mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/03/31 18:32:42
This commit is contained in:
parent
6bb30855d1
commit
ca3344466b
21 changed files with 118 additions and 58 deletions
|
@ -369,10 +369,10 @@
|
|||
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T14:25:09Z",
|
||||
"updated_at": "2023-03-25T09:08:19Z",
|
||||
"updated_at": "2023-03-31T14:18:34Z",
|
||||
"pushed_at": "2020-10-01T11:51:46Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
|
@ -381,7 +381,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T06:38:15Z",
|
||||
"updated_at": "2022-11-23T12:24:16Z",
|
||||
"updated_at": "2023-03-31T13:36:32Z",
|
||||
"pushed_at": "2019-03-18T01:20:52Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2023-03-31T03:58:11Z",
|
||||
"updated_at": "2023-03-31T14:37:30Z",
|
||||
"pushed_at": "2023-02-16T02:07:09Z",
|
||||
"stargazers_count": 1566,
|
||||
"watchers_count": 1566,
|
||||
"stargazers_count": 1567,
|
||||
"watchers_count": 1567,
|
||||
"has_discussions": false,
|
||||
"forks_count": 354,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 354,
|
||||
"watchers": 1566,
|
||||
"watchers": 1567,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -455,10 +455,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-03-27T14:36:00Z",
|
||||
"updated_at": "2023-03-31T13:23:35Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 866,
|
||||
"watchers_count": 866,
|
||||
"stargazers_count": 867,
|
||||
"watchers_count": 867,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
|
@ -467,7 +467,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 866,
|
||||
"watchers": 867,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"forks": 25,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -138,7 +138,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2023-03-10T12:09:42Z",
|
||||
"updated_at": "2023-03-31T15:04:12Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
|
|
|
@ -1510,7 +1510,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2022-11-09T18:14:42Z",
|
||||
"pushed_at": "2022-11-10T15:43:50Z",
|
||||
"pushed_at": "2023-03-31T15:18:41Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
@ -10446,10 +10446,10 @@
|
|||
"description": "Log4jshell - CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-07T09:56:30Z",
|
||||
"updated_at": "2022-01-12T06:44:17Z",
|
||||
"updated_at": "2023-03-31T16:40:36Z",
|
||||
"pushed_at": "2022-07-26T05:17:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -10458,7 +10458,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-03-30T06:44:52Z",
|
||||
"updated_at": "2023-03-31T15:33:02Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 951,
|
||||
"watchers_count": 951,
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"has_discussions": true,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 951,
|
||||
"watchers": 952,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T17:52:26Z",
|
||||
"updated_at": "2023-03-20T08:12:45Z",
|
||||
"updated_at": "2023-03-31T13:27:05Z",
|
||||
"pushed_at": "2022-12-26T09:49:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,10 +46,10 @@
|
|||
"description": "POC of CVE-2022-36537",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T14:15:52Z",
|
||||
"updated_at": "2023-03-10T09:22:35Z",
|
||||
"updated_at": "2023-03-31T18:07:43Z",
|
||||
"pushed_at": "2022-12-11T13:13:21Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -329,5 +329,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 621899889,
|
||||
"name": "CVE-2022-46169_poc",
|
||||
"full_name": "devAL3X\/CVE-2022-46169_poc",
|
||||
"owner": {
|
||||
"login": "devAL3X",
|
||||
"id": 40294005,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4",
|
||||
"html_url": "https:\/\/github.com\/devAL3X"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-31T16:21:20Z",
|
||||
"updated_at": "2023-03-31T16:21:28Z",
|
||||
"pushed_at": "2023-03-31T16:21:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -81,10 +81,10 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T06:11:40Z",
|
||||
"updated_at": "2023-03-24T10:19:27Z",
|
||||
"updated_at": "2023-03-31T18:07:39Z",
|
||||
"pushed_at": "2023-02-13T09:03:19Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -102,7 +102,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -108,10 +108,10 @@
|
|||
"description": "Windows_AFD_LPE_CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-13T20:32:50Z",
|
||||
"updated_at": "2023-03-24T10:19:25Z",
|
||||
"updated_at": "2023-03-31T18:07:38Z",
|
||||
"pushed_at": "2023-03-13T21:16:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-03-31T11:15:50Z",
|
||||
"updated_at": "2023-03-31T14:04:57Z",
|
||||
"pushed_at": "2023-03-03T03:30:04Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"has_discussions": false,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -371,10 +371,10 @@
|
|||
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T16:31:54Z",
|
||||
"updated_at": "2023-03-31T09:49:07Z",
|
||||
"updated_at": "2023-03-31T13:11:11Z",
|
||||
"pushed_at": "2023-03-24T10:46:38Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -385,7 +385,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-15T15:52:20Z",
|
||||
"updated_at": "2023-03-21T18:42:21Z",
|
||||
"pushed_at": "2023-03-15T16:31:11Z",
|
||||
"pushed_at": "2023-03-31T16:44:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -233,5 +233,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 621829474,
|
||||
"name": "MinIO_CVE-2023-28432",
|
||||
"full_name": "Majus527\/MinIO_CVE-2023-28432",
|
||||
"owner": {
|
||||
"login": "Majus527",
|
||||
"id": 98865436,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98865436?v=4",
|
||||
"html_url": "https:\/\/github.com\/Majus527"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Majus527\/MinIO_CVE-2023-28432",
|
||||
"description": "minio敏感信息泄露",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-31T13:29:36Z",
|
||||
"updated_at": "2023-03-31T14:09:52Z",
|
||||
"pushed_at": "2023-03-31T14:06:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-27T08:53:04Z",
|
||||
"updated_at": "2023-03-31T12:33:57Z",
|
||||
"updated_at": "2023-03-31T17:32:05Z",
|
||||
"pushed_at": "2023-03-27T09:03:56Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 139,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -595,6 +595,7 @@ Minio is a Multi-Cloud Object Storage framework. In a cluster deployment startin
|
|||
- [steponeerror/Cve-2023-28432-](https://github.com/steponeerror/Cve-2023-28432-)
|
||||
- [yuyongxr/minio_cve-2023-28432](https://github.com/yuyongxr/minio_cve-2023-28432)
|
||||
- [Cuerz/CVE-2023-28432](https://github.com/Cuerz/CVE-2023-28432)
|
||||
- [Majus527/MinIO_CVE-2023-28432](https://github.com/Majus527/MinIO_CVE-2023-28432)
|
||||
|
||||
### CVE-2023-28434 (2023-03-22)
|
||||
|
||||
|
@ -6573,6 +6574,7 @@ Cacti is an open source platform which provides a robust and extensible operatio
|
|||
- [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169)
|
||||
- [ariyaadinatha/cacti-cve-2022-46169-exploit](https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit)
|
||||
- [doosec101/CVE-2022-46169](https://github.com/doosec101/CVE-2022-46169)
|
||||
- [devAL3X/CVE-2022-46169_poc](https://github.com/devAL3X/CVE-2022-46169_poc)
|
||||
|
||||
### CVE-2022-46175 (2022-12-23)
|
||||
|
||||
|
|
Loading…
Reference in a new issue