mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2023/05/31 00:28:39
This commit is contained in:
parent
3f5d18e657
commit
ef50ded99b
17 changed files with 104 additions and 139 deletions
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 178656447,
|
||||
"name": "eps-CVE-2017-0261",
|
||||
"full_name": "kcufId\/eps-CVE-2017-0261",
|
||||
"owner": {
|
||||
"login": "kcufId",
|
||||
"id": 10615265,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10615265?v=4",
|
||||
"html_url": "https:\/\/github.com\/kcufId"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kcufId\/eps-CVE-2017-0261",
|
||||
"description": "eps漏洞(CVE-2017-0261)漏洞分析",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-31T07:29:48Z",
|
||||
"updated_at": "2021-07-01T06:42:07Z",
|
||||
"pushed_at": "2019-03-31T07:39:37Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 289408689,
|
||||
"name": "CVE-2017-0261",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 164232365,
|
||||
"name": "5MMISSI-CVE-2017-1000499",
|
||||
"full_name": "Villaquiranm\/5MMISSI-CVE-2017-1000499",
|
||||
"owner": {
|
||||
"login": "Villaquiranm",
|
||||
"id": 22179290,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22179290?v=4",
|
||||
"html_url": "https:\/\/github.com\/Villaquiranm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Villaquiranm\/5MMISSI-CVE-2017-1000499",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-01-05T16:33:08Z",
|
||||
"updated_at": "2019-01-13T11:38:09Z",
|
||||
"pushed_at": "2019-01-13T11:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-30T09:55:55Z",
|
||||
"updated_at": "2023-03-10T10:21:56Z",
|
||||
"updated_at": "2023-05-30T22:35:03Z",
|
||||
"pushed_at": "2020-04-20T10:12:11Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 110,
|
||||
"forks": 32,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -268,35 +268,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 233294562,
|
||||
"name": "Exploits_CVE-2019-19781",
|
||||
"full_name": "unknowndevice64\/Exploits_CVE-2019-19781",
|
||||
"owner": {
|
||||
"login": "unknowndevice64",
|
||||
"id": 23033569,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23033569?v=4",
|
||||
"html_url": "https:\/\/github.com\/unknowndevice64"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/unknowndevice64\/Exploits_CVE-2019-19781",
|
||||
"description": "All Working Exploits",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T20:43:09Z",
|
||||
"updated_at": "2021-04-19T06:52:48Z",
|
||||
"pushed_at": "2020-01-11T22:09:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 233412280,
|
||||
"name": "citrixmash_scanner",
|
||||
|
|
|
@ -580,8 +580,8 @@
|
|||
"description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T18:26:48Z",
|
||||
"updated_at": "2021-12-05T20:32:40Z",
|
||||
"pushed_at": "2020-01-28T10:11:44Z",
|
||||
"updated_at": "2023-05-30T20:05:30Z",
|
||||
"pushed_at": "2023-05-30T20:05:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -2433,13 +2433,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -953,13 +953,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"has_discussions": false,
|
||||
"forks_count": 128,
|
||||
"forks_count": 127,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 128,
|
||||
"forks": 127,
|
||||
"watchers": 342,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,10 +105,10 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2023-05-27T08:18:54Z",
|
||||
"updated_at": "2023-05-30T18:58:24Z",
|
||||
"pushed_at": "2022-01-13T12:35:19Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-05-27T08:19:10Z",
|
||||
"updated_at": "2023-05-30T19:05:16Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T18:26:10Z",
|
||||
"updated_at": "2023-05-29T22:51:17Z",
|
||||
"updated_at": "2023-05-30T23:12:09Z",
|
||||
"pushed_at": "2023-04-07T20:09:28Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-25T13:25:10Z",
|
||||
"updated_at": "2023-05-30T15:38:58Z",
|
||||
"updated_at": "2023-05-30T19:40:20Z",
|
||||
"pushed_at": "2023-05-28T00:28:52Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-05-30T11:04:15Z",
|
||||
"updated_at": "2023-05-30T20:21:54Z",
|
||||
"pushed_at": "2023-05-27T12:32:24Z",
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 439,
|
||||
"watchers": 441,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T02:18:29Z",
|
||||
"updated_at": "2023-05-30T16:00:23Z",
|
||||
"updated_at": "2023-05-30T22:03:33Z",
|
||||
"pushed_at": "2023-05-30T02:43:06Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
60
2023/CVE-2023-33733.json
Normal file
60
2023/CVE-2023-33733.json
Normal file
|
@ -0,0 +1,60 @@
|
|||
[
|
||||
{
|
||||
"id": 647418660,
|
||||
"name": "CVE-2023-33733",
|
||||
"full_name": "sahiloj\/CVE-2023-33733",
|
||||
"owner": {
|
||||
"login": "sahiloj",
|
||||
"id": 59600077,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59600077?v=4",
|
||||
"html_url": "https:\/\/github.com\/sahiloj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sahiloj\/CVE-2023-33733",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T18:36:03Z",
|
||||
"updated_at": "2023-05-30T18:48:19Z",
|
||||
"pushed_at": "2023-05-30T18:48:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 647486953,
|
||||
"name": "CVE-2023-33733",
|
||||
"full_name": "c53elyas\/CVE-2023-33733",
|
||||
"owner": {
|
||||
"login": "c53elyas",
|
||||
"id": 127761067,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127761067?v=4",
|
||||
"html_url": "https:\/\/github.com\/c53elyas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c53elyas\/CVE-2023-33733",
|
||||
"description": "CVE-2023-33733 reportlab RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-30T22:22:50Z",
|
||||
"updated_at": "2023-05-30T22:23:01Z",
|
||||
"pushed_at": "2023-05-30T22:22:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
14
README.md
14
README.md
|
@ -1483,6 +1483,10 @@ An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2
|
|||
### CVE-2023-33731
|
||||
- [sahiloj/CVE-2023-33731](https://github.com/sahiloj/CVE-2023-33731)
|
||||
|
||||
### CVE-2023-33733
|
||||
- [sahiloj/CVE-2023-33733](https://github.com/sahiloj/CVE-2023-33733)
|
||||
- [c53elyas/CVE-2023-33733](https://github.com/c53elyas/CVE-2023-33733)
|
||||
|
||||
### CVE-2023-33829 (2023-05-24)
|
||||
|
||||
<code>
|
||||
|
@ -24208,7 +24212,6 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
|
|||
- [mpgn/CVE-2019-19781](https://github.com/mpgn/CVE-2019-19781)
|
||||
- [oways/CVE-2019-19781](https://github.com/oways/CVE-2019-19781)
|
||||
- [becrevex/Citrix_CVE-2019-19781](https://github.com/becrevex/Citrix_CVE-2019-19781)
|
||||
- [unknowndevice64/Exploits_CVE-2019-19781](https://github.com/unknowndevice64/Exploits_CVE-2019-19781)
|
||||
- [x1sec/citrixmash_scanner](https://github.com/x1sec/citrixmash_scanner)
|
||||
- [jamesjguthrie/Shitrix-CVE-2019-19781](https://github.com/jamesjguthrie/Shitrix-CVE-2019-19781)
|
||||
- [x1sec/CVE-2019-19781](https://github.com/x1sec/CVE-2019-19781)
|
||||
|
@ -28029,7 +28032,6 @@ Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow
|
|||
Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281.
|
||||
</code>
|
||||
|
||||
- [kcufId/eps-CVE-2017-0261](https://github.com/kcufId/eps-CVE-2017-0261)
|
||||
- [erfze/CVE-2017-0261](https://github.com/erfze/CVE-2017-0261)
|
||||
|
||||
### CVE-2017-0263 (2017-05-12)
|
||||
|
@ -30148,14 +30150,6 @@ Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in rem
|
|||
- [cved-sources/cve-2017-1000486](https://github.com/cved-sources/cve-2017-1000486)
|
||||
- [Pastea/CVE-2017-1000486](https://github.com/Pastea/CVE-2017-1000486)
|
||||
|
||||
### CVE-2017-1000499 (2018-01-03)
|
||||
|
||||
<code>
|
||||
phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.
|
||||
</code>
|
||||
|
||||
- [Villaquiranm/5MMISSI-CVE-2017-1000499](https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499)
|
||||
|
||||
### CVE-2017-1002101 (2018-03-13)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue