mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/02/19 06:14:03
This commit is contained in:
parent
6f47ff593a
commit
3bf312cfac
15 changed files with 72 additions and 67 deletions
|
@ -75,7 +75,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-12T20:39:24Z",
|
||||
"updated_at": "2020-10-09T06:41:30Z",
|
||||
"pushed_at": "2022-02-13T19:14:22Z",
|
||||
"pushed_at": "2022-02-19T06:02:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -233,12 +233,12 @@
|
|||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 140,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -377,12 +377,12 @@
|
|||
"pushed_at": "2019-11-06T15:48:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-02-18T15:28:11Z",
|
||||
"updated_at": "2022-02-19T03:58:58Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3167,
|
||||
"watchers_count": 3167,
|
||||
"stargazers_count": 3168,
|
||||
"watchers_count": 3168,
|
||||
"forks_count": 946,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 946,
|
||||
"watchers": 3167,
|
||||
"watchers": 3168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Script that automates the process of escalating privileges on openbsd system (CVE-2019-19520) by exploiting the xlock binary and againing it's sgid and escalating to the root user by (CVE-2019-19522) exploiting the privileges of auth group and adding keys to the Skey or Yubikey",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-21T07:30:10Z",
|
||||
"updated_at": "2020-11-21T07:41:02Z",
|
||||
"pushed_at": "2020-11-21T07:41:00Z",
|
||||
"updated_at": "2022-02-19T04:11:28Z",
|
||||
"pushed_at": "2022-02-19T04:11:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T21:34:16Z",
|
||||
"updated_at": "2022-02-08T14:25:07Z",
|
||||
"updated_at": "2022-02-19T01:24:41Z",
|
||||
"pushed_at": "2021-02-18T04:17:07Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-11T13:09:52Z",
|
||||
"updated_at": "2021-05-09T12:11:55Z",
|
||||
"pushed_at": "2022-02-13T13:19:40Z",
|
||||
"pushed_at": "2022-02-19T02:06:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-02-18T15:28:11Z",
|
||||
"updated_at": "2022-02-19T03:58:58Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3167,
|
||||
"watchers_count": 3167,
|
||||
"stargazers_count": 3168,
|
||||
"watchers_count": 3168,
|
||||
"forks_count": 946,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 946,
|
||||
"watchers": 3167,
|
||||
"watchers": 3168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T14:19:58Z",
|
||||
"updated_at": "2022-02-18T23:03:45Z",
|
||||
"updated_at": "2022-02-19T06:11:17Z",
|
||||
"pushed_at": "2022-02-18T14:23:07Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"forks": 2,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2022-02-18T15:00:16Z",
|
||||
"updated_at": "2022-02-19T03:27:11Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -106,17 +106,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-02-18T15:45:26Z",
|
||||
"updated_at": "2022-02-19T06:12:47Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1325,
|
||||
"watchers_count": 1325,
|
||||
"stargazers_count": 1327,
|
||||
"watchers_count": 1327,
|
||||
"forks_count": 380,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 380,
|
||||
"watchers": 1325,
|
||||
"watchers": 1327,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-02-15T08:16:44Z",
|
||||
"updated_at": "2022-02-19T05:06:02Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"stargazers_count": 1368,
|
||||
"watchers_count": 1368,
|
||||
"forks_count": 450,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 450,
|
||||
"watchers": 1367,
|
||||
"watchers": 1368,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-02-18T20:49:45Z",
|
||||
"updated_at": "2022-02-19T05:01:58Z",
|
||||
"pushed_at": "2021-12-20T04:51:01Z",
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 50,
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 253,
|
||||
"forks": 51,
|
||||
"watchers": 254,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2022-01-18T12:01:52Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 99,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"forks": 100,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -862,7 +862,7 @@
|
|||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"forks_count": 108,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -887,7 +887,7 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"forks": 109,
|
||||
"watchers": 695,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -905,11 +905,11 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-02-18T05:07:40Z",
|
||||
"updated_at": "2022-02-19T02:34:54Z",
|
||||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1244,
|
||||
"watchers_count": 1244,
|
||||
"forks_count": 327,
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"forks_count": 328,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,8 +919,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1244,
|
||||
"forks": 328,
|
||||
"watchers": 1245,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "cve-2022-23131 exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T08:38:53Z",
|
||||
"updated_at": "2022-02-18T21:20:28Z",
|
||||
"updated_at": "2022-02-19T03:27:14Z",
|
||||
"pushed_at": "2022-02-18T08:51:50Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 22,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T11:51:47Z",
|
||||
"updated_at": "2022-02-18T23:52:59Z",
|
||||
"updated_at": "2022-02-19T06:12:29Z",
|
||||
"pushed_at": "2022-02-18T12:00:19Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 9,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -94,8 +94,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T14:48:53Z",
|
||||
"updated_at": "2022-02-18T14:48:53Z",
|
||||
"pushed_at": "2022-02-18T15:19:06Z",
|
||||
"updated_at": "2022-02-19T03:14:49Z",
|
||||
"pushed_at": "2022-02-19T03:14:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -260,7 +260,12 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
|
|||
### CVE-2022-24693
|
||||
- [lukejenkins/CVE-2022-24693](https://github.com/lukejenkins/CVE-2022-24693)
|
||||
|
||||
### CVE-2022-25256
|
||||
### CVE-2022-25256 (2022-02-18)
|
||||
|
||||
<code>
|
||||
SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
|
||||
</code>
|
||||
|
||||
- [RobertDra/CVE-2022-25256](https://github.com/RobertDra/CVE-2022-25256)
|
||||
|
||||
### CVE-2022-25257
|
||||
|
|
Loading…
Reference in a new issue