mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/06 06:11:08
This commit is contained in:
parent
3456b1554c
commit
2a1e54ede6
17 changed files with 122 additions and 74 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 353825444,
|
||||
"name": "CVE-1999-0016-POC",
|
||||
"full_name": "Pommaq\/CVE-1999-0016-POC",
|
||||
"owner": {
|
||||
"login": "Pommaq",
|
||||
"id": 42520348,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42520348?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pommaq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pommaq\/CVE-1999-0016-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T21:00:13Z",
|
||||
"updated_at": "2021-04-02T09:59:32Z",
|
||||
"pushed_at": "2021-04-02T09:59:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2021-03-29T21:34:33Z",
|
||||
"updated_at": "2021-04-05T19:45:11Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 295,
|
||||
"watchers": 296,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-18T04:24:43Z",
|
||||
"updated_at": "2021-02-17T19:26:59Z",
|
||||
"updated_at": "2021-04-05T15:48:57Z",
|
||||
"pushed_at": "2019-09-30T23:38:11Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2014/CVE-2014-7205.json
Normal file
25
2014/CVE-2014-7205.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 354908031,
|
||||
"name": "bassmaster-rce",
|
||||
"full_name": "maximilianmarx\/bassmaster-rce",
|
||||
"owner": {
|
||||
"login": "maximilianmarx",
|
||||
"id": 49280556,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49280556?v=4",
|
||||
"html_url": "https:\/\/github.com\/maximilianmarx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maximilianmarx\/bassmaster-rce",
|
||||
"description": "Exploiting CVE-2014-7205 by injecting arbitrary JavaScript resulting in Remote Code Execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T17:02:36Z",
|
||||
"updated_at": "2021-04-05T17:09:09Z",
|
||||
"pushed_at": "2021-04-05T17:09:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-13T15:24:10Z",
|
||||
"updated_at": "2020-09-21T03:44:19Z",
|
||||
"updated_at": "2021-04-05T19:01:01Z",
|
||||
"pushed_at": "2017-09-19T18:06:41Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "This Tool Aims to Exploit the CVE-2018-13341",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T13:37:28Z",
|
||||
"updated_at": "2021-04-05T14:46:26Z",
|
||||
"pushed_at": "2021-04-05T13:41:47Z",
|
||||
"updated_at": "2021-04-05T18:42:41Z",
|
||||
"pushed_at": "2021-04-05T18:42:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T21:46:57Z",
|
||||
"updated_at": "2021-03-25T13:13:35Z",
|
||||
"updated_at": "2021-04-05T15:46:15Z",
|
||||
"pushed_at": "2021-02-07T19:51:24Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -83,7 +83,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-03-23T02:52:31Z",
|
||||
"updated_at": "2021-03-28T16:06:26Z",
|
||||
"pushed_at": "2020-06-25T06:13:09Z",
|
||||
"pushed_at": "2021-04-05T20:36:45Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 26,
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-04T22:02:30Z",
|
||||
"updated_at": "2020-08-14T17:15:13Z",
|
||||
"updated_at": "2021-04-05T20:29:00Z",
|
||||
"pushed_at": "2020-03-05T08:02:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2021-03-31T19:31:49Z",
|
||||
"updated_at": "2021-04-05T19:49:23Z",
|
||||
"pushed_at": "2021-03-31T21:01:13Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-04-03T21:24:32Z",
|
||||
"updated_at": "2021-04-05T20:37:08Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 296,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -68,6 +68,29 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 284611609,
|
||||
"name": "CTF_CVE-2020-7471",
|
||||
"full_name": "Tempuss\/CTF_CVE-2020-7471",
|
||||
"owner": {
|
||||
"login": "Tempuss",
|
||||
"id": 13353498,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13353498?v=4",
|
||||
"html_url": "https:\/\/github.com\/Tempuss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Tempuss\/CTF_CVE-2020-7471",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-03T05:29:25Z",
|
||||
"updated_at": "2021-04-05T15:21:12Z",
|
||||
"pushed_at": "2020-12-27T09:00:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 289502738,
|
||||
"name": "cve-2020-7471-Time_Blind_SQLi-",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2021-03-06T13:57:38Z",
|
||||
"updated_at": "2021-04-05T19:12:12Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -519,13 +519,13 @@
|
|||
"description": "CVE-2021-26855: PoC (Not a HoneyPoC for once!)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T14:23:34Z",
|
||||
"updated_at": "2021-03-24T03:04:19Z",
|
||||
"updated_at": "2021-04-05T20:31:47Z",
|
||||
"pushed_at": "2021-03-15T18:56:38Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Froala Persistent XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T10:14:48Z",
|
||||
"updated_at": "2021-04-05T10:20:40Z",
|
||||
"pushed_at": "2021-04-05T10:20:38Z",
|
||||
"updated_at": "2021-04-05T19:08:26Z",
|
||||
"pushed_at": "2021-04-05T19:08:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -987,5 +987,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354924420,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "AlexSeniorProject\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "AlexSeniorProject",
|
||||
"id": 81662965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81662965?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlexSeniorProject"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlexSeniorProject\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T18:00:43Z",
|
||||
"updated_at": "2021-04-05T18:39:34Z",
|
||||
"pushed_at": "2021-04-05T18:03:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
18
README.md
18
README.md
|
@ -169,6 +169,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [lmol/CVE-2021-3156](https://github.com/lmol/CVE-2021-3156)
|
||||
- [Nokialinux/CVE-2021-3156](https://github.com/Nokialinux/CVE-2021-3156)
|
||||
- [password520/CVE-2021-3156](https://github.com/password520/CVE-2021-3156)
|
||||
- [AlexSeniorProject/CVE-2021-3156](https://github.com/AlexSeniorProject/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [y3rb1t4/CVE-2021-3157](https://github.com/y3rb1t4/CVE-2021-3157)
|
||||
|
@ -1954,6 +1955,7 @@ Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL I
|
|||
- [Saferman/CVE-2020-7471](https://github.com/Saferman/CVE-2020-7471)
|
||||
- [secoba/DjVul_StringAgg](https://github.com/secoba/DjVul_StringAgg)
|
||||
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
|
||||
- [Tempuss/CTF_CVE-2020-7471](https://github.com/Tempuss/CTF_CVE-2020-7471)
|
||||
- [victomteng1997/cve-2020-7471-Time_Blind_SQLi-](https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-)
|
||||
|
||||
### CVE-2020-7473 (2020-05-07)
|
||||
|
@ -16407,6 +16409,14 @@ GNU Bash through 4.3 bash43-025 processes trailing strings after certain malform
|
|||
- [chef-boneyard/bash-shellshock](https://github.com/chef-boneyard/bash-shellshock)
|
||||
- [gina-alaska/bash-cve-2014-7169-cookbook](https://github.com/gina-alaska/bash-cve-2014-7169-cookbook)
|
||||
|
||||
### CVE-2014-7205 (2014-10-08)
|
||||
|
||||
<code>
|
||||
Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
|
||||
</code>
|
||||
|
||||
- [maximilianmarx/bassmaster-rce](https://github.com/maximilianmarx/bassmaster-rce)
|
||||
|
||||
### CVE-2014-7236 (2020-02-17)
|
||||
|
||||
<code>
|
||||
|
@ -18227,14 +18237,6 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
|
|||
|
||||
|
||||
## 1999
|
||||
### CVE-1999-0016 (1999-09-29)
|
||||
|
||||
<code>
|
||||
Land IP denial of service.
|
||||
</code>
|
||||
|
||||
- [Pommaq/CVE-1999-0016-POC](https://github.com/Pommaq/CVE-1999-0016-POC)
|
||||
|
||||
### CVE-1999-0532
|
||||
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)
|
||||
|
||||
|
|
Loading…
Reference in a new issue