mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-03 13:55:44 +02:00
Auto Update 2022/05/21 00:15:16
This commit is contained in:
parent
bda416bf8d
commit
75e893e929
19 changed files with 115 additions and 111 deletions
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-06-11T00:16:40Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 58,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"forks": 59,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -106,32 +106,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 494459884,
|
||||
"name": "Nuclei-Template-Primefaces-RCE",
|
||||
"full_name": "prok3z\/Nuclei-Template-Primefaces-RCE",
|
||||
"owner": {
|
||||
"login": "prok3z",
|
||||
"id": 43358190,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43358190?v=4",
|
||||
"html_url": "https:\/\/github.com\/prok3z"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/prok3z\/Nuclei-Template-Primefaces-RCE",
|
||||
"description": "CVE-2017-1000486",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T12:43:10Z",
|
||||
"updated_at": "2022-05-20T12:44:23Z",
|
||||
"pushed_at": "2022-05-20T12:43:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2022-05-02T19:14:22Z",
|
||||
"updated_at": "2022-05-20T19:20:00Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 450,
|
||||
"watchers_count": 450,
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 450,
|
||||
"watchers": 451,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A tool to check if your lnd node was targeted by CVE-2019-12999",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-27T03:47:09Z",
|
||||
"updated_at": "2021-12-05T22:18:25Z",
|
||||
"updated_at": "2022-05-20T21:14:41Z",
|
||||
"pushed_at": "2019-09-27T21:08:41Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T19:03:53Z",
|
||||
"updated_at": "2022-05-16T01:45:44Z",
|
||||
"updated_at": "2022-05-20T23:12:59Z",
|
||||
"pushed_at": "2021-12-19T18:18:36Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2022-05-20T09:24:07Z",
|
||||
"updated_at": "2022-05-20T22:34:20Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2022-05-17T12:34:30Z",
|
||||
"updated_at": "2022-05-20T23:25:06Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -95,7 +95,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-07-14T02:42:41Z",
|
||||
"updated_at": "2022-04-14T08:25:21Z",
|
||||
"pushed_at": "2022-05-16T22:36:28Z",
|
||||
"pushed_at": "2022-05-20T21:57:46Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
|
|
|
@ -188,12 +188,12 @@
|
|||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
|
|
29
2021/CVE-2021-3929.json
Normal file
29
2021/CVE-2021-3929.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 491769512,
|
||||
"name": "CVE-2021-3929-3947",
|
||||
"full_name": "QiuhaoLi\/CVE-2021-3929-3947",
|
||||
"owner": {
|
||||
"login": "QiuhaoLi",
|
||||
"id": 45557084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45557084?v=4",
|
||||
"html_url": "https:\/\/github.com\/QiuhaoLi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/QiuhaoLi\/CVE-2021-3929-3947",
|
||||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2022-05-20T23:14:52Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-17T13:58:11Z",
|
||||
"updated_at": "2022-05-18T17:53:20Z",
|
||||
"updated_at": "2022-05-20T18:23:52Z",
|
||||
"pushed_at": "2022-05-17T18:38:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435810052,
|
||||
"name": "Grafana-CVE-2021-43798",
|
||||
"full_name": "jas502n\/Grafana-CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
|
||||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2022-04-16T04:07:08Z",
|
||||
"pushed_at": "2021-12-09T03:16:21Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435840491,
|
||||
"name": "CVE-2021-43798-Grafana-POC",
|
||||
|
|
|
@ -857,7 +857,7 @@
|
|||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1362,
|
||||
"watchers_count": 1362,
|
||||
"forks_count": 374,
|
||||
"forks_count": 375,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -867,7 +867,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 374,
|
||||
"forks": 375,
|
||||
"watchers": 1362,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -155,12 +155,12 @@
|
|||
"pushed_at": "2022-04-12T12:00:26Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1675,7 +1675,7 @@
|
|||
"pushed_at": "2022-05-20T00:42:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1685,7 +1685,7 @@
|
|||
"spring4shell-poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:07:51Z",
|
||||
"updated_at": "2022-05-20T06:23:00Z",
|
||||
"updated_at": "2022-05-20T21:26:39Z",
|
||||
"pushed_at": "2022-05-11T02:02:59Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 111,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,44 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-19T01:16:01Z",
|
||||
"updated_at": "2022-05-20T12:21:20Z",
|
||||
"updated_at": "2022-05-20T20:37:17Z",
|
||||
"pushed_at": "2022-05-19T01:17:07Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 494602673,
|
||||
"name": "CVE-2022-26717-Safari-WebGL-Exploit",
|
||||
"full_name": "trhacknon\/CVE-2022-26717-Safari-WebGL-Exploit",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-26717-Safari-WebGL-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T20:46:40Z",
|
||||
"updated_at": "2022-05-20T20:46:52Z",
|
||||
"pushed_at": "2022-05-20T20:46:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -375,17 +375,17 @@
|
|||
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T14:26:38Z",
|
||||
"updated_at": "2022-05-20T14:35:44Z",
|
||||
"updated_at": "2022-05-20T20:30:39Z",
|
||||
"pushed_at": "2022-05-20T14:26:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -402,17 +402,17 @@
|
|||
"description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T15:16:30Z",
|
||||
"updated_at": "2022-05-20T15:16:30Z",
|
||||
"updated_at": "2022-05-20T18:50:01Z",
|
||||
"pushed_at": "2022-05-20T15:16:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1382,6 +1382,7 @@ Automatic Question Paper Generator v1.0 contains a Time-Based Blind SQL injectio
|
|||
|
||||
### CVE-2022-26717
|
||||
- [theori-io/CVE-2022-26717-Safari-WebGL-Exploit](https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit)
|
||||
- [trhacknon/CVE-2022-26717-Safari-WebGL-Exploit](https://github.com/trhacknon/CVE-2022-26717-Safari-WebGL-Exploit)
|
||||
|
||||
### CVE-2022-26726
|
||||
- [acheong08/CVE-2022-26726-POC](https://github.com/acheong08/CVE-2022-26726-POC)
|
||||
|
@ -2687,6 +2688,9 @@ D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to
|
|||
### CVE-2021-3864
|
||||
- [walac/cve-2021-3864](https://github.com/walac/cve-2021-3864)
|
||||
|
||||
### CVE-2021-3929
|
||||
- [QiuhaoLi/CVE-2021-3929-3947](https://github.com/QiuhaoLi/CVE-2021-3929-3947)
|
||||
|
||||
### CVE-2021-3972 (2022-04-22)
|
||||
|
||||
<code>
|
||||
|
@ -5189,7 +5193,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
</code>
|
||||
|
||||
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
|
||||
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
|
||||
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
|
||||
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
|
||||
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
|
||||
|
@ -20967,7 +20970,6 @@ Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in rem
|
|||
- [mogwailabs/CVE-2017-1000486](https://github.com/mogwailabs/CVE-2017-1000486)
|
||||
- [cved-sources/cve-2017-1000486](https://github.com/cved-sources/cve-2017-1000486)
|
||||
- [Pastea/CVE-2017-1000486](https://github.com/Pastea/CVE-2017-1000486)
|
||||
- [prok3z/Nuclei-Template-Primefaces-RCE](https://github.com/prok3z/Nuclei-Template-Primefaces-RCE)
|
||||
|
||||
### CVE-2017-1000499 (2018-01-03)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue