mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/01/29 00:29:40
This commit is contained in:
parent
416e83553f
commit
7c8498a0c7
24 changed files with 79 additions and 88 deletions
|
@ -100,7 +100,7 @@
|
|||
"description": "Mass, multithreaded testing for servers against Heartbleed (CVE-2014-0160).",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T09:08:52Z",
|
||||
"updated_at": "2019-01-09T02:36:04Z",
|
||||
"updated_at": "2023-01-28T21:18:39Z",
|
||||
"pushed_at": "2014-05-29T11:38:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
@ -767,7 +767,7 @@
|
|||
"description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-13T19:18:32Z",
|
||||
"updated_at": "2018-10-07T00:48:31Z",
|
||||
"updated_at": "2023-01-28T19:55:06Z",
|
||||
"pushed_at": "2015-05-02T08:25:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
@ -854,7 +854,7 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-15T22:22:18Z",
|
||||
"updated_at": "2019-05-30T01:17:07Z",
|
||||
"updated_at": "2023-01-28T18:42:45Z",
|
||||
"pushed_at": "2019-03-27T19:51:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
"description": "I think this CVE is full of lies and deceit and very confusing code.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-17T06:51:01Z",
|
||||
"updated_at": "2018-04-13T22:09:15Z",
|
||||
"updated_at": "2023-01-28T20:50:55Z",
|
||||
"pushed_at": "2014-04-17T07:07:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "rabl 0.8.6 + fix for CVE-2014-4671",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-21T19:43:46Z",
|
||||
"updated_at": "2018-11-14T20:03:10Z",
|
||||
"updated_at": "2023-01-28T19:40:49Z",
|
||||
"pushed_at": "2017-03-21T19:45:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "DEPRECATED: Chef cookbook to audit & remediate \"Shellshock\" (BASH-CVE-2014-7169)",
|
||||
"fork": false,
|
||||
"created_at": "2014-10-31T21:12:24Z",
|
||||
"updated_at": "2019-02-25T00:44:46Z",
|
||||
"updated_at": "2023-01-28T20:52:52Z",
|
||||
"pushed_at": "2017-04-25T06:31:01Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -245,7 +245,7 @@
|
|||
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-29T07:14:17Z",
|
||||
"updated_at": "2019-06-14T02:44:06Z",
|
||||
"updated_at": "2023-01-28T20:14:16Z",
|
||||
"pushed_at": "2015-01-29T07:38:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "🔥 A checker site for MS15-034 \/ CVE-2015-1635",
|
||||
"fork": false,
|
||||
"created_at": "2015-04-15T15:05:01Z",
|
||||
"updated_at": "2021-10-25T03:08:54Z",
|
||||
"updated_at": "2023-01-28T21:06:18Z",
|
||||
"pushed_at": "2015-05-31T10:16:34Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Win32k LPE vulnerability used in APT attack",
|
||||
"fork": false,
|
||||
"created_at": "2015-05-12T18:04:48Z",
|
||||
"updated_at": "2023-01-13T15:35:59Z",
|
||||
"updated_at": "2023-01-28T19:05:41Z",
|
||||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit of the CVE-2016-1494 allowing to forge signatures of RSA keys with low exponents",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-02T09:32:02Z",
|
||||
"updated_at": "2021-02-04T13:48:18Z",
|
||||
"updated_at": "2023-01-28T21:24:44Z",
|
||||
"pushed_at": "2017-01-28T13:31:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -100,7 +100,7 @@
|
|||
"description": "CVE-2016-5195 exploit written in Crystal",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T15:54:10Z",
|
||||
"updated_at": "2022-11-16T21:05:09Z",
|
||||
"updated_at": "2023-01-28T19:55:08Z",
|
||||
"pushed_at": "2016-10-25T18:44:59Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
|
@ -582,7 +582,7 @@
|
|||
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-20T05:28:04Z",
|
||||
"updated_at": "2023-01-18T19:17:51Z",
|
||||
"updated_at": "2023-01-28T18:40:41Z",
|
||||
"pushed_at": "2017-01-27T10:04:07Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
|
|
|
@ -100,7 +100,7 @@
|
|||
"description": "Quick and dirty fix to OLE2 executing code via .hta",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-18T06:33:45Z",
|
||||
"updated_at": "2022-01-08T23:25:22Z",
|
||||
"updated_at": "2023-01-28T21:31:51Z",
|
||||
"pushed_at": "2017-04-24T20:48:36Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
|
|
|
@ -100,7 +100,7 @@
|
|||
"description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T20:02:56Z",
|
||||
"updated_at": "2022-10-16T14:18:39Z",
|
||||
"updated_at": "2023-01-28T18:29:24Z",
|
||||
"pushed_at": "2018-09-04T21:35:36Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "EPoD (Ethereum Packet of Death)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-19T11:11:01Z",
|
||||
"updated_at": "2022-06-20T08:48:12Z",
|
||||
"updated_at": "2023-01-28T19:03:04Z",
|
||||
"pushed_at": "2018-10-20T21:07:42Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -221,7 +221,7 @@
|
|||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -236,7 +236,7 @@
|
|||
"security-tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 61,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -198,10 +198,10 @@
|
|||
"description": "vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T23:24:38Z",
|
||||
"updated_at": "2022-11-09T18:11:49Z",
|
||||
"updated_at": "2023-01-28T18:31:14Z",
|
||||
"pushed_at": "2021-04-07T03:10:07Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -210,7 +210,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 389496562,
|
||||
"name": "CVE-2021-33909",
|
||||
"full_name": "bbinfosec43\/CVE-2021-33909",
|
||||
"owner": {
|
||||
"login": "bbinfosec43",
|
||||
"id": 82197936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82197936?v=4",
|
||||
"html_url": "https:\/\/github.com\/bbinfosec43"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bbinfosec43\/CVE-2021-33909",
|
||||
"description": "Exploit code for CVE-2021-33909,Just a dump of removed https:\/\/github.com\/AmIAHuman\/ repo",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-26T03:24:35Z",
|
||||
"updated_at": "2022-07-12T14:51:35Z",
|
||||
"pushed_at": "2021-07-26T03:29:36Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402293370,
|
||||
"name": "CVE-2021-33909",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 436831581,
|
||||
"name": "Mass_CVE-2021-39316",
|
||||
"full_name": "anggoroexe\/Mass_CVE-2021-39316",
|
||||
"owner": {
|
||||
"login": "anggoroexe",
|
||||
"id": 75475767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75475767?v=4",
|
||||
"html_url": "https:\/\/github.com\/anggoroexe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/anggoroexe\/Mass_CVE-2021-39316",
|
||||
"description": "i made this with love .",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T02:56:46Z",
|
||||
"updated_at": "2021-12-23T02:16:37Z",
|
||||
"pushed_at": "2021-12-10T03:09:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"stargazers_count": 1731,
|
||||
"watchers_count": 1731,
|
||||
"has_discussions": false,
|
||||
"forks_count": 501,
|
||||
"forks_count": 502,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 501,
|
||||
"forks": 502,
|
||||
"watchers": 1731,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1816,10 +1816,10 @@
|
|||
"description": "-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-24T03:59:24Z",
|
||||
"updated_at": "2023-01-19T03:40:34Z",
|
||||
"updated_at": "2023-01-29T00:13:20Z",
|
||||
"pushed_at": "2022-12-25T02:43:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1833,7 +1833,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T20:31:15Z",
|
||||
"updated_at": "2023-01-25T11:21:22Z",
|
||||
"updated_at": "2023-01-28T21:41:58Z",
|
||||
"pushed_at": "2022-04-21T12:04:10Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2022-23935 exploit PoC exiftool version 12.37",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-28T18:04:05Z",
|
||||
"updated_at": "2023-01-28T18:04:05Z",
|
||||
"pushed_at": "2023-01-28T18:04:06Z",
|
||||
"updated_at": "2023-01-28T18:54:44Z",
|
||||
"pushed_at": "2023-01-28T18:58:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T04:27:15Z",
|
||||
"updated_at": "2023-01-26T17:29:32Z",
|
||||
"updated_at": "2023-01-28T21:09:09Z",
|
||||
"pushed_at": "2023-01-09T08:19:27Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for vulnerability in Renault ZOE Keyless System(CVE-2022-38766)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-26T08:43:40Z",
|
||||
"updated_at": "2023-01-25T20:37:15Z",
|
||||
"updated_at": "2023-01-28T19:38:33Z",
|
||||
"pushed_at": "2022-10-07T10:01:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC and Scanner for CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T19:19:23Z",
|
||||
"updated_at": "2023-01-28T14:41:52Z",
|
||||
"updated_at": "2023-01-28T21:36:47Z",
|
||||
"pushed_at": "2023-01-25T00:04:57Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T03:21:42Z",
|
||||
"updated_at": "2023-01-28T17:31:11Z",
|
||||
"updated_at": "2023-01-28T23:32:30Z",
|
||||
"pushed_at": "2023-01-25T06:29:15Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -8927,6 +8927,7 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
|
|||
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
|
||||
</code>
|
||||
|
||||
- [bbinfosec43/CVE-2021-33909](https://github.com/bbinfosec43/CVE-2021-33909)
|
||||
- [ChrisTheCoolHut/CVE-2021-33909](https://github.com/ChrisTheCoolHut/CVE-2021-33909)
|
||||
|
||||
### CVE-2021-33959 (2023-01-18)
|
||||
|
@ -9647,14 +9648,6 @@ In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) are set u
|
|||
### CVE-2021-39287
|
||||
- [Fearless523/CVE-2021-39287-Stored-XSS](https://github.com/Fearless523/CVE-2021-39287-Stored-XSS)
|
||||
|
||||
### CVE-2021-39316 (2021-08-31)
|
||||
|
||||
<code>
|
||||
The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
|
||||
</code>
|
||||
|
||||
- [anggoroexe/Mass_CVE-2021-39316](https://github.com/anggoroexe/Mass_CVE-2021-39316)
|
||||
|
||||
### CVE-2021-39377 (2021-09-01)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue