mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/04/28 06:29:05
This commit is contained in:
parent
a96fd7063d
commit
1d760c8fa3
34 changed files with 138 additions and 237 deletions
|
@ -785,10 +785,10 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2023-04-25T10:02:59Z",
|
||||
"updated_at": "2023-04-28T05:35:59Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -797,7 +797,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 125,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2023-04-25T03:49:01Z",
|
||||
"updated_at": "2023-04-28T05:36:36Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 531,
|
||||
"watchers_count": 531,
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"has_discussions": false,
|
||||
"forks_count": 260,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 260,
|
||||
"watchers": 531,
|
||||
"watchers": 530,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2023-04-25T01:52:13Z",
|
||||
"updated_at": "2023-04-28T03:35:40Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"has_discussions": false,
|
||||
"forks_count": 185,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 185,
|
||||
"watchers": 722,
|
||||
"watchers": 723,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -230,34 +230,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453272234,
|
||||
"name": "CVE-2018-0114-Exploit",
|
||||
"full_name": "CyberSecurityUP\/CVE-2018-0114-Exploit",
|
||||
"owner": {
|
||||
"login": "CyberSecurityUP",
|
||||
"id": 34966120,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34966120?v=4",
|
||||
"html_url": "https:\/\/github.com\/CyberSecurityUP"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CyberSecurityUP\/CVE-2018-0114-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-29T02:04:44Z",
|
||||
"updated_at": "2022-07-23T12:23:25Z",
|
||||
"pushed_at": "2022-01-29T02:11:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 473832086,
|
||||
"name": "CVE-2018-12326",
|
||||
"full_name": "spasm5\/CVE-2018-12326",
|
||||
"owner": {
|
||||
"login": "spasm5",
|
||||
"id": 102309527,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102309527?v=4",
|
||||
"html_url": "https:\/\/github.com\/spasm5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/spasm5\/CVE-2018-12326",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-25T01:44:26Z",
|
||||
"updated_at": "2022-03-25T01:44:57Z",
|
||||
"pushed_at": "2022-03-25T01:44:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1826,35 +1826,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 473521612,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "the-valluvarsploit\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "the-valluvarsploit",
|
||||
"id": 94351646,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94351646?v=4",
|
||||
"html_url": "https:\/\/github.com\/the-valluvarsploit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/the-valluvarsploit\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-24T08:40:42Z",
|
||||
"updated_at": "2022-11-23T00:05:24Z",
|
||||
"pushed_at": "2022-03-24T08:41:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 483722584,
|
||||
"name": "CVE-2018-6574",
|
||||
|
|
|
@ -83,7 +83,7 @@
|
|||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"has_discussions": false,
|
||||
"forks_count": 180,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -99,7 +99,7 @@
|
|||
"sa-core-2018-002"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 180,
|
||||
"forks": 181,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2023-04-27T03:03:31Z",
|
||||
"updated_at": "2023-04-28T01:15:09Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 299,
|
||||
"watchers": 300,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2023-04-27T16:01:40Z",
|
||||
"updated_at": "2023-04-28T02:18:39Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-06T02:15:39Z",
|
||||
"updated_at": "2023-04-26T02:27:30Z",
|
||||
"updated_at": "2023-04-28T01:26:25Z",
|
||||
"pushed_at": "2021-01-06T23:51:32Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,30 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 401543989,
|
||||
"id": 432034471,
|
||||
"name": "CVE-2021-10086",
|
||||
"full_name": "xiaoyun-1\/CVE-2021-10086",
|
||||
"full_name": "AK-blank\/CVE-2021-10086",
|
||||
"owner": {
|
||||
"login": "xiaoyun-1",
|
||||
"id": 58814739,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814739?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiaoyun-1"
|
||||
"login": "AK-blank",
|
||||
"id": 56591429,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
|
||||
"html_url": "https:\/\/github.com\/AK-blank"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiaoyun-1\/CVE-2021-10086",
|
||||
"html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-10086",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T02:08:07Z",
|
||||
"updated_at": "2021-10-31T12:23:49Z",
|
||||
"created_at": "2021-11-26T02:43:58Z",
|
||||
"updated_at": "2023-04-28T02:53:28Z",
|
||||
"pushed_at": "2021-08-05T06:47:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T07:14:45Z",
|
||||
"updated_at": "2023-04-27T22:40:11Z",
|
||||
"updated_at": "2023-04-28T00:26:16Z",
|
||||
"pushed_at": "2023-03-09T07:15:29Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -315,7 +315,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -173,10 +173,10 @@
|
|||
"description": "Dell Driver EoP (CVE-2021-21551)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T01:47:03Z",
|
||||
"updated_at": "2022-12-12T21:01:31Z",
|
||||
"updated_at": "2023-04-28T01:54:27Z",
|
||||
"pushed_at": "2022-02-24T10:13:45Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -185,7 +185,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 33,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -778,10 +778,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-04-27T12:23:36Z",
|
||||
"updated_at": "2023-04-28T02:39:24Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 900,
|
||||
"watchers_count": 900,
|
||||
"stargazers_count": 901,
|
||||
"watchers_count": 901,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -797,7 +797,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 900,
|
||||
"watchers": 901,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -274,10 +274,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2023-04-26T06:17:04Z",
|
||||
"updated_at": "2023-04-28T04:36:35Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -286,7 +286,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1124,10 +1124,10 @@
|
|||
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T21:10:34Z",
|
||||
"updated_at": "2023-03-15T11:24:32Z",
|
||||
"updated_at": "2023-04-28T01:29:11Z",
|
||||
"pushed_at": "2021-03-31T11:57:38Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -1136,7 +1136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 222,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -255,10 +255,10 @@
|
|||
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T01:34:44Z",
|
||||
"updated_at": "2023-04-25T18:26:53Z",
|
||||
"updated_at": "2023-04-28T04:08:58Z",
|
||||
"pushed_at": "2022-01-27T15:13:51Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -267,7 +267,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -908,10 +908,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-04-25T13:02:19Z",
|
||||
"updated_at": "2023-04-28T02:50:09Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 774,
|
||||
"watchers_count": 774,
|
||||
"stargazers_count": 775,
|
||||
"watchers_count": 775,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"watchers": 774,
|
||||
"watchers": 775,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-04-27T14:52:43Z",
|
||||
"updated_at": "2023-04-28T02:58:13Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 566,
|
||||
"watchers_count": 566,
|
||||
"stargazers_count": 567,
|
||||
"watchers_count": 567,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 566,
|
||||
"watchers": 567,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-04-27T14:51:24Z",
|
||||
"updated_at": "2023-04-28T02:57:36Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1203,
|
||||
"watchers_count": 1203,
|
||||
"stargazers_count": 1205,
|
||||
"watchers_count": 1205,
|
||||
"has_discussions": false,
|
||||
"forks_count": 309,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 309,
|
||||
"watchers": 1203,
|
||||
"watchers": 1205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -387,10 +387,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2023-04-19T06:23:24Z",
|
||||
"updated_at": "2023-04-28T02:39:05Z",
|
||||
"pushed_at": "2023-04-14T18:41:21Z",
|
||||
"stargazers_count": 1055,
|
||||
"watchers_count": 1055,
|
||||
"stargazers_count": 1056,
|
||||
"watchers_count": 1056,
|
||||
"has_discussions": false,
|
||||
"forks_count": 496,
|
||||
"allow_forking": true,
|
||||
|
@ -401,7 +401,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 496,
|
||||
"watchers": 1055,
|
||||
"watchers": 1056,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1259,10 +1259,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-04-26T15:29:15Z",
|
||||
"updated_at": "2023-04-28T05:54:42Z",
|
||||
"pushed_at": "2023-04-26T14:33:24Z",
|
||||
"stargazers_count": 658,
|
||||
"watchers_count": 658,
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -1276,7 +1276,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 658,
|
||||
"watchers": 660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2023-03-29T11:08:15Z",
|
||||
"updated_at": "2023-04-28T03:09:36Z",
|
||||
"pushed_at": "2022-07-23T23:14:02Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 76,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -916,10 +916,10 @@
|
|||
"description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-10T15:44:50Z",
|
||||
"updated_at": "2023-04-04T14:09:57Z",
|
||||
"updated_at": "2023-04-28T03:09:34Z",
|
||||
"pushed_at": "2022-05-16T14:02:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -928,7 +928,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22916,O2OA RCE 远程命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-21T16:28:23Z",
|
||||
"updated_at": "2023-01-31T13:30:00Z",
|
||||
"updated_at": "2023-04-28T03:09:35Z",
|
||||
"pushed_at": "2022-05-21T19:10:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -682,10 +682,10 @@
|
|||
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T09:32:36Z",
|
||||
"updated_at": "2022-10-29T19:36:19Z",
|
||||
"updated_at": "2023-04-28T03:09:33Z",
|
||||
"pushed_at": "2022-03-08T09:36:31Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -694,7 +694,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 22,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -361,10 +361,10 @@
