mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/11/20 12:20:58
This commit is contained in:
parent
261d51b19a
commit
bbb9f19bf4
18 changed files with 167 additions and 60 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2022-10-26T09:49:18Z",
|
||||
"updated_at": "2022-11-20T08:10:55Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-05-08T06:22:07Z",
|
||||
"updated_at": "2021-10-06T04:53:16Z",
|
||||
"updated_at": "2022-11-20T06:13:53Z",
|
||||
"pushed_at": "2016-05-10T22:41:12Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2022-11-01T06:39:13Z",
|
||||
"updated_at": "2022-11-20T10:40:37Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 584,
|
||||
"watchers_count": 584,
|
||||
"stargazers_count": 585,
|
||||
"watchers_count": 585,
|
||||
"has_discussions": false,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 128,
|
||||
"watchers": 584,
|
||||
"watchers": 585,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2022-11-19T16:11:41Z",
|
||||
"updated_at": "2022-11-20T10:29:51Z",
|
||||
"pushed_at": "2021-12-23T16:28:28Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 311,
|
||||
"watchers": 312,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 34,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2022-11-09T18:12:20Z",
|
||||
"updated_at": "2022-11-20T08:43:55Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 818,
|
||||
"watchers_count": 818,
|
||||
"stargazers_count": 819,
|
||||
"watchers_count": 819,
|
||||
"has_discussions": false,
|
||||
"forks_count": 136,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"watchers": 818,
|
||||
"watchers": 819,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2022-11-10T06:25:57Z",
|
||||
"updated_at": "2022-11-20T09:15:26Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -86,7 +86,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -340,10 +340,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-11-19T23:09:37Z",
|
||||
"updated_at": "2022-11-20T09:57:33Z",
|
||||
"pushed_at": "2022-09-21T07:49:03Z",
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"stargazers_count": 1500,
|
||||
"watchers_count": 1500,
|
||||
"has_discussions": false,
|
||||
"forks_count": 430,
|
||||
"allow_forking": true,
|
||||
|
@ -357,7 +357,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 430,
|
||||
"watchers": 1499,
|
||||
"watchers": 1500,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1884,10 +1884,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-11-17T00:58:09Z",
|
||||
"updated_at": "2022-11-20T07:15:47Z",
|
||||
"pushed_at": "2022-04-24T08:56:47Z",
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -1902,7 +1902,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 360,
|
||||
"watchers": 359,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T05:11:14Z",
|
||||
"updated_at": "2022-11-17T23:51:59Z",
|
||||
"updated_at": "2022-11-20T11:54:55Z",
|
||||
"pushed_at": "2022-11-17T12:58:20Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,8 +29,8 @@
|
|||
"gl-inet"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2022-11-19T13:11:04Z",
|
||||
"updated_at": "2022-11-20T11:31:58Z",
|
||||
"pushed_at": "2022-11-07T16:21:14Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-3546.json
Normal file
31
2022/CVE-2022-3546.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 552325321,
|
||||
"name": "CVE-2022-3546",
|
||||
"full_name": "thehackingverse\/CVE-2022-3546",
|
||||
"owner": {
|
||||
"login": "thehackingverse",
|
||||
"id": 86924237,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86924237?v=4",
|
||||
"html_url": "https:\/\/github.com\/thehackingverse"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thehackingverse\/CVE-2022-3546",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-16T10:35:24Z",
|
||||
"updated_at": "2022-11-20T07:45:32Z",
|
||||
"pushed_at": "2022-11-20T07:45:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -198,10 +198,10 @@
|
|||
"description": "Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-03T03:19:52Z",
|
||||
"updated_at": "2022-11-14T06:06:26Z",
|
||||
"updated_at": "2022-11-20T07:37:49Z",
|
||||
"pushed_at": "2022-11-08T22:59:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -210,7 +210,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T13:19:23Z",
|
||||
"updated_at": "2022-11-20T00:57:12Z",
|
||||
"updated_at": "2022-11-20T06:30:50Z",
|
||||
"pushed_at": "2022-11-19T10:35:50Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -831,19 +831,19 @@
|
|||
"description": "Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-04T19:26:23Z",
|
||||
"updated_at": "2022-11-17T02:38:39Z",
|
||||
"updated_at": "2022-11-20T11:54:11Z",
|
||||
"pushed_at": "2022-11-17T07:28:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-43117.json
Normal file
31
2022/CVE-2022-43117.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 568387385,
|
||||
"name": "CVE-2022-43117",
|
||||
"full_name": "RashidKhanPathan\/CVE-2022-43117",
|
||||
"owner": {
|
||||
"login": "RashidKhanPathan",
|
||||
"id": 65374016,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65374016?v=4",
|
||||
"html_url": "https:\/\/github.com\/RashidKhanPathan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RashidKhanPathan\/CVE-2022-43117",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-20T11:33:46Z",
|
||||
"updated_at": "2022-11-20T11:33:46Z",
|
||||
"pushed_at": "2022-11-20T11:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-44830.json
Normal file
31
2022/CVE-2022-44830.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 568387723,
|
||||
"name": "CVE-2022-44830",
|
||||
"full_name": "RashidKhanPathan\/CVE-2022-44830",
|
||||
"owner": {
|
||||
"login": "RashidKhanPathan",
|
||||
"id": 65374016,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65374016?v=4",
|
||||
"html_url": "https:\/\/github.com\/RashidKhanPathan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RashidKhanPathan\/CVE-2022-44830",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-20T11:35:05Z",
|
||||
"updated_at": "2022-11-20T11:35:05Z",
|
||||
"pushed_at": "2022-11-20T11:35:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
14
README.md
14
README.md
|
@ -652,6 +652,14 @@ A vulnerability classified as problematic has been found in SourceCodester Sanit
|
|||
|
||||
- [lohith19/CVE-2022-3518](https://github.com/lohith19/CVE-2022-3518)
|
||||
|
||||
### CVE-2022-3546 (2022-10-17)
|
||||
|
||||
<code>
|
||||
A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /csms/admin/?page=user/list of the component Create User Handler. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-211046 is the identifier assigned to this vulnerability.
|
||||
</code>
|
||||
|
||||
- [thehackingverse/CVE-2022-3546](https://github.com/thehackingverse/CVE-2022-3546)
|
||||
|
||||
### CVE-2022-3602 (2022-11-01)
|
||||
|
||||
<code>
|
||||
|
@ -4350,6 +4358,9 @@ Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via
|
|||
|
||||
- [ProxyStaffy/Mediatrix-CVE-2022-43096](https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096)
|
||||
|
||||
### CVE-2022-43117
|
||||
- [RashidKhanPathan/CVE-2022-43117](https://github.com/RashidKhanPathan/CVE-2022-43117)
|
||||
|
||||
### CVE-2022-43144 (2022-11-08)
|
||||
|
||||
<code>
|
||||
|
@ -4369,6 +4380,9 @@ A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers
|
|||
### CVE-2022-43959
|
||||
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
|
||||
|
||||
### CVE-2022-44830
|
||||
- [RashidKhanPathan/CVE-2022-44830](https://github.com/RashidKhanPathan/CVE-2022-44830)
|
||||
|
||||
|
||||
## 2021
|
||||
### CVE-2021-0302 (2021-02-10)
|
||||
|
|
Loading…
Reference in a new issue