mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/12/01 00:18:13
This commit is contained in:
parent
3872a2f498
commit
1aaa9ffb8c
32 changed files with 257 additions and 234 deletions
31
2016/CVE-2016-4004.json
Normal file
31
2016/CVE-2016-4004.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 572725685,
|
||||
"name": "AFR-in-OMSA",
|
||||
"full_name": "und3sc0n0c1d0\/AFR-in-OMSA",
|
||||
"owner": {
|
||||
"login": "und3sc0n0c1d0",
|
||||
"id": 32236059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0\/AFR-in-OMSA",
|
||||
"description": "Validation of Arbitrary File Read Vulnerabilities in Dell OpenManage Server Administrator (OMSA) - CVE-2016-4004, CVE-2021-21514 and CVE-2020-5377.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T22:34:58Z",
|
||||
"updated_at": "2022-11-30T22:34:58Z",
|
||||
"pushed_at": "2022-11-30T22:37:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,7 +42,7 @@
|
|||
"description": "cve-2018-1133 moodle athenticated as teacher remote code execution. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-26T08:09:19Z",
|
||||
"updated_at": "2021-01-22T18:16:32Z",
|
||||
"updated_at": "2022-11-30T19:19:19Z",
|
||||
"pushed_at": "2019-03-16T15:19:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "CVE-2018-2893-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-22T01:15:58Z",
|
||||
"updated_at": "2022-10-28T07:04:19Z",
|
||||
"updated_at": "2022-11-30T19:08:04Z",
|
||||
"pushed_at": "2018-10-27T01:42:20Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -3051,10 +3051,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T19:33:53Z",
|
||||
"updated_at": "2022-11-12T14:47:09Z",
|
||||
"updated_at": "2022-11-30T21:36:03Z",
|
||||
"pushed_at": "2022-03-28T04:10:20Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -3063,7 +3063,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "ZeroShell 3.9.0 Remote Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-13T23:57:37Z",
|
||||
"updated_at": "2022-09-29T05:42:53Z",
|
||||
"updated_at": "2022-11-30T19:02:07Z",
|
||||
"pushed_at": "2021-06-14T00:07:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -87,7 +87,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"forks": 69,
|
||||
"watchers": 222,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-03T05:57:44Z",
|
||||
"updated_at": "2022-10-13T15:20:35Z",
|
||||
"updated_at": "2022-11-30T19:00:16Z",
|
||||
"pushed_at": "2021-06-26T08:28:02Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -102,10 +102,10 @@
|
|||
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T13:53:46Z",
|
||||
"updated_at": "2022-11-09T18:06:30Z",
|
||||
"updated_at": "2022-11-30T19:25:08Z",
|
||||
"pushed_at": "2020-02-27T15:57:53Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2273,34 +2273,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 572293975,
|
||||
"name": "-CVE-2020-0796-RCE",
|
||||
"full_name": "NetJBS\/-CVE-2020-0796-RCE",
|
||||
"owner": {
|
||||
"login": "NetJBS",
|
||||
"id": 100053595,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100053595?v=4",
|
||||
"html_url": "https:\/\/github.com\/NetJBS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NetJBS\/-CVE-2020-0796-RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T00:40:45Z",
|
||||
"updated_at": "2022-11-30T00:41:09Z",
|
||||
"pushed_at": "2022-11-30T00:41:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 572658457,
|
||||
"name": "ripple20-digi-connect-exploit",
|
||||
"full_name": "0xkol\/ripple20-digi-connect-exploit",
|
||||
"owner": {
|
||||
"login": "0xkol",
|
||||
"id": 58270928,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58270928?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkol\/ripple20-digi-connect-exploit",
|
||||
"description": "RCE exploit for CVE-2020-11896 (Ripple20 IP-in-IP Heap Overflow Vulnerability) targeting Digi Connect ME 9210",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T18:44:25Z",
|
||||
"updated_at": "2022-11-30T18:46:32Z",
|
||||
"pushed_at": "2022-11-30T18:46:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC of how to exploit a RCE vulnerability of the example DAGs in Apache Airflow <1.10.11 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T15:58:01Z",
|
||||
"updated_at": "2022-07-23T07:58:35Z",
|
||||
"updated_at": "2022-11-30T18:58:50Z",
|
||||
"pushed_at": "2021-06-01T18:17:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -671,10 +671,10 @@
|
|||
"description": "CVE-2020-14882",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T12:57:08Z",
|
||||
"updated_at": "2022-07-15T09:44:00Z",
|
||||
"updated_at": "2022-11-30T18:48:16Z",
|
||||
"pushed_at": "2021-03-01T16:34:10Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -683,7 +683,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2020/CVE-2020-5377.json
Normal file
31
2020/CVE-2020-5377.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 572725685,
|
||||
"name": "AFR-in-OMSA",
|
||||
"full_name": "und3sc0n0c1d0\/AFR-in-OMSA",
|
||||
"owner": {
|
||||
"login": "und3sc0n0c1d0",
|
||||
"id": 32236059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0\/AFR-in-OMSA",
|
||||
"description": "Validation of Arbitrary File Read Vulnerabilities in Dell OpenManage Server Administrator (OMSA) - CVE-2016-4004, CVE-2021-21514 and CVE-2020-5377.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T22:34:58Z",
|
||||
"updated_at": "2022-11-30T22:34:58Z",
|
||||
"pushed_at": "2022-11-30T22:37:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -92,35 +92,6 @@
|
|||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277354676,
|
||||
"name": "CVE-2020-5902-NSE",
|
||||
"full_name": "rwincey\/CVE-2020-5902-NSE",
|
||||
"owner": {
|
||||
"login": "rwincey",
|
||||
"id": 5438659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
|
||||
"html_url": "https:\/\/github.com\/rwincey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rwincey\/CVE-2020-5902-NSE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T17:51:38Z",
|
||||
"updated_at": "2021-09-30T13:33:15Z",
|
||||
"pushed_at": "2020-07-06T17:10:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277360749,
|
||||
"name": "CVE-2020-5902",
|
||||
|
@ -302,35 +273,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277584668,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "jinnywc\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "jinnywc",
|
||||
"id": 30540295,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30540295?v=4",
|
||||
"html_url": "https:\/\/github.com\/jinnywc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jinnywc\/CVE-2020-5902",
|
||||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T15:49:46Z",
|
||||
"updated_at": "2020-07-06T15:55:37Z",
|
||||
"pushed_at": "2020-07-06T15:53:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277626606,
|
||||
"name": "F5-Patch",
|
||||
|
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 572664898,
|
||||
"name": "freebsd-dhclient-poc",
|
||||
"full_name": "0xkol\/freebsd-dhclient-poc",
|
||||
"owner": {
|
||||
"login": "0xkol",
|
||||
"id": 58270928,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58270928?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xkol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xkol\/freebsd-dhclient-poc",
|
||||
"description": "Reproducer PoC for FreeBSD dhclient heap-based buffer overflow vulnerability when parsing DHCP option 119 (CVE-2020-7461)",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T19:03:57Z",
|
||||
"updated_at": "2022-11-30T19:04:41Z",
|
||||
"pushed_at": "2022-11-30T19:04:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2021/CVE-2021-21514.json
Normal file
31
2021/CVE-2021-21514.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 572725685,
|
||||
"name": "AFR-in-OMSA",
|
||||
"full_name": "und3sc0n0c1d0\/AFR-in-OMSA",
|
||||
"owner": {
|
||||
"login": "und3sc0n0c1d0",
|
||||
"id": 32236059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0\/AFR-in-OMSA",
|
||||
"description": "Validation of Arbitrary File Read Vulnerabilities in Dell OpenManage Server Administrator (OMSA) - CVE-2016-4004, CVE-2021-21514 and CVE-2020-5377.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T22:34:58Z",
|
||||
"updated_at": "2022-11-30T22:34:58Z",
|
||||
"pushed_at": "2022-11-30T22:37:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2022-11-30T04:47:09Z",
|
||||
"updated_at": "2022-11-30T18:28:11Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -319,10 +319,10 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2022-11-28T15:16:15Z",
|
||||
"updated_at": "2022-11-30T21:11:48Z",
|
||||
"pushed_at": "2022-03-02T15:41:29Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -339,7 +339,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1211,10 +1211,10 @@
|
|||
"description": "Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-04T22:38:30Z",
|
||||
"updated_at": "2022-02-22T05:29:04Z",
|
||||
"updated_at": "2022-11-30T23:53:53Z",
|
||||
"pushed_at": "2022-02-10T15:20:42Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1223,7 +1223,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-03T13:54:36Z",
|
||||
"updated_at": "2022-11-09T18:12:09Z",
|
||||
"updated_at": "2022-11-30T20:28:12Z",
|
||||
"pushed_at": "2021-05-03T14:29:49Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-11-30T04:44:41Z",
|
||||
"updated_at": "2022-11-30T23:20:07Z",
|
||||
"pushed_at": "2022-11-23T07:39:55Z",
|
||||
"stargazers_count": 479,
|
||||
"watchers_count": 479,
|
||||
"stargazers_count": 480,
|
||||
"watchers_count": 480,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 479,
|
||||
"watchers": 480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -761,39 +761,6 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437562080,
|
||||
"name": "log4j-log4shell-affected",
|
||||
"full_name": "authomize\/log4j-log4shell-affected",
|
||||
"owner": {
|
||||
"login": "authomize",
|
||||
"id": 57180096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57180096?v=4",
|
||||
"html_url": "https:\/\/github.com\/authomize"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/authomize\/log4j-log4shell-affected",
|
||||
"description": "Lists of affected components and affected apps\/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T14:05:05Z",
|
||||
"updated_at": "2022-07-06T23:37:59Z",
|
||||
"pushed_at": "2021-12-19T07:40:25Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"log4j",
|
||||
"log4j-rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437567489,
|
||||
"name": "CVE-2021-44228_IoCs",
|
||||
|
@ -1844,7 +1811,7 @@
|
|||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1856,7 +1823,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"forks": 50,
|
||||
"watchers": 360,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-06T20:44:10Z",
|
||||
"updated_at": "2022-11-30T16:06:49Z",
|
||||
"updated_at": "2022-11-30T22:08:18Z",
|
||||
"pushed_at": "2022-11-23T21:09:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -100,7 +100,7 @@
|
|||
"description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:08:52Z",
|
||||
"updated_at": "2022-10-20T15:28:09Z",
|
||||
"updated_at": "2022-11-30T20:18:32Z",
|
||||
"pushed_at": "2022-03-08T17:12:37Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Shell exploit for CVE-2022-25765",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-29T09:25:13Z",
|
||||
"updated_at": "2022-11-29T09:26:01Z",
|
||||
"updated_at": "2022-11-30T21:24:23Z",
|
||||
"pushed_at": "2022-11-29T09:25:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2022-11-29T06:41:35Z",
|
||||
"updated_at": "2022-11-30T19:36:50Z",
|
||||
"pushed_at": "2022-10-27T16:35:08Z",
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 380,
|
||||
"watchers": 381,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-11-24T11:25:28Z",
|
||||
"updated_at": "2022-11-30T20:17:35Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 323,
|
||||
"watchers": 324,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1542,7 +1542,7 @@
|
|||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1558,7 +1558,7 @@
|
|||
"word"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -366,10 +366,10 @@
|
|||
"description": "A OS Command Injection Vulnerability in the CGI Program of Zyxel",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-12T19:04:41Z",
|
||||
"updated_at": "2022-06-12T19:13:13Z",
|
||||
"updated_at": "2022-11-30T20:16:19Z",
|
||||
"pushed_at": "2022-06-12T19:27:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -378,7 +378,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"gl-inet"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -383,34 +383,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 572526199,
|
||||
"name": "coablt_strike_4.5",
|
||||
"full_name": "Trinity-SYT-SECURITY\/coablt_strike_4.5",
|
||||
"owner": {
|
||||
"login": "Trinity-SYT-SECURITY",
|
||||
"id": 96654161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96654161?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinity-SYT-SECURITY"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinity-SYT-SECURITY\/coablt_strike_4.5",
|
||||
"description": "可以利用這個版本做CVE-2022-39197 RCE POC,以及其他的漏洞測試,請在解壓前關閉防毒軟體,不然會被查殺",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-30T13:16:43Z",
|
||||
"updated_at": "2022-11-30T14:51:35Z",
|
||||
"pushed_at": "2022-11-30T13:43:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
README.md
31
README.md
|
@ -4161,7 +4161,6 @@ An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Stri
|
|||
- [PyterSmithDarkGhost/CVE-2022-39197-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-39197-POC)
|
||||
- [TheCryingGame/CVE-2022-39197-RCE](https://github.com/TheCryingGame/CVE-2022-39197-RCE)
|
||||
- [adeljck/CVE-2022-39197](https://github.com/adeljck/CVE-2022-39197)
|
||||
- [Trinity-SYT-SECURITY/coablt_strike_4.5](https://github.com/Trinity-SYT-SECURITY/coablt_strike_4.5)
|
||||
|
||||
### CVE-2022-39425 (2022-10-18)
|
||||
|
||||
|
@ -6016,6 +6015,14 @@ Grav Admin Plugin is an HTML user interface that provides a way to configure Gra
|
|||
- [CsEnox/CVE-2021-21425](https://github.com/CsEnox/CVE-2021-21425)
|
||||
- [frknktlca/GravCMS_Nmap_Script](https://github.com/frknktlca/GravCMS_Nmap_Script)
|
||||
|
||||
### CVE-2021-21514 (2021-03-02)
|
||||
|
||||
<code>
|
||||
Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request.
|
||||
</code>
|
||||
|
||||
- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA)
|
||||
|
||||
### CVE-2021-21551 (2021-05-04)
|
||||
|
||||
<code>
|
||||
|
@ -8706,7 +8713,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)
|
||||
- [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner)
|
||||
- [Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228](https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228)
|
||||
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
|
||||
- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
|
||||
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
|
||||
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
|
||||
|
@ -10028,7 +10034,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-](https://github.com/vsai94/ECE9069_SMBGhost_Exploit_CVE-2020-0796-)
|
||||
- [arzuozkan/CVE-2020-0796](https://github.com/arzuozkan/CVE-2020-0796)
|
||||
- [SEHandler/CVE-2020-0796](https://github.com/SEHandler/CVE-2020-0796)
|
||||
- [NetJBS/-CVE-2020-0796-RCE](https://github.com/NetJBS/-CVE-2020-0796-RCE)
|
||||
|
||||
### CVE-2020-0797 (2020-03-12)
|
||||
|
||||
|
@ -10761,6 +10766,14 @@ In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulne
|
|||
|
||||
- [GUI/legacy-rails-CVE-2020-5267-patch](https://github.com/GUI/legacy-rails-CVE-2020-5267-patch)
|
||||
|
||||
### CVE-2020-5377 (2020-07-28)
|
||||
|
||||
<code>
|
||||
Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain file system access on the compromised management station.
|
||||
</code>
|
||||
|
||||
- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA)
|
||||
|
||||
### CVE-2020-5398 (2020-01-16)
|
||||
|
||||
<code>
|
||||
|
@ -10838,14 +10851,12 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [aqhmal/CVE-2020-5902-Scanner](https://github.com/aqhmal/CVE-2020-5902-Scanner)
|
||||
- [jas502n/CVE-2020-5902](https://github.com/jas502n/CVE-2020-5902)
|
||||
- [yassineaboukir/CVE-2020-5902](https://github.com/yassineaboukir/CVE-2020-5902)
|
||||
- [rwincey/CVE-2020-5902-NSE](https://github.com/rwincey/CVE-2020-5902-NSE)
|
||||
- [un4gi/CVE-2020-5902](https://github.com/un4gi/CVE-2020-5902)
|
||||
- [yasserjanah/CVE-2020-5902](https://github.com/yasserjanah/CVE-2020-5902)
|
||||
- [dunderhay/CVE-2020-5902](https://github.com/dunderhay/CVE-2020-5902)
|
||||
- [r0ttenbeef/cve-2020-5902](https://github.com/r0ttenbeef/cve-2020-5902)
|
||||
- [lijiaxing1997/CVE-2020-5902-POC-EXP](https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP)
|
||||
- [0xAbdullah/CVE-2020-5902](https://github.com/0xAbdullah/CVE-2020-5902)
|
||||
- [jinnywc/CVE-2020-5902](https://github.com/jinnywc/CVE-2020-5902)
|
||||
- [GoodiesHQ/F5-Patch](https://github.com/GoodiesHQ/F5-Patch)
|
||||
- [jiansiting/CVE-2020-5902](https://github.com/jiansiting/CVE-2020-5902)
|
||||
- [wdlid/CVE-2020-5902-fix](https://github.com/wdlid/CVE-2020-5902-fix)
|
||||
|
@ -11087,6 +11098,7 @@ In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE
|
|||
</code>
|
||||
|
||||
- [knqyf263/CVE-2020-7461](https://github.com/knqyf263/CVE-2020-7461)
|
||||
- [0xkol/freebsd-dhclient-poc](https://github.com/0xkol/freebsd-dhclient-poc)
|
||||
|
||||
### CVE-2020-7471 (2020-02-03)
|
||||
|
||||
|
@ -12172,6 +12184,7 @@ The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to
|
|||
</code>
|
||||
|
||||
- [Fans0n-Fan/Treck20-Related](https://github.com/Fans0n-Fan/Treck20-Related)
|
||||
- [0xkol/ripple20-digi-connect-exploit](https://github.com/0xkol/ripple20-digi-connect-exploit)
|
||||
|
||||
### CVE-2020-11898 (2020-06-17)
|
||||
|
||||
|
@ -25282,6 +25295,14 @@ Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LAN
|
|||
|
||||
- [securifera/CVE-2016-3962-Exploit](https://github.com/securifera/CVE-2016-3962-Exploit)
|
||||
|
||||
### CVE-2016-4004 (2016-04-12)
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in Dell OpenManage Server Administrator (OMSA) 8.2 allows remote authenticated administrators to read arbitrary files via a ..\ (dot dot backslash) in the file parameter to ViewFile.
|
||||
</code>
|
||||
|
||||
- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA)
|
||||
|
||||
### CVE-2016-4010 (2017-01-23)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue