mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/01/30 00:38:17
This commit is contained in:
parent
ce213643a2
commit
b497731f19
16 changed files with 117 additions and 68 deletions
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2018-18368 SEP Manager EoP Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-27T10:22:19Z",
|
||||
"updated_at": "2020-06-16T11:22:19Z",
|
||||
"updated_at": "2023-01-29T23:31:24Z",
|
||||
"pushed_at": "2019-11-27T16:25:41Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -306,10 +306,10 @@
|
|||
"description": "C# PrintNightmare (CVE-2021-1675)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-26T20:46:23Z",
|
||||
"updated_at": "2022-11-09T18:13:51Z",
|
||||
"updated_at": "2023-01-29T19:56:56Z",
|
||||
"pushed_at": "2021-09-26T22:35:07Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -318,7 +318,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T04:39:58Z",
|
||||
"updated_at": "2023-01-22T05:50:10Z",
|
||||
"updated_at": "2023-01-29T21:58:15Z",
|
||||
"pushed_at": "2022-07-01T00:33:57Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2023-01-29T02:31:09Z",
|
||||
"updated_at": "2023-01-30T00:06:06Z",
|
||||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1049,7 +1049,7 @@
|
|||
"description": "This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-28T11:12:22Z",
|
||||
"updated_at": "2023-01-28T11:16:53Z",
|
||||
"updated_at": "2023-01-29T20:01:43Z",
|
||||
"pushed_at": "2023-01-28T11:24:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -1058,7 +1058,17 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"automation",
|
||||
"cve-2021-43798",
|
||||
"exploit",
|
||||
"hacking",
|
||||
"lab",
|
||||
"methodology",
|
||||
"pentest",
|
||||
"privilege-escalation",
|
||||
"secrets"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -387,10 +387,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2023-01-29T03:24:46Z",
|
||||
"updated_at": "2023-01-29T19:48:19Z",
|
||||
"pushed_at": "2022-12-14T08:48:45Z",
|
||||
"stargazers_count": 1038,
|
||||
"watchers_count": 1038,
|
||||
"stargazers_count": 1039,
|
||||
"watchers_count": 1039,
|
||||
"has_discussions": false,
|
||||
"forks_count": 474,
|
||||
"allow_forking": true,
|
||||
|
@ -401,7 +401,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 474,
|
||||
"watchers": 1038,
|
||||
"watchers": 1039,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9585,10 +9585,10 @@
|
|||
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T13:18:49Z",
|
||||
"updated_at": "2023-01-22T15:06:49Z",
|
||||
"updated_at": "2023-01-29T21:44:19Z",
|
||||
"pushed_at": "2022-08-12T20:12:50Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -9597,7 +9597,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,12 +100,12 @@
|
|||
"description": "lpe poc for cve-2022-21882 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T03:45:36Z",
|
||||
"updated_at": "2022-12-14T21:47:36Z",
|
||||
"updated_at": "2023-01-29T23:27:13Z",
|
||||
"pushed_at": "2022-02-07T03:49:37Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -115,8 +115,8 @@
|
|||
"windows-exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 43,
|
||||
"forks": 21,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-02T18:52:20Z",
|
||||
"updated_at": "2023-01-27T16:09:21Z",
|
||||
"updated_at": "2023-01-29T21:10:39Z",
|
||||
"pushed_at": "2022-12-16T05:29:11Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-30T23:32:56Z",
|
||||
"updated_at": "2023-01-19T19:41:22Z",
|
||||
"updated_at": "2023-01-29T22:01:39Z",
|
||||
"pushed_at": "2022-11-01T19:56:40Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 166,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -255,10 +255,10 @@
|
|||
"description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-15T16:51:25Z",
|
||||
"updated_at": "2023-01-24T12:20:14Z",
|
||||
"updated_at": "2023-01-29T20:52:26Z",
|
||||
"pushed_at": "2022-10-19T16:27:16Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -267,7 +267,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T20:36:49Z",
|
||||
"updated_at": "2023-01-29T11:25:55Z",
|
||||
"updated_at": "2023-01-29T19:51:44Z",
|
||||
"pushed_at": "2023-01-20T17:58:39Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 42,
|
||||
"forks": 6,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-44900.json
Normal file
31
2022/CVE-2022-44900.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 591689085,
|
||||
"name": "CVE-2022-44900-demo-lab",
|
||||
"full_name": "0xless\/CVE-2022-44900-demo-lab",
|
||||
"owner": {
|
||||
"login": "0xless",
|
||||
"id": 78535423,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78535423?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xless"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xless\/CVE-2022-44900-demo-lab",
|
||||
"description": "Demo webapp vulnerable to CVE-2022-44900",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T14:52:59Z",
|
||||
"updated_at": "2023-01-29T19:40:29Z",
|
||||
"pushed_at": "2023-01-29T19:58:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit via windows driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T10:32:02Z",
|
||||
"updated_at": "2023-01-28T02:14:27Z",
|
||||
"updated_at": "2023-01-29T19:05:05Z",
|
||||
"pushed_at": "2023-01-28T08:57:56Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC and Scanner for CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T19:19:23Z",
|
||||
"updated_at": "2023-01-29T18:21:02Z",
|
||||
"updated_at": "2023-01-29T23:45:48Z",
|
||||
"pushed_at": "2023-01-25T00:04:57Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,19 +42,19 @@
|
|||
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T03:21:42Z",
|
||||
"updated_at": "2023-01-29T15:39:27Z",
|
||||
"updated_at": "2023-01-30T00:16:56Z",
|
||||
"pushed_at": "2023-01-25T06:29:15Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 93,
|
||||
"forks": 16,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -5154,6 +5154,14 @@ login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.
|
|||
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
|
||||
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
|
||||
|
||||
### CVE-2022-44900 (2022-12-06)
|
||||
|
||||
<code>
|
||||
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
|
||||
</code>
|
||||
|
||||
- [0xless/CVE-2022-44900-demo-lab](https://github.com/0xless/CVE-2022-44900-demo-lab)
|
||||
|
||||
### CVE-2022-45025 (2022-12-06)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue