mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/14 00:31:51
This commit is contained in:
parent
daacd3f8c0
commit
471aa30680
15 changed files with 80 additions and 48 deletions
|
@ -386,10 +386,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2024-12-07T09:08:40Z",
|
||||
"updated_at": "2024-12-13T20:29:20Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 367,
|
||||
"watchers_count": 367,
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -404,7 +404,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 367,
|
||||
"watchers": 368,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-12-10T04:31:07Z",
|
||||
"updated_at": "2024-12-13T20:49:15Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"stargazers_count": 1603,
|
||||
"watchers_count": 1603,
|
||||
"has_discussions": false,
|
||||
"forks_count": 482,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 482,
|
||||
"watchers": 1604,
|
||||
"watchers": 1603,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -665,10 +665,10 @@
|
|||
"description": "CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T02:47:08Z",
|
||||
"updated_at": "2024-11-19T16:43:07Z",
|
||||
"updated_at": "2024-12-13T18:53:00Z",
|
||||
"pushed_at": "2022-03-09T02:47:32Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -679,7 +679,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 77,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -862,5 +862,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 903170019,
|
||||
"name": "CVE-2022-22963",
|
||||
"full_name": "Shayz614\/CVE-2022-22963",
|
||||
"owner": {
|
||||
"login": "Shayz614",
|
||||
"id": 77766318,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77766318?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shayz614",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shayz614\/CVE-2022-22963",
|
||||
"description": "CVE to CTF FP",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T22:54:28Z",
|
||||
"updated_at": "2024-12-13T22:56:47Z",
|
||||
"pushed_at": "2024-12-13T22:56:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2024-12-09T01:44:53Z",
|
||||
"updated_at": "2024-12-13T21:06:58Z",
|
||||
"pushed_at": "2024-11-10T17:21:28Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 395,
|
||||
"watchers": 396,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"has_discussions": true,
|
||||
"forks_count": 44,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"unisoc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"forks": 45,
|
||||
"watchers": 307,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2024-12-10T03:54:16Z",
|
||||
"updated_at": "2024-12-13T21:40:02Z",
|
||||
"pushed_at": "2024-08-24T13:38:50Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -69,7 +69,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "PoC for a full exploitation of NextJS SSRF (CVE-2024-34351)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-27T15:10:26Z",
|
||||
"updated_at": "2024-10-04T18:20:48Z",
|
||||
"updated_at": "2024-12-13T19:24:09Z",
|
||||
"pushed_at": "2024-08-27T15:21:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2024-12-05T11:44:31Z",
|
||||
"updated_at": "2024-12-13T18:32:33Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -548,10 +548,10 @@
|
|||
"description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-08T13:04:45Z",
|
||||
"updated_at": "2024-12-10T05:57:56Z",
|
||||
"updated_at": "2024-12-13T21:54:39Z",
|
||||
"pushed_at": "2024-07-21T20:27:03Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -560,7 +560,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -538,10 +538,10 @@
|
|||
"description": "CVE-2024-4956 Python exploitation utility",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-12T04:05:10Z",
|
||||
"updated_at": "2024-12-13T16:50:36Z",
|
||||
"updated_at": "2024-12-13T22:26:06Z",
|
||||
"pushed_at": "2024-12-12T04:07:35Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -550,7 +550,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-08T11:47:07Z",
|
||||
"updated_at": "2024-11-28T12:07:11Z",
|
||||
"updated_at": "2024-12-13T20:55:01Z",
|
||||
"pushed_at": "2024-11-08T18:42:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-13T18:31:21Z",
|
||||
"pushed_at": "2024-12-13T18:31:16Z",
|
||||
"updated_at": "2024-12-13T18:31:45Z",
|
||||
"pushed_at": "2024-12-13T18:31:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-21T04:01:27Z",
|
||||
"updated_at": "2024-12-07T21:27:47Z",
|
||||
"updated_at": "2024-12-14T00:19:07Z",
|
||||
"pushed_at": "2024-11-21T04:41:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -17788,6 +17788,7 @@
|
|||
- [nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963](https://github.com/nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963)
|
||||
- [BearClaw96/CVE-2022-22963-Poc-Bearcules](https://github.com/BearClaw96/CVE-2022-22963-Poc-Bearcules)
|
||||
- [jrbH4CK/CVE-2022-22963](https://github.com/jrbH4CK/CVE-2022-22963)
|
||||
- [Shayz614/CVE-2022-22963](https://github.com/Shayz614/CVE-2022-22963)
|
||||
|
||||
### CVE-2022-22965 (2022-04-01)
|
||||
|
||||
|
|
Loading…
Reference in a new issue