mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/06 06:11:07
This commit is contained in:
parent
41dd16cbc9
commit
c0c5dd8634
22 changed files with 122 additions and 74 deletions
|
@ -82,13 +82,13 @@
|
|||
"description": "ProFTPd 1.3.5 - File Copy",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-29T04:31:10Z",
|
||||
"updated_at": "2017-07-29T04:31:53Z",
|
||||
"updated_at": "2021-05-05T18:56:50Z",
|
||||
"pushed_at": "2017-07-29T04:35:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-12-16T00:39:19Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-11-30T00:24:14Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-22T14:19:54Z",
|
||||
"updated_at": "2021-04-30T06:14:30Z",
|
||||
"updated_at": "2021-05-05T20:31:30Z",
|
||||
"pushed_at": "2019-02-21T13:18:24Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2021-04-20T04:55:05Z",
|
||||
"updated_at": "2021-05-05T15:36:34Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 280,
|
||||
"watchers": 281,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2021-05-01T14:17:05Z",
|
||||
"updated_at": "2021-05-05T15:32:41Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"stargazers_count": 391,
|
||||
"watchers_count": 391,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 390,
|
||||
"watchers": 391,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1232,13 +1232,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2021-04-25T23:05:04Z",
|
||||
"updated_at": "2021-05-05T16:58:13Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"stargazers_count": 808,
|
||||
"watchers_count": 808,
|
||||
"forks_count": 196,
|
||||
"forks": 196,
|
||||
"watchers": 807,
|
||||
"watchers": 808,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1310,6 +1310,29 @@
|
|||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 189061944,
|
||||
"name": "CVE-2019-0708Poc-BatchScanning",
|
||||
"full_name": "ht0Ruial\/CVE-2019-0708Poc-BatchScanning",
|
||||
"owner": {
|
||||
"login": "ht0Ruial",
|
||||
"id": 44924427,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44924427?v=4",
|
||||
"html_url": "https:\/\/github.com\/ht0Ruial"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ht0Ruial\/CVE-2019-0708Poc-BatchScanning",
|
||||
"description": "基于360公开的无损检测工具的可直接在windows上运行的批量检测程序",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-28T16:09:10Z",
|
||||
"updated_at": "2021-05-05T19:58:14Z",
|
||||
"pushed_at": "2019-05-28T17:16:24Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 189126322,
|
||||
"name": "BlueKeep",
|
||||
|
@ -1393,13 +1416,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-04-29T20:21:25Z",
|
||||
"updated_at": "2021-05-05T17:44:53Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1068,
|
||||
"watchers_count": 1068,
|
||||
"stargazers_count": 1069,
|
||||
"watchers_count": 1069,
|
||||
"forks_count": 357,
|
||||
"forks": 357,
|
||||
"watchers": 1068,
|
||||
"watchers": 1069,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2021-04-28T01:26:16Z",
|
||||
"updated_at": "2021-05-05T20:25:43Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2021-04-08T05:43:24Z",
|
||||
"updated_at": "2021-05-05T15:37:24Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 364638510,
|
||||
"name": "WP_CROP_RCE",
|
||||
"full_name": "synod2\/WP_CROP_RCE",
|
||||
"owner": {
|
||||
"login": "synod2",
|
||||
"id": 9367196,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9367196?v=4",
|
||||
"html_url": "https:\/\/github.com\/synod2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/synod2\/WP_CROP_RCE",
|
||||
"description": "cve-2019-8942, cve-2019-8943",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-05T16:23:03Z",
|
||||
"updated_at": "2021-05-05T17:01:38Z",
|
||||
"pushed_at": "2021-05-05T17:01:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2021-05-05T14:39:34Z",
|
||||
"updated_at": "2021-05-05T16:31:10Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 856,
|
||||
"watchers_count": 856,
|
||||
"stargazers_count": 855,
|
||||
"watchers_count": 855,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 856,
|
||||
"watchers": 855,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -891,8 +891,8 @@
|
|||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-05-04T16:08:08Z",
|
||||
"updated_at": "2021-05-05T17:36:09Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 363,
|
||||
"watchers": 362,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-04-28T17:01:14Z",
|
||||
"updated_at": "2021-05-05T16:08:10Z",
|
||||
"pushed_at": "2021-04-20T08:35:26Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-05-05T06:00:55Z",
|
||||
"updated_at": "2021-05-05T17:33:33Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "com_media allowed paths that are not intended for image uploads to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T02:13:57Z",
|
||||
"updated_at": "2021-04-25T18:57:49Z",
|
||||
"updated_at": "2021-05-05T19:58:15Z",
|
||||
"pushed_at": "2021-03-03T03:52:10Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-04-28T17:01:14Z",
|
||||
"updated_at": "2021-05-05T16:08:10Z",
|
||||
"pushed_at": "2021-04-20T08:35:26Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-17T01:29:31Z",
|
||||
"updated_at": "2021-04-29T11:58:22Z",
|
||||
"updated_at": "2021-05-05T16:17:43Z",
|
||||
"pushed_at": "2021-04-20T16:00:46Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1025,13 +1025,13 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-05-03T01:33:33Z",
|
||||
"updated_at": "2021-05-05T20:12:08Z",
|
||||
"pushed_at": "2021-04-29T16:26:45Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-24T20:08:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -5309,6 +5309,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC)
|
||||
- [Rostelecom-CERT/bluekeepscan](https://github.com/Rostelecom-CERT/bluekeepscan)
|
||||
- [Leoid/CVE-2019-0708](https://github.com/Leoid/CVE-2019-0708)
|
||||
- [ht0Ruial/CVE-2019-0708Poc-BatchScanning](https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning)
|
||||
- [oneoy/BlueKeep](https://github.com/oneoy/BlueKeep)
|
||||
- [infiniti-team/CVE-2019-0708](https://github.com/infiniti-team/CVE-2019-0708)
|
||||
- [haishanzheng/CVE-2019-0708-generate-hosts](https://github.com/haishanzheng/CVE-2019-0708-generate-hosts)
|
||||
|
@ -6607,6 +6608,7 @@ WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because
|
|||
|
||||
- [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC)
|
||||
- [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942)
|
||||
- [synod2/WP_CROP_RCE](https://github.com/synod2/WP_CROP_RCE)
|
||||
|
||||
### CVE-2019-8943 (2019-02-19)
|
||||
|
||||
|
|
Loading…
Reference in a new issue