mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2023/03/21 00:28:14
This commit is contained in:
parent
da62f940e5
commit
0f00ec6fac
43 changed files with 147 additions and 960 deletions
2017
2018
2020
2021
CVE-2021-3156.jsonCVE-2021-3656.jsonCVE-2021-4034.jsonCVE-2021-40449.jsonCVE-2021-41773.jsonCVE-2021-44228.json
2022
CVE-2022-0492.jsonCVE-2022-0847.jsonCVE-2022-1388.jsonCVE-2022-20124.jsonCVE-2022-20130.jsonCVE-2022-20135.jsonCVE-2022-20142.jsonCVE-2022-21449.jsonCVE-2022-22954.jsonCVE-2022-22965.jsonCVE-2022-24342.jsonCVE-2022-24706.jsonCVE-2022-24715.jsonCVE-2022-24716.jsonCVE-2022-26134.jsonCVE-2022-26763.jsonCVE-2022-26766.jsonCVE-2022-26923.jsonCVE-2022-28219.jsonCVE-2022-29464.jsonCVE-2022-29885.jsonCVE-2022-30333.jsonCVE-2022-30594.jsonCVE-2022-30929.jsonCVE-2022-41082.jsonCVE-2022-46169.json
2023
CVE-2023-0179.jsonCVE-2023-0669.jsonCVE-2023-21768.jsonCVE-2023-23397.jsonCVE-2023-27326.jsonCVE-2023-27587.json
README.md
|
@ -129,10 +129,10 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2023-02-21T12:06:17Z",
|
||||
"updated_at": "2023-03-20T20:36:01Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"has_discussions": false,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
|
@ -146,7 +146,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 307,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -250,7 +250,7 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2022-09-07T06:58:04Z",
|
||||
"updated_at": "2023-03-20T19:49:55Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
|
|
|
@ -104,10 +104,10 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2023-02-26T14:56:04Z",
|
||||
"updated_at": "2023-03-20T20:34:45Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"has_discussions": false,
|
||||
"forks_count": 126,
|
||||
"allow_forking": true,
|
||||
|
@ -116,7 +116,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"watchers": 292,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1532,10 +1532,10 @@
|
|||
"description": "CVE-2021-3156 POC and Docker and Analysis write up",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T02:31:43Z",
|
||||
"updated_at": "2023-01-31T18:43:03Z",
|
||||
"updated_at": "2023-03-20T21:20:34Z",
|
||||
"pushed_at": "2022-05-23T01:51:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1544,7 +1544,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 510479826,
|
||||
"name": "CVE-2022-30887",
|
||||
"full_name": "MuallimNaci\/CVE-2022-30887",
|
||||
"id": 562227251,
|
||||
"name": "CVE-2021-3656-Demo",
|
||||
"full_name": "rami08448\/CVE-2021-3656-Demo",
|
||||
"owner": {
|
||||
"login": "MuallimNaci",
|
||||
"id": 87265009,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4",
|
||||
"html_url": "https:\/\/github.com\/MuallimNaci"
|
||||
"login": "rami08448",
|
||||
"id": 77466752,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77466752?v=4",
|
||||
"html_url": "https:\/\/github.com\/rami08448"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887",
|
||||
"html_url": "https:\/\/github.com\/rami08448\/CVE-2021-3656-Demo",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T19:24:56Z",
|
||||
"updated_at": "2022-12-08T03:15:35Z",
|
||||
"pushed_at": "2022-07-04T19:30:52Z",
|
||||
"created_at": "2022-11-05T17:32:47Z",
|
||||
"updated_at": "2023-03-20T20:09:22Z",
|
||||
"pushed_at": "2022-11-22T03:03:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
|
@ -1508,14 +1508,14 @@
|
|||
{
|
||||
"id": 452478414,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "T3cnokarita\/CVE-2021-4034",
|
||||
"full_name": "ch4rum\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "T3cnokarita",
|
||||
"login": "ch4rum",
|
||||
"id": 98498025,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98498025?v=4",
|
||||
"html_url": "https:\/\/github.com\/T3cnokarita"
|
||||
"html_url": "https:\/\/github.com\/ch4rum"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/T3cnokarita\/CVE-2021-4034",
|
||||
"html_url": "https:\/\/github.com\/ch4rum\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T23:46:28Z",
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "LPE exploit for a UAF in Windows (CVE-2021-40449).",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T04:58:49Z",
|
||||
"updated_at": "2023-01-31T18:52:30Z",
|
||||
"updated_at": "2023-03-20T19:39:52Z",
|
||||
"pushed_at": "2021-11-05T06:54:10Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -87,7 +87,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -923,14 +923,14 @@
|
|||
{
|
||||
"id": 414574168,
|
||||
"name": "POC-CVE-2021-41773",
|
||||
"full_name": "Hattan-515\/POC-CVE-2021-41773",
|
||||
"full_name": "Hattan515\/POC-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "Hattan-515",
|
||||
"login": "Hattan515",
|
||||
"id": 92092916,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92092916?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hattan-515"
|
||||
"html_url": "https:\/\/github.com\/Hattan515"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hattan-515\/POC-CVE-2021-41773",
|
||||
"html_url": "https:\/\/github.com\/Hattan515\/POC-CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T11:31:03Z",
|
||||
|
|
|
@ -909,10 +909,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-03-20T10:39:55Z",
|
||||
"updated_at": "2023-03-21T00:18:22Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1549,
|
||||
"watchers_count": 1549,
|
||||
"stargazers_count": 1550,
|
||||
"watchers_count": 1550,
|
||||
"has_discussions": false,
|
||||
"forks_count": 449,
|
||||
"allow_forking": true,
|
||||
|
@ -926,7 +926,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 449,
|
||||
"watchers": 1549,
|
||||
"watchers": 1550,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1865,64 +1865,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510629189,
|
||||
"name": "dirtypipe-ebpf_detection",
|
||||
"full_name": "airbus-cert\/dirtypipe-ebpf_detection",
|
||||
"owner": {
|
||||
"login": "airbus-cert",
|
||||
"id": 26453405,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
|
||||
"html_url": "https:\/\/github.com\/airbus-cert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection",
|
||||
"description": "An eBPF detection program for CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:20:59Z",
|
||||
"updated_at": "2023-01-16T18:05:15Z",
|
||||
"pushed_at": "2022-07-05T14:25:46Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510867863,
|
||||
"name": "Dirty-Pipe",
|
||||
"full_name": "edr1412\/Dirty-Pipe",
|
||||
"owner": {
|
||||
"login": "edr1412",
|
||||
"id": 40953911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
|
||||
"html_url": "https:\/\/github.com\/edr1412"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
|
||||
"description": "exp of CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:22:50Z",
|
||||
"updated_at": "2023-01-31T12:51:32Z",
|
||||
"pushed_at": "2022-07-05T19:23:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 520138171,
|
||||
"name": "CVE-2022-0847-DirtyPipe-Exploits",
|
||||
|
|
|
@ -1592,68 +1592,6 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509548569,
|
||||
"name": "CVE-2022-1388_refresh",
|
||||
"full_name": "Luchoane\/CVE-2022-1388_refresh",
|
||||
"owner": {
|
||||
"login": "Luchoane",
|
||||
"id": 40374879,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
|
||||
"html_url": "https:\/\/github.com\/Luchoane"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
|
||||
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T18:08:50Z",
|
||||
"updated_at": "2022-07-07T19:22:09Z",
|
||||
"pushed_at": "2022-07-01T20:04:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510239425,
|
||||
"name": "CVE-2022-1388",
|
||||
"full_name": "jbharucha05\/CVE-2022-1388",
|
||||
"owner": {
|
||||
"login": "jbharucha05",
|
||||
"id": 13020621,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
|
||||
"html_url": "https:\/\/github.com\/jbharucha05"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
|
||||
"description": "CVE-2022-1388, bypassing iControl REST authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T06:31:56Z",
|
||||
"updated_at": "2022-07-04T07:08:22Z",
|
||||
"pushed_at": "2022-07-04T10:37:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-1388",
|
||||
"f5-big-ip-icontrol-rest-rce",
|
||||
"f5-bigip"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 557286411,
|
||||
"name": "CVE-2022-1388",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 510660359,
|
||||
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T08:59:44Z",
|
||||
"updated_at": "2022-07-05T09:52:45Z",
|
||||
"pushed_at": "2022-07-05T09:52:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 509461641,
|
||||
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T13:16:14Z",
|
||||
"updated_at": "2022-07-01T13:25:04Z",
|
||||
"pushed_at": "2022-07-01T13:25:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 510684846,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T10:15:49Z",
|
||||
"updated_at": "2022-07-05T10:42:21Z",
|
||||
"pushed_at": "2022-07-05T10:41:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 510346412,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T12:16:05Z",
|
||||
"updated_at": "2022-07-04T13:19:53Z",
|
||||
"pushed_at": "2022-07-04T12:21:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 529215266,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
|
|
|
@ -202,35 +202,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510875629,
|
||||
"name": "CVE-2022-21449-I2P-TLS-POC",
|
||||
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
|
||||
"owner": {
|
||||
"login": "PyterSmithDarkGhost",
|
||||
"id": 106814901,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
|
||||
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:51:39Z",
|
||||
"updated_at": "2022-09-01T23:29:48Z",
|
||||
"pushed_at": "2022-07-05T19:52:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 519281774,
|
||||
"name": "CVE-2022-21449-showcase",
|
||||
|
|
|
@ -637,64 +637,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524471767,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "amit-pathak009\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:00:04Z",
|
||||
"updated_at": "2022-06-02T01:44:19Z",
|
||||
"pushed_at": "2022-06-02T01:44:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524471940,
|
||||
"name": "CVE-2022-22954-PoC",
|
||||
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:00:39Z",
|
||||
"updated_at": "2022-06-01T22:41:09Z",
|
||||
"pushed_at": "2022-06-01T22:41:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 545257457,
|
||||
"name": "VcenterKiller",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"forks": 104,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1896,35 +1896,6 @@
|
|||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510562121,
|
||||
"name": "CVE-2022-22965",
|
||||
"full_name": "trhacknon\/CVE-2022-22965",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:30:29Z",
|
||||
"updated_at": "2022-09-27T23:19:26Z",
|
||||
"pushed_at": "2022-07-05T02:32:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510569312,
|
||||
"name": "Spring4Shell-CVE-2022-22965",
|
||||
|
|
|
@ -1,39 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 509870464,
|
||||
"name": "CVE-2022-24342",
|
||||
"full_name": "yuriisanin\/CVE-2022-24342",
|
||||
"owner": {
|
||||
"login": "yuriisanin",
|
||||
"id": 11749007,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
|
||||
"html_url": "https:\/\/github.com\/yuriisanin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342",
|
||||
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T22:04:29Z",
|
||||
"updated_at": "2023-02-12T21:01:11Z",
|
||||
"pushed_at": "2022-07-05T17:31:35Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"csrf",
|
||||
"cve",
|
||||
"cve-2022-24342",
|
||||
"exploit",
|
||||
"jetbrains",
|
||||
"teamcity",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -57,35 +57,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510182546,
|
||||
"name": "CVE-2022-24706",
|
||||
"full_name": "superzerosec\/CVE-2022-24706",
|
||||
"owner": {
|
||||
"login": "superzerosec",
|
||||
"id": 57648217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||||
"html_url": "https:\/\/github.com\/superzerosec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706",
|
||||
"description": "CVE-2022-24706 POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T02:06:27Z",
|
||||
"updated_at": "2022-07-04T02:06:27Z",
|
||||
"pushed_at": "2022-07-04T02:06:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 533101052,
|
||||
"name": "CVE-2022-24706-CouchDB-Exploit",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": " Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T04:31:32Z",
|
||||
"updated_at": "2023-03-20T17:20:55Z",
|
||||
"updated_at": "2023-03-20T19:53:26Z",
|
||||
"pushed_at": "2023-03-20T18:07:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-19T20:41:46Z",
|
||||
"updated_at": "2023-03-20T17:03:44Z",
|
||||
"updated_at": "2023-03-20T23:34:15Z",
|
||||
"pushed_at": "2023-03-20T05:02:21Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2022-24716 | Arbitrary File Disclosure Icingaweb2",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T02:25:55Z",
|
||||
"updated_at": "2023-03-20T17:33:14Z",
|
||||
"pushed_at": "2023-03-20T02:32:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"updated_at": "2023-03-20T23:30:28Z",
|
||||
"pushed_at": "2023-03-20T23:26:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1280,35 +1280,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510402169,
|
||||
"name": "TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "r1skkam",
|
||||
"id": 58542375,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
|
||||
"html_url": "https:\/\/github.com\/r1skkam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T15:00:21Z",
|
||||
"updated_at": "2022-07-19T02:30:51Z",
|
||||
"pushed_at": "2022-07-04T16:49:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510586350,
|
||||
"name": "CVE-2022-26134",
|
||||
|
@ -1343,44 +1314,6 @@
|
|||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510624422,
|
||||
"name": "CVE-2022-26134",
|
||||
"full_name": "Debajyoti0-0\/CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "Debajyoti0-0",
|
||||
"id": 79437050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
|
||||
"html_url": "https:\/\/github.com\/Debajyoti0-0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
|
||||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:04:50Z",
|
||||
"updated_at": "2022-07-10T08:52:10Z",
|
||||
"pushed_at": "2022-07-05T09:40:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"atlassian-confluence",
|
||||
"cve-2022-26134",
|
||||
"infosec",
|
||||
"ognl-injection-vulnerability",
|
||||
"payload",
|
||||
"python",
|
||||
"rce",
|
||||
"unauthenticated"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510946912,
|
||||
"name": "cve-2022-26134",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 509675215,
|
||||
"name": "PCICrash",
|
||||
"full_name": "zhuowei\/PCICrash",
|
||||
"owner": {
|
||||
"login": "zhuowei",
|
||||
"id": 704768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhuowei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhuowei\/PCICrash",
|
||||
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:15:29Z",
|
||||
"updated_at": "2022-09-15T17:20:03Z",
|
||||
"pushed_at": "2022-07-02T06:15:40Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 509675427,
|
||||
"name": "CoreTrustDemo",
|
||||
"full_name": "zhuowei\/CoreTrustDemo",
|
||||
"owner": {
|
||||
"login": "zhuowei",
|
||||
"id": 704768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhuowei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo",
|
||||
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:16:33Z",
|
||||
"updated_at": "2023-02-26T02:08:22Z",
|
||||
"pushed_at": "2022-07-02T17:14:41Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-14T09:27:06Z",
|
||||
"updated_at": "2023-03-19T05:40:30Z",
|
||||
"updated_at": "2023-03-20T18:33:42Z",
|
||||
"pushed_at": "2022-05-14T20:56:39Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -28,35 +28,6 @@
|
|||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509605278,
|
||||
"name": "manageengine-auditad-cve-2022-28219",
|
||||
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
|
||||
"owner": {
|
||||
"login": "rbowes-r7",
|
||||
"id": 104588115,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
|
||||
"html_url": "https:\/\/github.com\/rbowes-r7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T22:40:46Z",
|
||||
"updated_at": "2022-07-19T13:50:08Z",
|
||||
"pushed_at": "2022-07-05T22:13:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 518384320,
|
||||
"name": "CVE-2022-28219-Like",
|
||||
|
|
|
@ -554,64 +554,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524474931,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "amit-pathak009\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:14:43Z",
|
||||
"updated_at": "2022-05-19T21:24:13Z",
|
||||
"pushed_at": "2022-05-19T21:24:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524475053,
|
||||
"name": "CVE-2022-29464-mass",
|
||||
"full_name": "amit-pathak009\/CVE-2022-29464-mass",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:15:18Z",
|
||||
"updated_at": "2023-01-11T06:21:01Z",
|
||||
"pushed_at": "2022-05-29T19:16:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 540011346,
|
||||
"name": "CVE-2022-29464",
|
||||
|
|
|
@ -27,34 +27,5 @@
|
|||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509388193,
|
||||
"name": "CVE-2022-29885",
|
||||
"full_name": "iveresk\/CVE-2022-29885",
|
||||
"owner": {
|
||||
"login": "iveresk",
|
||||
"id": 28754633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
|
||||
"html_url": "https:\/\/github.com\/iveresk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885",
|
||||
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T09:02:10Z",
|
||||
"updated_at": "2023-01-24T17:20:21Z",
|
||||
"pushed_at": "2022-07-05T06:23:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 510563141,
|
||||
"name": "CVE-2022-30333-PoC",
|
||||
"full_name": "TheL1ghtVn\/CVE-2022-30333-PoC",
|
||||
"owner": {
|
||||
"login": "TheL1ghtVn",
|
||||
"id": 89027345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheL1ghtVn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:35:12Z",
|
||||
"updated_at": "2022-11-19T19:17:38Z",
|
||||
"pushed_at": "2022-07-05T02:58:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 514420724,
|
||||
"name": "unrar-cve-2022-30333-poc",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 510304709,
|
||||
"name": "linux-4.19.72_CVE-2022-30594",
|
||||
"full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T10:01:05Z",
|
||||
"updated_at": "2023-03-08T01:26:26Z",
|
||||
"pushed_at": "2022-07-04T10:18:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 511398695,
|
||||
"name": "CVE-2022-30929",
|
||||
"full_name": "nanaao\/CVE-2022-30929",
|
||||
"owner": {
|
||||
"login": "nanaao",
|
||||
"id": 77666853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
|
||||
"html_url": "https:\/\/github.com\/nanaao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929",
|
||||
"description": "CVE-2022-30929 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-07T05:44:56Z",
|
||||
"updated_at": "2023-01-31T12:52:11Z",
|
||||
"pushed_at": "2022-07-04T06:19:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -129,10 +129,10 @@
|
|||
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T09:35:26Z",
|
||||
"updated_at": "2023-03-19T18:12:30Z",
|
||||
"updated_at": "2023-03-20T22:43:45Z",
|
||||
"pushed_at": "2023-01-10T08:09:36Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -271,5 +271,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 616701865,
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "doosec101\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "doosec101",
|
||||
"id": 128431701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4",
|
||||
"html_url": "https:\/\/github.com\/doosec101"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/doosec101\/CVE-2022-46169",
|
||||
"description": "Repo for CVE-2022-46169",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T22:54:18Z",
|
||||
"updated_at": "2023-03-20T23:57:27Z",
|
||||
"pushed_at": "2023-03-20T23:31:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T02:20:52Z",
|
||||
"updated_at": "2023-03-20T15:46:03Z",
|
||||
"updated_at": "2023-03-20T20:14:54Z",
|
||||
"pushed_at": "2023-03-16T02:22:28Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-10T13:02:55Z",
|
||||
"updated_at": "2023-03-19T04:28:18Z",
|
||||
"updated_at": "2023-03-20T20:08:49Z",
|
||||
"pushed_at": "2023-02-13T07:15:28Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-03-20T11:20:57Z",
|
||||
"updated_at": "2023-03-20T22:51:34Z",
|
||||
"pushed_at": "2023-03-10T08:58:44Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 313,
|
||||
"forks": 117,
|
||||
"watchers": 315,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit for the CVE-2023-23397",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T17:03:38Z",
|
||||
"updated_at": "2023-03-20T14:12:09Z",
|
||||
"updated_at": "2023-03-21T00:18:35Z",
|
||||
"pushed_at": "2023-03-15T17:53:53Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 122,
|
||||
"forks": 35,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -168,19 +168,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:43:39Z",
|
||||
"updated_at": "2023-03-20T15:55:28Z",
|
||||
"updated_at": "2023-03-21T00:18:00Z",
|
||||
"pushed_at": "2023-03-17T07:47:40Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 209,
|
||||
"forks": 32,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -371,10 +371,10 @@
|
|||
"description": "Simple CVE-2023-23397 poc with sending of the payload by email.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T16:31:54Z",
|
||||
"updated_at": "2023-03-20T16:47:16Z",
|
||||
"updated_at": "2023-03-21T00:22:14Z",
|
||||
"pushed_at": "2023-03-20T16:55:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -383,7 +383,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T11:47:54Z",
|
||||
"updated_at": "2023-03-20T18:21:05Z",
|
||||
"updated_at": "2023-03-20T23:40:35Z",
|
||||
"pushed_at": "2023-03-20T12:51:29Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The simple PoC of CVE-2023-27587",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T15:52:20Z",
|
||||
"updated_at": "2023-03-17T17:06:31Z",
|
||||
"updated_at": "2023-03-20T22:48:05Z",
|
||||
"pushed_at": "2023-03-15T16:31:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
102
README.md
102
README.md
|
@ -697,8 +697,6 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
|
||||
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
|
||||
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
|
||||
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
|
||||
- [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
|
||||
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
|
||||
|
@ -949,8 +947,6 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
|
|||
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
|
||||
- [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388)
|
||||
- [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388)
|
||||
- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh)
|
||||
- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388)
|
||||
- [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388)
|
||||
- [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388)
|
||||
- [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388)
|
||||
|
@ -1341,14 +1337,6 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
|
|||
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007)
|
||||
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007)
|
||||
|
||||
### CVE-2022-20124 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036
|
||||
</code>
|
||||
|
||||
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
|
||||
|
||||
### CVE-2022-20126 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1360,14 +1348,6 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo
|
|||
### CVE-2022-20128
|
||||
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
|
||||
|
||||
### CVE-2022-20130 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
|
||||
|
||||
### CVE-2022-20133 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1376,14 +1356,6 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of
|
|||
|
||||
- [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133)
|
||||
|
||||
### CVE-2022-20135 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
|
||||
</code>
|
||||
|
||||
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
|
||||
|
||||
### CVE-2022-20138 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1400,7 +1372,6 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there
|
|||
In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
|
||||
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142)
|
||||
|
||||
### CVE-2022-20186 (2022-06-15)
|
||||
|
@ -1591,7 +1562,6 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
|
|||
- [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449)
|
||||
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
|
||||
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
|
||||
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
|
||||
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
|
||||
- [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449)
|
||||
|
||||
|
@ -2042,8 +2012,6 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
|
|||
- [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954)
|
||||
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
|
||||
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
|
||||
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
|
||||
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
|
||||
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
|
||||
|
@ -2144,7 +2112,6 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
|
||||
- [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell)
|
||||
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
|
||||
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
|
||||
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
|
||||
- [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965)
|
||||
- [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC)
|
||||
|
@ -2530,14 +2497,6 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System
|
|||
|
||||
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
|
||||
|
||||
### CVE-2022-24342 (2022-02-25)
|
||||
|
||||
<code>
|
||||
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
|
||||
</code>
|
||||
|
||||
- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342)
|
||||
|
||||
### CVE-2022-24348 (2022-02-04)
|
||||
|
||||
<code>
|
||||
|
@ -2656,7 +2615,6 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
|
|||
|
||||
- [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit)
|
||||
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
|
||||
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
|
||||
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
|
||||
|
||||
### CVE-2022-24707 (2022-02-23)
|
||||
|
@ -3062,9 +3020,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
|
||||
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
|
||||
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
|
||||
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
|
||||
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
|
||||
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
|
||||
- [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134)
|
||||
- [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134)
|
||||
- [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit)
|
||||
|
@ -3190,22 +3146,6 @@ A use after free issue was addressed with improved memory management. This issue
|
|||
|
||||
- [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert)
|
||||
|
||||
### CVE-2022-26763 (2022-05-26)
|
||||
|
||||
<code>
|
||||
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.
|
||||
</code>
|
||||
|
||||
- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash)
|
||||
|
||||
### CVE-2022-26766 (2022-05-26)
|
||||
|
||||
<code>
|
||||
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
|
||||
</code>
|
||||
|
||||
- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo)
|
||||
|
||||
### CVE-2022-26809 (2022-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -3454,7 +3394,6 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
|
|||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
|
||||
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
|
||||
- [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like)
|
||||
|
||||
### CVE-2022-28281 (2022-12-22)
|
||||
|
@ -3729,8 +3668,6 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
|
||||
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
|
||||
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
|
||||
- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464)
|
||||
- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass)
|
||||
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
|
||||
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
|
||||
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
|
||||
|
@ -3837,7 +3774,6 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20
|
|||
</code>
|
||||
|
||||
- [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885)
|
||||
- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885)
|
||||
|
||||
### CVE-2022-29932 (2022-05-11)
|
||||
|
||||
|
@ -4017,7 +3953,6 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer
|
|||
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
|
||||
</code>
|
||||
|
||||
- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC)
|
||||
- [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc)
|
||||
- [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333)
|
||||
- [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333)
|
||||
|
@ -4128,14 +4063,6 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl
|
|||
|
||||
- [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks)
|
||||
|
||||
### CVE-2022-30594 (2022-05-12)
|
||||
|
||||
<code>
|
||||
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
|
||||
</code>
|
||||
|
||||
- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594)
|
||||
|
||||
### CVE-2022-30600 (2022-05-18)
|
||||
|
||||
<code>
|
||||
|
@ -4163,22 +4090,6 @@ Gitea before 1.16.7 does not escape git fetch remote.
|
|||
|
||||
- [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781)
|
||||
|
||||
### CVE-2022-30887 (2022-05-20)
|
||||
|
||||
<code>
|
||||
Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
|
||||
</code>
|
||||
|
||||
- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887)
|
||||
|
||||
### CVE-2022-30929 (2022-07-06)
|
||||
|
||||
<code>
|
||||
Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
|
||||
</code>
|
||||
|
||||
- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929)
|
||||
|
||||
### CVE-2022-31007 (2022-05-31)
|
||||
|
||||
<code>
|
||||
|
@ -6293,6 +6204,7 @@ Cacti is an open source platform which provides a robust and extensible operatio
|
|||
- [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC)
|
||||
- [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169)
|
||||
- [ariyaadinatha/cacti-cve-2022-46169-exploit](https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit)
|
||||
- [doosec101/CVE-2022-46169](https://github.com/doosec101/CVE-2022-46169)
|
||||
|
||||
### CVE-2022-46175 (2022-12-23)
|
||||
|
||||
|
@ -7598,6 +7510,14 @@ Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain H
|
|||
|
||||
- [szymonh/zephyr_cve-2021-3625](https://github.com/szymonh/zephyr_cve-2021-3625)
|
||||
|
||||
### CVE-2021-3656 (2022-03-04)
|
||||
|
||||
<code>
|
||||
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
|
||||
</code>
|
||||
|
||||
- [rami08448/CVE-2021-3656-Demo](https://github.com/rami08448/CVE-2021-3656-Demo)
|
||||
|
||||
### CVE-2021-3707 (2021-08-16)
|
||||
|
||||
<code>
|
||||
|
@ -7697,7 +7617,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [vilasboasph/CVE-2021-4034](https://github.com/vilasboasph/CVE-2021-4034)
|
||||
- [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034)
|
||||
- [callrbx/pkexec-lpe-poc](https://github.com/callrbx/pkexec-lpe-poc)
|
||||
- [T3cnokarita/CVE-2021-4034](https://github.com/T3cnokarita/CVE-2021-4034)
|
||||
- [ch4rum/CVE-2021-4034](https://github.com/ch4rum/CVE-2021-4034)
|
||||
- [cd80-ctf/CVE-2021-4034](https://github.com/cd80-ctf/CVE-2021-4034)
|
||||
- [Al1ex/CVE-2021-4034](https://github.com/Al1ex/CVE-2021-4034)
|
||||
- [puckiestyle/CVE-2021-4034](https://github.com/puckiestyle/CVE-2021-4034)
|
||||
|
@ -11451,7 +11371,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2)
|
||||
- [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit)
|
||||
- [sixpacksecurity/CVE-2021-41773](https://github.com/sixpacksecurity/CVE-2021-41773)
|
||||
- [Hattan-515/POC-CVE-2021-41773](https://github.com/Hattan-515/POC-CVE-2021-41773)
|
||||
- [Hattan515/POC-CVE-2021-41773](https://github.com/Hattan515/POC-CVE-2021-41773)
|
||||
- [twseptian/cve-2021-41773](https://github.com/twseptian/cve-2021-41773)
|
||||
- [noflowpls/CVE-2021-41773](https://github.com/noflowpls/CVE-2021-41773)
|
||||
- [McSl0vv/CVE-2021-41773](https://github.com/McSl0vv/CVE-2021-41773)
|
||||
|
|
Loading…
Add table
Reference in a new issue