mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/07/27 00:29:42
This commit is contained in:
parent
7f028e1015
commit
455cb90b56
18 changed files with 121 additions and 90 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T21:34:16Z",
|
||||
"updated_at": "2024-07-26T16:30:43Z",
|
||||
"updated_at": "2024-07-27T00:12:50Z",
|
||||
"pushed_at": "2022-05-03T09:22:01Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -373,10 +373,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2024-07-14T17:34:06Z",
|
||||
"updated_at": "2024-07-26T23:23:55Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -391,7 +391,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 353,
|
||||
"watchers": 354,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -272,6 +272,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -11316,36 +11316,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 477232735,
|
||||
"name": "log4shell-honeypot",
|
||||
"full_name": "vulnerable-apps\/log4shell-honeypot",
|
||||
"owner": {
|
||||
"login": "vulnerable-apps",
|
||||
"id": 79924070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79924070?v=4",
|
||||
"html_url": "https:\/\/github.com\/vulnerable-apps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vulnerable-apps\/log4shell-honeypot",
|
||||
"description": "Java application vulnerable to the CVE-2021-44228 (a.k.a log4shell) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-03T03:58:11Z",
|
||||
"updated_at": "2022-04-03T03:58:01Z",
|
||||
"pushed_at": "2021-12-17T10:51:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 482498767,
|
||||
"name": "log4j-scanner",
|
||||
|
@ -12603,5 +12573,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 834267924,
|
||||
"name": "CVE-2021-44228",
|
||||
"full_name": "asd58584388\/CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "asd58584388",
|
||||
"id": 43491476,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43491476?v=4",
|
||||
"html_url": "https:\/\/github.com\/asd58584388"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/asd58584388\/CVE-2021-44228",
|
||||
"description": "CVE-2021-44228 vulnerability study",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-26T19:59:47Z",
|
||||
"updated_at": "2024-07-26T20:57:53Z",
|
||||
"pushed_at": "2024-07-26T20:57:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-07-21T03:23:05Z",
|
||||
"updated_at": "2024-07-26T22:58:44Z",
|
||||
"pushed_at": "2024-07-21T09:49:01Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"has_discussions": true,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T18:26:10Z",
|
||||
"updated_at": "2024-03-16T21:53:30Z",
|
||||
"updated_at": "2024-07-26T23:47:16Z",
|
||||
"pushed_at": "2023-04-07T20:09:28Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -261,10 +261,10 @@
|
|||
"description": "MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-28T11:53:44Z",
|
||||
"updated_at": "2024-06-21T00:11:34Z",
|
||||
"updated_at": "2024-07-26T21:45:10Z",
|
||||
"pushed_at": "2023-11-02T09:08:31Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -273,7 +273,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Takeover Account OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T04:34:39Z",
|
||||
"updated_at": "2024-07-25T15:53:53Z",
|
||||
"updated_at": "2024-07-27T00:14:51Z",
|
||||
"pushed_at": "2024-06-30T21:54:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-07T15:08:30Z",
|
||||
"updated_at": "2024-07-24T11:36:21Z",
|
||||
"pushed_at": "2024-07-07T19:53:19Z",
|
||||
"updated_at": "2024-07-27T00:19:21Z",
|
||||
"pushed_at": "2024-07-27T00:19:17Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-07-26T14:52:51Z",
|
||||
"updated_at": "2024-07-26T23:45:45Z",
|
||||
"pushed_at": "2024-07-24T13:17:05Z",
|
||||
"stargazers_count": 1011,
|
||||
"watchers_count": 1011,
|
||||
"stargazers_count": 1013,
|
||||
"watchers_count": 1013,
|
||||
"has_discussions": false,
|
||||
"forks_count": 169,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 169,
|
||||
"watchers": 1011,
|
||||
"watchers": 1013,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-19T16:13:14Z",
|
||||
"updated_at": "2024-07-25T13:00:29Z",
|
||||
"updated_at": "2024-07-27T00:19:38Z",
|
||||
"pushed_at": "2024-05-27T12:07:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -73,18 +73,18 @@
|
|||
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-27T08:30:06Z",
|
||||
"updated_at": "2024-07-26T11:30:00Z",
|
||||
"pushed_at": "2024-07-25T08:35:11Z",
|
||||
"updated_at": "2024-07-26T20:55:37Z",
|
||||
"pushed_at": "2024-07-26T20:55:34Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 41,
|
||||
"watchers": 329,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-07-25T19:50:56Z",
|
||||
"updated_at": "2024-07-26T19:55:57Z",
|
||||
"pushed_at": "2024-07-18T01:28:46Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 262,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -442,10 +442,10 @@
|
|||
"description": "Exploitation CVE-2024-34102",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-13T10:25:23Z",
|
||||
"updated_at": "2024-07-15T04:16:05Z",
|
||||
"updated_at": "2024-07-26T18:51:37Z",
|
||||
"pushed_at": "2024-07-15T04:16:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -458,7 +458,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-21T00:54:55Z",
|
||||
"updated_at": "2024-07-26T15:15:06Z",
|
||||
"updated_at": "2024-07-26T22:07:08Z",
|
||||
"pushed_at": "2024-07-21T09:54:02Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-25T08:03:15Z",
|
||||
"updated_at": "2024-07-26T03:38:09Z",
|
||||
"updated_at": "2024-07-26T19:41:52Z",
|
||||
"pushed_at": "2024-07-25T09:34:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -58,5 +58,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 834245223,
|
||||
"name": "CVE-2024-41110-SCAN",
|
||||
"full_name": "PauloParoPP\/CVE-2024-41110-SCAN",
|
||||
"owner": {
|
||||
"login": "PauloParoPP",
|
||||
"id": 51863323,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51863323?v=4",
|
||||
"html_url": "https:\/\/github.com\/PauloParoPP"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PauloParoPP\/CVE-2024-41110-SCAN",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-07-26T18:41:42Z",
|
||||
"updated_at": "2024-07-26T19:21:26Z",
|
||||
"pushed_at": "2024-07-26T19:21:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T12:16:21Z",
|
||||
"updated_at": "2024-07-21T14:16:40Z",
|
||||
"updated_at": "2024-07-27T00:17:35Z",
|
||||
"pushed_at": "2024-07-01T12:25:01Z",
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"has_discussions": false,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 377,
|
||||
"watchers": 378,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -3700,6 +3700,7 @@
|
|||
|
||||
- [vvpoglazov/cve-2024-41110-checker](https://github.com/vvpoglazov/cve-2024-41110-checker)
|
||||
- [secsaburo/CVE-2024-41110-](https://github.com/secsaburo/CVE-2024-41110-)
|
||||
- [PauloParoPP/CVE-2024-41110-SCAN](https://github.com/PauloParoPP/CVE-2024-41110-SCAN)
|
||||
|
||||
### CVE-2024-41662 (2024-07-24)
|
||||
|
||||
|
@ -24534,7 +24535,6 @@
|
|||
- [Jun-5heng/CVE-2021-44228](https://github.com/Jun-5heng/CVE-2021-44228)
|
||||
- [honypot/CVE-2021-44228](https://github.com/honypot/CVE-2021-44228)
|
||||
- [honypot/CVE-2021-44228-vuln-app](https://github.com/honypot/CVE-2021-44228-vuln-app)
|
||||
- [vulnerable-apps/log4shell-honeypot](https://github.com/vulnerable-apps/log4shell-honeypot)
|
||||
- [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner)
|
||||
- [TPower2112/Writing-Sample-1](https://github.com/TPower2112/Writing-Sample-1)
|
||||
- [Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228](https://github.com/Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228)
|
||||
|
@ -24575,6 +24575,7 @@
|
|||
- [YangHyperData/LOGJ4_PocShell_CVE-2021-44228](https://github.com/YangHyperData/LOGJ4_PocShell_CVE-2021-44228)
|
||||
- [Hoanle396/CVE-2021-44228-demo](https://github.com/Hoanle396/CVE-2021-44228-demo)
|
||||
- [tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment](https://github.com/tadash10/Exploiting-CVE-2021-44228-Log4Shell-in-a-Banking-Environment)
|
||||
- [asd58584388/CVE-2021-44228](https://github.com/asd58584388/CVE-2021-44228)
|
||||
|
||||
### CVE-2021-44255 (2022-01-31)
|
||||
|
||||
|
|
Loading…
Reference in a new issue