mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/10/04 18:13:37
This commit is contained in:
parent
a5972ac4bc
commit
bdddcb1a87
18 changed files with 126 additions and 74 deletions
|
@ -17,10 +17,10 @@
|
|||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -438,15 +438,15 @@
|
|||
"description": "Exploit code for CVE-2007-2447 written in Python3.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T21:38:19Z",
|
||||
"updated_at": "2021-10-03T21:39:41Z",
|
||||
"updated_at": "2021-10-04T08:23:06Z",
|
||||
"pushed_at": "2021-10-03T21:39:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,10 +17,10 @@
|
|||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 190,
|
||||
"forks_count": 191,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"forks": 191,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
"description": "A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-29T22:19:51Z",
|
||||
"updated_at": "2021-06-29T17:12:00Z",
|
||||
"updated_at": "2021-10-04T05:57:45Z",
|
||||
"pushed_at": "2017-11-30T00:24:14Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -142,10 +142,10 @@
|
|||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 13,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 12,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1342,10 +1342,10 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 829,
|
||||
"watchers_count": 829,
|
||||
"forks_count": 238,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"forks": 239,
|
||||
"watchers": 829,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -467,10 +467,10 @@
|
|||
"pushed_at": "2021-06-06T16:03:53Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -23,5 +23,30 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 413322493,
|
||||
"name": "linux-3.0.35_CVE-2020-15436_withPatch",
|
||||
"full_name": "artsking\/linux-3.0.35_CVE-2020-15436_withPatch",
|
||||
"owner": {
|
||||
"login": "artsking",
|
||||
"id": 87514725,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87514725?v=4",
|
||||
"html_url": "https:\/\/github.com\/artsking"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/artsking\/linux-3.0.35_CVE-2020-15436_withPatch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-04T07:44:42Z",
|
||||
"updated_at": "2021-10-04T07:49:46Z",
|
||||
"pushed_at": "2021-10-04T07:50:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 295349771,
|
||||
"name": "CVE-2020-23934",
|
||||
"full_name": "H0j3n\/CVE-2020-23934",
|
||||
"owner": {
|
||||
"login": "H0j3n",
|
||||
"id": 51261763,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
|
||||
"html_url": "https:\/\/github.com\/H0j3n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2020-23934",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T08:16:23Z",
|
||||
"updated_at": "2021-10-04T05:41:12Z",
|
||||
"pushed_at": "2021-10-04T05:41:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 388210043,
|
||||
"name": "CVE-2020-23934",
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2021-08-05T13:13:06Z",
|
||||
"updated_at": "2021-10-04T06:09:43Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -238,15 +238,15 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-10-03T06:10:31Z",
|
||||
"updated_at": "2021-10-04T08:53:28Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 615,
|
||||
"watchers_count": 615,
|
||||
"stargazers_count": 616,
|
||||
"watchers_count": 616,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 615,
|
||||
"watchers": 616,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -788,15 +788,15 @@
|
|||
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-26T13:53:10Z",
|
||||
"updated_at": "2021-10-04T00:40:51Z",
|
||||
"updated_at": "2021-10-04T03:24:06Z",
|
||||
"pushed_at": "2021-09-26T13:58:18Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -188,15 +188,15 @@
|
|||
"description": "the metasploit script(POC\/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T07:32:04Z",
|
||||
"updated_at": "2021-10-04T00:18:41Z",
|
||||
"updated_at": "2021-10-04T07:40:37Z",
|
||||
"pushed_at": "2021-10-02T08:21:38Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,15 +13,15 @@
|
|||
"description": "PoC CVE-2021-30632 - Out of bounds write in V8",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-20T09:49:51Z",
|
||||
"updated_at": "2021-10-03T06:20:49Z",
|
||||
"updated_at": "2021-10-04T03:44:26Z",
|
||||
"pushed_at": "2021-09-20T09:52:06Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -113,15 +113,15 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-10-03T14:42:29Z",
|
||||
"updated_at": "2021-10-04T08:01:36Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,15 +63,15 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2021-10-03T10:33:05Z",
|
||||
"updated_at": "2021-10-04T06:10:04Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 128,
|
||||
"watchers": 129,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-09-30T11:09:28Z",
|
||||
"updated_at": "2021-10-04T08:25:05Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 245,
|
||||
"watchers": 246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,15 +63,15 @@
|
|||
"description": "a reliable C based exploit for CVE-2021-3560.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-12T05:22:35Z",
|
||||
"updated_at": "2021-08-30T16:58:46Z",
|
||||
"updated_at": "2021-10-04T09:12:51Z",
|
||||
"pushed_at": "2021-06-23T11:07:32Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 19,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -213,15 +213,15 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-10-03T16:33:40Z",
|
||||
"updated_at": "2021-10-04T09:01:37Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"forks_count": 395,
|
||||
"stargazers_count": 1248,
|
||||
"watchers_count": 1248,
|
||||
"forks_count": 396,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 395,
|
||||
"watchers": 1246,
|
||||
"forks": 396,
|
||||
"watchers": 1248,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -513,15 +513,15 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-10-03T16:33:48Z",
|
||||
"updated_at": "2021-10-04T06:24:35Z",
|
||||
"pushed_at": "2021-09-25T00:05:37Z",
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 443,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -663,15 +663,15 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T01:13:42Z",
|
||||
"updated_at": "2021-10-04T03:04:21Z",
|
||||
"updated_at": "2021-10-04T07:40:31Z",
|
||||
"pushed_at": "2021-10-03T01:34:54Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -5737,6 +5737,7 @@ Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 al
|
|||
</code>
|
||||
|
||||
- [artsking/linux-4.1.15_CVE-2020-15436_withPatch](https://github.com/artsking/linux-4.1.15_CVE-2020-15436_withPatch)
|
||||
- [artsking/linux-3.0.35_CVE-2020-15436_withPatch](https://github.com/artsking/linux-3.0.35_CVE-2020-15436_withPatch)
|
||||
|
||||
### CVE-2020-15492 (2020-07-23)
|
||||
|
||||
|
@ -6105,6 +6106,7 @@ A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, i
|
|||
An issue was discovered in RiteCMS 2.2.1. An authenticated user can directly execute system commands by uploading a php web shell in the "Filemanager" section.
|
||||
</code>
|
||||
|
||||
- [H0j3n/CVE-2020-23934](https://github.com/H0j3n/CVE-2020-23934)
|
||||
- [zyeinn/CVE-2020-23934](https://github.com/zyeinn/CVE-2020-23934)
|
||||
|
||||
### CVE-2020-23968 (2020-11-10)
|
||||
|
|
Loading…
Add table
Reference in a new issue