mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/11/01 06:12:49
This commit is contained in:
parent
6959b6fa39
commit
9dc5aca85f
13 changed files with 152 additions and 36 deletions
29
2016/CVE-2016-1757.json
Normal file
29
2016/CVE-2016-1757.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 57211701,
|
||||
"name": "mach_race",
|
||||
"full_name": "gdbinit\/mach_race",
|
||||
"owner": {
|
||||
"login": "gdbinit",
|
||||
"id": 859134,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/859134?v=4",
|
||||
"html_url": "https:\/\/github.com\/gdbinit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gdbinit\/mach_race",
|
||||
"description": "Exploit code for CVE-2016-1757",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-27T12:29:28Z",
|
||||
"updated_at": "2021-09-09T02:27:23Z",
|
||||
"pushed_at": "2016-04-27T14:07:43Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2016/CVE-2016-2118.json
Normal file
29
2016/CVE-2016-2118.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 56461631,
|
||||
"name": "cfengine-CVE-2016-2118",
|
||||
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
|
||||
"description": "An example detection and remediation policy.",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-17T22:22:04Z",
|
||||
"updated_at": "2016-04-18T02:57:44Z",
|
||||
"pushed_at": "2016-04-19T14:24:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2016/CVE-2016-3141.json
Normal file
29
2016/CVE-2016-3141.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 56758577,
|
||||
"name": "CVE-2016-3141",
|
||||
"full_name": "peternguyen93\/CVE-2016-3141",
|
||||
"owner": {
|
||||
"login": "peternguyen93",
|
||||
"id": 1802870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
|
||||
"html_url": "https:\/\/github.com\/peternguyen93"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
|
||||
"description": "CVE-2016-3141",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-21T08:59:05Z",
|
||||
"updated_at": "2019-11-27T06:28:33Z",
|
||||
"pushed_at": "2016-04-23T15:55:01Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -45,14 +45,19 @@
|
|||
"description": "GitLab 11.4.7 CE RCE exploit with different reverse shells. CVE-2018-19571 + CVE-2018-19585",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-11T11:23:37Z",
|
||||
"updated_at": "2021-05-03T12:59:20Z",
|
||||
"updated_at": "2021-10-31T18:14:10Z",
|
||||
"pushed_at": "2021-05-03T12:59:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2018-19571",
|
||||
"cve-2018-19585",
|
||||
"exploit",
|
||||
"gitlab"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "The exploit for CVE-2019-13272",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T06:36:21Z",
|
||||
"updated_at": "2020-12-14T12:01:59Z",
|
||||
"updated_at": "2021-10-31T16:17:53Z",
|
||||
"pushed_at": "2019-07-31T07:05:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -70,10 +70,10 @@
|
|||
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2021-09-10T22:00:32Z",
|
||||
"updated_at": "2021-10-31T17:08:17Z",
|
||||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -84,7 +84,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -193,8 +193,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T12:24:19Z",
|
||||
"updated_at": "2021-10-24T04:48:36Z",
|
||||
"pushed_at": "2021-10-03T13:04:19Z",
|
||||
"updated_at": "2021-10-31T15:29:24Z",
|
||||
"pushed_at": "2021-10-31T15:29:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "XMLRPC - RCE in MovableTypePoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-30T09:15:56Z",
|
||||
"updated_at": "2021-10-31T10:30:17Z",
|
||||
"updated_at": "2021-10-31T19:36:43Z",
|
||||
"pushed_at": "2021-10-30T09:22:31Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -52,8 +52,8 @@
|
|||
"xmlrpc-api"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Pocsuite3 For CVE-2021-22205",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T06:29:37Z",
|
||||
"updated_at": "2021-10-31T08:11:03Z",
|
||||
"updated_at": "2021-10-31T18:26:16Z",
|
||||
"pushed_at": "2021-10-28T08:54:26Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -233,8 +233,8 @@
|
|||
"description": "CVE-2021-22205 RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-31T14:34:51Z",
|
||||
"updated_at": "2021-10-31T14:34:54Z",
|
||||
"pushed_at": "2021-10-31T14:34:51Z",
|
||||
"updated_at": "2021-10-31T15:40:36Z",
|
||||
"pushed_at": "2021-10-31T15:40:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T22:59:29Z",
|
||||
"updated_at": "2021-10-30T15:07:21Z",
|
||||
"updated_at": "2021-10-31T15:35:25Z",
|
||||
"pushed_at": "2021-09-03T10:24:34Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -73,17 +73,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2021-10-28T21:12:48Z",
|
||||
"updated_at": "2021-10-31T16:50:36Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2021-10-30T12:50:39Z",
|
||||
"updated_at": "2021-10-31T16:23:14Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -17276,6 +17276,14 @@ AppleUSBNetworking in Apple iOS before 9.3 and OS X before 10.11.4 allows physic
|
|||
|
||||
- [Manouchehri/CVE-2016-1734](https://github.com/Manouchehri/CVE-2016-1734)
|
||||
|
||||
### CVE-2016-1757 (2016-03-23)
|
||||
|
||||
<code>
|
||||
Race condition in the kernel in Apple iOS before 9.3 and OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context via a crafted app.
|
||||
</code>
|
||||
|
||||
- [gdbinit/mach_race](https://github.com/gdbinit/mach_race)
|
||||
|
||||
### CVE-2016-1764 (2016-03-23)
|
||||
|
||||
<code>
|
||||
|
@ -17341,6 +17349,14 @@ The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does
|
|||
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
|
||||
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
|
||||
|
||||
### CVE-2016-2118 (2016-04-12)
|
||||
|
||||
<code>
|
||||
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
|
||||
</code>
|
||||
|
||||
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
|
||||
|
||||
### CVE-2016-2173 (2017-04-21)
|
||||
|
||||
<code>
|
||||
|
@ -17462,6 +17478,14 @@ Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers
|
|||
|
||||
- [0xEmanuel/CVE-2016-3113](https://github.com/0xEmanuel/CVE-2016-3113)
|
||||
|
||||
### CVE-2016-3141 (2016-03-31)
|
||||
|
||||
<code>
|
||||
Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
|
||||
</code>
|
||||
|
||||
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
|
||||
|
||||
### CVE-2016-3238 (2016-07-12)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue