mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-03-19 05:28:46 +01:00
Auto Update 2023/05/12 18:29:11
This commit is contained in:
parent
2ce74a919f
commit
0712bf792f
41 changed files with 219 additions and 180 deletions
2015
2016
2017
2018
CVE-2018-11235.jsonCVE-2018-20555.jsonCVE-2018-20718.jsonCVE-2018-2628.jsonCVE-2018-7600.jsonCVE-2018-8453.json
2019
2020
2021
CVE-2021-20294.jsonCVE-2021-22204.jsonCVE-2021-35587.jsonCVE-2021-41773.jsonCVE-2021-43798.jsonCVE-2021-44228.json
2022
CVE-2022-0543.jsonCVE-2022-1040.jsonCVE-2022-1329.jsonCVE-2022-21661.jsonCVE-2022-25845.jsonCVE-2022-2602.jsonCVE-2022-29464.jsonCVE-2022-31705.jsonCVE-2022-39197.jsonCVE-2022-41040.jsonCVE-2022-42864.jsonCVE-2022-46689.json
2023
CVE-2023-1454.jsonCVE-2023-2123.jsonCVE-2023-21839.jsonCVE-2023-23924.jsonCVE-2023-24055.jsonCVE-2023-27350.json
README.md
|
@ -71,7 +71,7 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-05-09T00:21:20Z",
|
||||
"updated_at": "2023-05-12T17:05:06Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-05-10T07:44:56Z",
|
||||
"updated_at": "2023-05-12T16:11:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1683,
|
||||
"watchers_count": 1683,
|
||||
"stargazers_count": 1684,
|
||||
"watchers_count": 1684,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1683,
|
||||
"watchers": 1684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-05-10T07:44:56Z",
|
||||
"updated_at": "2023-05-12T16:11:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1683,
|
||||
"watchers_count": 1683,
|
||||
"stargazers_count": 1684,
|
||||
"watchers_count": 1684,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1683,
|
||||
"watchers": 1684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -324,6 +324,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 195966434,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "0rx1\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "0rx1",
|
||||
"id": 12779060,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
|
||||
"html_url": "https:\/\/github.com\/0rx1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0rx1\/CVE-2018-11235",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-09T08:28:49Z",
|
||||
"updated_at": "2019-07-09T08:28:49Z",
|
||||
"pushed_at": "2019-07-09T08:28:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218206529,
|
||||
"name": "CVE-2018-11235-test",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-16T14:45:44Z",
|
||||
"updated_at": "2023-05-03T00:30:29Z",
|
||||
"updated_at": "2023-05-12T16:53:37Z",
|
||||
"pushed_at": "2020-10-20T14:30:01Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 78,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2018/CVE-2018-20718.json
Normal file
31
2018/CVE-2018-20718.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 196255066,
|
||||
"name": "CVE-2018-20718",
|
||||
"full_name": "us3r777\/CVE-2018-20718",
|
||||
"owner": {
|
||||
"login": "us3r777",
|
||||
"id": 8191240,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8191240?v=4",
|
||||
"html_url": "https:\/\/github.com\/us3r777"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/us3r777\/CVE-2018-20718",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-10T18:19:59Z",
|
||||
"updated_at": "2022-04-01T22:37:41Z",
|
||||
"pushed_at": "2019-07-15T13:39:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-05-10T07:44:56Z",
|
||||
"updated_at": "2023-05-12T16:11:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1683,
|
||||
"watchers_count": 1683,
|
||||
"stargazers_count": 1684,
|
||||
"watchers_count": 1684,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1683,
|
||||
"watchers": 1684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-7600 Drupal RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T08:52:54Z",
|
||||
"updated_at": "2022-06-18T04:00:35Z",
|
||||
"updated_at": "2023-05-12T13:22:17Z",
|
||||
"pushed_at": "2018-04-18T06:58:39Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -56,5 +56,34 @@
|
|||
"forks": 62,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 195813761,
|
||||
"name": "leHACK-Analysis-of-CVE-2018-8453",
|
||||
"full_name": "thepwnrip\/leHACK-Analysis-of-CVE-2018-8453",
|
||||
"owner": {
|
||||
"login": "thepwnrip",
|
||||
"id": 25064984,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25064984?v=4",
|
||||
"html_url": "https:\/\/github.com\/thepwnrip"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thepwnrip\/leHACK-Analysis-of-CVE-2018-8453",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T13:06:10Z",
|
||||
"updated_at": "2020-04-01T12:35:52Z",
|
||||
"pushed_at": "2019-07-08T13:15:07Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -79,10 +79,10 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2023-02-17T17:54:39Z",
|
||||
"updated_at": "2023-05-12T12:24:55Z",
|
||||
"pushed_at": "2022-08-22T12:00:56Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -103,7 +103,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"stargazers_count": 3742,
|
||||
"watchers_count": 3742,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1080,
|
||||
"forks_count": 1081,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1080,
|
||||
"forks": 1081,
|
||||
"watchers": 3742,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-05-10T07:44:56Z",
|
||||
"updated_at": "2023-05-12T16:11:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1683,
|
||||
"watchers_count": 1683,
|
||||
"stargazers_count": 1684,
|
||||
"watchers_count": 1684,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1683,
|
||||
"watchers": 1684,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-01T16:44:51Z",
|
||||
"updated_at": "2023-04-20T00:38:01Z",
|
||||
"updated_at": "2023-05-12T13:20:59Z",
|
||||
"pushed_at": "2019-11-02T10:47:46Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2023-02-17T17:54:39Z",
|
||||
"updated_at": "2023-05-12T12:24:55Z",
|
||||
"pushed_at": "2022-08-22T12:00:56Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 3742,
|
||||
"watchers_count": 3742,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1080,
|
||||
"forks_count": 1081,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1080,
|
||||
"forks": 1081,
|
||||
"watchers": 3742,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-05-10T07:44:56Z",
|
||||
"updated_at": "2023-05-12T16:11:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1683,
|
||||
"watchers_count": 1683,
|
||||
"stargazers_count": 1684,
|
||||
"watchers_count": 1684,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1683,
|
||||
"watchers": 1684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Simple CVE-2021-20294 poc",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T16:15:21Z",
|
||||
"updated_at": "2023-05-01T20:34:37Z",
|
||||
"updated_at": "2023-05-12T16:16:58Z",
|
||||
"pushed_at": "2023-01-21T22:37:16Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2023-05-11T19:04:12Z",
|
||||
"updated_at": "2023-05-12T16:54:39Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -27,34 +27,5 @@
|
|||
"forks": 10,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 639831642,
|
||||
"name": "CVE-2021-35587-Vulnerability-Check",
|
||||
"full_name": "1s1ldur\/CVE-2021-35587-Vulnerability-Check",
|
||||
"owner": {
|
||||
"login": "1s1ldur",
|
||||
"id": 124069385,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124069385?v=4",
|
||||
"html_url": "https:\/\/github.com\/1s1ldur"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1s1ldur\/CVE-2021-35587-Vulnerability-Check",
|
||||
"description": "This PoC proves that target is vulnerable to the CVE-2021-35587. Vulnerability is found in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-12T10:22:35Z",
|
||||
"updated_at": "2023-05-12T10:23:15Z",
|
||||
"pushed_at": "2023-05-12T10:23:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3116,7 +3116,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-15T14:17:45Z",
|
||||
"updated_at": "2022-09-16T01:01:16Z",
|
||||
"pushed_at": "2023-05-05T03:37:37Z",
|
||||
"pushed_at": "2023-05-12T17:37:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1060,7 +1060,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-12T04:10:09Z",
