mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/01 12:33:11
This commit is contained in:
parent
90fa3aa746
commit
d0be535bd4
22 changed files with 85 additions and 85 deletions
|
@ -14,10 +14,10 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2024-11-20T14:42:25Z",
|
||||
"updated_at": "2024-12-01T10:53:20Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2306,
|
||||
"watchers_count": 2306,
|
||||
"stargazers_count": 2305,
|
||||
"watchers_count": 2305,
|
||||
"has_discussions": false,
|
||||
"forks_count": 461,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 461,
|
||||
"watchers": 2306,
|
||||
"watchers": 2305,
|
||||
"score": 0,
|
||||
"subscribers_count": 117
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2024-10-25T14:40:51Z",
|
||||
"updated_at": "2024-12-01T09:58:27Z",
|
||||
"pushed_at": "2023-12-04T15:47:16Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -107,10 +107,10 @@
|
|||
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T16:08:35Z",
|
||||
"updated_at": "2024-11-06T01:07:04Z",
|
||||
"updated_at": "2024-12-01T09:54:11Z",
|
||||
"pushed_at": "2021-01-29T16:22:39Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-08T15:52:50Z",
|
||||
"updated_at": "2024-11-26T06:19:44Z",
|
||||
"updated_at": "2024-12-01T11:41:55Z",
|
||||
"pushed_at": "2018-11-23T11:47:10Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -469,10 +469,10 @@
|
|||
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-13T10:09:31Z",
|
||||
"updated_at": "2024-08-25T14:56:02Z",
|
||||
"updated_at": "2024-12-01T11:41:59Z",
|
||||
"pushed_at": "2020-01-15T13:58:22Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -481,7 +481,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T03:01:57Z",
|
||||
"updated_at": "2022-01-29T03:40:25Z",
|
||||
"updated_at": "2024-12-01T06:24:32Z",
|
||||
"pushed_at": "2020-06-23T03:05:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2024-11-29T11:43:34Z",
|
||||
"updated_at": "2024-12-01T09:49:19Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -7299,10 +7299,10 @@
|
|||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2024-11-29T22:57:02Z",
|
||||
"updated_at": "2024-12-01T11:52:36Z",
|
||||
"pushed_at": "2024-11-29T22:56:57Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": true,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -7311,7 +7311,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2024-11-24T13:54:06Z",
|
||||
"updated_at": "2024-12-01T07:51:20Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -2,15 +2,15 @@
|
|||
{
|
||||
"id": 622192084,
|
||||
"name": "CVE-2022-3552",
|
||||
"full_name": "kabir0x23\/CVE-2022-3552",
|
||||
"full_name": "0xk4b1r\/CVE-2022-3552",
|
||||
"owner": {
|
||||
"login": "kabir0x23",
|
||||
"login": "0xk4b1r",
|
||||
"id": 44284877,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44284877?v=4",
|
||||
"html_url": "https:\/\/github.com\/kabir0x23",
|
||||
"html_url": "https:\/\/github.com\/0xk4b1r",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kabir0x23\/CVE-2022-3552",
|
||||
"html_url": "https:\/\/github.com\/0xk4b1r\/CVE-2022-3552",
|
||||
"description": "BoxBilling<=4.22.1.5 - Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-01T11:53:14Z",
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-25T07:54:39Z",
|
||||
"updated_at": "2024-11-26T10:43:39Z",
|
||||
"updated_at": "2024-12-01T07:02:11Z",
|
||||
"pushed_at": "2023-10-25T08:11:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"forks": 44,
|
||||
"watchers": 228,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -184,13 +184,13 @@
|
|||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"forks": 63,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
@ -739,10 +739,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-14T22:02:55Z",
|
||||
"updated_at": "2023-08-06T00:14:02Z",
|
||||
"updated_at": "2024-12-01T08:06:36Z",
|
||||
"pushed_at": "2023-07-15T11:21:52Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -751,7 +751,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -266,10 +266,10 @@
|
|||
"description": "A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-15T16:30:51Z",
|
||||
"updated_at": "2024-08-03T02:01:59Z",
|
||||
"updated_at": "2024-12-01T08:49:57Z",
|
||||
"pushed_at": "2024-05-17T23:51:11Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -282,7 +282,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -424,10 +424,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-29T06:31:17Z",
|
||||
"updated_at": "2024-06-29T07:26:05Z",
|
||||
"updated_at": "2024-12-01T09:17:24Z",
|
||||
"pushed_at": "2024-06-29T07:26:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -436,7 +436,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2024-11-15T16:49:55Z",
|
||||
"updated_at": "2024-12-01T08:23:26Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 779,
|
||||
"watchers_count": 779,
|
||||
"stargazers_count": 780,
|
||||
"watchers_count": 780,
|
||||
"has_discussions": false,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 779,
|
||||
"watchers": 780,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -231,8 +231,8 @@
|
|||
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-30T16:06:02Z",
|
||||
"updated_at": "2024-11-30T17:57:25Z",
|
||||
"pushed_at": "2024-11-30T17:57:21Z",
|
||||
"updated_at": "2024-12-01T11:24:41Z",
|
||||
"pushed_at": "2024-12-01T11:24:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T06:13:36Z",
|
||||
"updated_at": "2024-12-01T03:15:26Z",
|
||||
"updated_at": "2024-12-01T08:35:41Z",
|
||||
"pushed_at": "2024-11-29T21:02:56Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-01T09:28:08Z",
|
||||
"updated_at": "2024-11-11T13:03:49Z",
|
||||
"updated_at": "2024-12-01T08:46:11Z",
|
||||
"pushed_at": "2024-03-01T09:46:56Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -168,7 +168,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "A PoC exploit for CVE-2024-3273 - D-Link Remote Code Execution RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-09T12:26:37Z",
|
||||
"updated_at": "2024-10-17T13:18:40Z",
|
||||
"updated_at": "2024-12-01T08:51:48Z",
|
||||
"pushed_at": "2024-04-09T12:51:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -641,10 +641,10 @@
|
|||
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-09T23:32:11Z",
|
||||
"updated_at": "2024-11-20T16:30:49Z",
|
||||
"updated_at": "2024-12-01T08:47:11Z",
|
||||
"pushed_at": "2024-07-12T02:56:25Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -667,7 +667,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -16460,7 +16460,7 @@
|
|||
<code>Unrestricted Upload of File with Dangerous Type in GitHub repository boxbilling/boxbilling prior to 0.0.1.
|
||||
</code>
|
||||
|
||||
- [kabir0x23/CVE-2022-3552](https://github.com/kabir0x23/CVE-2022-3552)
|
||||
- [0xk4b1r/CVE-2022-3552](https://github.com/0xk4b1r/CVE-2022-3552)
|
||||
|
||||
### CVE-2022-3564 (2022-10-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue