mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/11/04 12:25:10
This commit is contained in:
parent
b0f9273917
commit
cc4f4c628d
18 changed files with 1060 additions and 955 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2023-11-03T11:10:37Z",
|
||||
"updated_at": "2023-11-04T10:45:18Z",
|
||||
"pushed_at": "2023-01-22T09:39:45Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"has_discussions": false,
|
||||
"forks_count": 119,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 119,
|
||||
"watchers": 372,
|
||||
"watchers": 373,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2023-10-23T21:45:09Z",
|
||||
"updated_at": "2023-11-04T08:26:25Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2023-11-03T10:55:17Z",
|
||||
"updated_at": "2023-11-04T11:02:50Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"stargazers_count": 1089,
|
||||
"watchers_count": 1089,
|
||||
"has_discussions": false,
|
||||
"forks_count": 284,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 284,
|
||||
"watchers": 1088,
|
||||
"watchers": 1089,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -191,35 +191,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 492747547,
|
||||
"name": "CVE-2021-21315-ENV",
|
||||
"full_name": "H3rmesk1t\/CVE-2021-21315-ENV",
|
||||
"owner": {
|
||||
"login": "H3rmesk1t",
|
||||
"id": 70096788,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70096788?v=4",
|
||||
"html_url": "https:\/\/github.com\/H3rmesk1t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H3rmesk1t\/CVE-2021-21315-ENV",
|
||||
"description": "CVE-2021-21315-ENV",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-16T08:30:31Z",
|
||||
"updated_at": "2023-02-27T00:46:07Z",
|
||||
"pushed_at": "2022-05-16T08:31:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2021/CVE-2021-21716.json
Normal file
32
2021/CVE-2021-21716.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 714215346,
|
||||
"name": "CVE-2023-21716-EXPLOIT.py",
|
||||
"full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py",
|
||||
"owner": {
|
||||
"login": "MojithaR",
|
||||
"id": 127576267,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
|
||||
"html_url": "https:\/\/github.com\/MojithaR"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py",
|
||||
"description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-04T08:49:14Z",
|
||||
"updated_at": "2023-11-04T08:52:03Z",
|
||||
"pushed_at": "2023-11-04T08:52:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2021/CVE-2021-36393.json
Normal file
32
2021/CVE-2021-36393.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 714260511,
|
||||
"name": "CVE-2021-36393-Exploit",
|
||||
"full_name": "T0X1Cx\/CVE-2021-36393-Exploit",
|
||||
"owner": {
|
||||
"login": "T0X1Cx",
|
||||
"id": 71453093,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71453093?v=4",
|
||||
"html_url": "https:\/\/github.com\/T0X1Cx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/T0X1Cx\/CVE-2021-36393-Exploit",
|
||||
"description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-04T11:45:55Z",
|
||||
"updated_at": "2023-11-04T11:46:56Z",
|
||||
"pushed_at": "2023-11-04T11:52:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2023-10-08T08:18:58Z",
|
||||
"updated_at": "2023-11-04T06:56:49Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 492,
|
||||
"watchers_count": 492,
|
||||
"stargazers_count": 491,
|
||||
"watchers_count": 491,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 492,
|
||||
"watchers": 491,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-11-03T07:16:11Z",
|
||||
"updated_at": "2023-11-04T08:26:50Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1061,
|
||||
"watchers_count": 1061,
|
||||
"stargazers_count": 1062,
|
||||
"watchers_count": 1062,
|
||||
"has_discussions": true,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 1061,
|
||||
"watchers": 1062,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Attacks against QUIC (CVE-2022-30591)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T18:25:23Z",
|
||||
"updated_at": "2023-10-01T10:56:27Z",
|
||||
"updated_at": "2023-11-04T08:00:24Z",
|
||||
"pushed_at": "2022-12-31T01:55:15Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-10-28T05:09:56Z",
|
||||
"updated_at": "2023-11-04T09:10:09Z",
|
||||
"pushed_at": "2023-10-14T08:02:40Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": true,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-11-01T12:10:53Z",
|
||||
"updated_at": "2023-11-04T11:32:22Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 845,
|
||||
"watchers_count": 845,
|
||||
|
@ -228,10 +228,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T21:50:25Z",
|
||||
"updated_at": "2023-10-29T10:33:12Z",
|
||||
"updated_at": "2023-11-04T11:32:10Z",
|
||||
"pushed_at": "2023-06-13T08:55:50Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -242,7 +242,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 136,
|
||||
"watchers": 135,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -238,5 +238,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 714215346,
|
||||
"name": "CVE-2023-21716-EXPLOIT.py",
|
||||
"full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py",
|
||||
"owner": {
|
||||
"login": "MojithaR",
|
||||
"id": 127576267,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4",
|
||||
"html_url": "https:\/\/github.com\/MojithaR"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py",
|
||||
"description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-04T08:49:14Z",
|
||||
"updated_at": "2023-11-04T08:52:03Z",
|
||||
"pushed_at": "2023-11-04T08:52:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -424,10 +424,10 @@
|
|||
"description": "CVE-2023-22515",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-30T00:17:45Z",
|
||||
"updated_at": "2023-11-03T17:10:12Z",
|
||||
"updated_at": "2023-11-04T09:30:50Z",
|
||||
"pushed_at": "2023-10-31T09:58:17Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -436,7 +436,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2023-11-04T02:11:15Z",
|
||||
"updated_at": "2023-11-04T12:16:39Z",
|
||||
"pushed_at": "2023-11-03T12:50:06Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -73,7 +73,7 @@
|
|||
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T22:06:09Z",
|
||||
"updated_at": "2023-11-04T04:33:52Z",
|
||||
"updated_at": "2023-11-04T07:15:40Z",
|
||||
"pushed_at": "2023-11-03T22:37:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
@ -88,5 +88,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 714263844,
|
||||
"name": "CVE-2023-46604",
|
||||
"full_name": "evkl1d\/CVE-2023-46604",
|
||||
"owner": {
|
||||
"login": "evkl1d",
|
||||
"id": 113887123,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113887123?v=4",
|
||||
"html_url": "https:\/\/github.com\/evkl1d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evkl1d\/CVE-2023-46604",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-04T11:58:21Z",
|
||||
"updated_at": "2023-11-04T12:00:25Z",
|
||||
"pushed_at": "2023-11-04T12:08:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2023-11-04T01:14:44Z",
|
||||
"updated_at": "2023-11-04T06:43:22Z",
|
||||
"pushed_at": "2023-11-03T11:47:26Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-02T03:15:44Z",
|
||||
"updated_at": "2023-11-02T19:46:52Z",
|
||||
"updated_at": "2023-11-04T08:06:02Z",
|
||||
"pushed_at": "2023-11-02T17:57:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -128,7 +128,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
Loading…
Reference in a new issue