mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/08/27 06:12:14
This commit is contained in:
parent
84aa4853a6
commit
f9386226a2
22 changed files with 96 additions and 96 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2252,
|
||||
"watchers_count": 2252,
|
||||
"forks_count": 481,
|
||||
"forks": 481,
|
||||
"forks_count": 480,
|
||||
"forks": 480,
|
||||
"watchers": 2252,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 18869401,
|
||||
"name": "cve-2014-2734",
|
||||
"full_name": "adrienthebo\/cve-2014-2734",
|
||||
"owner": {
|
||||
"login": "adrienthebo",
|
||||
"id": 172194,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172194?v=4",
|
||||
"html_url": "https:\/\/github.com\/adrienthebo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adrienthebo\/cve-2014-2734",
|
||||
"description": "I think this CVE is full of lies and deceit and very confusing code.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-17T06:51:01Z",
|
||||
"updated_at": "2018-04-13T22:09:15Z",
|
||||
"pushed_at": "2014-04-17T07:07:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 400256321,
|
||||
"name": "openssh_dos",
|
||||
"full_name": "jptr218\/openssh_dos",
|
||||
"owner": {
|
||||
"login": "jptr218",
|
||||
"id": 84092766,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
|
||||
"html_url": "https:\/\/github.com\/jptr218"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jptr218\/openssh_dos",
|
||||
"description": "A proof of concept for CVE-2016-6515",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-26T17:44:03Z",
|
||||
"updated_at": "2021-08-26T17:53:57Z",
|
||||
"pushed_at": "2021-08-26T17:51:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2017-03-13T15:03:32Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2021-01-19T07:17:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-16T14:32:03Z",
|
||||
"updated_at": "2021-05-17T20:32:15Z",
|
||||
"updated_at": "2021-08-26T19:16:33Z",
|
||||
"pushed_at": "2019-04-17T02:42:03Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-11223 - Arbitrary File Upload in Wordpress Support Candy Plugin Version 2.0 Below",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-17T17:43:46Z",
|
||||
"updated_at": "2019-04-19T16:43:54Z",
|
||||
"updated_at": "2021-08-26T19:53:36Z",
|
||||
"pushed_at": "2019-04-19T04:32:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-08-25T12:36:26Z",
|
||||
"updated_at": "2021-08-26T20:48:52Z",
|
||||
"pushed_at": "2021-08-16T18:16:20Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-08-26T01:32:42Z",
|
||||
"updated_at": "2021-08-26T20:25:26Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 847,
|
||||
"watchers_count": 847,
|
||||
"stargazers_count": 848,
|
||||
"watchers_count": 848,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 847,
|
||||
"watchers": 848,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2021-08-26T02:09:49Z",
|
||||
"updated_at": "2021-08-26T19:32:23Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 233,
|
||||
"watchers": 234,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T03:25:00Z",
|
||||
"updated_at": "2021-08-10T19:21:20Z",
|
||||
"pushed_at": "2021-08-19T08:38:55Z",
|
||||
"updated_at": "2021-08-26T18:17:21Z",
|
||||
"pushed_at": "2021-08-26T18:17:17Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "my exp for CVE-2020-27194, tested on linux kernel 5.8.14.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T11:58:34Z",
|
||||
"updated_at": "2021-08-24T15:39:23Z",
|
||||
"updated_at": "2021-08-26T15:50:04Z",
|
||||
"pushed_at": "2021-02-03T04:57:56Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-08-25T12:36:26Z",
|
||||
"updated_at": "2021-08-26T20:48:52Z",
|
||||
"pushed_at": "2021-08-16T18:16:20Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-08-24T09:52:31Z",
|
||||
"updated_at": "2021-08-26T18:01:20Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 242,
|
||||
"watchers": 243,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T11:03:13Z",
|
||||
"updated_at": "2021-08-17T13:47:57Z",
|
||||
"updated_at": "2021-08-26T18:00:42Z",
|
||||
"pushed_at": "2021-06-07T04:00:06Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2021-08-26T09:49:54Z",
|
||||
"updated_at": "2021-08-26T15:39:01Z",
|
||||
"pushed_at": "2021-07-09T04:39:57Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-08-26T10:06:04Z",
|
||||
"updated_at": "2021-08-26T19:32:22Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
"forks_count": 216,
|
||||
"forks": 216,
|
||||
"watchers": 752,
|
||||
"watchers": 753,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-12T17:09:48Z",
|
||||
"updated_at": "2021-06-25T01:59:11Z",
|
||||
"updated_at": "2021-08-26T15:32:01Z",
|
||||
"pushed_at": "2021-06-12T17:17:41Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T06:55:52Z",
|
||||
"updated_at": "2021-08-23T18:16:17Z",
|
||||
"updated_at": "2021-08-26T18:00:28Z",
|
||||
"pushed_at": "2021-06-10T10:31:30Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2021-08-23T17:56:50Z",
|
||||
"updated_at": "2021-08-26T15:51:01Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-07-01T03:56:55Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-24T06:15:20Z",
|
||||
"updated_at": "2021-08-26T15:11:29Z",
|
||||
"updated_at": "2021-08-26T15:30:23Z",
|
||||
"pushed_at": "2021-08-25T02:00:12Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -16656,6 +16656,7 @@ The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does n
|
|||
|
||||
- [opsxcq/exploit-CVE-2016-6515](https://github.com/opsxcq/exploit-CVE-2016-6515)
|
||||
- [cved-sources/cve-2016-6515](https://github.com/cved-sources/cve-2016-6515)
|
||||
- [jptr218/openssh_dos](https://github.com/jptr218/openssh_dos)
|
||||
|
||||
### CVE-2016-6516 (2016-08-06)
|
||||
|
||||
|
@ -18186,7 +18187,6 @@ Unspecified vulnerability in HP Operations Agent 11.00, when Glance is used, all
|
|||
</code>
|
||||
|
||||
- [gdisneyleugers/CVE-2014-2734](https://github.com/gdisneyleugers/CVE-2014-2734)
|
||||
- [adrienthebo/cve-2014-2734](https://github.com/adrienthebo/cve-2014-2734)
|
||||
|
||||
### CVE-2014-3120 (2014-07-28)
|
||||
|
||||
|
|
Loading…
Reference in a new issue