mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/12/10 12:39:22
This commit is contained in:
parent
801ab0a6c0
commit
ac936d78cb
30 changed files with 157 additions and 394 deletions
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 7481496,
|
||||
"name": "diaggetroot",
|
||||
"full_name": "hiikezoe\/diaggetroot",
|
||||
"owner": {
|
||||
"login": "hiikezoe",
|
||||
"id": 188175,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4",
|
||||
"html_url": "https:\/\/github.com\/hiikezoe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot",
|
||||
"description": "Obtain root access through CVE-2012-4220",
|
||||
"fork": false,
|
||||
"created_at": "2013-01-07T11:45:35Z",
|
||||
"updated_at": "2023-09-28T10:21:15Z",
|
||||
"pushed_at": "2013-04-03T11:58:57Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 11198771,
|
||||
"name": "root-zte-open",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 8106302,
|
||||
"name": "MySQL-Fu.rb",
|
||||
"full_name": "Hood3dRob1n\/MySQL-Fu.rb",
|
||||
"owner": {
|
||||
"login": "Hood3dRob1n",
|
||||
"id": 1881344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hood3dRob1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hood3dRob1n\/MySQL-Fu.rb",
|
||||
"description": "MySQL-Fu is a Ruby based MySQL Client Script I wrote. It does most of the stuff a normal MySQL client might do: SQL Shell, Update\/Delete\/Drop Database\/Table, Add\/Delete Users, Dump Database(s)\/Table w\/ option for gzip...... Plus a few extra options to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2013-02-09T04:59:43Z",
|
||||
"updated_at": "2023-06-21T15:30:06Z",
|
||||
"pushed_at": "2013-02-09T05:02:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 137385853,
|
||||
"name": "UDFPwn-CVE-2012-5613",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 7420891,
|
||||
"name": "rails-cve-2012-5664-test",
|
||||
"full_name": "phusion\/rails-cve-2012-5664-test",
|
||||
"owner": {
|
||||
"login": "phusion",
|
||||
"id": 830588,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/830588?v=4",
|
||||
"html_url": "https:\/\/github.com\/phusion"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phusion\/rails-cve-2012-5664-test",
|
||||
"description": "Demo app showing how the Rails CVE-2013-5664 vulnerability works.",
|
||||
"fork": false,
|
||||
"created_at": "2013-01-03T10:07:27Z",
|
||||
"updated_at": "2018-03-12T19:42:18Z",
|
||||
"pushed_at": "2013-01-03T13:15:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 9437130,
|
||||
"name": "vulnupnp",
|
||||
"full_name": "lochiiconnectivity\/vulnupnp",
|
||||
"owner": {
|
||||
"login": "lochiiconnectivity",
|
||||
"id": 4155305,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4",
|
||||
"html_url": "https:\/\/github.com\/lochiiconnectivity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp",
|
||||
"description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959",
|
||||
"fork": false,
|
||||
"created_at": "2013-04-14T23:34:56Z",
|
||||
"updated_at": "2016-09-04T16:49:13Z",
|
||||
"pushed_at": "2013-04-14T23:37:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -119,36 +119,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 188897438,
|
||||
"name": "CVE-2013-0156",
|
||||
"full_name": "R3dKn33-zz\/CVE-2013-0156",
|
||||
"owner": {
|
||||
"login": "R3dKn33-zz",
|
||||
"id": 31809058,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31809058?v=4",
|
||||
"html_url": "https:\/\/github.com\/R3dKn33-zz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R3dKn33-zz\/CVE-2013-0156",
|
||||
"description": "Arbitrary deserialization that can be used to trigger SQL injection and even Code execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-27T19:17:55Z",
|
||||
"updated_at": "2019-05-27T19:25:01Z",
|
||||
"pushed_at": "2019-05-27T19:24:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 672302842,
|
||||
"name": "kuang_grade_mk11",
|
||||
|
|
|
@ -59,36 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 200347068,
|
||||
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"owner": {
|
||||
"login": "tachibana51",
|
||||
"id": 29031994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
|
||||
"html_url": "https:\/\/github.com\/tachibana51"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"description": "this is not stable",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-03T07:38:18Z",
|
||||
"updated_at": "2019-10-26T18:48:26Z",
|
||||
"pushed_at": "2019-08-03T07:58:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 275396332,
|
||||
"name": "CVE-2013-2028-Exploit",
|
||||
|
|
|
@ -148,35 +148,5 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 198426665,
|
||||
"name": "CVE-2013-2094",
|
||||
"full_name": "vnik5287\/CVE-2013-2094",
|
||||
"owner": {
|
||||
"login": "vnik5287",
|
||||
"id": 9650718,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4",
|
||||
"html_url": "https:\/\/github.com\/vnik5287"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vnik5287\/CVE-2013-2094",
|
||||
"description": "perf_swevent_init",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T12:31:55Z",
|
||||
"updated_at": "2019-07-23T12:33:10Z",
|
||||
"pushed_at": "2019-07-23T12:33:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T21:57:24Z",
|
||||
"updated_at": "2023-05-14T17:57:10Z",
|
||||
"updated_at": "2023-12-10T10:24:20Z",
|
||||
"pushed_at": "2021-02-25T22:04:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 56461631,
|
||||
"name": "cfengine-CVE-2016-2118",
|
||||
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
|
||||
"description": "An example detection and remediation policy.",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-17T22:22:04Z",
|
||||
"updated_at": "2016-04-18T02:57:44Z",
|
||||
"pushed_at": "2016-04-19T14:24:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 56758577,
|
||||
"name": "CVE-2016-3141",
|
||||
"full_name": "peternguyen93\/CVE-2016-3141",
|
||||
"owner": {
|
||||
"login": "peternguyen93",
|
||||
"id": 1802870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
|
||||
"html_url": "https:\/\/github.com\/peternguyen93"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
|
||||
"description": "CVE-2016-3141",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-21T08:59:05Z",
|
||||
"updated_at": "2023-03-11T18:41:15Z",
|
||||
"pushed_at": "2016-04-23T15:55:01Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Commvault-CVE-2017-18044",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-02T19:18:31Z",
|
||||
"updated_at": "2023-09-28T10:54:32Z",
|
||||
"updated_at": "2023-12-10T09:56:08Z",
|
||||
"pushed_at": "2018-10-07T18:12:55Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "This is an edited version of the CVE-2018-19422 exploit to fix an small but annoying issue I had.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T17:23:23Z",
|
||||
"updated_at": "2022-04-29T17:27:25Z",
|
||||
"updated_at": "2023-12-10T10:52:24Z",
|
||||
"pushed_at": "2022-04-29T17:27:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-09T22:25:02Z",
|
||||
"updated_at": "2023-12-09T22:25:26Z",
|
||||
"updated_at": "2023-12-10T11:10:13Z",
|
||||
"pushed_at": "2023-12-09T22:25:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T19:23:09Z",
|
||||
"updated_at": "2023-10-17T11:56:53Z",
|
||||
"updated_at": "2023-12-10T06:55:20Z",
|
||||
"pushed_at": "2021-12-19T18:18:36Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -118,5 +118,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 729798547,
|
||||
"name": "Internet-Explorer-UAF",
|
||||
"full_name": "Micky-Thongam\/Internet-Explorer-UAF",
|
||||
"owner": {
|
||||
"login": "Micky-Thongam",
|
||||
"id": 107787739,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107787739?v=4",
|
||||
"html_url": "https:\/\/github.com\/Micky-Thongam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Micky-Thongam\/Internet-Explorer-UAF",
|
||||
"description": "Porting the CVE-2020-0674 exploit for Windows8.1 and Windows10",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T11:52:48Z",
|
||||
"updated_at": "2023-12-10T12:11:32Z",
|
||||
"pushed_at": "2023-12-10T12:11:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-24T09:10:17Z",
|
||||
"updated_at": "2023-10-29T09:47:59Z",
|
||||
"updated_at": "2023-12-10T08:21:47Z",
|
||||
"pushed_at": "2020-12-25T09:51:37Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-29T12:37:31Z",
|
||||
"updated_at": "2023-11-21T16:23:40Z",
|
||||
"updated_at": "2023-12-10T10:31:12Z",
|
||||
"pushed_at": "2022-06-30T08:36:58Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -133,12 +133,12 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2023-12-07T13:30:54Z",
|
||||
"updated_at": "2023-12-10T07:30:19Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -147,8 +147,8 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 112,
|
||||
"forks": 22,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-12-09T08:23:36Z",
|
||||
