:22Z |
CVE-2023-3047 | 0x1x02/GLiNet-Router-Auth-Bypass | Demonstrates critical vulnerability allowing unauthorized access to GL.iNet router web interface without valid credentials. Exploit targets CVE-2023-46453 | 2024-03-07T08:05:31Z |
CVE-2023-30383 | a2ure123/CVE-2023-30383 | no description | 2023-07-15T08:43:41Z |
CVE-2023-30367 | S1lkys/CVE-2023-30367-mRemoteNG-password-dumper | Original PoC for CVE-2023-30367 | 2023-07-08T18:16:39Z |
CVE-2023-30367 | costacoco/Adiscon | CVE-2023-34600 | 2023-06-16T08:30:10Z |
CVE-2023-30347 | huzefa2212/CVE-2023-30347 | Reflected Cross-Site-Scripting | 2023-06-21T07:03:43Z |
CVE-2023-30258 | gy741/CVE-2023-30258-setup | no description | 2024-01-27T06:01:02Z |
CVE-2023-30226 | ifyGecko/CVE-2023-30226 | rizin denial of service bug | 2023-07-08T19:14:30Z |
CVE-2023-30212 | VisDev23/Vulnerable-Docker--CVE-2023-30212- | This contains the necessary files and Docker to replicate A vulnerability in OURPHP that has a XSS Vulnerability (CVE-2023-30212) | 2023-06-20T09:08:38Z |
CVE-2023-30212 | AAsh035/CVE-2023-30212 | no description | 2023-06-20T10:50:30Z |
CVE-2023-30212 | arunsnap/CVE-2023-30212-POC | no description | 2023-06-19T16:30:05Z |
CVE-2023-30212 | JasaluRah/Creating-a-Vulnerable-Docker-Environment-CVE-2023-30212- | no description | 2023-06-20T12:20:20Z |
CVE-2023-30212 | fullspectrumdev/RancidCrisco | PoC for CVE-2023-20126 | 2023-05-17T08:59:40Z |
CVE-2023-30212 | VisDev23/Vulnerable-Docker-CVE-2023-30212 | no description | 2023-06-20T08:18:43Z |
CVE-2023-30212 | MaThEw-ViNcEnT/CVE-2023-30212-OURPHP-Vulnerability | no description | 2023-06-18T19:56:09Z |
CVE-2023-30212 | hheeyywweellccoommee/CVE-2023-30212-Vulnerable-Lab-xjghb | no description | 2023-06-17T12:01:21Z |
CVE-2023-30212 | kai-iszz/CVE-2023-30212 | no description | 2023-05-29T08:23:34Z |
CVE-2023-30212 | libasv/Exploite-CVE-2023-30212-vulnerability | Exploit-the-CVE-2023-30212-vulnerability | 2023-05-27T09:52:54Z |
CVE-2023-30212 | libasmon/Exploite-CVE-2023-30212-Vulnerability | Docker environment and exploit the CVE-2023-30212 vulnerabilityVE-2023-30212 is a security vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks | 2023-05-27T06:43:44Z |
CVE-2023-30212 | libas7994/Exploit-the-CVE-2023-30212-vulnerability | Vulnerable Docker Environment CVE-2023-30212 | 2023-05-27T09:29:41Z |
CVE-2023-30212 | mallutrojan/CVE-2023-30212-Lab | GitHub repository with Dockerfile and files to create a vulnerable environment for CVE-2023-30212, enabling exploration of the exploitability of this security vulnerability. Ideal for research and security enthusiasts to study and understand the impact of the vulnerability in a controlled setting. | 2023-05-26T09:33:23Z |
CVE-2023-30190 | MojithaR/CVE-2023-30190-FOLLINA | no description | 2023-11-05T13:36:07Z |
CVE-2023-30146 | L1-0/CVE-2023-30146 | Some Assmann manufactured IP-Cams leak the administrator password in their backup. | 2023-06-08T18:18:47Z |
CVE-2023-3009 | mnqazi/CVE-2023-3009 | Stored XSS vulnerability in Teampass < 3.0.9 (Bypass of CVE-2023–2516) — M Nadeem Qazi | 2023-05-31T16:23:23Z |
CVE-2023-30033 | phucodeexp/CVE-2023-30033 | no description | 2023-10-24T02:23:03Z |
CVE-2023-29923 | Le1a/CVE-2023-29923 | PowerJob V4.3.1 Unauthorized Vulnerability Exploit | 2023-05-29T05:48:35Z |
CVE-2023-29922 | CN016/Powerjob-CVE-2023-29922- | Powerjob 未授权访问漏洞(CVE-2023-29922) | 2023-10-10T08:35:00Z |
CVE-2023-2986 | Ayantaker/CVE-2023-2986 | Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress | 2023-06-09T17:44:09Z |
CVE-2023-2986 | Alucard0x1/CVE-2023-2986 | Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress in Python Version | 2023-06-13T20:35:03Z |
CVE-2023-2982 | H4K6/CVE-2023-2982-POC | WordPress社交登录和注册(Discord,Google,Twitter,LinkedIn)<=7.6.4-绕过身份验证 | 2023-06-30T09:15:02Z |
CVE-2023-2982 | LoaiEsam37/CVE-2023-2982 | no description | 2023-07-07T08:25:38Z |
CVE-2023-2982 | hheeyywweellccoommee/CVE-2023-2982-ugdqh | no description | 2023-07-07T09:01:26Z |
CVE-2023-2982 | RandomRobbieBF/CVE-2023-2982 | WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass | 2023-06-29T14:21:08Z |
CVE-2023-2982 | wshinkle/CVE-2023-2982 | no description | 2023-11-18T06:34:15Z |
CVE-2023-29489 | tucommenceapousser/CVE-2023-29489.py | no description | 2023-06-10T22:48:54Z |
CVE-2023-29489 | tucommenceapousser/CVE-2023-29489 | no description | 2023-06-10T22:34:59Z |
CVE-2023-29489 | Abdullah7-ma/CVE-2023-29489 | CVE-2023-29489-XSS | 2023-06-01T18:13:17Z |
CVE-2023-29489 | S4muraiMelayu1337/CVE-2023-29489 | no description | 2023-10-17T11:18:53Z |
CVE-2023-29489 | SynixCyberCrimeMy/CVE-2023-29489 | SynixCyberCrimeMY CVE-2023-29489 Scanner By SamuraiMelayu1337 & h4zzzzzz@scc | 2023-11-16T20:24:11Z |
CVE-2023-29489 | Makurorororororororo/Validate-CVE-2023-29489-scanner- | no description | 2023-12-23T06:28:32Z |
CVE-2023-29489 | some-man1/CVE-2023-29489 | # CVE-2023-29489 exploit | 2024-04-14T08:29:22Z |
CVE-2023-29478 | Exopteron/BiblioRCE | CVE-2023-29478 - BiblioCraft File Manipulation/Remote Code Execution exploit affecting BiblioCraft versions prior to v2.4.6 | 2022-10-27T06:17:24Z |
CVE-2023-29439 | LOURC0D3/CVE-2023-29439 | PoC of CVE-2023-29439 | 2023-07-05T13:04:39Z |
CVE-2023-29409 | mateusz834/CVE-2023-29409 | CVE-2023-29409 reproducer | 2023-08-21T15:59:26Z |
CVE-2023-29360 | Nero22k/cve-2023-29360 | Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver | 2023-09-24T21:59:23Z |
CVE-2023-29357 | Chocapikk/CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | 2023-09-26T16:18:41Z |
CVE-2023-29357 | KeyStrOke95/CVE-2023-29357-ExE | Recreation of the SharePoint PoC for CVE-2023-29357 in C# from LuemmelSec | 2023-10-10T13:41:21Z |
CVE-2023-29357 | LuemmelSec/CVE-2023-29357 | no description | 2023-09-30T23:17:04Z |
CVE-2023-29357 | abrahim7112/Vulnerability-scanner-2023 | The largest hacking program with new tools CVE-2023-PoC for the year 2023 It contains all the attack and exploitation tools for testing websites, as well as a graphical interface to facilitate its use for beginners | 2023-10-10T17:16:38Z |
CVE-2023-29357 | Twil4/CVE-2023-29357-check | no description | 2023-10-25T12:34:22Z |
CVE-2023-29357 | Guillaume-Risch/cve-2023-29357-Sharepoint | no description | 2023-12-22T08:42:00Z |
CVE-2023-29357 | febinrev/deepin-linux_reader_RCE-exploit | CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "deepin-reader" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document. | 2023-12-22T06:50:28Z |
CVE-2023-29343 | Wh04m1001/CVE-2023-29343 | no description | 2023-06-18T11:14:08Z |
CVE-2023-29336 | m-cetin/CVE-2023-29336 | no description | 2023-06-09T15:36:45Z |
CVE-2023-29325 | a-bazi/test-CVE-2023-29325 | no description | 2023-06-07T07:51:59Z |
CVE-2023-29325 | a-bazi/test2-CVE-2023-29325 | no description | 2023-06-19T12:57:43Z |
CVE-2023-29325 | daniloalbuqrque/poc-cve-xss-inventory-press-plugin | PoC for CVE-2023-2579 | 2023-04-21T16:22:10Z |
CVE-2023-2928 | CN016/DedeCMS-getshell-CVE-2023-2928- | DedeCMS文件包含漏洞导致后台getshell(CVE-2023-2928)复现 | 2023-10-10T08:46:17Z |
CVE-2023-2916 | d0rb/CVE-2023-2916 | CVE-2023-291 |