mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/12/20 00:18:12
This commit is contained in:
parent
7e8897e9d6
commit
2bc24bca7d
19 changed files with 66 additions and 66 deletions
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-12-19T16:13:43Z",
|
||||
"updated_at": "2022-12-19T21:47:51Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-12-19T16:13:43Z",
|
||||
"updated_at": "2022-12-19T21:47:51Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 229444408,
|
||||
"name": "CVE-2016-3861",
|
||||
"full_name": "dropk1ck\/CVE-2016-3861",
|
||||
"full_name": "ionraider\/CVE-2016-3861",
|
||||
"owner": {
|
||||
"login": "dropk1ck",
|
||||
"login": "ionraider",
|
||||
"id": 1975987,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1975987?v=4",
|
||||
"html_url": "https:\/\/github.com\/dropk1ck"
|
||||
"html_url": "https:\/\/github.com\/ionraider"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dropk1ck\/CVE-2016-3861",
|
||||
"html_url": "https:\/\/github.com\/ionraider\/CVE-2016-3861",
|
||||
"description": "my extended take on Mark Brand's CVE 2016-3861 libutils bug",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T15:11:19Z",
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "JBoss CVE-2017-12149 (Insecure Deserialization - RCE) Exploitation Lab.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-30T20:26:51Z",
|
||||
"updated_at": "2021-08-04T10:11:09Z",
|
||||
"updated_at": "2022-12-19T22:10:42Z",
|
||||
"pushed_at": "2021-08-04T10:11:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-12-19T16:13:43Z",
|
||||
"updated_at": "2022-12-19T21:47:51Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -176,14 +176,14 @@
|
|||
{
|
||||
"id": 323457742,
|
||||
"name": "Larascript",
|
||||
"full_name": "PwnedShell\/Larascript",
|
||||
"full_name": "pwnedshell\/Larascript",
|
||||
"owner": {
|
||||
"login": "PwnedShell",
|
||||
"login": "pwnedshell",
|
||||
"id": 55540142,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55540142?v=4",
|
||||
"html_url": "https:\/\/github.com\/PwnedShell"
|
||||
"html_url": "https:\/\/github.com\/pwnedshell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PwnedShell\/Larascript",
|
||||
"html_url": "https:\/\/github.com\/pwnedshell\/Larascript",
|
||||
"description": "Laravel RCE exploit. CVE-2018-15133",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T22:02:08Z",
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-12-19T16:13:43Z",
|
||||
"updated_at": "2022-12-19T21:47:51Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-12-13T07:32:42Z",
|
||||
"updated_at": "2022-12-19T19:32:19Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1748,
|
||||
"watchers_count": 1748,
|
||||
"stargazers_count": 1749,
|
||||
"watchers_count": 1749,
|
||||
"has_discussions": false,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 1748,
|
||||
"watchers": 1749,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-12-19T16:13:43Z",
|
||||
"updated_at": "2022-12-19T21:47:51Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,7 +42,7 @@
|
|||
"description": "CVE-2019-2729 Exploit Script",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-19T03:49:51Z",
|
||||
"updated_at": "2022-11-12T19:03:05Z",
|
||||
"updated_at": "2022-12-19T19:23:56Z",
|
||||
"pushed_at": "2020-02-19T08:48:02Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Little thing put together quickly to demonstrate this CVE ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T01:10:33Z",
|
||||
"updated_at": "2022-12-15T18:31:06Z",
|
||||
"updated_at": "2022-12-19T22:02:30Z",
|
||||
"pushed_at": "2022-09-11T22:06:40Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-19T07:02:18Z",
|
||||
"updated_at": "2022-12-19T07:02:25Z",
|
||||
"pushed_at": "2022-12-19T07:04:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2022-12-19T23:26:07Z",
|
||||
"pushed_at": "2022-12-19T21:48:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-12-19T16:13:43Z",
|
||||
"updated_at": "2022-12-19T21:47:51Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1561,
|
||||
"watchers": 1562,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2022-12-13T15:00:40Z",
|
||||
"updated_at": "2022-12-19T22:03:34Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -130,13 +130,13 @@
|
|||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"has_discussions": false,
|
||||
"forks_count": 216,
|
||||
"forks_count": 215,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 216,
|
||||
"forks": 215,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"souls-games"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-13T16:43:01Z",
|
||||
"updated_at": "2022-12-13T16:43:19Z",
|
||||
"pushed_at": "2022-12-13T16:43:09Z",
|
||||
"pushed_at": "2022-12-19T19:19:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2022-12-19T16:39:56Z",
|
||||
"updated_at": "2022-12-19T23:41:14Z",
|
||||
"pushed_at": "2022-12-17T16:45:42Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 104,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -4086,7 +4086,7 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
|
|||
### CVE-2022-37177 (2022-08-29)
|
||||
|
||||
<code>
|
||||
** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists.
|
||||
** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists. Furthermore, the rail-fence cipher has been removed, and TLS 1.2 is now used for encryption.
|
||||
</code>
|
||||
|
||||
- [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177)
|
||||
|
@ -21565,7 +21565,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
|
|||
- [bukitbarisan/laravel-rce-cve-2018-15133](https://github.com/bukitbarisan/laravel-rce-cve-2018-15133)
|
||||
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
|
||||
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
|
||||
- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript)
|
||||
- [pwnedshell/Larascript](https://github.com/pwnedshell/Larascript)
|
||||
- [AzhariKun/CVE-2018-15133](https://github.com/AzhariKun/CVE-2018-15133)
|
||||
- [huydoppa/CVE-2018-15133](https://github.com/huydoppa/CVE-2018-15133)
|
||||
- [NatteeSetobol/CVE-2018-15133-Lavel-Expliot](https://github.com/NatteeSetobol/CVE-2018-15133-Lavel-Expliot)
|
||||
|
@ -25564,7 +25564,7 @@ server/LockSettingsService.java in LockSettingsService in Android 6.x before 201
|
|||
LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted file, aka internal bug 29250543.
|
||||
</code>
|
||||
|
||||
- [dropk1ck/CVE-2016-3861](https://github.com/dropk1ck/CVE-2016-3861)
|
||||
- [ionraider/CVE-2016-3861](https://github.com/ionraider/CVE-2016-3861)
|
||||
|
||||
### CVE-2016-3955 (2016-07-03)
|
||||
|
||||
|
|
Loading…
Reference in a new issue