mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/04/28 00:28:43
This commit is contained in:
parent
8ebf4a3d31
commit
a96fd7063d
17 changed files with 94 additions and 59 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Broadpwn bug (CVE-2017-9417)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-29T22:23:34Z",
|
||||
"updated_at": "2023-01-01T22:52:13Z",
|
||||
"updated_at": "2023-04-27T23:30:20Z",
|
||||
"pushed_at": "2017-09-22T12:14:25Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -250,10 +250,10 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2023-03-20T19:49:55Z",
|
||||
"updated_at": "2023-04-27T19:04:07Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -262,7 +262,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 484,
|
||||
"watchers_count": 484,
|
||||
"has_discussions": false,
|
||||
"forks_count": 472,
|
||||
"forks_count": 473,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 472,
|
||||
"forks": 473,
|
||||
"watchers": 484,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2023-04-01T00:54:37Z",
|
||||
"updated_at": "2023-04-27T20:10:40Z",
|
||||
"pushed_at": "2021-08-07T16:48:55Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 389,
|
||||
"watchers": 388,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-28502 node-XMLHttpRequest RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-12T12:11:03Z",
|
||||
"updated_at": "2022-07-21T02:50:56Z",
|
||||
"updated_at": "2023-04-27T21:51:41Z",
|
||||
"pushed_at": "2021-05-12T12:18:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 1680,
|
||||
"watchers_count": 1680,
|
||||
"has_discussions": false,
|
||||
"forks_count": 585,
|
||||
"forks_count": 586,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 585,
|
||||
"forks": 586,
|
||||
"watchers": 1680,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T07:14:45Z",
|
||||
"updated_at": "2023-04-24T22:34:07Z",
|
||||
"updated_at": "2023-04-27T22:40:11Z",
|
||||
"pushed_at": "2023-03-09T07:15:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -315,7 +315,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -52,13 +52,13 @@
|
|||
"stargazers_count": 566,
|
||||
"watchers_count": 566,
|
||||
"has_discussions": false,
|
||||
"forks_count": 102,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"forks": 103,
|
||||
"watchers": 566,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "Exploit for WP BookingPress (< 1.0.11) based on destr4ct POC.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-06T19:07:11Z",
|
||||
"updated_at": "2023-01-31T12:41:45Z",
|
||||
"updated_at": "2023-04-27T23:47:35Z",
|
||||
"pushed_at": "2023-01-17T16:02:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -158,10 +158,10 @@
|
|||
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-06T20:44:10Z",
|
||||
"updated_at": "2023-04-01T08:55:56Z",
|
||||
"updated_at": "2023-04-27T23:44:31Z",
|
||||
"pushed_at": "2022-11-23T21:09:11Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -176,7 +176,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-04-22T16:16:30Z",
|
||||
"updated_at": "2023-04-27T23:41:05Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 344,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
"use-after-free"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"forks": 49,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-22T21:34:06Z",
|
||||
"updated_at": "2023-04-27T07:46:42Z",
|
||||
"updated_at": "2023-04-27T20:30:23Z",
|
||||
"pushed_at": "2023-04-22T21:50:35Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T04:59:05Z",
|
||||
"updated_at": "2023-04-27T14:15:41Z",
|
||||
"updated_at": "2023-04-27T18:56:41Z",
|
||||
"pushed_at": "2023-04-25T12:00:05Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 32,
|
||||
"forks": 5,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC repository for CVE-2023-29007",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-26T14:00:11Z",
|
||||
"updated_at": "2023-04-27T09:15:33Z",
|
||||
"updated_at": "2023-04-27T19:53:17Z",
|
||||
"pushed_at": "2023-04-26T14:21:51Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 633587053,
|
||||
"name": "cPanel-CVE-2023-29489",
|
||||
"full_name": "xKore123\/cPanel-CVE-2023-29489",
|
||||
"owner": {
|
||||
"login": "xKore123",
|
||||
"id": 63617858,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63617858?v=4",
|
||||
"html_url": "https:\/\/github.com\/xKore123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xKore123\/cPanel-CVE-2023-29489",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-27T20:51:47Z",
|
||||
"updated_at": "2023-04-27T20:51:48Z",
|
||||
"pushed_at": "2023-04-27T21:17:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
16
README.md
16
README.md
|
@ -288,7 +288,7 @@ Microsoft Word Remote Code Execution Vulnerability
|
|||
### CVE-2023-21739 (2023-01-10)
|
||||
|
||||
<code>
|
||||
Windows Bluetooth Driver Elevation of Privilege Vulnerability.
|
||||
Windows Bluetooth Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-21739](https://github.com/gmh5225/CVE-2023-21739)
|
||||
|
@ -296,7 +296,7 @@ Windows Bluetooth Driver Elevation of Privilege Vulnerability.
|
|||
### CVE-2023-21742 (2023-01-10)
|
||||
|
||||
<code>
|
||||
Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21744.
|
||||
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [ohnonoyesyes/CVE-2023-21742](https://github.com/ohnonoyesyes/CVE-2023-21742)
|
||||
|
@ -304,7 +304,7 @@ Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is
|
|||
### CVE-2023-21752 (2023-01-10)
|
||||
|
||||
<code>
|
||||
Windows Backup Service Elevation of Privilege Vulnerability.
|
||||
Windows Backup Service Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Wh04m1001/CVE-2023-21752](https://github.com/Wh04m1001/CVE-2023-21752)
|
||||
|
@ -312,7 +312,7 @@ Windows Backup Service Elevation of Privilege Vulnerability.
|
|||
### CVE-2023-21768 (2023-01-10)
|
||||
|
||||
<code>
|
||||
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
|
||||
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [chompie1337/Windows_LPE_AFD_CVE-2023-21768](https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768)
|
||||
|
@ -942,8 +942,14 @@ Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to
|
|||
|
||||
- [ohnonoyesyes/CVE-2023-29084](https://github.com/ohnonoyesyes/CVE-2023-29084)
|
||||
|
||||
### CVE-2023-29489
|
||||
### CVE-2023-29489 (2023-04-27)
|
||||
|
||||
<code>
|
||||
An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
|
||||
</code>
|
||||
|
||||
- [learnerboy88/CVE-2023-29489](https://github.com/learnerboy88/CVE-2023-29489)
|
||||
- [xKore123/cPanel-CVE-2023-29489](https://github.com/xKore123/cPanel-CVE-2023-29489)
|
||||
|
||||
### CVE-2023-30458 (2023-04-24)
|
||||
|
||||
|
|
Loading…
Reference in a new issue