mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2023/09/30 00:30:26
This commit is contained in:
parent
6409915e88
commit
50a7aaf659
41 changed files with 192 additions and 153 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T06:15:56Z",
|
||||
"updated_at": "2023-09-28T10:42:49Z",
|
||||
"updated_at": "2023-09-29T19:19:58Z",
|
||||
"pushed_at": "2017-08-19T06:49:15Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 24,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -1836,10 +1836,10 @@
|
|||
"description": "ShellShock interactive-shell exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T07:30:31Z",
|
||||
"updated_at": "2023-09-28T11:37:37Z",
|
||||
"updated_at": "2023-09-29T18:43:04Z",
|
||||
"pushed_at": "2022-04-02T07:31:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1852,7 +1852,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC exploit for CVE-2016-4622",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-09T15:22:06Z",
|
||||
"updated_at": "2023-09-28T10:36:44Z",
|
||||
"updated_at": "2023-09-29T19:19:41Z",
|
||||
"pushed_at": "2023-09-18T16:58:56Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 94,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -46,10 +46,10 @@
|
|||
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T00:46:19Z",
|
||||
"updated_at": "2023-08-19T02:28:20Z",
|
||||
"updated_at": "2023-09-29T19:03:57Z",
|
||||
"pushed_at": "2020-04-12T19:46:40Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "OS X 10.11.6 LPE PoC for CVE-2016-4655 \/ CVE-2016-4656",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-02T12:42:14Z",
|
||||
"updated_at": "2023-09-25T18:02:51Z",
|
||||
"updated_at": "2023-09-29T19:16:07Z",
|
||||
"pushed_at": "2016-10-04T16:36:18Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 97,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "code for webkit exploit, Nintendo Switch",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-17T01:39:57Z",
|
||||
"updated_at": "2022-09-01T14:16:51Z",
|
||||
"updated_at": "2023-09-29T19:20:02Z",
|
||||
"pushed_at": "2017-03-17T01:52:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -106,10 +106,10 @@
|
|||
"description": " CVE-2016-4657 web-kit vulnerability for ios 9.3, nintendo switch browser vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-11T14:22:18Z",
|
||||
"updated_at": "2023-06-18T15:30:23Z",
|
||||
"updated_at": "2023-09-29T19:20:01Z",
|
||||
"pushed_at": "2018-11-11T14:50:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -118,7 +118,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -297,10 +297,10 @@
|
|||
"description": "Universal Android root tool based on CVE-2016-5195. Watch this space.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-24T12:35:55Z",
|
||||
"updated_at": "2023-06-27T01:00:11Z",
|
||||
"updated_at": "2023-09-29T18:22:40Z",
|
||||
"pushed_at": "2016-10-29T13:42:39Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -309,7 +309,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 29,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-16T07:34:50Z",
|
||||
"updated_at": "2023-09-28T10:36:19Z",
|
||||
"updated_at": "2023-09-29T21:04:14Z",
|
||||
"pushed_at": "2016-09-18T06:55:38Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-06T15:31:08Z",
|
||||
"updated_at": "2023-09-28T10:46:29Z",
|
||||
"updated_at": "2023-09-29T19:20:00Z",
|
||||
"pushed_at": "2017-12-06T15:41:28Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Webkit uxss exploit (CVE-2017-7089)",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-03T12:13:43Z",
|
||||
"updated_at": "2023-09-28T10:44:52Z",
|
||||
"updated_at": "2023-09-29T19:19:55Z",
|
||||
"pushed_at": "2017-10-03T12:23:43Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 65,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit Safari CVE-2017-7089",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-11T15:09:45Z",
|
||||
"updated_at": "2023-09-28T10:45:02Z",
|
||||
"updated_at": "2023-09-29T19:01:55Z",
|
||||
"pushed_at": "2017-10-11T15:10:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is the Pwn2Own 2017 Safari backup vul's exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-26T04:10:32Z",
|
||||
"updated_at": "2023-09-28T10:44:42Z",
|
||||
"updated_at": "2023-09-29T19:02:08Z",
|
||||
"pushed_at": "2019-03-25T02:38:06Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 116,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -170,10 +170,10 @@
|
|||
"description": "RCE exploit for PHP Unit 5.6.2",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-20T07:01:52Z",
|
||||
"updated_at": "2023-09-28T11:37:12Z",
|
||||
"updated_at": "2023-09-29T18:42:49Z",
|
||||
"pushed_at": "2022-08-19T14:33:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -184,7 +184,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "macOS 10.13.3 (17D47) Safari Wasm Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-19T08:33:12Z",
|
||||
"updated_at": "2023-09-28T10:49:59Z",
|
||||
"updated_at": "2023-09-29T19:18:36Z",
|
||||
"pushed_at": "2018-04-19T11:20:41Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 120,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-27T00:58:39Z",
|
||||
"updated_at": "2023-09-28T10:48:33Z",
|
||||
"updated_at": "2023-09-29T19:12:44Z",
|
||||
"pushed_at": "2018-03-07T08:07:29Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 86,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T14:41:20Z",
|
||||
"updated_at": "2023-09-28T10:52:57Z",
|
||||
"updated_at": "2023-09-29T19:01:16Z",
|
||||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 174,
|
||||
"watchers": 173,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-08T18:06:10Z",
|
||||
"updated_at": "2023-09-28T10:59:11Z",
|
||||
"updated_at": "2023-09-29T19:19:53Z",
|
||||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 201,
|
||||
"watchers": 200,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
}
|
||||
|
|
|
@ -1566,19 +1566,19 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2023-09-28T11:02:03Z",
|
||||
"updated_at": "2023-09-29T20:38:08Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 885,
|
||||
"watchers_count": 885,
|
||||
"stargazers_count": 886,
|
||||
"watchers_count": 886,
|
||||
"has_discussions": false,
|
||||
"forks_count": 292,
|
||||
"forks_count": 293,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 292,
|
||||
"watchers": 885,
|
||||
"forks": 293,
|
||||
"watchers": 886,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -43,7 +43,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T21:35:40Z",
|
||||
"updated_at": "2023-09-15T08:07:29Z",
|
||||
"updated_at": "2023-09-29T20:01:40Z",
|
||||
"pushed_at": "2023-09-02T10:41:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -355,10 +355,10 @@
|
|||
"description": "Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-28T02:34:31Z",
|
||||
"updated_at": "2023-09-05T05:28:30Z",
|
||||
"updated_at": "2023-09-29T18:23:02Z",
|
||||
"pushed_at": "2022-03-19T14:07:35Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -376,7 +376,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -87,6 +87,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-25T03:00:01Z",
|
||||
"updated_at": "2023-09-27T12:56:24Z",
|
||||
"updated_at": "2023-09-29T19:10:40Z",
|
||||
"pushed_at": "2023-08-13T21:00:46Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
|
|
|
@ -1224,10 +1224,10 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2023-09-28T11:27:15Z",
|
||||
"updated_at": "2023-09-29T19:04:34Z",
|
||||
"pushed_at": "2022-02-12T19:33:07Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -1236,7 +1236,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 207,
|
||||
"watchers": 206,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-09-28T11:34:04Z",
|
||||
"updated_at": "2023-09-29T18:36:49Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 642,
|
||||
"watchers_count": 642,
|
||||
"stargazers_count": 643,
|
||||
"watchers_count": 643,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 642,
|
||||
"watchers": 643,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -1966,10 +1966,10 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2023-09-28T18:00:03Z",
|
||||
"updated_at": "2023-09-29T23:36:18Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Webkit (Safari) - Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T07:11:39Z",
|
||||
"updated_at": "2023-04-13T02:20:19Z",
|
||||
"updated_at": "2023-09-29T19:20:03Z",
|
||||
"pushed_at": "2022-08-09T13:43:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22629 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T17:21:27Z",
|
||||
"updated_at": "2023-09-28T11:42:36Z",
|
||||
"updated_at": "2023-09-29T19:17:20Z",
|
||||
"pushed_at": "2022-09-09T21:23:08Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 50,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-21T13:09:50Z",
|
||||
"updated_at": "2023-09-23T23:05:03Z",
|
||||
"updated_at": "2023-09-29T19:15:18Z",
|
||||
"pushed_at": "2022-07-21T13:44:32Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 97,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-31T13:24:34Z",
|
||||
"updated_at": "2023-09-08T18:38:53Z",
|
||||
"updated_at": "2023-09-29T23:48:54Z",
|
||||
"pushed_at": "2023-02-08T17:24:05Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T20:36:49Z",
|
||||
"updated_at": "2023-09-28T11:44:50Z",
|
||||
"updated_at": "2023-09-29T19:11:58Z",
|
||||
"pushed_at": "2023-01-20T17:58:39Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 61,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-09-28T11:44:31Z",
|
||||
"updated_at": "2023-09-29T19:12:34Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 840,
|
||||
"watchers_count": 840,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 841,
|
||||
"watchers": 840,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "simple urls < 115 - Reflected XSS",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-18T06:44:44Z",
|
||||
"updated_at": "2023-09-27T17:33:46Z",
|
||||
"updated_at": "2023-09-29T23:26:24Z",
|
||||
"pushed_at": "2023-09-18T06:52:23Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T12:22:05Z",
|
||||
"updated_at": "2023-09-29T13:42:40Z",
|
||||
"updated_at": "2023-09-29T20:10:41Z",
|
||||
"pushed_at": "2023-07-10T16:57:44Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T16:18:41Z",
|
||||
"updated_at": "2023-09-29T17:08:49Z",
|
||||
"updated_at": "2023-09-29T21:06:43Z",
|
||||
"pushed_at": "2023-09-26T19:04:21Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2023-09-29T14:08:49Z",
|
||||
"updated_at": "2023-09-30T00:12:16Z",
|
||||
"pushed_at": "2023-09-26T09:49:37Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 39,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -108,7 +108,7 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -118,7 +118,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T12:07:40Z",
|
||||
"updated_at": "2023-09-29T11:25:09Z",
|
||||
"updated_at": "2023-09-29T22:34:57Z",
|
||||
"pushed_at": "2023-08-23T16:46:53Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-28T19:26:33Z",
|
||||
"updated_at": "2023-09-28T19:26:34Z",
|
||||
"pushed_at": "2023-09-28T19:26:34Z",
|
||||
"pushed_at": "2023-09-29T20:59:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-09-29T16:55:02Z",
|
||||
"updated_at": "2023-09-29T21:27:12Z",
|
||||
"pushed_at": "2023-09-22T04:31:47Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 168,
|
||||
"forks": 27,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
32
2023/CVE-2023-5074.json
Normal file
32
2023/CVE-2023-5074.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 698443120,
|
||||
"name": "CVE-2023-5074-PoC",
|
||||
"full_name": "codeb0ss\/CVE-2023-5074-PoC",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-5074-PoC",
|
||||
"description": "Mass Exploit - CVE-2023-5074 \/ D-Link D-View < Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-30T00:07:52Z",
|
||||
"updated_at": "2023-09-30T00:07:53Z",
|
||||
"pushed_at": "2023-09-30T00:08:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -725,6 +725,13 @@
|
|||
|
||||
- [PH03N1XSP/CVE-2023-5024](https://github.com/PH03N1XSP/CVE-2023-5024)
|
||||
|
||||
### CVE-2023-5074 (2023-09-20)
|
||||
|
||||
<code>Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-5074-PoC](https://github.com/codeb0ss/CVE-2023-5074-PoC)
|
||||
|
||||
### CVE-2023-5546
|
||||
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue