mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2022/05/24 00:16:33
This commit is contained in:
parent
1f043da81f
commit
1e50b5d806
24 changed files with 120 additions and 120 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T04:39:32Z",
|
||||
"updated_at": "2022-05-06T00:53:10Z",
|
||||
"updated_at": "2022-05-23T19:23:18Z",
|
||||
"pushed_at": "2021-11-18T11:07:54Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-23T12:16:37Z",
|
||||
"updated_at": "2022-05-23T23:29:34Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1366,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-23T12:16:37Z",
|
||||
"updated_at": "2022-05-23T23:29:34Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1366,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-23T12:16:37Z",
|
||||
"updated_at": "2022-05-23T23:29:34Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1366,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -355,33 +355,6 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201442014,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "ThanHuuTuan\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "ThanHuuTuan",
|
||||
"id": 32167814,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T10:01:50Z",
|
||||
"updated_at": "2019-08-09T10:01:53Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
|
@ -424,17 +424,17 @@
|
|||
"description": "SambaCry exploit (CVE-2017-7494) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-07T11:42:40Z",
|
||||
"updated_at": "2022-05-23T00:50:17Z",
|
||||
"updated_at": "2022-05-23T20:31:18Z",
|
||||
"pushed_at": "2022-05-08T09:02:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-23T12:16:37Z",
|
||||
"updated_at": "2022-05-23T23:29:34Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1366,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-23T12:16:37Z",
|
||||
"updated_at": "2022-05-23T23:29:34Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1366,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -566,7 +566,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-12T03:17:35Z",
|
||||
"updated_at": "2022-05-12T03:18:14Z",
|
||||
"pushed_at": "2022-05-19T07:14:10Z",
|
||||
"pushed_at": "2022-05-23T23:08:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-23T12:16:37Z",
|
||||
"updated_at": "2022-05-23T23:29:34Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1366,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -99,17 +99,17 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2022-05-23T05:04:55Z",
|
||||
"updated_at": "2022-05-23T23:29:45Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 385,
|
||||
"watchers": 386,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -184,17 +184,17 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-05-22T10:50:21Z",
|
||||
"updated_at": "2022-05-23T21:55:32Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2022-05-23T17:58:10Z",
|
||||
"updated_at": "2022-05-23T23:51:06Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 69,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -154,10 +154,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-05-23T13:44:18Z",
|
||||
"updated_at": "2022-05-23T20:38:34Z",
|
||||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 856,
|
||||
"watchers_count": 856,
|
||||
"stargazers_count": 855,
|
||||
"watchers_count": 855,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -168,7 +168,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 856,
|
||||
"watchers": 855,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2022-05-21T09:21:52Z",
|
||||
"updated_at": "2022-05-23T19:07:41Z",
|
||||
"pushed_at": "2022-03-18T16:32:13Z",
|
||||
"stargazers_count": 801,
|
||||
"watchers_count": 801,
|
||||
"stargazers_count": 802,
|
||||
"watchers_count": 802,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 801,
|
||||
"watchers": 802,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-05-21T09:14:11Z",
|
||||
"updated_at": "2022-05-23T18:50:28Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1093,
|
||||
"watchers_count": 1093,
|
||||
"stargazers_count": 1094,
|
||||
"watchers_count": 1094,
|
||||
"forks_count": 288,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 288,
|
||||
"watchers": 1093,
|
||||
"watchers": 1094,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1095,17 +1095,17 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-05-21T13:29:51Z",
|
||||
"updated_at": "2022-05-23T19:26:19Z",
|
||||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -283,17 +283,17 @@
|
|||
"description": "POC for CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T11:46:45Z",
|
||||
"updated_at": "2022-05-23T14:47:21Z",
|
||||
"updated_at": "2022-05-23T19:14:42Z",
|
||||
"pushed_at": "2022-05-09T20:52:07Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-05-23T15:27:59Z",
|
||||
"updated_at": "2022-05-23T19:37:47Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 595,
|
||||
"watchers_count": 595,
|
||||
"stargazers_count": 596,
|
||||
"watchers_count": 596,
|
||||
"forks_count": 119,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 119,
|
||||
"watchers": 595,
|
||||
"watchers": 596,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-05-23T16:15:13Z",
|
||||
"updated_at": "2022-05-23T20:51:36Z",
|
||||
"pushed_at": "2022-05-18T18:27:36Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 271,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -589,17 +589,17 @@
|
|||
"description": "批量无损检测CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T07:55:26Z",
|
||||
"updated_at": "2022-05-19T08:20:19Z",
|
||||
"updated_at": "2022-05-23T23:05:45Z",
|
||||
"pushed_at": "2022-04-01T08:44:19Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1340,17 +1340,17 @@
|
|||
"description": "CVE-2022-22965写入冰蝎webshell脚本",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T03:50:14Z",
|
||||
"updated_at": "2022-05-23T17:41:56Z",
|
||||
"updated_at": "2022-05-23T23:01:48Z",
|
||||
"pushed_at": "2022-05-10T03:54:23Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1529,11 +1529,11 @@
|
|||
"description": "spring4shell | CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T14:59:42Z",
|
||||
"updated_at": "2022-05-04T22:28:37Z",
|
||||
"updated_at": "2022-05-23T22:38:31Z",
|
||||
"pushed_at": "2022-04-13T14:44:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1545,8 +1545,8 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -52,5 +52,32 @@
|
|||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 495567632,
|
||||
"name": "CVE-2022-23046",
|
||||
"full_name": "bernauers\/CVE-2022-23046",
|
||||
"owner": {
|
||||
"login": "bernauers",
|
||||
"id": 44301851,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44301851?v=4",
|
||||
"html_url": "https:\/\/github.com\/bernauers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bernauers\/CVE-2022-23046",
|
||||
"description": "Tinker Script for CVE-2022-23046",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-23T20:44:15Z",
|
||||
"updated_at": "2022-05-23T20:57:03Z",
|
||||
"pushed_at": "2022-05-23T21:03:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -123,17 +123,17 @@
|
|||
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T16:58:09Z",
|
||||
"updated_at": "2022-05-23T10:23:05Z",
|
||||
"updated_at": "2022-05-23T18:39:27Z",
|
||||
"pushed_at": "2022-05-17T15:17:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-05-23T08:26:33Z",
|
||||
"updated_at": "2022-05-23T18:51:34Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 665,
|
||||
"watchers_count": 665,
|
||||
|
|
|
@ -810,6 +810,7 @@ PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the
|
|||
|
||||
- [jcarabantes/CVE-2022-23046](https://github.com/jcarabantes/CVE-2022-23046)
|
||||
- [dnr6419/CVE-2022-23046](https://github.com/dnr6419/CVE-2022-23046)
|
||||
- [bernauers/CVE-2022-23046](https://github.com/bernauers/CVE-2022-23046)
|
||||
|
||||
### CVE-2022-23121
|
||||
- [kuznyJan1972/CVE-2022-23121-RCE](https://github.com/kuznyJan1972/CVE-2022-23121-RCE)
|
||||
|
@ -19626,7 +19627,6 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
|
|||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [k4u5h41/CVE-2017-7269](https://github.com/k4u5h41/CVE-2017-7269)
|
||||
|
||||
### CVE-2017-7374 (2017-03-31)
|
||||
|
|
Loading…
Add table
Reference in a new issue