|
||||
"updated_at": "2023-05-12T04:36:47Z",
|
||||
"pushed_at": "2023-05-12T04:39:33Z",
|
||||
"pushed_at": "2023-05-12T17:37:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -2748,10 +2748,10 @@
|
|||
"description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T13:45:08Z",
|
||||
"updated_at": "2023-05-05T03:24:46Z",
|
||||
"updated_at": "2023-05-12T17:06:20Z",
|
||||
"pushed_at": "2021-12-15T08:14:56Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -2767,7 +2767,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 41,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Redis RCE through Lua Sandbox Escape vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T16:44:56Z",
|
||||
"updated_at": "2022-12-04T01:17:56Z",
|
||||
"updated_at": "2023-05-12T17:34:58Z",
|
||||
"pushed_at": "2022-09-02T22:46:08Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-10T10:38:59Z",
|
||||
"updated_at": "2023-05-08T10:00:58Z",
|
||||
"updated_at": "2023-05-12T17:09:04Z",
|
||||
"pushed_at": "2022-10-21T07:55:22Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-17T05:44:45Z",
|
||||
"updated_at": "2023-05-04T12:24:10Z",
|
||||
"updated_at": "2023-05-12T17:07:48Z",
|
||||
"pushed_at": "2022-04-17T05:53:54Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -158,10 +158,10 @@
|
|||
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-06T20:44:10Z",
|
||||
"updated_at": "2023-05-05T17:32:10Z",
|
||||
"updated_at": "2023-05-12T17:09:56Z",
|
||||
"pushed_at": "2022-11-23T21:09:11Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -176,7 +176,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 93,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T04:36:50Z",
|
||||
"updated_at": "2023-04-20T09:50:51Z",
|
||||
"updated_at": "2023-05-12T14:04:45Z",
|
||||
"pushed_at": "2022-09-02T11:00:28Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -85,34 +85,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 625290723,
|
||||
"name": "CVE-2022-2602",
|
||||
"full_name": "vnc1106\/CVE-2022-2602",
|
||||
"owner": {
|
||||
"login": "vnc1106",
|
||||
"id": 100759941,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100759941?v=4",
|
||||
"html_url": "https:\/\/github.com\/vnc1106"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vnc1106\/CVE-2022-2602",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-08T16:50:23Z",
|
||||
"updated_at": "2023-04-08T16:53:09Z",
|
||||
"pushed_at": "2023-04-08T16:53:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2023-05-05T17:29:51Z",
|
||||
"updated_at": "2023-05-12T17:24:44Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T04:27:15Z",
|
||||
"updated_at": "2023-05-09T14:52:01Z",
|
||||
"updated_at": "2023-05-12T18:00:38Z",
|
||||
"pushed_at": "2023-01-09T08:19:27Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -398,10 +398,10 @@
|
|||
"description": "Cobalt Strike 4.4 猪猪版 去暗桩 去流量特征 beacon仿造真实API服务 修补CVE-2022-39197补丁",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-28T06:31:38Z",
|
||||
"updated_at": "2023-05-11T03:52:38Z",
|
||||
"updated_at": "2023-05-12T12:51:57Z",
|
||||
"pushed_at": "2023-04-28T07:10:00Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -410,7 +410,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -228,10 +228,10 @@
|
|||
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-20T03:11:03Z",
|
||||
"updated_at": "2023-05-07T21:16:19Z",
|
||||
"updated_at": "2023-05-12T16:37:06Z",
|
||||
"pushed_at": "2022-10-20T06:36:42Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -240,7 +240,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T20:36:49Z",
|
||||
"updated_at": "2023-05-05T17:33:03Z",
|
||||
"updated_at": "2023-05-12T18:15:04Z",
|
||||
"pushed_at": "2023-01-20T17:58:39Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-07T03:30:22Z",
|
||||
"updated_at": "2023-04-14T03:29:37Z",
|
||||
"updated_at": "2023-05-12T15:36:33Z",
|
||||
"pushed_at": "2023-04-07T03:41:00Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-16T00:33:56Z",
|
||||
"updated_at": "2023-05-10T19:40:34Z",
|
||||
"pushed_at": "2023-05-08T19:50:50Z",
|
||||
"pushed_at": "2023-05-12T12:39:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -105,10 +105,10 @@
|
|||
"description": "CVE-2023-21839工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-11T08:26:30Z",
|
||||
"updated_at": "2023-04-28T15:04:29Z",
|
||||
"updated_at": "2023-05-12T14:36:29Z",
|
||||
"pushed_at": "2023-03-11T08:28:28Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -117,7 +117,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2023-23924 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-01T18:21:23Z",
|
||||
"updated_at": "2023-05-11T13:10:32Z",
|
||||
"updated_at": "2023-05-12T12:54:12Z",
|
||||
"pushed_at": "2023-02-02T02:05:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC and Scanner for CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T19:19:23Z",
|
||||
"updated_at": "2023-05-08T21:13:46Z",
|
||||
"updated_at": "2023-05-12T16:17:37Z",
|
||||
"pushed_at": "2023-01-25T00:04:57Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-21T09:19:13Z",
|
||||
"updated_at": "2023-04-24T13:50:59Z",
|
||||
"pushed_at": "2023-04-22T14:47:32Z",
|
||||
"pushed_at": "2023-05-12T13:20:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-22T21:34:06Z",
|
||||
"updated_at": "2023-05-12T11:00:10Z",
|
||||
"updated_at": "2023-05-12T18:06:45Z",
|
||||
"pushed_at": "2023-05-01T19:31:20Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
12
README.md
12
README.md
|
@ -1882,7 +1882,6 @@ The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content
|
|||
- [LukeGix/CVE-2022-2602](https://github.com/LukeGix/CVE-2022-2602)
|
||||
- [kiks7/CVE-2022-2602-Kernel-Exploit](https://github.com/kiks7/CVE-2022-2602-Kernel-Exploit)
|
||||
- [th3-5had0w/CVE-2022-2602-Study](https://github.com/th3-5had0w/CVE-2022-2602-Study)
|
||||
- [vnc1106/CVE-2022-2602](https://github.com/vnc1106/CVE-2022-2602)
|
||||
|
||||
### CVE-2022-2639 (2022-09-01)
|
||||
|
||||
|
@ -11379,7 +11378,6 @@ Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (
|
|||
</code>
|
||||
|
||||
- [antx-code/CVE-2021-35587](https://github.com/antx-code/CVE-2021-35587)
|
||||
- [1s1ldur/CVE-2021-35587-Vulnerability-Check](https://github.com/1s1ldur/CVE-2021-35587-Vulnerability-Check)
|
||||
|
||||
### CVE-2021-35616 (2021-10-20)
|
||||
|
||||
|
@ -25494,6 +25492,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
|
|||
|
||||
- [Mkv4/cve-2018-8453-exp](https://github.com/Mkv4/cve-2018-8453-exp)
|
||||
- [ze0r/cve-2018-8453-exp](https://github.com/ze0r/cve-2018-8453-exp)
|
||||
- [thepwnrip/leHACK-Analysis-of-CVE-2018-8453](https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453)
|
||||
|
||||
### CVE-2018-8495 (2018-10-10)
|
||||
|
||||
|
@ -25916,6 +25915,7 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
|
|||
- [qweraqq/CVE-2018-11235-Git-Submodule-CE](https://github.com/qweraqq/CVE-2018-11235-Git-Submodule-CE)
|
||||
- [jhswartz/CVE-2018-11235](https://github.com/jhswartz/CVE-2018-11235)
|
||||
- [AnonymKing/CVE-2018-11235](https://github.com/AnonymKing/CVE-2018-11235)
|
||||
- [0rx1/CVE-2018-11235](https://github.com/0rx1/CVE-2018-11235)
|
||||
- [cchang27/CVE-2018-11235-test](https://github.com/cchang27/CVE-2018-11235-test)
|
||||
- [nthuong95/CVE-2018-11235](https://github.com/nthuong95/CVE-2018-11235)
|
||||
- [xElkomy/CVE-2018-11235](https://github.com/xElkomy/CVE-2018-11235)
|
||||
|
@ -27289,6 +27289,14 @@ The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remot
|
|||
|
||||
- [gscamelo/CVE-2018-20580](https://github.com/gscamelo/CVE-2018-20580)
|
||||
|
||||
### CVE-2018-20718 (2019-01-15)
|
||||
|
||||
<code>
|
||||
In Pydio before 8.2.2, an attack is possible via PHP Object Injection because a user is allowed to use the $phpserial$a:0:{} syntax to store a preference. An attacker either needs a "public link" of a file, or access to any unprivileged user account for creation of such a link.
|
||||
</code>
|
||||
|
||||
- [us3r777/CVE-2018-20718](https://github.com/us3r777/CVE-2018-20718)
|
||||
|
||||
### CVE-2018-20966 (2019-08-12)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue