mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-03-22 15:08:43 +01:00
Auto Update 2025/01/31 12:32:45
This commit is contained in:
parent
0d517540ea
commit
7a6cee5b13
22 changed files with 65 additions and 65 deletions
|
@ -81,7 +81,7 @@
|
|||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -95,7 +95,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-06T15:35:42Z",
|
||||
"updated_at": "2024-09-21T11:32:28Z",
|
||||
"updated_at": "2025-01-31T11:21:07Z",
|
||||
"pushed_at": "2024-02-15T22:50:51Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -338,8 +338,8 @@
|
|||
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T15:31:37Z",
|
||||
"updated_at": "2024-10-19T22:52:51Z",
|
||||
"pushed_at": "2022-06-01T20:45:02Z",
|
||||
"updated_at": "2025-01-31T09:32:57Z",
|
||||
"pushed_at": "2025-01-31T09:32:53Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2025-01-22T23:27:57Z",
|
||||
"updated_at": "2025-01-31T10:21:47Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 214,
|
||||
"watchers": 215,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -61,8 +61,8 @@
|
|||
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T20:21:00Z",
|
||||
"updated_at": "2025-01-31T05:09:05Z",
|
||||
"pushed_at": "2025-01-31T05:09:03Z",
|
||||
"updated_at": "2025-01-31T12:02:27Z",
|
||||
"pushed_at": "2025-01-31T12:02:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,8 +107,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-01-30T12:06:02Z",
|
||||
"updated_at": "2025-01-30T12:21:20Z",
|
||||
"pushed_at": "2025-01-30T12:09:08Z",
|
||||
"updated_at": "2025-01-31T10:07:21Z",
|
||||
"pushed_at": "2025-01-31T10:07:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -107,8 +107,8 @@
|
|||
"description": "CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T11:23:52Z",
|
||||
"updated_at": "2024-07-05T16:18:13Z",
|
||||
"pushed_at": "2024-03-16T08:25:40Z",
|
||||
"updated_at": "2025-01-31T12:06:22Z",
|
||||
"pushed_at": "2025-01-31T12:06:18Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2025-01-27T04:11:22Z",
|
||||
"updated_at": "2025-01-31T08:49:49Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1178,
|
||||
"watchers_count": 1178,
|
||||
"stargazers_count": 1179,
|
||||
"watchers_count": 1179,
|
||||
"has_discussions": true,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 1178,
|
||||
"watchers": 1179,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T11:47:17Z",
|
||||
"updated_at": "2024-08-21T06:25:25Z",
|
||||
"pushed_at": "2022-08-23T15:57:41Z",
|
||||
"updated_at": "2025-01-31T09:36:34Z",
|
||||
"pushed_at": "2025-01-31T09:36:30Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Pwndoc local file inclusion to remote code execution of Node.js code on the server",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-13T10:03:14Z",
|
||||
"updated_at": "2024-08-12T20:28:51Z",
|
||||
"pushed_at": "2023-09-14T20:19:41Z",
|
||||
"updated_at": "2025-01-31T09:58:17Z",
|
||||
"pushed_at": "2025-01-31T09:58:14Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -110,10 +110,10 @@
|
|||
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T18:29:27Z",
|
||||
"updated_at": "2025-01-01T17:53:49Z",
|
||||
"updated_at": "2025-01-31T09:35:42Z",
|
||||
"pushed_at": "2024-01-13T13:50:20Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"watchers": 237,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -11,11 +11,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/D3N14LD15K\/CVE-2024-11680_PoC_Exploit",
|
||||
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
|
||||
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets an improper authentication flaw due Privilege Misconfiguration issues.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T18:42:43Z",
|
||||
"updated_at": "2025-01-09T08:12:50Z",
|
||||
"pushed_at": "2024-12-11T23:45:31Z",
|
||||
"updated_at": "2025-01-31T08:50:22Z",
|
||||
"pushed_at": "2025-01-31T08:50:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -620,10 +620,10 @@
|
|||
"description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-31T18:14:19Z",
|
||||
"updated_at": "2024-12-30T22:04:33Z",
|
||||
"updated_at": "2025-01-31T06:37:50Z",
|
||||
"pushed_at": "2024-06-05T16:13:51Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -632,7 +632,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,8 +45,8 @@
|
|||
"description": "User Enumeration through response time difference",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-29T19:09:41Z",
|
||||
"updated_at": "2024-04-29T23:58:37Z",
|
||||
"pushed_at": "2024-04-29T19:12:38Z",
|
||||
"updated_at": "2025-01-31T10:07:09Z",
|
||||
"pushed_at": "2025-01-31T10:07:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-13T19:30:20Z",
|
||||
"updated_at": "2025-01-24T18:03:59Z",
|
||||
"updated_at": "2025-01-31T10:40:46Z",
|
||||
"pushed_at": "2024-11-29T16:56:23Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T08:56:59Z",
|
||||
"updated_at": "2025-01-23T05:37:12Z",
|
||||
"updated_at": "2025-01-31T11:57:06Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -61,8 +61,8 @@
|
|||
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-23T20:21:00Z",
|
||||
"updated_at": "2025-01-31T06:18:39Z",
|
||||
"pushed_at": "2025-01-31T06:18:36Z",
|
||||
"updated_at": "2025-01-31T12:02:27Z",
|
||||
"pushed_at": "2025-01-31T12:02:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -85,13 +85,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-22T14:40:34Z",
|
||||
"updated_at": "2025-01-30T11:23:09Z",
|
||||
"updated_at": "2025-01-31T12:31:32Z",
|
||||
"pushed_at": "2025-01-22T15:08:56Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 81,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -52,8 +52,8 @@
|
|||
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-25T18:07:12Z",
|
||||
"updated_at": "2025-01-31T06:19:18Z",
|
||||
"pushed_at": "2025-01-31T06:19:15Z",
|
||||
"updated_at": "2025-01-31T12:03:04Z",
|
||||
"pushed_at": "2025-01-31T12:03:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept & details for CVE-2025-21298",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-20T18:16:51Z",
|
||||
"updated_at": "2025-01-30T23:04:50Z",
|
||||
"updated_at": "2025-01-31T11:32:41Z",
|
||||
"pushed_at": "2025-01-20T18:22:01Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 71,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Apache CloudStack vulnerability allows unauthorized access to annotations on certain resources.",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-30T19:26:38Z",
|
||||
"updated_at": "2025-01-30T20:30:25Z",
|
||||
"pushed_at": "2025-01-30T20:30:23Z",
|
||||
"updated_at": "2025-01-31T11:57:09Z",
|
||||
"pushed_at": "2025-01-31T11:57:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
Loading…
Add table
Reference in a new issue