mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2022/09/19 00:18:47
This commit is contained in:
parent
fc7d2c2ba5
commit
7f0bb817e4
14 changed files with 120 additions and 53 deletions
|
@ -423,7 +423,7 @@
|
|||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 649,
|
||||
"watchers_count": 649,
|
||||
"forks_count": 402,
|
||||
"forks_count": 403,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -433,7 +433,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 402,
|
||||
"forks": 403,
|
||||
"watchers": 649,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T23:09:40Z",
|
||||
"updated_at": "2022-09-16T01:46:12Z",
|
||||
"updated_at": "2022-09-18T23:57:52Z",
|
||||
"pushed_at": "2022-09-12T01:43:19Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -143,7 +143,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1766,10 +1766,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2022-08-27T06:44:16Z",
|
||||
"updated_at": "2022-09-18T18:16:18Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1116,
|
||||
"watchers_count": 1116,
|
||||
"stargazers_count": 1115,
|
||||
"watchers_count": 1115,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1777,7 +1777,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 1116,
|
||||
"watchers": 1115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2022-08-14T16:19:03Z",
|
||||
"updated_at": "2022-09-18T20:43:05Z",
|
||||
"pushed_at": "2020-11-02T06:43:15Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"forks_count": 99,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 314,
|
||||
"forks": 100,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2022-09-17T10:03:16Z",
|
||||
"updated_at": "2022-09-18T23:16:36Z",
|
||||
"pushed_at": "2021-09-01T08:56:40Z",
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
"stargazers_count": 655,
|
||||
"watchers_count": 655,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 654,
|
||||
"watchers": 655,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -377,10 +377,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2022-09-17T14:49:26Z",
|
||||
"updated_at": "2022-09-18T21:36:15Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -394,7 +394,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"watchers": 269,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -97,10 +97,10 @@
|
|||
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:15:38Z",
|
||||
"updated_at": "2022-09-14T22:58:55Z",
|
||||
"updated_at": "2022-09-18T19:59:17Z",
|
||||
"pushed_at": "2021-12-16T01:33:48Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -116,7 +116,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 181,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -378,11 +378,11 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-09-16T04:34:00Z",
|
||||
"updated_at": "2022-09-18T20:04:55Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 845,
|
||||
"watchers_count": 845,
|
||||
"forks_count": 131,
|
||||
"stargazers_count": 846,
|
||||
"watchers_count": 846,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -408,8 +408,8 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 845,
|
||||
"forks": 132,
|
||||
"watchers": 846,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1479,10 +1479,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-09-16T03:41:23Z",
|
||||
"updated_at": "2022-09-18T19:50:54Z",
|
||||
"pushed_at": "2022-09-11T03:55:38Z",
|
||||
"stargazers_count": 3047,
|
||||
"watchers_count": 3047,
|
||||
"stargazers_count": 3048,
|
||||
"watchers_count": 3048,
|
||||
"forks_count": 728,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1490,7 +1490,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 728,
|
||||
"watchers": 3047,
|
||||
"watchers": 3048,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2102,7 +2102,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-11T19:50:53Z",
|
||||
"updated_at": "2022-09-13T01:44:47Z",
|
||||
"pushed_at": "2022-09-12T07:15:49Z",
|
||||
"pushed_at": "2022-09-18T22:53:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
30
2022/CVE-2022-20126.json
Normal file
30
2022/CVE-2022-20126.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 534168096,
|
||||
"name": "packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
|
||||
"full_name": "Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-08T10:51:13Z",
|
||||
"updated_at": "2022-09-18T19:44:24Z",
|
||||
"pushed_at": "2022-09-08T10:56:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"description": "CVE-2022-2588,CVE-2022-2586,CVE-2022-2585 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-24T02:20:35Z",
|
||||
"updated_at": "2022-08-28T14:50:46Z",
|
||||
"updated_at": "2022-09-18T21:37:19Z",
|
||||
"pushed_at": "2022-08-23T23:33:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,35 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 538247197,
|
||||
"name": "CVE-2022-2588",
|
||||
"full_name": "sang-chu\/CVE-2022-2588",
|
||||
"owner": {
|
||||
"login": "sang-chu",
|
||||
"id": 46855517,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46855517?v=4",
|
||||
"html_url": "https:\/\/github.com\/sang-chu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sang-chu\/CVE-2022-2588",
|
||||
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T21:35:19Z",
|
||||
"updated_at": "2022-09-18T21:41:15Z",
|
||||
"pushed_at": "2022-09-18T21:38:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -487,7 +487,7 @@
|
|||
"pushed_at": "2022-06-22T23:54:38Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -504,7 +504,7 @@
|
|||
"shodan"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -153,10 +153,10 @@
|
|||
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T09:52:02Z",
|
||||
"updated_at": "2022-09-08T12:03:43Z",
|
||||
"updated_at": "2022-09-18T20:19:44Z",
|
||||
"pushed_at": "2022-09-15T03:19:28Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 161,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2022-09-18T17:05:23Z",
|
||||
"updated_at": "2022-09-18T21:07:02Z",
|
||||
"pushed_at": "2022-09-14T07:45:40Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 140,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -552,6 +552,7 @@ It was found that Quarkus 2.10.x does not terminate HTTP requests header context
|
|||
- [ASkyeye/2022-LPE-UAF](https://github.com/ASkyeye/2022-LPE-UAF)
|
||||
- [pirenga/2022-LPE-UAF](https://github.com/pirenga/2022-LPE-UAF)
|
||||
- [konoha279/2022-LPE-UAF](https://github.com/konoha279/2022-LPE-UAF)
|
||||
- [sang-chu/CVE-2022-2588](https://github.com/sang-chu/CVE-2022-2588)
|
||||
|
||||
### CVE-2022-2639 (2022-09-01)
|
||||
|
||||
|
@ -616,6 +617,14 @@ In deletePackageX of DeletePackageHelper.java, there is a possible way for a Gue
|
|||
|
||||
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
|
||||
|
||||
### CVE-2022-20126 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023
|
||||
</code>
|
||||
|
||||
- [Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126](https://github.com/Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126)
|
||||
|
||||
### CVE-2022-20128
|
||||
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue