mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/06/20 00:12:09
This commit is contained in:
parent
eb7a413622
commit
57d7a2a47e
23 changed files with 84 additions and 60 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-28T10:28:16Z",
|
||||
"updated_at": "2021-05-10T11:15:03Z",
|
||||
"updated_at": "2021-06-19T14:11:29Z",
|
||||
"pushed_at": "2019-01-30T21:36:22Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 46,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2021-06-01T08:23:08Z",
|
||||
"updated_at": "2021-06-19T10:19:18Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 395,
|
||||
"watchers": 396,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-06-18T00:25:13Z",
|
||||
"updated_at": "2021-06-19T13:29:43Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 429,
|
||||
"watchers": 430,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-12-30T11:53:08Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"forks_count": 113,
|
||||
"forks": 113,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1485,13 +1485,13 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2021-06-11T18:01:24Z",
|
||||
"updated_at": "2021-06-19T12:47:29Z",
|
||||
"pushed_at": "2021-01-10T04:31:22Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"forks_count": 124,
|
||||
"forks": 124,
|
||||
"watchers": 346,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1669,8 +1669,8 @@
|
|||
"description": "CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack.",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-11T09:38:36Z",
|
||||
"updated_at": "2021-04-23T21:07:03Z",
|
||||
"pushed_at": "2020-11-10T13:07:40Z",
|
||||
"updated_at": "2021-06-19T13:18:23Z",
|
||||
"pushed_at": "2021-06-19T13:18:20Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 7,
|
||||
|
|
|
@ -527,5 +527,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 378376347,
|
||||
"name": "Sudo-Vulnerability-Exploit-CVE-2019-14287",
|
||||
"full_name": "Hasintha-98\/Sudo-Vulnerability-Exploit-CVE-2019-14287",
|
||||
"owner": {
|
||||
"login": "Hasintha-98",
|
||||
"id": 62957436,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62957436?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hasintha-98"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hasintha-98\/Sudo-Vulnerability-Exploit-CVE-2019-14287",
|
||||
"description": "The sudo vulnerability CVE-2019-14287 is a security policy bypass issue that provides a user or a program the ability to execute commands as root on a Linux system when the \"sudoers configuration\" explicitly disallows the root access.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T09:43:08Z",
|
||||
"updated_at": "2021-06-19T09:43:08Z",
|
||||
"pushed_at": "2021-06-19T09:43:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-05-02T08:42:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -201,8 +201,8 @@
|
|||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 289,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2021-06-15T13:50:08Z",
|
||||
"updated_at": "2021-06-19T13:22:10Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 596,
|
||||
"watchers_count": 596,
|
||||
"stargazers_count": 595,
|
||||
"watchers_count": 595,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 596,
|
||||
"watchers": 595,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 238,
|
||||
"forks": 238,
|
||||
"forks_count": 239,
|
||||
"forks": 239,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-12T10:11:42Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,8 +128,8 @@
|
|||
"description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T07:34:42Z",
|
||||
"updated_at": "2021-06-19T08:32:31Z",
|
||||
"pushed_at": "2021-06-19T08:06:42Z",
|
||||
"updated_at": "2021-06-19T09:20:07Z",
|
||||
"pushed_at": "2021-06-19T09:20:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2021-01-15T10:51:58Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-02T07:45:20Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 729,
|
||||
"watchers_count": 729,
|
||||
"forks_count": 205,
|
||||
"forks": 205,
|
||||
"forks_count": 206,
|
||||
"forks": 206,
|
||||
"watchers": 729,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1025,13 +1025,13 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-06-15T02:40:26Z",
|
||||
"updated_at": "2021-06-19T13:32:30Z",
|
||||
"pushed_at": "2021-06-12T10:24:05Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T06:55:52Z",
|
||||
"updated_at": "2021-06-18T07:30:01Z",
|
||||
"updated_at": "2021-06-19T10:25:19Z",
|
||||
"pushed_at": "2021-06-10T10:31:30Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2021-06-19T09:07:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -10356,6 +10356,7 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
|
|||
- [edsonjt81/CVE-2019-14287-](https://github.com/edsonjt81/CVE-2019-14287-)
|
||||
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
|
||||
- [3hydraking/CVE-2019-14287](https://github.com/3hydraking/CVE-2019-14287)
|
||||
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
|
||||
|
||||
### CVE-2019-14314 (2019-08-27)
|
||||
|
||||
|
|
Loading…
Reference in a new issue