mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/08/27 00:12:21
This commit is contained in:
parent
c3d65666a3
commit
84aa4853a6
22 changed files with 95 additions and 95 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2021-08-17T09:31:34Z",
|
||||
"updated_at": "2021-08-26T14:13:16Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 876,
|
||||
"watchers_count": 876,
|
||||
"stargazers_count": 878,
|
||||
"watchers_count": 878,
|
||||
"forks_count": 411,
|
||||
"forks": 411,
|
||||
"watchers": 876,
|
||||
"watchers": 878,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2021-08-22T12:53:14Z",
|
||||
"updated_at": "2021-08-26T09:43:54Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 230,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for Foxit Reader CVE-2018-14442",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-28T08:29:28Z",
|
||||
"updated_at": "2021-03-26T15:16:17Z",
|
||||
"updated_at": "2021-08-26T12:55:07Z",
|
||||
"pushed_at": "2018-12-28T09:46:29Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -914,8 +914,8 @@
|
|||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 476,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2811,
|
||||
"watchers_count": 2811,
|
||||
"forks_count": 813,
|
||||
"forks": 813,
|
||||
"forks_count": 815,
|
||||
"forks": 815,
|
||||
"watchers": 2811,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -841,13 +841,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-08-22T15:28:02Z",
|
||||
"updated_at": "2021-08-26T11:26:59Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1140,
|
||||
"watchers_count": 1140,
|
||||
"stargazers_count": 1141,
|
||||
"watchers_count": 1141,
|
||||
"forks_count": 358,
|
||||
"forks": 358,
|
||||
"watchers": 1140,
|
||||
"watchers": 1141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1025,13 +1025,13 @@
|
|||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-06T15:16:10Z",
|
||||
"updated_at": "2021-08-10T12:09:25Z",
|
||||
"updated_at": "2021-08-26T11:32:50Z",
|
||||
"pushed_at": "2020-09-09T09:42:22Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-11975 CVE-2020-13942",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-24T05:23:42Z",
|
||||
"updated_at": "2020-12-01T08:25:09Z",
|
||||
"updated_at": "2021-08-26T15:13:14Z",
|
||||
"pushed_at": "2020-12-01T08:25:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-08-25T04:06:35Z",
|
||||
"updated_at": "2021-08-26T10:51:35Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1331,
|
||||
"watchers_count": 1331,
|
||||
"stargazers_count": 1332,
|
||||
"watchers_count": 1332,
|
||||
"forks_count": 303,
|
||||
"forks": 303,
|
||||
"watchers": 1331,
|
||||
"watchers": 1332,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2811,
|
||||
"watchers_count": 2811,
|
||||
"forks_count": 813,
|
||||
"forks": 813,
|
||||
"forks_count": 815,
|
||||
"forks": 815,
|
||||
"watchers": 2811,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2021-08-24T10:52:01Z",
|
||||
"updated_at": "2021-08-26T14:55:15Z",
|
||||
"pushed_at": "2021-08-24T10:51:58Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 276,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-07-21T03:02:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-4464 \/ CVE-2020-4450",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-17T08:44:49Z",
|
||||
"updated_at": "2021-08-24T15:02:21Z",
|
||||
"updated_at": "2021-08-26T12:12:40Z",
|
||||
"pushed_at": "2021-08-24T15:02:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1336,
|
||||
"watchers_count": 1336,
|
||||
"forks_count": 478,
|
||||
"forks": 478,
|
||||
"forks_count": 479,
|
||||
"forks": 479,
|
||||
"watchers": 1336,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-07-20T20:37:57Z",
|
||||
"updated_at": "2021-08-26T12:48:09Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "exiftool arbitrary code execution vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-12T08:51:44Z",
|
||||
"updated_at": "2021-08-04T11:40:45Z",
|
||||
"updated_at": "2021-08-26T12:02:29Z",
|
||||
"pushed_at": "2021-05-12T09:09:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2021-07-26T04:37:57Z",
|
||||
"updated_at": "2021-08-26T09:49:54Z",
|
||||
"pushed_at": "2021-07-09T04:39:57Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "PoC for exploiting RCE in Exchange CVEs: CVE-2021-28480, CVE-2021-28481, CVE-2021-28482 and CVE-2021-28483. Achieves Domain Admin on Exchange Servers running Windows Server 2003 up to Windows Server 2019.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:50:39Z",
|
||||
"updated_at": "2021-07-22T11:59:48Z",
|
||||
"updated_at": "2021-08-26T12:02:11Z",
|
||||
"pushed_at": "2021-07-15T01:41:13Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-08-25T07:26:28Z",
|
||||
"updated_at": "2021-08-26T10:06:04Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 751,
|
||||
"watchers_count": 751,
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 751,
|
||||
"watchers": 752,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-08-26T05:05:42Z",
|
||||
"updated_at": "2021-08-26T13:44:45Z",
|
||||
"pushed_at": "2021-07-23T15:46:37Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1025,13 +1025,13 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-08-19T16:21:34Z",
|
||||
"updated_at": "2021-08-26T11:45:57Z",
|
||||
"pushed_at": "2021-08-11T15:52:19Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "nuclei scanner for proxyshell ( CVE-2021-34473 )",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-10T15:01:02Z",
|
||||
"updated_at": "2021-08-23T05:42:55Z",
|
||||
"updated_at": "2021-08-26T10:30:24Z",
|
||||
"pushed_at": "2021-08-11T20:40:50Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2021-08-26T06:18:01Z",
|
||||
"updated_at": "2021-08-26T14:33:39Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 149,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-08-25T16:49:29Z",
|
||||
"updated_at": "2021-08-26T12:38:27Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 227,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2021-07-25T15:41:33Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-24T06:15:20Z",
|
||||
"updated_at": "2021-08-25T10:08:55Z",
|
||||
"updated_at": "2021-08-26T15:11:29Z",
|
||||
"pushed_at": "2021-08-25T02:00:12Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Reference in a new issue