|
|||
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T16:18:56Z",
|
||||
"updated_at": "2023-03-09T05:23:15Z",
|
||||
"updated_at": "2023-04-28T03:23:25Z",
|
||||
"pushed_at": "2022-04-26T04:26:00Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -373,7 +373,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 64,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -709,10 +709,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-04-27T12:23:36Z",
|
||||
"updated_at": "2023-04-28T02:39:24Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 900,
|
||||
"watchers_count": 900,
|
||||
"stargazers_count": 901,
|
||||
"watchers_count": 901,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -728,7 +728,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 900,
|
||||
"watchers": 901,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "CVE-2022-25765 pdfkit <0.8.6 command injection.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-20T14:59:41Z",
|
||||
"updated_at": "2023-03-17T16:33:12Z",
|
||||
"updated_at": "2023-04-28T02:13:33Z",
|
||||
"pushed_at": "2022-12-21T14:19:03Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -139,10 +139,10 @@
|
|||
"description": "Exploit for CVE-2022-25765 command injection in pdfkit < 0.8.6",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T10:36:40Z",
|
||||
"updated_at": "2023-02-24T10:44:39Z",
|
||||
"updated_at": "2023-04-28T02:13:40Z",
|
||||
"pushed_at": "2023-01-29T11:01:27Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -151,7 +151,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -746,7 +746,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-25T09:45:18Z",
|
||||
"updated_at": "2023-04-27T11:20:39Z",
|
||||
"pushed_at": "2023-04-27T11:16:35Z",
|
||||
"pushed_at": "2023-04-28T06:07:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -616,7 +616,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-09T13:20:48Z",
|
||||
"updated_at": "2023-04-27T11:21:00Z",
|
||||
"pushed_at": "2023-04-27T11:16:00Z",
|
||||
"pushed_at": "2023-04-28T05:50:28Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T11:47:54Z",
|
||||
"updated_at": "2023-04-19T12:16:10Z",
|
||||
"updated_at": "2023-04-28T03:16:38Z",
|
||||
"pushed_at": "2023-03-20T12:51:29Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T04:59:05Z",
|
||||
"updated_at": "2023-04-27T18:56:41Z",
|
||||
"updated_at": "2023-04-28T06:29:06Z",
|
||||
"pushed_at": "2023-04-25T12:00:05Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 33,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-27T06:21:00Z",
|
||||
"updated_at": "2023-04-27T13:57:45Z",
|
||||
"updated_at": "2023-04-28T03:46:36Z",
|
||||
"pushed_at": "2023-04-27T06:34:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2023-28343 POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T15:19:02Z",
|
||||
"updated_at": "2023-03-30T18:06:37Z",
|
||||
"updated_at": "2023-04-28T02:13:08Z",
|
||||
"pushed_at": "2023-03-23T15:23:13Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-10T15:33:54Z",
|
||||
"updated_at": "2023-04-20T09:00:27Z",
|
||||
"updated_at": "2023-04-28T00:30:40Z",
|
||||
"pushed_at": "2023-04-10T20:24:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
12
README.md
12
README.md
|
@ -8713,7 +8713,7 @@ An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF d
|
|||
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
|
||||
|
||||
### CVE-2021-10086
|
||||
- [xiaoyun-1/CVE-2021-10086](https://github.com/xiaoyun-1/CVE-2021-10086)
|
||||
- [AK-blank/CVE-2021-10086](https://github.com/AK-blank/CVE-2021-10086)
|
||||
|
||||
### CVE-2021-20038 (2021-12-08)
|
||||
|
||||
|
@ -23726,7 +23726,6 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
|
|||
- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114)
|
||||
- [j4k0m/CVE-2018-0114](https://github.com/j4k0m/CVE-2018-0114)
|
||||
- [mmeza-developer/CVE-2018-0114](https://github.com/mmeza-developer/CVE-2018-0114)
|
||||
- [CyberSecurityUP/CVE-2018-0114-Exploit](https://github.com/CyberSecurityUP/CVE-2018-0114-Exploit)
|
||||
|
||||
### CVE-2018-0202 (2018-03-27)
|
||||
|
||||
|
@ -24729,7 +24728,6 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [ItsFadinG/CVE-2018-6574](https://github.com/ItsFadinG/CVE-2018-6574)
|
||||
- [imojne/CVE-2018-6574-POC](https://github.com/imojne/CVE-2018-6574-POC)
|
||||
- [twseptian/cve-2018-6574](https://github.com/twseptian/cve-2018-6574)
|
||||
- [the-valluvarsploit/CVE-2018-6574](https://github.com/the-valluvarsploit/CVE-2018-6574)
|
||||
- [yavolo/CVE-2018-6574](https://github.com/yavolo/CVE-2018-6574)
|
||||
- [ThaFWord/pentesterlab](https://github.com/ThaFWord/pentesterlab)
|
||||
- [Cypheer/exploit_CVE-2018-6574](https://github.com/Cypheer/exploit_CVE-2018-6574)
|
||||
|
@ -25808,14 +25806,6 @@ Buffer overflow in OPC UA applications allows remote attackers to trigger a stac
|
|||
|
||||
- [kevinherron/stack-overflow-poc](https://github.com/kevinherron/stack-overflow-poc)
|
||||
|
||||
### CVE-2018-12326 (2018-06-17)
|
||||
|
||||
<code>
|
||||
Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
|
||||
</code>
|
||||
|
||||
- [spasm5/CVE-2018-12326](https://github.com/spasm5/CVE-2018-12326)
|
||||
|
||||
### CVE-2018-12386 (2018-10-18)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue