mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/08/25 00:29:15
This commit is contained in:
parent
0798e7e3c1
commit
f0849bd428
23 changed files with 162 additions and 64 deletions
|
@ -73,10 +73,10 @@
|
|||
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-25T16:31:16Z",
|
||||
"updated_at": "2023-12-26T11:40:49Z",
|
||||
"updated_at": "2024-08-24T19:27:12Z",
|
||||
"pushed_at": "2019-10-22T20:04:08Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -96,7 +96,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 66,
|
||||
"watchers": 401,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 271296526,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-08-12T20:05:34Z",
|
||||
"updated_at": "2024-08-24T21:16:08Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"stargazers_count": 1715,
|
||||
"watchers_count": 1715,
|
||||
"has_discussions": false,
|
||||
"forks_count": 357,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 357,
|
||||
"watchers": 1714,
|
||||
"watchers": 1715,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"forks": 1088,
|
||||
"watchers": 4091,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
"subscribers_count": 149
|
||||
},
|
||||
{
|
||||
"id": 307998445,
|
||||
|
|
|
@ -138,7 +138,7 @@
|
|||
"forks": 80,
|
||||
"watchers": 333,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 264347023,
|
||||
|
|
|
@ -460,6 +460,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2024-07-16T19:17:16Z",
|
||||
"updated_at": "2024-08-24T22:50:22Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 205,
|
||||
"watchers": 206,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -261,10 +261,10 @@
|
|||
"description": "PoC for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T02:02:25Z",
|
||||
"updated_at": "2024-08-12T20:20:05Z",
|
||||
"updated_at": "2024-08-24T23:44:02Z",
|
||||
"pushed_at": "2022-01-26T02:27:53Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -273,7 +273,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2024-08-12T20:20:06Z",
|
||||
"updated_at": "2024-08-24T18:49:47Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 459,
|
||||
"watchers": 458,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T14:28:13Z",
|
||||
"updated_at": "2024-08-15T20:53:49Z",
|
||||
"updated_at": "2024-08-24T19:18:01Z",
|
||||
"pushed_at": "2024-07-01T22:13:19Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -179,6 +179,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 642105586,
|
||||
"name": "CVE-2023-29489",
|
||||
"full_name": "0-d3y\/CVE-2023-29489",
|
||||
"owner": {
|
||||
"login": "0-d3y",
|
||||
"id": 103077384,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103077384?v=4",
|
||||
"html_url": "https:\/\/github.com\/0-d3y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0-d3y\/CVE-2023-29489",
|
||||
"description": "Mass Scaning vulnerability in Cpanel [XSS] ",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-17T20:46:59Z",
|
||||
"updated_at": "2024-08-25T00:11:01Z",
|
||||
"pushed_at": "2024-08-25T00:10:58Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 648330999,
|
||||
"name": "CVE-2023-29489",
|
||||
|
|
|
@ -88,5 +88,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 847072591,
|
||||
"name": "CVE-2023-50564-pluck",
|
||||
"full_name": "thefizzyfish\/CVE-2023-50564-pluck",
|
||||
"owner": {
|
||||
"login": "thefizzyfish",
|
||||
"id": 94797978,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94797978?v=4",
|
||||
"html_url": "https:\/\/github.com\/thefizzyfish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thefizzyfish\/CVE-2023-50564-pluck",
|
||||
"description": "CVE-2023-50564 - An arbitrary file upload vulnerability in the component \/inc\/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T19:09:21Z",
|
||||
"updated_at": "2024-08-24T19:22:05Z",
|
||||
"pushed_at": "2024-08-24T19:22:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2023-6319 proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-11T18:58:17Z",
|
||||
"updated_at": "2024-08-13T18:01:09Z",
|
||||
"updated_at": "2024-08-24T19:00:40Z",
|
||||
"pushed_at": "2024-08-09T18:16:49Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
|
@ -22,7 +22,12 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2023-6319",
|
||||
"exploit",
|
||||
"tv",
|
||||
"webos"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 31,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-08-24T12:51:34Z",
|
||||
"updated_at": "2024-08-24T22:52:33Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2221,
|
||||
"watchers_count": 2221,
|
||||
"stargazers_count": 2222,
|
||||
"watchers_count": 2222,
|
||||
"has_discussions": false,
|
||||
"forks_count": 290,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 290,
|
||||
"watchers": 2221,
|
||||
"watchers": 2222,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0Day CVE-2024-28000 Auto Exploiter on WordPress LiteSpeed Cache plugin",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T13:28:32Z",
|
||||
"updated_at": "2024-08-24T11:24:27Z",
|
||||
"updated_at": "2024-08-24T20:26:32Z",
|
||||
"pushed_at": "2024-08-24T11:24:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -52,19 +52,19 @@
|
|||
"description": "LiteSpeed Cache Privilege Escalation PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T05:12:56Z",
|
||||
"updated_at": "2024-08-24T10:58:50Z",
|
||||
"updated_at": "2024-08-24T20:51:59Z",
|
||||
"pushed_at": "2024-08-24T09:38:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-15T08:07:05Z",
|
||||
"updated_at": "2024-08-24T15:13:19Z",
|
||||
"updated_at": "2024-08-25T00:06:34Z",
|
||||
"pushed_at": "2024-08-19T15:29:58Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 304,
|
||||
"watchers": 305,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-3183 (FreeIPA Rosting)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-14T14:24:58Z",
|
||||
"updated_at": "2024-08-22T19:25:13Z",
|
||||
"updated_at": "2024-08-24T21:17:38Z",
|
||||
"pushed_at": "2024-08-20T14:16:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -241,5 +241,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 847061153,
|
||||
"name": "CVE-2024-38063",
|
||||
"full_name": "ynwarcs\/CVE-2024-38063",
|
||||
"owner": {
|
||||
"login": "ynwarcs",
|
||||
"id": 108408574,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108408574?v=4",
|
||||
"html_url": "https:\/\/github.com\/ynwarcs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ynwarcs\/CVE-2024-38063",
|
||||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-08-24T19:15:33Z",
|
||||
"pushed_at": "2024-08-24T19:13:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,8 +43,8 @@
|
|||
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T14:39:31Z",
|
||||
"updated_at": "2024-08-23T14:40:14Z",
|
||||
"pushed_at": "2024-08-23T14:40:11Z",
|
||||
"updated_at": "2024-08-24T22:42:44Z",
|
||||
"pushed_at": "2024-08-24T22:42:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
"rce-scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -260,10 +260,10 @@
|
|||
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-01T20:33:20Z",
|
||||
"updated_at": "2024-08-21T20:10:57Z",
|
||||
"updated_at": "2024-08-24T20:03:21Z",
|
||||
"pushed_at": "2024-07-14T09:58:48Z",
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 430,
|
||||
"watchers": 429,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Will attempt to retrieve DB details for FastAdmin instances",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-20T03:09:47Z",
|
||||
"updated_at": "2024-08-24T17:03:07Z",
|
||||
"updated_at": "2024-08-24T21:48:51Z",
|
||||
"pushed_at": "2024-08-20T03:21:56Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -3942,6 +3942,7 @@
|
|||
- [almogopp/Disable-IPv6-CVE-2024-38063-Fix](https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix)
|
||||
- [Th3Tr1ckst3r/CVE-2024-38063](https://github.com/Th3Tr1ckst3r/CVE-2024-38063)
|
||||
- [haroonawanofficial/CVE-2024-38063-Research-Tool](https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool)
|
||||
- [ynwarcs/CVE-2024-38063](https://github.com/ynwarcs/CVE-2024-38063)
|
||||
|
||||
### CVE-2024-38077 (2024-07-09)
|
||||
|
||||
|
@ -7700,6 +7701,7 @@
|
|||
- [Mostafa-Elguerdawi/CVE-2023-29489.yaml](https://github.com/Mostafa-Elguerdawi/CVE-2023-29489.yaml)
|
||||
- [Mostafa-Elguerdawi/CVE-2023-29489](https://github.com/Mostafa-Elguerdawi/CVE-2023-29489)
|
||||
- [whalebone7/EagleEye](https://github.com/whalebone7/EagleEye)
|
||||
- [0-d3y/CVE-2023-29489](https://github.com/0-d3y/CVE-2023-29489)
|
||||
- [Abdullah7-ma/CVE-2023-29489](https://github.com/Abdullah7-ma/CVE-2023-29489)
|
||||
- [tucommenceapousser/CVE-2023-29489](https://github.com/tucommenceapousser/CVE-2023-29489)
|
||||
- [tucommenceapousser/CVE-2023-29489.py](https://github.com/tucommenceapousser/CVE-2023-29489.py)
|
||||
|
@ -12278,6 +12280,7 @@
|
|||
- [Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC](https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC)
|
||||
- [ipuig/CVE-2023-50564](https://github.com/ipuig/CVE-2023-50564)
|
||||
- [rwexecute/CVE-2023-50564](https://github.com/rwexecute/CVE-2023-50564)
|
||||
- [thefizzyfish/CVE-2023-50564-pluck](https://github.com/thefizzyfish/CVE-2023-50564-pluck)
|
||||
|
||||
### CVE-2023-50596
|
||||
- [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)
|
||||
|
|
Loading…
Reference in a new issue