"updated_at": "2023-12-10T07:12:32Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 913,
|
||||
"watchers_count": 913,
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
"has_discussions": false,
|
||||
"forks_count": 175,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 175,
|
||||
"watchers": 913,
|
||||
"watchers": 914,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T23:26:47Z",
|
||||
"updated_at": "2023-12-04T19:30:00Z",
|
||||
"updated_at": "2023-12-10T12:12:35Z",
|
||||
"pushed_at": "2022-11-20T03:03:53Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 201,
|
||||
"watchers": 200,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-12-08T02:31:01Z",
|
||||
"updated_at": "2023-12-10T09:40:42Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 372,
|
||||
"watchers": 373,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-20963 PoC (Android WorkSource parcel\/unparcel logic mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T10:44:59Z",
|
||||
"updated_at": "2023-12-06T09:02:13Z",
|
||||
"updated_at": "2023-12-10T12:20:30Z",
|
||||
"pushed_at": "2023-07-27T08:58:10Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2023-12-08T17:25:47Z",
|
||||
"updated_at": "2023-12-10T07:39:34Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
32
2023/CVE-2023-30547.json
Normal file
32
2023/CVE-2023-30547.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 729751099,
|
||||
"name": "CVE-2023-30547",
|
||||
"full_name": "rvizx\/CVE-2023-30547",
|
||||
"owner": {
|
||||
"login": "rvizx",
|
||||
"id": 84989569,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
|
||||
"html_url": "https:\/\/github.com\/rvizx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rvizx\/CVE-2023-30547",
|
||||
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T08:32:26Z",
|
||||
"updated_at": "2023-12-10T11:21:39Z",
|
||||
"pushed_at": "2023-12-10T11:23:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -169,10 +169,10 @@
|
|||
"description": "POC for CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-30T09:56:52Z",
|
||||
"updated_at": "2023-12-10T06:12:47Z",
|
||||
"updated_at": "2023-12-10T07:26:16Z",
|
||||
"pushed_at": "2023-12-07T11:10:46Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -1119,7 +1119,7 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 729723100,
|
||||
"id": 729734696,
|
||||
"name": "CVE-2023-38831-EXP",
|
||||
"full_name": "80r1ng\/CVE-2023-38831-EXP",
|
||||
"owner": {
|
||||
|
@ -1131,9 +1131,9 @@
|
|||
"html_url": "https:\/\/github.com\/80r1ng\/CVE-2023-38831-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T06:16:26Z",
|
||||
"updated_at": "2023-12-10T06:16:27Z",
|
||||
"pushed_at": "2023-12-10T06:16:27Z",
|
||||
"created_at": "2023-12-10T07:13:38Z",
|
||||
"updated_at": "2023-12-10T07:19:06Z",
|
||||
"pushed_at": "2023-12-10T07:19:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -104,7 +104,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-28T00:55:11Z",
|
||||
"updated_at": "2023-11-28T00:55:24Z",
|
||||
"pushed_at": "2023-11-28T00:55:20Z",
|
||||
"pushed_at": "2023-12-10T10:18:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2023-12-08T12:39:20Z",
|
||||
"updated_at": "2023-12-10T09:24:13Z",
|
||||
"pushed_at": "2023-10-14T16:43:31Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 196,
|
||||
"watchers": 195,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of concept for DoS exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T01:59:47Z",
|
||||
"updated_at": "2023-11-26T05:12:39Z",
|
||||
"updated_at": "2023-12-10T09:24:09Z",
|
||||
"pushed_at": "2023-10-13T11:19:10Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 40,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -111,10 +111,10 @@
|
|||
"description": "CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T07:06:42Z",
|
||||
"updated_at": "2023-10-19T14:05:17Z",
|
||||
"updated_at": "2023-12-10T09:24:05Z",
|
||||
"pushed_at": "2023-10-12T07:11:17Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -141,10 +141,10 @@
|
|||
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-13T23:55:32Z",
|
||||
"updated_at": "2023-12-09T07:49:25Z",
|
||||
"updated_at": "2023-12-10T09:24:08Z",
|
||||
"pushed_at": "2023-10-30T20:22:37Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -153,7 +153,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 31,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -171,10 +171,10 @@
|
|||
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-16T11:07:50Z",
|
||||
"updated_at": "2023-12-06T03:26:03Z",
|
||||
"updated_at": "2023-12-10T09:24:06Z",
|
||||
"pushed_at": "2023-10-16T12:32:50Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -193,7 +193,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -500,13 +500,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
37
README.md
37
README.md
|
@ -2653,6 +2653,13 @@
|
|||
|
||||
- [BenEdridge/CVE-2023-30533](https://github.com/BenEdridge/CVE-2023-30533)
|
||||
|
||||
### CVE-2023-30547 (2023-04-17)
|
||||
|
||||
<code>vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
|
||||
</code>
|
||||
|
||||
- [rvizx/CVE-2023-30547](https://github.com/rvizx/CVE-2023-30547)
|
||||
|
||||
### CVE-2023-30765 (2023-07-10)
|
||||
|
||||
<code>\nDelta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.\n\n
|
||||
|
@ -18995,6 +19002,7 @@
|
|||
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
|
||||
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
|
||||
- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)
|
||||
- [Micky-Thongam/Internet-Explorer-UAF](https://github.com/Micky-Thongam/Internet-Explorer-UAF)
|
||||
|
||||
### CVE-2020-0683 (2020-02-11)
|
||||
|
||||
|
@ -33476,13 +33484,6 @@
|
|||
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
|
||||
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
|
||||
|
||||
### CVE-2016-2118 (2016-04-12)
|
||||
|
||||
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
|
||||
</code>
|
||||
|
||||
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
|
||||
|
||||
### CVE-2016-2173 (2017-04-21)
|
||||
|
||||
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
|
||||
|
@ -33604,13 +33605,6 @@
|
|||
|
||||
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
|
||||
|
||||
### CVE-2016-3141 (2016-03-31)
|
||||
|
||||
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
|
||||
</code>
|
||||
|
||||
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
|
||||
|
||||
### CVE-2016-3238 (2016-07-12)
|
||||
|
||||
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability."
|
||||
|
@ -36137,7 +36131,6 @@
|
|||
- [heroku/heroku-CVE-2013-0156](https://github.com/heroku/heroku-CVE-2013-0156)
|
||||
- [josal/crack-0.1.8-fixed](https://github.com/josal/crack-0.1.8-fixed)
|
||||
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
|
||||
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
|
||||
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
|
||||
|
||||
### CVE-2013-0212 (2013-02-24)
|
||||
|
@ -36248,7 +36241,6 @@
|
|||
|
||||
- [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0)
|
||||
- [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn)
|
||||
- [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC)
|
||||
- [m4drat/CVE-2013-2028-Exploit](https://github.com/m4drat/CVE-2013-2028-Exploit)
|
||||
- [mambroziak/docker-cve-2013-2028](https://github.com/mambroziak/docker-cve-2013-2028)
|
||||
- [jptr218/nginxhack](https://github.com/jptr218/nginxhack)
|
||||
|
@ -36271,7 +36263,6 @@
|
|||
- [Pashkela/CVE-2013-2094](https://github.com/Pashkela/CVE-2013-2094)
|
||||
- [tarunyadav/fix-cve-2013-2094](https://github.com/tarunyadav/fix-cve-2013-2094)
|
||||
- [timhsutw/cve-2013-2094](https://github.com/timhsutw/cve-2013-2094)
|
||||
- [vnik5287/CVE-2013-2094](https://github.com/vnik5287/CVE-2013-2094)
|
||||
|
||||
### CVE-2013-2165 (2013-07-22)
|
||||
|
||||
|
@ -36730,7 +36721,6 @@
|
|||
<code>diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
|
||||
</code>
|
||||
|
||||
- [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot)
|
||||
- [poliva/root-zte-open](https://github.com/poliva/root-zte-open)
|
||||
|
||||
### CVE-2012-4431 (2012-12-19)
|
||||
|
@ -36797,19 +36787,8 @@
|
|||
<code>** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
|
||||
</code>
|
||||
|
||||
- [Hood3dRob1n/MySQL-Fu.rb](https://github.com/Hood3dRob1n/MySQL-Fu.rb)
|
||||
- [w4fz5uck5/UDFPwn-CVE-2012-5613](https://github.com/w4fz5uck5/UDFPwn-CVE-2012-5613)
|
||||
|
||||
### CVE-2012-5664
|
||||
- [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test)
|
||||
|
||||
### CVE-2012-5958 (2013-01-31)
|
||||
|
||||
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
|
||||
</code>
|
||||
|
||||
- [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp)
|
||||
|
||||
### CVE-2012-5960 (2013-01-31)
|
||||
|
||||
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.
|
||||
|
|
Loading…
Reference in a new issue