mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2024/05/19 00:28:07
This commit is contained in:
parent
69dc2ede75
commit
8495c42d40
21 changed files with 120 additions and 72 deletions
|
@ -2296,5 +2296,52 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 802616947,
|
||||
"name": "CVE-2014-6271-EXPLOIT",
|
||||
"full_name": "K3ysTr0K3R\/CVE-2014-6271-EXPLOIT",
|
||||
"owner": {
|
||||
"login": "K3ysTr0K3R",
|
||||
"id": 70909693,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2014-6271-EXPLOIT",
|
||||
"description": "A PoC exploit for CVE-2014-6271 - Shellshock",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-18T19:42:58Z",
|
||||
"updated_at": "2024-05-18T20:00:10Z",
|
||||
"pushed_at": "2024-05-18T19:56:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bash",
|
||||
"critical",
|
||||
"cve-2014-6271",
|
||||
"exploit",
|
||||
"exploitation",
|
||||
"hacking",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"rce",
|
||||
"rce-exploit",
|
||||
"rce-scanner",
|
||||
"remote-code-execution",
|
||||
"shellshock",
|
||||
"shellshock-vulnerability",
|
||||
"vulnerabilities",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -279,7 +279,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 336183847,
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"cve-2020-0610"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"forks": 78,
|
||||
"watchers": 253,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2024-05-07T13:53:48Z",
|
||||
"updated_at": "2024-05-18T20:32:13Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 224,
|
||||
"watchers": 223,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Win10 20H2 LPE for CVE-2021-31956",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-02T10:35:11Z",
|
||||
"updated_at": "2023-09-03T03:26:03Z",
|
||||
"updated_at": "2024-05-18T18:32:10Z",
|
||||
"pushed_at": "2022-09-02T10:40:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-05T00:03:10Z",
|
||||
"updated_at": "2023-07-23T03:59:29Z",
|
||||
"updated_at": "2024-05-18T18:32:08Z",
|
||||
"pushed_at": "2023-06-05T14:20:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pickle Serialization Remote Code Execution - Memcached Poisoning",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-05T18:11:54Z",
|
||||
"updated_at": "2024-03-12T17:17:13Z",
|
||||
"updated_at": "2024-05-18T22:35:21Z",
|
||||
"pushed_at": "2021-11-05T21:04:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -236,10 +236,10 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2024-05-17T15:04:42Z",
|
||||
"updated_at": "2024-05-18T20:26:46Z",
|
||||
"pushed_at": "2023-08-25T16:11:40Z",
|
||||
"stargazers_count": 746,
|
||||
"watchers_count": 746,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -248,7 +248,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 746,
|
||||
"watchers": 747,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2024-05-18T09:10:34Z",
|
||||
"updated_at": "2024-05-18T23:12:29Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 784,
|
||||
"watchers_count": 784,
|
||||
"stargazers_count": 785,
|
||||
"watchers_count": 785,
|
||||
"has_discussions": false,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 784,
|
||||
"watchers": 785,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -196,10 +196,10 @@
|
|||
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-05T18:42:27Z",
|
||||
"updated_at": "2024-05-17T06:21:05Z",
|
||||
"updated_at": "2024-05-18T20:32:12Z",
|
||||
"pushed_at": "2023-02-05T19:35:03Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -208,7 +208,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 208,
|
||||
"watchers": 209,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-21707 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-30T10:15:07Z",
|
||||
"updated_at": "2024-04-20T01:38:48Z",
|
||||
"updated_at": "2024-05-18T19:23:35Z",
|
||||
"pushed_at": "2023-07-06T07:43:24Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T19:06:36Z",
|
||||
"updated_at": "2024-05-16T06:46:11Z",
|
||||
"updated_at": "2024-05-18T19:24:27Z",
|
||||
"pushed_at": "2023-10-29T11:12:26Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-05-18T18:27:13Z",
|
||||
"updated_at": "2024-05-19T00:23:17Z",
|
||||
"pushed_at": "2024-05-16T21:12:20Z",
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 692,
|
||||
"watchers": 695,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2024-05-07T00:21:50Z",
|
||||
"updated_at": "2024-05-18T21:38:08Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -193,7 +193,7 @@
|
|||
"description": "CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T14:49:22Z",
|
||||
"updated_at": "2024-03-22T21:03:07Z",
|
||||
"updated_at": "2024-05-18T18:45:06Z",
|
||||
"pushed_at": "2023-10-11T15:15:18Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -198,10 +198,10 @@
|
|||
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T14:21:49Z",
|
||||
"updated_at": "2024-05-18T17:19:30Z",
|
||||
"updated_at": "2024-05-18T20:39:52Z",
|
||||
"pushed_at": "2024-05-18T09:40:01Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -230,7 +230,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 50,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1012,10 +1012,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-05-17T00:52:53Z",
|
||||
"updated_at": "2024-05-18T19:24:05Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3462,
|
||||
"watchers_count": 3462,
|
||||
"stargazers_count": 3461,
|
||||
"watchers_count": 3461,
|
||||
"has_discussions": false,
|
||||
"forks_count": 233,
|
||||
"allow_forking": true,
|
||||
|
@ -1024,7 +1024,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 233,
|
||||
"watchers": 3462,
|
||||
"watchers": 3461,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
|
@ -70,11 +70,11 @@
|
|||
"html_url": "https:\/\/github.com\/M507"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M507\/CVE-2024-32002",
|
||||
"description": null,
|
||||
"description": "local poc for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-18T02:42:33Z",
|
||||
"updated_at": "2024-05-18T16:18:05Z",
|
||||
"pushed_at": "2024-05-18T16:56:56Z",
|
||||
"updated_at": "2024-05-18T19:33:05Z",
|
||||
"pushed_at": "2024-05-18T19:32:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -106,12 +106,12 @@
|
|||
"description": "CVE-2024-32002 RCE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-18T15:05:28Z",
|
||||
"updated_at": "2024-05-18T16:42:33Z",
|
||||
"updated_at": "2024-05-18T21:50:27Z",
|
||||
"pushed_at": "2024-05-18T15:12:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -121,8 +121,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-25T19:51:38Z",
|
||||
"updated_at": "2024-05-18T08:54:24Z",
|
||||
"updated_at": "2024-05-18T20:50:23Z",
|
||||
"pushed_at": "2024-05-13T17:29:03Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -160,7 +160,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -40761,6 +40761,7 @@
|
|||
- [AlissonFaoli/Shellshock](https://github.com/AlissonFaoli/Shellshock)
|
||||
- [hackintoanetwork/shellshock](https://github.com/hackintoanetwork/shellshock)
|
||||
- [ajansha/shellshock](https://github.com/ajansha/shellshock)
|
||||
- [K3ysTr0K3R/CVE-2014-6271-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOIT)
|
||||
|
||||
### CVE-2014-6287 (2014-10-07)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue