mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/02/13 06:26:09
This commit is contained in:
parent
c59e2a3e54
commit
1d17cf1163
19 changed files with 60 additions and 119 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2024-02-11T09:53:02Z",
|
||||
"updated_at": "2024-02-13T03:47:02Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 38,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-02-08T03:33:56Z",
|
||||
"updated_at": "2024-02-13T00:03:41Z",
|
||||
"pushed_at": "2024-02-13T00:09:43Z",
|
||||
"pushed_at": "2024-02-13T00:10:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -84,13 +84,13 @@
|
|||
"stargazers_count": 1889,
|
||||
"watchers_count": 1889,
|
||||
"has_discussions": false,
|
||||
"forks_count": 517,
|
||||
"forks_count": 518,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 517,
|
||||
"forks": 518,
|
||||
"watchers": 1889,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
|
@ -3601,36 +3601,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 467743719,
|
||||
"name": "CVE-2021-4034-bug-root",
|
||||
"full_name": "digiboxcc\/CVE-2021-4034-bug-root",
|
||||
"owner": {
|
||||
"login": "digiboxcc",
|
||||
"id": 7570307,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7570307?v=4",
|
||||
"html_url": "https:\/\/github.com\/digiboxcc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/digiboxcc\/CVE-2021-4034-bug-root",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T02:04:07Z",
|
||||
"updated_at": "2022-03-09T02:04:19Z",
|
||||
"pushed_at": "2022-03-09T02:04:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 467844609,
|
||||
"name": "Polkit-s-Pkexec-CVE-2021-4034",
|
||||
|
@ -3754,19 +3724,19 @@
|
|||
{
|
||||
"id": 470778554,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "OpenCVEs\/CVE-2021-4034",
|
||||
"full_name": "azazelm3dj3d\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "OpenCVEs",
|
||||
"id": 159454354,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159454354?v=4",
|
||||
"html_url": "https:\/\/github.com\/OpenCVEs"
|
||||
"login": "azazelm3dj3d",
|
||||
"id": 56496067,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56496067?v=4",
|
||||
"html_url": "https:\/\/github.com\/azazelm3dj3d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/OpenCVEs\/CVE-2021-4034",
|
||||
"html_url": "https:\/\/github.com\/azazelm3dj3d\/CVE-2021-4034",
|
||||
"description": "CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T23:05:53Z",
|
||||
"updated_at": "2024-02-08T15:42:59Z",
|
||||
"pushed_at": "2024-02-08T15:39:03Z",
|
||||
"updated_at": "2024-02-13T04:47:37Z",
|
||||
"pushed_at": "2024-02-13T04:46:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 1515,
|
||||
"watchers_count": 1515,
|
||||
"has_discussions": false,
|
||||
"forks_count": 493,
|
||||
"forks_count": 494,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 493,
|
||||
"forks": 494,
|
||||
"watchers": 1515,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
|
|
|
@ -3562,40 +3562,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 754696322,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "OpenCVEs\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "OpenCVEs",
|
||||
"id": 159454354,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159454354?v=4",
|
||||
"html_url": "https:\/\/github.com\/OpenCVEs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/OpenCVEs\/CVE-2021-41773",
|
||||
"description": "CVE-2021-41773, CVE-2021-42013",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-08T15:41:43Z",
|
||||
"updated_at": "2024-02-08T16:00:54Z",
|
||||
"pushed_at": "2024-02-08T16:05:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2021-41773",
|
||||
"cve-2021-42013",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-02-12T22:40:44Z",
|
||||
"updated_at": "2024-02-13T01:50:11Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1698,
|
||||
"watchers_count": 1698,
|
||||
"stargazers_count": 1699,
|
||||
"watchers_count": 1699,
|
||||
"has_discussions": false,
|
||||
"forks_count": 503,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 503,
|
||||
"watchers": 1698,
|
||||
"watchers": 1699,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Let's control Secure Boot Chain ourselves.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-01T07:32:18Z",
|
||||
"updated_at": "2024-02-10T11:56:08Z",
|
||||
"updated_at": "2024-02-13T05:53:56Z",
|
||||
"pushed_at": "2024-01-25T01:35:44Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-02-12T06:44:21Z",
|
||||
"updated_at": "2024-02-13T05:53:57Z",
|
||||
"pushed_at": "2024-02-11T02:51:34Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": true,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2024-02-11T17:41:17Z",
|
||||
"updated_at": "2024-02-13T05:14:18Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 866,
|
||||
"watchers_count": 866,
|
||||
"stargazers_count": 868,
|
||||
"watchers_count": 868,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 866,
|
||||
"watchers": 868,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T10:44:59Z",
|
||||
"updated_at": "2024-02-09T10:25:25Z",
|
||||
"updated_at": "2024-02-13T05:58:53Z",
|
||||
"pushed_at": "2023-07-27T08:58:10Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "POC for CVE-2023-24488",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-04T18:02:50Z",
|
||||
"updated_at": "2024-02-03T07:57:35Z",
|
||||
"updated_at": "2024-02-13T05:17:08Z",
|
||||
"pushed_at": "2023-07-04T18:39:03Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -63,7 +63,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 739947067,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 8,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 743886715,
|
||||
|
|
|
@ -34,6 +34,6 @@
|
|||
"forks": 4,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 755420593,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
16
README.md
16
README.md
|
@ -139,7 +139,11 @@
|
|||
- [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py)
|
||||
- [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887)
|
||||
|
||||
### CVE-2024-22024
|
||||
### CVE-2024-22024 (-)
|
||||
|
||||
<code>An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
|
||||
</code>
|
||||
|
||||
- [0dteam/CVE-2024-22024](https://github.com/0dteam/CVE-2024-22024)
|
||||
- [labesterOct/CVE-2024-22024](https://github.com/labesterOct/CVE-2024-22024)
|
||||
|
||||
|
@ -6907,7 +6911,11 @@
|
|||
|
||||
- [louiselalanne/CVE-2023-49314](https://github.com/louiselalanne/CVE-2023-49314)
|
||||
|
||||
### CVE-2023-49339
|
||||
### CVE-2023-49339 (-)
|
||||
|
||||
<code>Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.
|
||||
</code>
|
||||
|
||||
- [3zizme/CVE-2023-49339](https://github.com/3zizme/CVE-2023-49339)
|
||||
|
||||
### CVE-2023-49438 (2023-12-26)
|
||||
|
@ -14864,12 +14872,11 @@
|
|||
- [Squirre17/CVE-2021-4034](https://github.com/Squirre17/CVE-2021-4034)
|
||||
- [Jesrat/make_me_root](https://github.com/Jesrat/make_me_root)
|
||||
- [defhacks/cve-2021-4034](https://github.com/defhacks/cve-2021-4034)
|
||||
- [digiboxcc/CVE-2021-4034-bug-root](https://github.com/digiboxcc/CVE-2021-4034-bug-root)
|
||||
- [ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034](https://github.com/ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034)
|
||||
- [edsonjt81/CVE-2021-4034-Linux](https://github.com/edsonjt81/CVE-2021-4034-Linux)
|
||||
- [nel0x/pwnkit-vulnerability](https://github.com/nel0x/pwnkit-vulnerability)
|
||||
- [TomSgn/CVE-2021-4034](https://github.com/TomSgn/CVE-2021-4034)
|
||||
- [OpenCVEs/CVE-2021-4034](https://github.com/OpenCVEs/CVE-2021-4034)
|
||||
- [azazelm3dj3d/CVE-2021-4034](https://github.com/azazelm3dj3d/CVE-2021-4034)
|
||||
- [TheJoyOfHacking/berdav-CVE-2021-4034](https://github.com/TheJoyOfHacking/berdav-CVE-2021-4034)
|
||||
- [tzwlhack/CVE-2021-4034](https://github.com/tzwlhack/CVE-2021-4034)
|
||||
- [jcatala/f_poc_cve-2021-4034](https://github.com/jcatala/f_poc_cve-2021-4034)
|
||||
|
@ -18585,7 +18592,6 @@
|
|||
- [OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits](https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits)
|
||||
- [belajarqywok/CVE-2021-41773-MSF](https://github.com/belajarqywok/CVE-2021-41773-MSF)
|
||||
- [Iris288/CVE-2021-41773](https://github.com/Iris288/CVE-2021-41773)
|
||||
- [OpenCVEs/CVE-2021-41773](https://github.com/OpenCVEs/CVE-2021-41773)
|
||||
|
||||
### CVE-2021-41784 (2022-08-29)
|
||||
|
||||
|
|
Loading…
Reference in a new issue