mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/11/10 00:40:00
This commit is contained in:
parent
40ab31a7eb
commit
0e57c3af1f
45 changed files with 375 additions and 91 deletions
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 120135334,
|
||||
"name": "pocs",
|
||||
"full_name": "pagvac\/pocs",
|
||||
"full_name": "adpast\/pocs",
|
||||
"owner": {
|
||||
"login": "pagvac",
|
||||
"login": "adpast",
|
||||
"id": 6169628,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6169628?v=4",
|
||||
"html_url": "https:\/\/github.com\/pagvac"
|
||||
"html_url": "https:\/\/github.com\/adpast"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pagvac\/pocs",
|
||||
"html_url": "https:\/\/github.com\/adpast\/pocs",
|
||||
"description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-03T22:26:09Z",
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit code for CVE-2016-1757",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-27T12:29:28Z",
|
||||
"updated_at": "2023-09-07T17:01:02Z",
|
||||
"updated_at": "2023-11-09T18:25:43Z",
|
||||
"pushed_at": "2016-04-27T14:07:43Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 80,
|
||||
"forks": 24,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T09:33:51Z",
|
||||
"updated_at": "2023-09-07T12:47:00Z",
|
||||
"updated_at": "2023-11-09T23:55:00Z",
|
||||
"pushed_at": "2021-03-22T10:46:07Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-75 - Check and EXPLOIT",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T17:13:30Z",
|
||||
"updated_at": "2023-11-09T17:22:44Z",
|
||||
"updated_at": "2023-11-09T18:31:23Z",
|
||||
"pushed_at": "2023-11-09T17:22:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
32
2019/CVE-2019-0678.json
Normal file
32
2019/CVE-2019-0678.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 197768361,
|
||||
"name": "CVE-2019-0678",
|
||||
"full_name": "sharmasandeepkr\/CVE-2019-0678",
|
||||
"owner": {
|
||||
"login": "sharmasandeepkr",
|
||||
"id": 16163884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16163884?v=4",
|
||||
"html_url": "https:\/\/github.com\/sharmasandeepkr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sharmasandeepkr\/CVE-2019-0678",
|
||||
"description": "Microsoft Edge Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-19T12:23:27Z",
|
||||
"updated_at": "2022-12-01T13:46:39Z",
|
||||
"pushed_at": "2019-07-19T12:15:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -2343,6 +2343,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 197547695,
|
||||
"name": "cve-2019-0708",
|
||||
"full_name": "cve-2019-0708-poc\/cve-2019-0708",
|
||||
"owner": {
|
||||
"login": "cve-2019-0708-poc",
|
||||
"id": 53038783,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53038783?v=4",
|
||||
"html_url": "https:\/\/github.com\/cve-2019-0708-poc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cve-2019-0708-poc\/cve-2019-0708",
|
||||
"description": "CVE-2019-0708 Exploit Tool",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-18T08:41:01Z",
|
||||
"updated_at": "2022-08-23T04:38:53Z",
|
||||
"pushed_at": "2019-07-18T08:44:51Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
{
|
||||
"id": 197655376,
|
||||
"name": "CVE-2019-0708",
|
||||
|
|
32
2019/CVE-2019-10915.json
Normal file
32
2019/CVE-2019-10915.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 198133475,
|
||||
"name": "CVE-2019-10915",
|
||||
"full_name": "jiansiting\/CVE-2019-10915",
|
||||
"owner": {
|
||||
"login": "jiansiting",
|
||||
"id": 28823754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiansiting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915",
|
||||
"description": "Siemens TIA administrator Tool RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-22T02:38:54Z",
|
||||
"updated_at": "2023-09-28T11:04:20Z",
|
||||
"pushed_at": "2019-07-22T11:48:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -37,6 +37,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 197643691,
|
||||
"name": "jquery-prototype-pollution-fix",
|
||||
"full_name": "bitnesswise\/jquery-prototype-pollution-fix",
|
||||
"owner": {
|
||||
"login": "bitnesswise",
|
||||
"id": 32780182,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32780182?v=4",
|
||||
"html_url": "https:\/\/github.com\/bitnesswise"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bitnesswise\/jquery-prototype-pollution-fix",
|
||||
"description": "A fix for CVE-2019-11358 (prototype pollution in jquery)",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-18T19:15:33Z",
|
||||
"updated_at": "2023-09-28T11:04:14Z",
|
||||
"pushed_at": "2019-07-18T20:00:15Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 255702097,
|
||||
"name": "snyk-js-jquery-565129",
|
||||
|
|
32
2019/CVE-2019-11477.json
Normal file
32
2019/CVE-2019-11477.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 198296662,
|
||||
"name": "cve-2019-11477-poc",
|
||||
"full_name": "sasqwatch\/cve-2019-11477-poc",
|
||||
"owner": {
|
||||
"login": "sasqwatch",
|
||||
"id": 22352904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22352904?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasqwatch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-22T20:23:08Z",
|
||||
"updated_at": "2023-09-28T11:04:22Z",
|
||||
"pushed_at": "2019-07-21T15:56:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 197342430,
|
||||
"name": "CVE-2019-11580",
|
||||
"full_name": "jas502n\/CVE-2019-11580",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11580",
|
||||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2023-10-14T03:31:41Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 245476096,
|
||||
"name": "CVE-2019-11580",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 197105656,
|
||||
"name": "CVE-2019-11581",
|
||||
"full_name": "jas502n\/CVE-2019-11581",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581",
|
||||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2023-09-28T11:04:08Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 198763431,
|
||||
"name": "CVE-2019-11581",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 198579428,
|
||||
"name": "CVE-2019-12384",
|
||||
"full_name": "jas502n\/CVE-2019-12384",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12384",
|
||||
"description": "Jackson Rce For CVE-2019-12384 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-24T07:12:14Z",
|
||||
"updated_at": "2023-09-28T11:04:25Z",
|
||||
"pushed_at": "2019-07-24T07:31:42Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 198939305,
|
||||
"name": "Jackson_RCE-CVE-2019-12384",
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -947,6 +947,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -270,6 +270,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -733,7 +733,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 237996900,
|
||||
|
|
|
@ -117,6 +117,6 @@
|
|||
"forks": 8,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -953,6 +953,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -156,7 +156,7 @@
|
|||
"forks": 21,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 381984439,
|
||||
|
|
|
@ -872,6 +872,6 @@
|
|||
"forks": 149,
|
||||
"watchers": 1146,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 11
|
||||
}
|
||||
]
|
|
@ -44,11 +44,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-30T04:39:58Z",
|
||||
"updated_at": "2023-10-27T11:22:01Z",
|
||||
"pushed_at": "2022-07-01T00:33:57Z",
|
||||
"pushed_at": "2023-11-09T21:43:52Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -739,7 +739,7 @@
|
|||
"forks": 10,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 347961970,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 70,
|
||||
"watchers": 255,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
"subscribers_count": 14
|
||||
},
|
||||
{
|
||||
"id": 331843308,
|
||||
|
|
|
@ -1948,10 +1948,10 @@
|
|||
"description": "clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-28T12:52:11Z",
|
||||
"updated_at": "2023-10-05T08:58:58Z",
|
||||
"updated_at": "2023-11-09T22:23:44Z",
|
||||
"pushed_at": "2022-12-22T12:38:31Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -1960,7 +1960,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -31,6 +31,6 @@
|
|||
"forks": 24,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -662,7 +662,7 @@
|
|||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 625005108,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2023-11-06T11:08:08Z",
|
||||
"updated_at": "2023-11-09T21:49:33Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -79,19 +79,19 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2023-11-08T22:07:22Z",
|
||||
"updated_at": "2023-11-09T19:03:53Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1858,
|
||||
"watchers_count": 1858,
|
||||
"stargazers_count": 1857,
|
||||
"watchers_count": 1857,
|
||||
"has_discussions": false,
|
||||
"forks_count": 515,
|
||||
"forks_count": 516,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 515,
|
||||
"watchers": 1858,
|
||||
"forks": 516,
|
||||
"watchers": 1857,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -211,7 +211,7 @@
|
|||
"forks": 35,
|
||||
"watchers": 90,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 667239570,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -62,7 +62,7 @@
|
|||
"forks": 113,
|
||||
"watchers": 653,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
"subscribers_count": 12
|
||||
},
|
||||
{
|
||||
"id": 437924403,
|
||||
|
|
|
@ -675,7 +675,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 445007761,
|
||||
|
|
|
@ -891,7 +891,7 @@
|
|||
"forks": 142,
|
||||
"watchers": 922,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
"subscribers_count": 24
|
||||
},
|
||||
{
|
||||
"id": 437139341,
|
||||
|
@ -4898,7 +4898,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 437983994,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-09T15:53:48Z",
|
||||
"updated_at": "2023-11-03T07:35:36Z",
|
||||
"updated_at": "2023-11-10T00:00:34Z",
|
||||
"pushed_at": "2023-09-27T06:44:27Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-11-09T02:05:09Z",
|
||||
"updated_at": "2023-11-09T20:45:24Z",
|
||||
"pushed_at": "2023-09-10T10:44:32Z",
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 221,
|
||||
"watchers": 222,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T05:58:03Z",
|
||||
"updated_at": "2023-10-10T21:07:22Z",
|
||||
"updated_at": "2023-11-09T22:12:11Z",
|
||||
"pushed_at": "2023-06-20T06:58:04Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-11-09T07:44:24Z",
|
||||
"updated_at": "2023-11-09T23:16:49Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 430,
|
||||
"watchers": 431,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T12:07:40Z",
|
||||
"updated_at": "2023-11-07T05:56:45Z",
|
||||
"updated_at": "2023-11-10T00:03:13Z",
|
||||
"pushed_at": "2023-08-23T16:46:53Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-09T19:56:07Z",
|
||||
"updated_at": "2023-11-09T17:41:58Z",
|
||||
"updated_at": "2023-11-09T18:51:28Z",
|
||||
"pushed_at": "2023-08-10T05:12:20Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-05T15:06:43Z",
|
||||
"updated_at": "2023-11-09T08:00:21Z",
|
||||
"updated_at": "2023-11-09T23:23:57Z",
|
||||
"pushed_at": "2023-11-06T18:56:53Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,12 +133,12 @@
|
|||
"description": " CVE-2023-46604 ActiveMQ RCE vulnerability verification\/exploitation tool",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-06T04:05:51Z",
|
||||
"updated_at": "2023-11-09T10:18:56Z",
|
||||
"updated_at": "2023-11-09T19:51:05Z",
|
||||
"pushed_at": "2023-11-07T11:58:28Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -146,7 +146,7 @@
|
|||
"cve-2023-46604"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2023-11-09T12:34:42Z",
|
||||
"pushed_at": "2023-11-07T12:34:17Z",
|
||||
"pushed_at": "2023-11-10T00:37:38Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
|
|
46
README.md
46
README.md
|
@ -881,13 +881,25 @@
|
|||
|
||||
- [juweihuitao/MpOperationLogs](https://github.com/juweihuitao/MpOperationLogs)
|
||||
|
||||
### CVE-2023-5539
|
||||
### CVE-2023-5539 (2023-11-09)
|
||||
|
||||
<code>A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
|
||||
</code>
|
||||
|
||||
- [cli-ish/CVE-2023-5539](https://github.com/cli-ish/CVE-2023-5539)
|
||||
|
||||
### CVE-2023-5540
|
||||
### CVE-2023-5540 (2023-11-09)
|
||||
|
||||
<code>A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.
|
||||
</code>
|
||||
|
||||
- [cli-ish/CVE-2023-5540](https://github.com/cli-ish/CVE-2023-5540)
|
||||
|
||||
### CVE-2023-5546
|
||||
### CVE-2023-5546 (2023-11-09)
|
||||
|
||||
<code>ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.
|
||||
</code>
|
||||
|
||||
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
|
||||
|
||||
### CVE-2023-20025 (2023-01-20)
|
||||
|
@ -22783,6 +22795,13 @@
|
|||
|
||||
- [Anti-ghosts/CVE-2019-0623-32-exp](https://github.com/Anti-ghosts/CVE-2019-0623-32-exp)
|
||||
|
||||
### CVE-2019-0678 (2019-04-08)
|
||||
|
||||
<code>An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain.In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability, aka 'Microsoft Edge Elevation of Privilege Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [sharmasandeepkr/CVE-2019-0678](https://github.com/sharmasandeepkr/CVE-2019-0678)
|
||||
|
||||
### CVE-2019-0708 (2019-05-16)
|
||||
|
||||
<code>A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
|
||||
|
@ -22865,6 +22884,7 @@
|
|||
- [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708)
|
||||
- [ze0r/CVE-2019-0708-exp](https://github.com/ze0r/CVE-2019-0708-exp)
|
||||
- [mekhalleh/cve-2019-0708](https://github.com/mekhalleh/cve-2019-0708)
|
||||
- [cve-2019-0708-poc/cve-2019-0708](https://github.com/cve-2019-0708-poc/cve-2019-0708)
|
||||
- [andripwn/CVE-2019-0708](https://github.com/andripwn/CVE-2019-0708)
|
||||
- [0xeb-bp/bluekeep](https://github.com/0xeb-bp/bluekeep)
|
||||
- [ntkernel0/CVE-2019-0708](https://github.com/ntkernel0/CVE-2019-0708)
|
||||
|
@ -24535,6 +24555,13 @@
|
|||
|
||||
- [KTN1990/CVE-2019-10869](https://github.com/KTN1990/CVE-2019-10869)
|
||||
|
||||
### CVE-2019-10915 (2019-07-11)
|
||||
|
||||
<code>A vulnerability has been identified in TIA Administrator (All versions < V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication. The vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
||||
</code>
|
||||
|
||||
- [jiansiting/CVE-2019-10915](https://github.com/jiansiting/CVE-2019-10915)
|
||||
|
||||
### CVE-2019-10945 (2019-04-10)
|
||||
|
||||
<code>An issue was discovered in Joomla! before 3.9.5. The Media Manager component does not properly sanitize the folder parameter, allowing attackers to act outside the media manager root directory.
|
||||
|
@ -24619,6 +24646,7 @@
|
|||
</code>
|
||||
|
||||
- [DanielRuf/snyk-js-jquery-174006](https://github.com/DanielRuf/snyk-js-jquery-174006)
|
||||
- [bitnesswise/jquery-prototype-pollution-fix](https://github.com/bitnesswise/jquery-prototype-pollution-fix)
|
||||
- [DanielRuf/snyk-js-jquery-565129](https://github.com/DanielRuf/snyk-js-jquery-565129)
|
||||
- [chrisneagu/FTC-Skystone-Dark-Angels-Romania-2020](https://github.com/chrisneagu/FTC-Skystone-Dark-Angels-Romania-2020)
|
||||
- [Snorlyd/https-nj.gov---CVE-2019-11358](https://github.com/Snorlyd/https-nj.gov---CVE-2019-11358)
|
||||
|
@ -24636,6 +24664,13 @@
|
|||
- [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447)
|
||||
- [0xConstant/CVE-2019-11447](https://github.com/0xConstant/CVE-2019-11447)
|
||||
|
||||
### CVE-2019-11477 (2019-06-18)
|
||||
|
||||
<code>Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
|
||||
</code>
|
||||
|
||||
- [sasqwatch/cve-2019-11477-poc](https://github.com/sasqwatch/cve-2019-11477-poc)
|
||||
|
||||
### CVE-2019-11510 (2019-05-08)
|
||||
|
||||
<code>In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
|
||||
|
@ -24674,6 +24709,7 @@
|
|||
<code>Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
|
||||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580)
|
||||
- [shelld3v/CVE-2019-11580](https://github.com/shelld3v/CVE-2019-11580)
|
||||
|
||||
### CVE-2019-11581 (2019-08-09)
|
||||
|
@ -24681,6 +24717,7 @@
|
|||
<code>There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
|
||||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-11581](https://github.com/jas502n/CVE-2019-11581)
|
||||
- [kobs0N/CVE-2019-11581](https://github.com/kobs0N/CVE-2019-11581)
|
||||
- [PetrusViet/CVE-2019-11581](https://github.com/PetrusViet/CVE-2019-11581)
|
||||
|
||||
|
@ -24840,6 +24877,7 @@
|
|||
<code>FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
|
||||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-12384](https://github.com/jas502n/CVE-2019-12384)
|
||||
- [MagicZer0/Jackson_RCE-CVE-2019-12384](https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384)
|
||||
|
||||
### CVE-2019-12409 (2019-11-18)
|
||||
|
@ -36164,7 +36202,7 @@
|
|||
<code>Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
|
||||
</code>
|
||||
|
||||
- [pagvac/pocs](https://github.com/pagvac/pocs)
|
||||
- [adpast/pocs](https://github.com/adpast/pocs)
|
||||
|
||||
### CVE-2009-1244 (2009-04-13)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue