mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/03/09 12:14:39
This commit is contained in:
parent
a9ec3ebfbf
commit
232d7f0247
66 changed files with 571 additions and 1055 deletions
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 33029463,
|
||||
"name": "BEAST-PoC",
|
||||
"full_name": "mpgn\/BEAST-PoC",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/BEAST-PoC",
|
||||
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-28T10:28:16Z",
|
||||
"updated_at": "2021-12-08T06:17:16Z",
|
||||
"pushed_at": "2019-01-30T21:36:22Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"beast",
|
||||
"plaintext-attack",
|
||||
"python",
|
||||
"sslv3",
|
||||
"tls"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,11 +40,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-03-08T04:40:45Z",
|
||||
"updated_at": "2022-03-09T10:13:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"forks_count": 286,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -70,8 +70,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1305,
|
||||
"forks": 287,
|
||||
"watchers": 1306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1604,33 +1604,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 421096576,
|
||||
"name": "ShellShock",
|
||||
"full_name": "JowardBince\/ShellShock",
|
||||
"owner": {
|
||||
"login": "JowardBince",
|
||||
"id": 66454005,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66454005?v=4",
|
||||
"html_url": "https:\/\/github.com\/JowardBince"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JowardBince\/ShellShock",
|
||||
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T16:13:48Z",
|
||||
"updated_at": "2021-11-27T17:59:13Z",
|
||||
"pushed_at": "2021-10-28T14:09:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 459666650,
|
||||
"name": "ShellShock",
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-03-08T04:40:45Z",
|
||||
"updated_at": "2022-03-09T10:13:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"forks_count": 286,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -43,8 +43,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1305,
|
||||
"forks": 287,
|
||||
"watchers": 1306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 62454997,
|
||||
"name": "CVE-2016-2468",
|
||||
"full_name": "gitcollect\/CVE-2016-2468",
|
||||
"owner": {
|
||||
"login": "gitcollect",
|
||||
"id": 17906239,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
|
||||
"html_url": "https:\/\/github.com\/gitcollect"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gitcollect\/CVE-2016-2468",
|
||||
"description": "Buildable Poc of CVE-2016-2468 based on http:\/\/retme.net\/index.php\/2016\/06\/12\/CVE-2016-2468.html",
|
||||
"fork": false,
|
||||
"created_at": "2016-07-02T14:37:31Z",
|
||||
"updated_at": "2018-03-01T18:02:03Z",
|
||||
"pushed_at": "2016-07-02T10:34:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1065,17 +1065,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-03-09T05:51:08Z",
|
||||
"pushed_at": "2022-03-09T05:27:59Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 24,
|
||||
"updated_at": "2022-03-09T11:46:43Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 74,
|
||||
"forks": 28,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -136,12 +136,12 @@
|
|||
"pushed_at": "2021-03-26T10:33:51Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-03-08T04:40:45Z",
|
||||
"updated_at": "2022-03-09T10:13:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"forks_count": 286,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -70,8 +70,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1305,
|
||||
"forks": 287,
|
||||
"watchers": 1306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -170,36 +170,6 @@
|
|||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84602394,
|
||||
"name": "apache-struts2-CVE-2017-5638",
|
||||
"full_name": "immunio\/apache-struts2-CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "immunio",
|
||||
"id": 6700387,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6700387?v=4",
|
||||
"html_url": "https:\/\/github.com\/immunio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638",
|
||||
"description": "Demo Application and Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T21:33:25Z",
|
||||
"updated_at": "2021-10-27T16:49:21Z",
|
||||
"pushed_at": "2017-03-13T15:03:32Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"apache-struts2-045",
|
||||
"cve-2017-5638"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84620334,
|
||||
"name": "OgnlContentTypeRejectorValve",
|
||||
|
@ -1528,39 +1498,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 177221305,
|
||||
"name": "CVE-2017-5638",
|
||||
"full_name": "colorblindpentester\/CVE-2017-5638",
|
||||
"owner": {
|
||||
"login": "colorblindpentester",
|
||||
"id": 45195264,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45195264?v=4",
|
||||
"html_url": "https:\/\/github.com\/colorblindpentester"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2017-5638",
|
||||
"description": "CVE-2017-5638 (PoC Exploits)",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-22T23:25:49Z",
|
||||
"updated_at": "2019-03-22T23:30:08Z",
|
||||
"pushed_at": "2019-03-22T23:29:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2017",
|
||||
"cve-2017-5638",
|
||||
"exploit",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 202619396,
|
||||
"name": "cve-2017-5638",
|
||||
|
|
|
@ -1,36 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 116768537,
|
||||
"name": "exploit-cve-2017-5715",
|
||||
"full_name": "opsxcq\/exploit-cve-2017-5715",
|
||||
"owner": {
|
||||
"login": "opsxcq",
|
||||
"id": 16995025,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
|
||||
"html_url": "https:\/\/github.com\/opsxcq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
|
||||
"description": "Spectre exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T05:06:12Z",
|
||||
"updated_at": "2022-02-21T01:51:16Z",
|
||||
"pushed_at": "2018-01-09T22:27:25Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"intelbug",
|
||||
"memory-leak",
|
||||
"spectre"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117425769,
|
||||
"name": "meltdown-spectre-bios-list",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Hikvision camera CVE-2017-7921-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-27T11:49:40Z",
|
||||
"updated_at": "2022-02-26T17:00:32Z",
|
||||
"updated_at": "2022-03-09T08:54:32Z",
|
||||
"pushed_at": "2020-08-09T15:35:16Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -32,32 +32,5 @@
|
|||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 465062160,
|
||||
"name": "tools-for-CVE-2018-1000001",
|
||||
"full_name": "usernameid0\/tools-for-CVE-2018-1000001",
|
||||
"owner": {
|
||||
"login": "usernameid0",
|
||||
"id": 100703550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100703550?v=4",
|
||||
"html_url": "https:\/\/github.com\/usernameid0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/usernameid0\/tools-for-CVE-2018-1000001",
|
||||
"description": "Tools for get offsets and adding patch for support i386",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T21:27:37Z",
|
||||
"updated_at": "2022-03-01T21:43:03Z",
|
||||
"pushed_at": "2022-03-01T21:41:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -196,33 +196,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 410750342,
|
||||
"name": "Bash-Script-CVE-2018-16763",
|
||||
"full_name": "k4is3r13\/Bash-Script-CVE-2018-16763",
|
||||
"owner": {
|
||||
"login": "k4is3r13",
|
||||
"id": 47679627,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47679627?v=4",
|
||||
"html_url": "https:\/\/github.com\/k4is3r13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k4is3r13\/Bash-Script-CVE-2018-16763",
|
||||
"description": "FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages\/select\/ filter parameter or the preview\/ data parameter. This can lead to Pre-Auth Remote Code Execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-27T05:15:38Z",
|
||||
"updated_at": "2021-11-30T23:31:45Z",
|
||||
"pushed_at": "2021-11-30T23:31:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 424093201,
|
||||
"name": "CVE-2018-16763",
|
||||
|
|
|
@ -530,11 +530,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-03-08T04:40:45Z",
|
||||
"updated_at": "2022-03-09T10:13:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"forks_count": 286,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -560,8 +560,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1305,
|
||||
"forks": 287,
|
||||
"watchers": 1306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T08:04:19Z",
|
||||
"updated_at": "2022-01-17T15:13:46Z",
|
||||
"updated_at": "2022-03-09T09:19:41Z",
|
||||
"pushed_at": "2018-08-28T08:06:21Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept for CVE-2018-4150 by @cmwdotme ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-08T16:12:59Z",
|
||||
"updated_at": "2021-06-20T05:17:02Z",
|
||||
"updated_at": "2022-03-09T10:45:29Z",
|
||||
"pushed_at": "2018-05-08T16:14:50Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": "incomplete exploit for CVE-2018-4150 (by cmwdotme) for devices without SMAP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T14:29:37Z",
|
||||
"updated_at": "2020-09-29T08:51:45Z",
|
||||
"updated_at": "2022-03-09T10:45:07Z",
|
||||
"pushed_at": "2018-05-30T14:39:55Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2022-03-04T09:07:10Z",
|
||||
"updated_at": "2022-03-09T08:15:07Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 495,
|
||||
"watchers": 496,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,38 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 131405057,
|
||||
"name": "NXLoader",
|
||||
"full_name": "DavidBuchanan314\/NXLoader",
|
||||
"owner": {
|
||||
"login": "DavidBuchanan314",
|
||||
"id": 13520633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4",
|
||||
"html_url": "https:\/\/github.com\/DavidBuchanan314"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DavidBuchanan314\/NXLoader",
|
||||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2022-03-01T15:43:25Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2018-6242",
|
||||
"exploit",
|
||||
"nintendo",
|
||||
"nintendo-switch",
|
||||
"nintendo-switch-hacking",
|
||||
"usb"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 444,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134342730,
|
||||
"name": "rcm-modchips",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 308459174,
|
||||
"name": "CVE-2019-10779",
|
||||
"full_name": "RepublicR0K\/CVE-2019-10779",
|
||||
"owner": {
|
||||
"login": "RepublicR0K",
|
||||
"id": 73670332,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73670332?v=4",
|
||||
"html_url": "https:\/\/github.com\/RepublicR0K"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RepublicR0K\/CVE-2019-10779",
|
||||
"description": "GCHQ Stroom is vulnerable to Cross-Site Scripting due to the ability to load the Stroom dashboard on another site and insufficient protection against window event origins.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T21:56:32Z",
|
||||
"updated_at": "2021-07-13T10:09:41Z",
|
||||
"pushed_at": "2020-10-29T21:57:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,5 +41,32 @@
|
|||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 467862315,
|
||||
"name": "CVE-2019-10999",
|
||||
"full_name": "qjh2333\/CVE-2019-10999",
|
||||
"owner": {
|
||||
"login": "qjh2333",
|
||||
"id": 97860473,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97860473?v=4",
|
||||
"html_url": "https:\/\/github.com\/qjh2333"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qjh2333\/CVE-2019-10999",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T09:35:15Z",
|
||||
"updated_at": "2022-03-09T09:35:15Z",
|
||||
"pushed_at": "2022-03-09T09:43:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 1701,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217065303,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "B1gd0g\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "B1gd0g",
|
||||
"id": 49259860,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49259860?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1gd0g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1gd0g\/CVE-2019-11043",
|
||||
"description": "CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T13:32:14Z",
|
||||
"updated_at": "2020-09-07T00:53:59Z",
|
||||
"pushed_at": "2019-10-23T13:35:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217065801,
|
||||
"name": "CVE-2019-11043",
|
||||
|
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 203123412,
|
||||
"name": "CVE-2019-15107",
|
||||
"full_name": "jas502n\/CVE-2019-15107",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-15107",
|
||||
"description": "CVE-2019-15107 Webmin RCE (unauthorized)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-19T07:43:16Z",
|
||||
"updated_at": "2021-12-06T02:46:36Z",
|
||||
"pushed_at": "2019-09-02T16:06:19Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 203752840,
|
||||
"name": "webmin_docker_and_exp",
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2022-03-03T12:32:12Z",
|
||||
"updated_at": "2022-03-09T06:43:49Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 797,
|
||||
"watchers_count": 797,
|
||||
"stargazers_count": 798,
|
||||
"watchers_count": 798,
|
||||
"forks_count": 171,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 171,
|
||||
"watchers": 797,
|
||||
"watchers": 798,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -175,11 +175,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-03-08T04:40:45Z",
|
||||
"updated_at": "2022-03-09T10:13:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"forks_count": 286,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -205,8 +205,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1305,
|
||||
"forks": 287,
|
||||
"watchers": 1306,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -80,33 +80,6 @@
|
|||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 184489534,
|
||||
"name": "cve-2019-2725",
|
||||
"full_name": "lasensio\/cve-2019-2725",
|
||||
"owner": {
|
||||
"login": "lasensio",
|
||||
"id": 17970238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17970238?v=4",
|
||||
"html_url": "https:\/\/github.com\/lasensio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lasensio\/cve-2019-2725",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-01T22:25:14Z",
|
||||
"updated_at": "2021-01-23T11:50:16Z",
|
||||
"pushed_at": "2019-05-01T23:00:39Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 184651903,
|
||||
"name": "CVE-2019-2725",
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"forks_count": 155,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"forks": 156,
|
||||
"watchers": 570,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:14:27Z",
|
||||
"updated_at": "2022-03-08T17:39:32Z",
|
||||
"updated_at": "2022-03-09T11:05:06Z",
|
||||
"pushed_at": "2022-03-08T17:40:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2022-02-26T15:35:42Z",
|
||||
"updated_at": "2022-03-09T06:25:49Z",
|
||||
"pushed_at": "2021-10-29T07:46:53Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 320,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,47 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 303511670,
|
||||
"name": "CVE-2020-16899",
|
||||
"full_name": "advanced-threat-research\/CVE-2020-16899",
|
||||
"owner": {
|
||||
"login": "advanced-threat-research",
|
||||
"id": 27901279,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
|
||||
"html_url": "https:\/\/github.com\/advanced-threat-research"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899",
|
||||
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-12T20:59:03Z",
|
||||
"updated_at": "2021-06-02T02:02:37Z",
|
||||
"pushed_at": "2020-10-19T13:58:46Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"atr",
|
||||
"buffer-overflow",
|
||||
"buffer-overflow-vulnerability",
|
||||
"cve",
|
||||
"cve-2020-16899",
|
||||
"icmpv6",
|
||||
"lua",
|
||||
"mcafee",
|
||||
"microsoft",
|
||||
"neighbor-discovery",
|
||||
"neighbor-discovery-protocol",
|
||||
"rce",
|
||||
"suricata",
|
||||
"suricata-rule",
|
||||
"tcpip-stack",
|
||||
"vulnerability",
|
||||
"windows-10"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2021-11-26T07:40:35Z",
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 100,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"forks": 101,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -206,12 +206,12 @@
|
|||
"pushed_at": "2020-02-21T08:45:51Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -233,12 +233,12 @@
|
|||
"pushed_at": "2020-02-28T07:08:16Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-03-08T04:40:45Z",
|
||||
"updated_at": "2022-03-09T10:13:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"forks_count": 286,
|
||||
"stargazers_count": 1306,
|
||||
"watchers_count": 1306,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -43,8 +43,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 1305,
|
||||
"forks": 287,
|
||||
"watchers": 1306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -633,33 +633,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277798487,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "k3nundrum\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "k3nundrum",
|
||||
"id": 47409600,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47409600?v=4",
|
||||
"html_url": "https:\/\/github.com\/k3nundrum"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k3nundrum\/CVE-2020-5902",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-07T11:31:31Z",
|
||||
"updated_at": "2020-07-08T13:06:25Z",
|
||||
"pushed_at": "2020-07-08T13:06:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277800636,
|
||||
"name": "CVE-2020-5902-F5-BIGIP",
|
||||
|
|
|
@ -179,12 +179,12 @@
|
|||
"pushed_at": "2021-01-03T10:54:20Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -206,12 +206,12 @@
|
|||
"pushed_at": "2021-01-15T10:51:58Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-03-08T04:14:28Z",
|
||||
"updated_at": "2022-03-09T12:03:47Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1534,
|
||||
"watchers_count": 1534,
|
||||
"stargazers_count": 1535,
|
||||
"watchers_count": 1535,
|
||||
"forks_count": 556,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 556,
|
||||
"watchers": 1534,
|
||||
"watchers": 1535,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T14:19:58Z",
|
||||
"updated_at": "2022-03-04T15:42:08Z",
|
||||
"updated_at": "2022-03-09T07:23:22Z",
|
||||
"pushed_at": "2022-02-19T13:52:32Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,32 +25,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 418722822,
|
||||
"name": "CVE-2021-21234",
|
||||
"full_name": "xiaojiangxl\/CVE-2021-21234",
|
||||
"owner": {
|
||||
"login": "xiaojiangxl",
|
||||
"id": 58814935,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814935?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiaojiangxl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiaojiangxl\/CVE-2021-21234",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-19T01:08:48Z",
|
||||
"updated_at": "2021-12-13T03:39:02Z",
|
||||
"pushed_at": "2021-10-19T01:18:49Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -148,5 +148,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402614345,
|
||||
"name": "Dell-Driver-EoP-CVE-2021-21551",
|
||||
"full_name": "ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551",
|
||||
"owner": {
|
||||
"login": "ihack4falafel",
|
||||
"id": 17316888,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17316888?v=4",
|
||||
"html_url": "https:\/\/github.com\/ihack4falafel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551",
|
||||
"description": "Dell Driver EoP (CVE-2021-21551)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T01:47:03Z",
|
||||
"updated_at": "2022-02-16T12:56:09Z",
|
||||
"pushed_at": "2022-02-24T10:13:45Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2022-03-09T03:06:38Z",
|
||||
"updated_at": "2022-03-09T08:11:42Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 71,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,18 +121,18 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2022-03-09T03:19:02Z",
|
||||
"updated_at": "2022-03-09T08:00:12Z",
|
||||
"pushed_at": "2021-11-06T05:20:30Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 65,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"forks": 66,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-22T03:04:50Z",
|
||||
"updated_at": "2022-03-01T06:56:42Z",
|
||||
"updated_at": "2022-03-09T08:05:13Z",
|
||||
"pushed_at": "2021-06-22T04:35:08Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 14,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 62,
|
||||
"forks": 15,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,34 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 418585239,
|
||||
"name": "CVE-2021-24884",
|
||||
"full_name": "S1lkys\/CVE-2021-24884",
|
||||
"owner": {
|
||||
"login": "S1lkys",
|
||||
"id": 40408435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
|
||||
"html_url": "https:\/\/github.com\/S1lkys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-24884",
|
||||
"description": "If an authenticated user who is able to edit Wordpress PHP code in any kind, clicks a malicious link, PHP code can be edited through XSS in Formidable Forms 4.09.04.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T16:37:08Z",
|
||||
"updated_at": "2021-10-19T20:10:11Z",
|
||||
"pushed_at": "2021-10-19T20:10:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"formidable",
|
||||
"wordpress",
|
||||
"xss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 35,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -726,17 +726,17 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2022-03-08T20:34:24Z",
|
||||
"updated_at": "2022-03-09T08:19:15Z",
|
||||
"pushed_at": "2022-02-13T12:21:53Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2022-03-09T02:57:19Z",
|
||||
"updated_at": "2022-03-09T11:53:45Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 224,
|
||||
"watchers": 225,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2022-03-05T01:07:11Z",
|
||||
"updated_at": "2022-03-09T08:55:56Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 104,
|
||||
"watchers": 283,
|
||||
"watchers": 284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-35042.json
Normal file
29
2021/CVE-2021-35042.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 410014595,
|
||||
"name": "CVE-2021-35042",
|
||||
"full_name": "r4vi\/CVE-2021-35042",
|
||||
"owner": {
|
||||
"login": "r4vi",
|
||||
"id": 565628,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/565628?v=4",
|
||||
"html_url": "https:\/\/github.com\/r4vi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r4vi\/CVE-2021-35042",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-24T15:30:25Z",
|
||||
"updated_at": "2021-11-16T09:48:31Z",
|
||||
"pushed_at": "2022-02-10T16:43:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 427206143,
|
||||
"name": "CVE-2021-38666-poc",
|
||||
"full_name": "DarkSprings\/CVE-2021-38666-poc",
|
||||
"owner": {
|
||||
"login": "DarkSprings",
|
||||
"id": 90366126,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
|
||||
"html_url": "https:\/\/github.com\/DarkSprings"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-38666-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-12T02:21:27Z",
|
||||
"updated_at": "2021-11-30T07:27:35Z",
|
||||
"pushed_at": "2021-11-12T02:32:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437242073,
|
||||
"name": "CVE-2021-38666",
|
||||
|
|
|
@ -1,34 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 418598904,
|
||||
"name": "CVE-2021-40101",
|
||||
"full_name": "S1lkys\/CVE-2021-40101",
|
||||
"owner": {
|
||||
"login": "S1lkys",
|
||||
"id": 40408435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
|
||||
"html_url": "https:\/\/github.com\/S1lkys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-40101",
|
||||
"description": "Survey XSS combined with CSRF leads to Admin Account Takeover in Concrete5 8.5.4",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T17:18:28Z",
|
||||
"updated_at": "2021-11-10T20:22:06Z",
|
||||
"pushed_at": "2021-10-18T17:50:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"concrete5",
|
||||
"cve-2021-40101",
|
||||
"exploit",
|
||||
"xss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -106,17 +106,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-03-08T12:08:59Z",
|
||||
"updated_at": "2022-03-09T09:19:47Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1391,
|
||||
"watchers_count": 1391,
|
||||
"forks_count": 401,
|
||||
"stargazers_count": 1393,
|
||||
"watchers_count": 1393,
|
||||
"forks_count": 402,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 401,
|
||||
"watchers": 1391,
|
||||
"forks": 402,
|
||||
"watchers": 1393,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1234,17 +1234,17 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2022-03-07T02:31:13Z",
|
||||
"updated_at": "2022-03-09T07:15:19Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 49,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1261,10 +1261,10 @@
|
|||
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:01:26Z",
|
||||
"updated_at": "2022-03-09T02:58:20Z",
|
||||
"updated_at": "2022-03-09T11:33:43Z",
|
||||
"pushed_at": "2022-02-07T15:42:00Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1287,7 +1287,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3522,5 +3522,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 467844609,
|
||||
"name": "Polkit-s-Pkexec-CVE-2021-4034",
|
||||
"full_name": "ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "ITMarcin2211",
|
||||
"id": 60057530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4",
|
||||
"html_url": "https:\/\/github.com\/ITMarcin2211"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034",
|
||||
"description": "Polkit's Pkexec CVE-2021-4034 Proof Of Concept and Patching",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T08:44:02Z",
|
||||
"updated_at": "2022-03-09T08:51:49Z",
|
||||
"pushed_at": "2022-03-09T08:54:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-40374.json
Normal file
29
2021/CVE-2021-40374.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 401673817,
|
||||
"name": "CVE-2021-40374",
|
||||
"full_name": "DCKento\/CVE-2021-40374",
|
||||
"owner": {
|
||||
"login": "DCKento",
|
||||
"id": 20635370,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20635370?v=4",
|
||||
"html_url": "https:\/\/github.com\/DCKento"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DCKento\/CVE-2021-40374",
|
||||
"description": "XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T11:12:49Z",
|
||||
"updated_at": "2021-10-30T14:45:52Z",
|
||||
"pushed_at": "2021-10-30T14:48:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-40375.json
Normal file
29
2021/CVE-2021-40375.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 401673921,
|
||||
"name": "CVE-2021-40375",
|
||||
"full_name": "DCKento\/CVE-2021-40375",
|
||||
"owner": {
|
||||
"login": "DCKento",
|
||||
"id": 20635370,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20635370?v=4",
|
||||
"html_url": "https:\/\/github.com\/DCKento"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DCKento\/CVE-2021-40375",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T11:13:14Z",
|
||||
"updated_at": "2021-10-30T14:45:53Z",
|
||||
"pushed_at": "2021-10-30T14:49:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-03-09T05:22:24Z",
|
||||
"updated_at": "2022-03-09T06:55:38Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1381,
|
||||
"watchers_count": 1381,
|
||||
"stargazers_count": 1382,
|
||||
"watchers_count": 1382,
|
||||
"forks_count": 453,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 453,
|
||||
"watchers": 1381,
|
||||
"watchers": 1382,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T19:07:37Z",
|
||||
"updated_at": "2022-03-09T05:12:26Z",
|
||||
"updated_at": "2022-03-09T12:03:34Z",
|
||||
"pushed_at": "2022-03-08T15:37:34Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 32,
|
||||
"forks": 9,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 416209688,
|
||||
"name": "goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
|
||||
"full_name": "kimusan\/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
|
||||
"owner": {
|
||||
"login": "kimusan",
|
||||
"id": 1150049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1150049?v=4",
|
||||
"html_url": "https:\/\/github.com\/kimusan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kimusan\/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
|
||||
"description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T06:21:02Z",
|
||||
"updated_at": "2022-01-20T06:50:27Z",
|
||||
"pushed_at": "2021-10-18T20:56:31Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 444456600,
|
||||
"name": "CVE-2021-42342",
|
||||
|
|
|
@ -183,10 +183,10 @@
|
|||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:42:37Z",
|
||||
"updated_at": "2022-03-05T20:44:45Z",
|
||||
"updated_at": "2022-03-09T08:29:23Z",
|
||||
"pushed_at": "2021-12-11T02:49:41Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,17 +772,17 @@
|
|||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:46:18Z",
|
||||
"updated_at": "2022-02-14T08:27:55Z",
|
||||
"updated_at": "2022-03-09T07:20:57Z",
|
||||
"pushed_at": "2021-12-13T22:27:25Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 173,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1894,10 +1894,10 @@
|
|||
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2022-03-08T10:56:38Z",
|
||||
"updated_at": "2022-03-09T07:02:09Z",
|
||||
"pushed_at": "2022-01-17T19:47:41Z",
|
||||
"stargazers_count": 617,
|
||||
"watchers_count": 617,
|
||||
"stargazers_count": 618,
|
||||
"watchers_count": 618,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1916,7 +1916,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 617,
|
||||
"watchers": 618,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2651,17 +2651,17 @@
|
|||
"description": "Python script that sends CVE-2021-44228 log4j payload requests to url list",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T13:28:31Z",
|
||||
"updated_at": "2021-12-20T13:16:16Z",
|
||||
"updated_at": "2022-03-09T07:20:53Z",
|
||||
"pushed_at": "2021-12-12T13:39:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3548,17 +3548,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-03-09T05:46:38Z",
|
||||
"updated_at": "2022-03-09T08:08:04Z",
|
||||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2771,
|
||||
"watchers_count": 2771,
|
||||
"stargazers_count": 2772,
|
||||
"watchers_count": 2772,
|
||||
"forks_count": 674,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 674,
|
||||
"watchers": 2771,
|
||||
"watchers": 2772,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4963,7 +4963,7 @@
|
|||
"pushed_at": "2022-01-02T16:34:49Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -4976,7 +4976,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -5971,12 +5971,12 @@
|
|||
"pushed_at": "2022-02-03T20:02:09Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 96,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"forks": 95,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -6800,17 +6800,17 @@
|
|||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2022-03-07T18:24:00Z",
|
||||
"updated_at": "2022-03-09T06:29:52Z",
|
||||
"pushed_at": "2022-01-23T22:37:41Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8685,17 +8685,17 @@
|
|||
"description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T13:41:35Z",
|
||||
"updated_at": "2022-03-08T02:25:19Z",
|
||||
"updated_at": "2022-03-09T07:57:58Z",
|
||||
"pushed_at": "2021-12-21T06:11:58Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0185",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T06:19:38Z",
|
||||
"updated_at": "2022-03-09T05:40:10Z",
|
||||
"updated_at": "2022-03-09T06:44:30Z",
|
||||
"pushed_at": "2022-01-25T17:00:16Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 305,
|
||||
"watchers": 306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-28T01:25:26Z",
|
||||
"updated_at": "2022-03-09T03:13:15Z",
|
||||
"updated_at": "2022-03-09T06:57:40Z",
|
||||
"pushed_at": "2022-03-09T00:09:46Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-03-06T17:19:38Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-06T00:03:31Z",
|
||||
"updated_at": "2022-03-09T05:56:43Z",
|
||||
"updated_at": "2022-03-09T09:50:24Z",
|
||||
"pushed_at": "2022-03-06T07:01:15Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 53,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-03-07T15:52:23Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -71,12 +71,12 @@
|
|||
"pushed_at": "2022-03-07T17:59:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-03-09T06:14:32Z",
|
||||
"pushed_at": "2022-03-09T05:27:59Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 24,
|
||||
"updated_at": "2022-03-09T11:46:43Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 75,
|
||||
"forks": 28,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,17 +121,17 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-03-09T06:13:01Z",
|
||||
"updated_at": "2022-03-09T12:02:43Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"forks_count": 99,
|
||||
"stargazers_count": 488,
|
||||
"watchers_count": 488,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 431,
|
||||
"forks": 109,
|
||||
"watchers": 488,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -206,12 +206,12 @@
|
|||
"pushed_at": "2022-03-08T01:50:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -233,12 +233,12 @@
|
|||
"pushed_at": "2022-03-08T09:31:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -260,12 +260,12 @@
|
|||
"pushed_at": "2022-03-08T05:18:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -283,17 +283,17 @@
|
|||
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T09:10:51Z",
|
||||
"updated_at": "2022-03-09T06:05:02Z",
|
||||
"updated_at": "2022-03-09T10:00:33Z",
|
||||
"pushed_at": "2022-03-08T09:14:25Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -310,17 +310,17 @@
|
|||
"description": "An exploit for CVE-2022-0847 dirty-pipe vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T10:40:07Z",
|
||||
"updated_at": "2022-03-08T10:42:34Z",
|
||||
"updated_at": "2022-03-09T07:15:27Z",
|
||||
"pushed_at": "2022-03-08T11:15:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -337,17 +337,17 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2022-03-09T05:27:28Z",
|
||||
"updated_at": "2022-03-09T08:44:38Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -364,16 +364,16 @@
|
|||
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T12:43:43Z",
|
||||
"updated_at": "2022-03-08T12:50:25Z",
|
||||
"updated_at": "2022-03-09T09:12:37Z",
|
||||
"pushed_at": "2022-03-08T13:15:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -391,17 +391,17 @@
|
|||
"description": "The Dirty Pipe Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T13:48:55Z",
|
||||
"updated_at": "2022-03-09T05:24:47Z",
|
||||
"updated_at": "2022-03-09T07:16:02Z",
|
||||
"pushed_at": "2022-03-08T13:54:08Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -422,12 +422,12 @@
|
|||
"pushed_at": "2022-03-08T15:35:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -449,12 +449,12 @@
|
|||
"pushed_at": "2022-03-08T15:47:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -580,17 +580,17 @@
|
|||
"description": "A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T01:55:04Z",
|
||||
"updated_at": "2022-03-09T02:01:30Z",
|
||||
"updated_at": "2022-03-09T07:16:19Z",
|
||||
"pushed_at": "2022-03-09T02:01:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -634,46 +634,19 @@
|
|||
"description": "CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T02:47:08Z",
|
||||
"updated_at": "2022-03-09T04:03:00Z",
|
||||
"updated_at": "2022-03-09T12:06:00Z",
|
||||
"pushed_at": "2022-03-09T02:47:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2022-0847"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 467779512,
|
||||
"name": "Dirtypipe-exploit",
|
||||
"full_name": "MRNIKO1\/Dirtypipe-exploit",
|
||||
"owner": {
|
||||
"login": "MRNIKO1",
|
||||
"id": 72093135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72093135?v=4",
|
||||
"html_url": "https:\/\/github.com\/MRNIKO1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MRNIKO1\/Dirtypipe-exploit",
|
||||
"description": "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T04:42:59Z",
|
||||
"updated_at": "2022-03-09T04:42:59Z",
|
||||
"pushed_at": "2022-03-09T04:43:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -694,6 +667,87 @@
|
|||
"pushed_at": "2022-03-09T06:16:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 467818101,
|
||||
"name": "Dirtypipe-exploit",
|
||||
"full_name": "nanaao\/Dirtypipe-exploit",
|
||||
"owner": {
|
||||
"login": "nanaao",
|
||||
"id": 77666853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
|
||||
"html_url": "https:\/\/github.com\/nanaao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nanaao\/Dirtypipe-exploit",
|
||||
"description": "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T07:16:57Z",
|
||||
"updated_at": "2022-03-09T11:39:58Z",
|
||||
"pushed_at": "2022-03-09T04:43:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 467872655,
|
||||
"name": "cve-2022-0847dirtypipe-exploit",
|
||||
"full_name": "AyoubNajim\/cve-2022-0847dirtypipe-exploit",
|
||||
"owner": {
|
||||
"login": "AyoubNajim",
|
||||
"id": 68334573,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68334573?v=4",
|
||||
"html_url": "https:\/\/github.com\/AyoubNajim"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AyoubNajim\/cve-2022-0847dirtypipe-exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T10:05:53Z",
|
||||
"updated_at": "2022-03-09T10:15:23Z",
|
||||
"pushed_at": "2022-03-09T10:16:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 467878952,
|
||||
"name": "pentestblog-CVE-2022-0847",
|
||||
"full_name": "pentestblogin\/pentestblog-CVE-2022-0847",
|
||||
"owner": {
|
||||
"login": "pentestblogin",
|
||||
"id": 70894330,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70894330?v=4",
|
||||
"html_url": "https:\/\/github.com\/pentestblogin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pentestblogin\/pentestblog-CVE-2022-0847",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T10:24:42Z",
|
||||
"updated_at": "2022-03-09T10:26:10Z",
|
||||
"pushed_at": "2022-03-09T10:26:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 457817909,
|
||||
"name": "CVE-2022-20699",
|
||||
"full_name": "puckiestyle\/CVE-2022-20699",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-20699",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-10T14:40:25Z",
|
||||
"updated_at": "2022-02-10T14:40:40Z",
|
||||
"pushed_at": "2022-02-10T14:40:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 459040811,
|
||||
"name": "CVE-2022-20699",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-03-08T01:05:06Z",
|
||||
"updated_at": "2022-03-09T11:40:55Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 198,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-15T09:22:19Z",
|
||||
"updated_at": "2022-03-04T11:03:24Z",
|
||||
"updated_at": "2022-03-09T08:42:44Z",
|
||||
"pushed_at": "2022-02-21T08:58:22Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2022-03-09T06:10:37Z",
|
||||
"updated_at": "2022-03-09T08:55:07Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 158,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,17 +121,17 @@
|
|||
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-03T13:13:02Z",
|
||||
"updated_at": "2022-03-09T03:19:42Z",
|
||||
"updated_at": "2022-03-09T09:39:53Z",
|
||||
"pushed_at": "2022-03-03T14:31:32Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -447,17 +447,17 @@
|
|||
"description": "CVE-2022-22947批量检测脚本,超时时间不超过2s,已更新可反弹shell的EXP,欢迎师傅们试用",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T11:31:00Z",
|
||||
"updated_at": "2022-03-08T09:46:36Z",
|
||||
"updated_at": "2022-03-09T09:11:33Z",
|
||||
"pushed_at": "2022-03-08T09:43:50Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -582,7 +582,7 @@
|
|||
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947)批量检测工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T09:14:50Z",
|
||||
"updated_at": "2022-03-08T10:43:15Z",
|
||||
"updated_at": "2022-03-09T06:21:27Z",
|
||||
"pushed_at": "2022-03-08T02:09:38Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
@ -690,17 +690,17 @@
|
|||
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T09:32:36Z",
|
||||
"updated_at": "2022-03-09T02:11:24Z",
|
||||
"updated_at": "2022-03-09T08:34:39Z",
|
||||
"pushed_at": "2022-03-08T09:36:31Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -717,8 +717,8 @@
|
|||
"description": "调试代码包含断点信息,直接导入即可进行调试",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T10:07:54Z",
|
||||
"updated_at": "2022-03-08T10:07:54Z",
|
||||
"pushed_at": "2022-03-08T10:07:55Z",
|
||||
"updated_at": "2022-03-09T07:44:58Z",
|
||||
"pushed_at": "2022-03-09T07:44:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -188,33 +188,6 @@
|
|||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 462818933,
|
||||
"name": "cve-2022-23131-exp",
|
||||
"full_name": "random-robbie\/cve-2022-23131-exp",
|
||||
"owner": {
|
||||
"login": "random-robbie",
|
||||
"id": 4902869,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4",
|
||||
"html_url": "https:\/\/github.com\/random-robbie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/random-robbie\/cve-2022-23131-exp",
|
||||
"description": "Zabbix SSO Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-23T16:34:03Z",
|
||||
"updated_at": "2022-02-26T11:22:28Z",
|
||||
"pushed_at": "2022-02-23T16:37:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 463061723,
|
||||
"name": "CVE-2022-23131",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-03-09T06:01:28Z",
|
||||
"updated_at": "2022-03-09T11:50:27Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 23,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 101,
|
||||
"forks": 24,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-25943",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T23:34:57Z",
|
||||
"updated_at": "2022-03-09T03:37:03Z",
|
||||
"pushed_at": "2022-03-08T13:41:23Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"updated_at": "2022-03-09T08:22:49Z",
|
||||
"pushed_at": "2022-03-09T08:26:45Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
85
README.md
85
README.md
|
@ -93,8 +93,10 @@ Improper Access Control to Remote Code Execution in GitHub repository webmin/web
|
|||
- [dadhee/CVE-2022-0847_DirtyPipeExploit](https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit)
|
||||
- [Greetdawn/CVE-2022-0847-DirtyPipe](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe)
|
||||
- [Al1ex/CVE-2022-0847](https://github.com/Al1ex/CVE-2022-0847)
|
||||
- [MRNIKO1/Dirtypipe-exploit](https://github.com/MRNIKO1/Dirtypipe-exploit)
|
||||
- [Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit)
|
||||
- [nanaao/Dirtypipe-exploit](https://github.com/nanaao/Dirtypipe-exploit)
|
||||
- [AyoubNajim/cve-2022-0847dirtypipe-exploit](https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit)
|
||||
- [pentestblogin/pentestblog-CVE-2022-0847](https://github.com/pentestblogin/pentestblog-CVE-2022-0847)
|
||||
|
||||
### CVE-2022-20699 (2022-02-10)
|
||||
|
||||
|
@ -103,7 +105,6 @@ Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345
|
|||
</code>
|
||||
|
||||
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
|
||||
- [puckiestyle/CVE-2022-20699](https://github.com/puckiestyle/CVE-2022-20699)
|
||||
- [rohankumardubey/CVE-2022-20699](https://github.com/rohankumardubey/CVE-2022-20699)
|
||||
|
||||
### CVE-2022-21241 (2022-02-08)
|
||||
|
@ -335,7 +336,6 @@ In the case of instances where the SAML SSO authentication is enabled (non-defau
|
|||
- [0tt7/CVE-2022-23131](https://github.com/0tt7/CVE-2022-23131)
|
||||
- [zwjjustdoit/cve-2022-23131](https://github.com/zwjjustdoit/cve-2022-23131)
|
||||
- [L0ading-x/cve-2022-23131](https://github.com/L0ading-x/cve-2022-23131)
|
||||
- [random-robbie/cve-2022-23131-exp](https://github.com/random-robbie/cve-2022-23131-exp)
|
||||
- [trganda/CVE-2022-23131](https://github.com/trganda/CVE-2022-23131)
|
||||
- [pykiller/CVE-2022-23131](https://github.com/pykiller/CVE-2022-23131)
|
||||
- [Fa1c0n35/zabbix-cve-2022-23131](https://github.com/Fa1c0n35/zabbix-cve-2022-23131)
|
||||
|
@ -1216,6 +1216,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [T369-Real/pwnkit-pwn](https://github.com/T369-Real/pwnkit-pwn)
|
||||
- [GatoGamer1155/CVE-2021-4034](https://github.com/GatoGamer1155/CVE-2021-4034)
|
||||
- [bakhtiyarsierad/CVE-2021-4034-bug-root](https://github.com/bakhtiyarsierad/CVE-2021-4034-bug-root)
|
||||
- [ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034](https://github.com/ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
@ -1353,7 +1354,6 @@ spring-boot-actuator-logview in a library that adds a simple logfile viewer as s
|
|||
</code>
|
||||
|
||||
- [PwCNO-CTO/CVE-2021-21234](https://github.com/PwCNO-CTO/CVE-2021-21234)
|
||||
- [xiaojiangxl/CVE-2021-21234](https://github.com/xiaojiangxl/CVE-2021-21234)
|
||||
|
||||
### CVE-2021-21300 (2021-03-09)
|
||||
|
||||
|
@ -1445,6 +1445,7 @@ Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability
|
|||
- [arnaudluti/PS-CVE-2021-21551](https://github.com/arnaudluti/PS-CVE-2021-21551)
|
||||
- [mathisvickie/CVE-2021-21551](https://github.com/mathisvickie/CVE-2021-21551)
|
||||
- [mzakocs/CVE-2021-21551-POC](https://github.com/mzakocs/CVE-2021-21551-POC)
|
||||
- [ihack4falafel/Dell-Driver-EoP-CVE-2021-21551](https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551)
|
||||
|
||||
### CVE-2021-21972 (2021-02-24)
|
||||
|
||||
|
@ -1802,14 +1803,6 @@ The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does n
|
|||
|
||||
- [fimtow/CVE-2021-24750](https://github.com/fimtow/CVE-2021-24750)
|
||||
|
||||
### CVE-2021-24884 (2021-10-25)
|
||||
|
||||
<code>
|
||||
The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject certain HTML Tags like <audio>,<video>,<img>,<a> and<button>.This could allow an unauthenticated, remote attacker to exploit a HTML-injection byinjecting a malicous link. The HTML-injection may trick authenticated users to follow the link. If the Link gets clicked, Javascript code can be executed. The vulnerability is due to insufficient sanitization of the "data-frmverify" tag for links in the web-based entry inspection page of affected systems. A successful exploitation incomibantion with CSRF could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These actions include stealing the users account by changing their password or allowing attackers to submit their own code through an authenticated user resulting in Remote Code Execution. If an authenticated user who is able to edit Wordpress PHP Code in any kind, clicks the malicious link, PHP code can be edited.
|
||||
</code>
|
||||
|
||||
- [S1lkys/CVE-2021-24884](https://github.com/S1lkys/CVE-2021-24884)
|
||||
|
||||
### CVE-2021-25281 (2021-02-26)
|
||||
|
||||
<code>
|
||||
|
@ -2845,6 +2838,14 @@ Telenot CompasX versions prior to 32.0 use a weak seed for random number generat
|
|||
|
||||
- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
|
||||
|
||||
### CVE-2021-35042 (2021-07-02)
|
||||
|
||||
<code>
|
||||
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
|
||||
</code>
|
||||
|
||||
- [r4vi/CVE-2021-35042](https://github.com/r4vi/CVE-2021-35042)
|
||||
|
||||
### CVE-2021-35211 (2021-07-14)
|
||||
|
||||
<code>
|
||||
|
@ -3020,7 +3021,6 @@ Open Management Infrastructure Remote Code Execution Vulnerability
|
|||
Remote Desktop Client Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [DarkSprings/CVE-2021-38666-poc](https://github.com/DarkSprings/CVE-2021-38666-poc)
|
||||
- [JaneMandy/CVE-2021-38666](https://github.com/JaneMandy/CVE-2021-38666)
|
||||
|
||||
### CVE-2021-39316 (2021-08-31)
|
||||
|
@ -3050,14 +3050,6 @@ Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and ear
|
|||
|
||||
- [lsw29475/CVE-2021-39863](https://github.com/lsw29475/CVE-2021-39863)
|
||||
|
||||
### CVE-2021-40101 (2021-11-30)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.
|
||||
</code>
|
||||
|
||||
- [S1lkys/CVE-2021-40101](https://github.com/S1lkys/CVE-2021-40101)
|
||||
|
||||
### CVE-2021-40154 (2021-12-01)
|
||||
|
||||
<code>
|
||||
|
@ -3083,6 +3075,12 @@ An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can
|
|||
- [Vulnmachines/HAProxy_CVE-2021-40346](https://github.com/Vulnmachines/HAProxy_CVE-2021-40346)
|
||||
- [alexOarga/CVE-2021-40346](https://github.com/alexOarga/CVE-2021-40346)
|
||||
|
||||
### CVE-2021-40374
|
||||
- [DCKento/CVE-2021-40374](https://github.com/DCKento/CVE-2021-40374)
|
||||
|
||||
### CVE-2021-40375
|
||||
- [DCKento/CVE-2021-40375](https://github.com/DCKento/CVE-2021-40375)
|
||||
|
||||
### CVE-2021-40438 (2021-09-16)
|
||||
|
||||
<code>
|
||||
|
@ -3429,7 +3427,6 @@ dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugf
|
|||
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
|
||||
</code>
|
||||
|
||||
- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
|
||||
- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
|
||||
|
||||
### CVE-2021-42392 (2022-01-07)
|
||||
|
@ -5769,7 +5766,6 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [jiansiting/CVE-2020-5902](https://github.com/jiansiting/CVE-2020-5902)
|
||||
- [wdlid/CVE-2020-5902-fix](https://github.com/wdlid/CVE-2020-5902-fix)
|
||||
- [Any3ite/CVE-2020-5902-F5BIG](https://github.com/Any3ite/CVE-2020-5902-F5BIG)
|
||||
- [k3nundrum/CVE-2020-5902](https://github.com/k3nundrum/CVE-2020-5902)
|
||||
- [inho28/CVE-2020-5902-F5-BIGIP](https://github.com/inho28/CVE-2020-5902-F5-BIGIP)
|
||||
- [cristiano-corrado/f5_scanner](https://github.com/cristiano-corrado/f5_scanner)
|
||||
- [ajdumanhug/CVE-2020-5902](https://github.com/ajdumanhug/CVE-2020-5902)
|
||||
|
@ -8007,14 +8003,6 @@ A remote code execution vulnerability exists when the Windows TCP/IP stack impro
|
|||
- [komomon/CVE-2020-16898-EXP-POC](https://github.com/komomon/CVE-2020-16898-EXP-POC)
|
||||
- [komomon/CVE-2020-16898--EXP-POC](https://github.com/komomon/CVE-2020-16898--EXP-POC)
|
||||
|
||||
### CVE-2020-16899 (2020-10-16)
|
||||
|
||||
<code>
|
||||
A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Denial of Service Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [advanced-threat-research/CVE-2020-16899](https://github.com/advanced-threat-research/CVE-2020-16899)
|
||||
|
||||
### CVE-2020-16938 (2020-10-16)
|
||||
|
||||
<code>
|
||||
|
@ -10009,7 +9997,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
- [shack2/javaserializetools](https://github.com/shack2/javaserializetools)
|
||||
- [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961)
|
||||
- [iceMatcha/CNTA-2019-0014xCVE-2019-2725](https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725)
|
||||
- [lasensio/cve-2019-2725](https://github.com/lasensio/cve-2019-2725)
|
||||
- [davidmthomsen/CVE-2019-2725](https://github.com/davidmthomsen/CVE-2019-2725)
|
||||
- [leerina/CVE-2019-2725](https://github.com/leerina/CVE-2019-2725)
|
||||
- [zhusx110/cve-2019-2725](https://github.com/zhusx110/cve-2019-2725)
|
||||
|
@ -11252,14 +11239,6 @@ mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints
|
|||
- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758)
|
||||
- [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758)
|
||||
|
||||
### CVE-2019-10779 (2020-01-27)
|
||||
|
||||
<code>
|
||||
All versions of stroom:stroom-app before 5.5.12 and all versions of the 6.0.0 branch before 6.0.25 are affected by Cross-site Scripting. An attacker website is able to load the Stroom UI into a hidden iframe. Using that iframe, the attacker site can issue commands to the Stroom UI via an XSS vulnerability to take full control of the Stroom UI on behalf of the logged-in user.
|
||||
</code>
|
||||
|
||||
- [RepublicR0K/CVE-2019-10779](https://github.com/RepublicR0K/CVE-2019-10779)
|
||||
|
||||
### CVE-2019-10869 (2019-05-07)
|
||||
|
||||
<code>
|
||||
|
@ -11283,6 +11262,7 @@ The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in
|
|||
</code>
|
||||
|
||||
- [tacnetsol/CVE-2019-10999](https://github.com/tacnetsol/CVE-2019-10999)
|
||||
- [qjh2333/CVE-2019-10999](https://github.com/qjh2333/CVE-2019-10999)
|
||||
|
||||
### CVE-2019-11043 (2019-10-28)
|
||||
|
||||
|
@ -11291,7 +11271,6 @@ In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in
|
|||
</code>
|
||||
|
||||
- [neex/phuip-fpizdam](https://github.com/neex/phuip-fpizdam)
|
||||
- [B1gd0g/CVE-2019-11043](https://github.com/B1gd0g/CVE-2019-11043)
|
||||
- [tinker-li/CVE-2019-11043](https://github.com/tinker-li/CVE-2019-11043)
|
||||
- [jas502n/CVE-2019-11043](https://github.com/jas502n/CVE-2019-11043)
|
||||
- [AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-](https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-)
|
||||
|
@ -12272,7 +12251,6 @@ The "HTML Include and replace macro" plugin before 1.5.0 for Confluenc
|
|||
An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
|
||||
</code>
|
||||
|
||||
- [jas502n/CVE-2019-15107](https://github.com/jas502n/CVE-2019-15107)
|
||||
- [HACHp1/webmin_docker_and_exp](https://github.com/HACHp1/webmin_docker_and_exp)
|
||||
- [ketlerd/CVE-2019-15107](https://github.com/ketlerd/CVE-2019-15107)
|
||||
- [AdministratorGithub/CVE-2019-15107](https://github.com/AdministratorGithub/CVE-2019-15107)
|
||||
|
@ -14155,7 +14133,6 @@ Integer overflow in computing the required allocation size when instantiating a
|
|||
Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.
|
||||
</code>
|
||||
|
||||
- [DavidBuchanan314/NXLoader](https://github.com/DavidBuchanan314/NXLoader)
|
||||
- [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips)
|
||||
- [ChrisFigura/react-tegra-payload-launcher](https://github.com/ChrisFigura/react-tegra-payload-launcher)
|
||||
- [austinhartzheim/fusee-gelee](https://github.com/austinhartzheim/fusee-gelee)
|
||||
|
@ -15935,7 +15912,6 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
|
|||
- [uwueviee/Fu3l-F1lt3r](https://github.com/uwueviee/Fu3l-F1lt3r)
|
||||
- [shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--](https://github.com/shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--)
|
||||
- [NeKroFR/CVE-2018-16763](https://github.com/NeKroFR/CVE-2018-16763)
|
||||
- [k4is3r13/Bash-Script-CVE-2018-16763](https://github.com/k4is3r13/Bash-Script-CVE-2018-16763)
|
||||
- [padsalatushal/CVE-2018-16763](https://github.com/padsalatushal/CVE-2018-16763)
|
||||
- [SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763)
|
||||
- [4n0nym0u5dk/CVE-2018-16763](https://github.com/4n0nym0u5dk/CVE-2018-16763)
|
||||
|
@ -16476,7 +16452,6 @@ In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpat
|
|||
</code>
|
||||
|
||||
- [0x00-0x00/CVE-2018-1000001](https://github.com/0x00-0x00/CVE-2018-1000001)
|
||||
- [usernameid0/tools-for-CVE-2018-1000001](https://github.com/usernameid0/tools-for-CVE-2018-1000001)
|
||||
|
||||
### CVE-2018-1000006 (2018-01-24)
|
||||
|
||||
|
@ -17154,7 +17129,6 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
|
|||
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
|
||||
- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro)
|
||||
- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)
|
||||
- [immunio/apache-struts2-CVE-2017-5638](https://github.com/immunio/apache-struts2-CVE-2017-5638)
|
||||
- [Masahiro-Yamada/OgnlContentTypeRejectorValve](https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve)
|
||||
- [aljazceru/CVE-2017-5638-Apache-Struts2](https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2)
|
||||
- [sjitech/test_struts2_vulnerability_CVE-2017-5638](https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638)
|
||||
|
@ -17203,7 +17177,6 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
|
|||
- [Iletee/struts2-rce](https://github.com/Iletee/struts2-rce)
|
||||
- [andypitcher/check_struts](https://github.com/andypitcher/check_struts)
|
||||
- [un4ckn0wl3z/CVE-2017-5638](https://github.com/un4ckn0wl3z/CVE-2017-5638)
|
||||
- [colorblindpentester/CVE-2017-5638](https://github.com/colorblindpentester/CVE-2017-5638)
|
||||
- [injcristianrojas/cve-2017-5638](https://github.com/injcristianrojas/cve-2017-5638)
|
||||
- [pasannirmana/Aspire](https://github.com/pasannirmana/Aspire)
|
||||
- [ludy-dev/XworkStruts-RCE](https://github.com/ludy-dev/XworkStruts-RCE)
|
||||
|
@ -17256,7 +17229,6 @@ Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletio
|
|||
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
|
||||
</code>
|
||||
|
||||
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
|
||||
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
|
||||
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
|
||||
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
|
||||
|
@ -19323,14 +19295,6 @@ The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows a
|
|||
|
||||
- [jianqiangzhao/CVE-2016-2434](https://github.com/jianqiangzhao/CVE-2016-2434)
|
||||
|
||||
### CVE-2016-2468 (2016-06-12)
|
||||
|
||||
<code>
|
||||
The Qualcomm GPU driver in Android before 2016-06-01 on Nexus 5, 5X, 6, 6P, and 7 devices allows attackers to gain privileges via a crafted application, aka internal bug 27475454.
|
||||
</code>
|
||||
|
||||
- [gitcollect/CVE-2016-2468](https://github.com/gitcollect/CVE-2016-2468)
|
||||
|
||||
### CVE-2016-2555 (2017-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -21701,7 +21665,6 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
|||
- [MuirlandOracle/CVE-2014-6271-IPFire](https://github.com/MuirlandOracle/CVE-2014-6271-IPFire)
|
||||
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
|
||||
- [b4keSn4ke/shellshock](https://github.com/b4keSn4ke/shellshock)
|
||||
- [JowardBince/ShellShock](https://github.com/JowardBince/ShellShock)
|
||||
- [0bfxgh0st-secondary/ShellShock](https://github.com/0bfxgh0st-secondary/ShellShock)
|
||||
|
||||
### CVE-2014-6287 (2014-10-07)
|
||||
|
@ -22764,14 +22727,6 @@ The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x throu
|
|||
- [SECFORCE/CVE-2011-3368](https://github.com/SECFORCE/CVE-2011-3368)
|
||||
- [colorblindpentester/CVE-2011-3368](https://github.com/colorblindpentester/CVE-2011-3368)
|
||||
|
||||
### CVE-2011-3389 (2011-09-06)
|
||||
|
||||
<code>
|
||||
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
|
||||
</code>
|
||||
|
||||
- [mpgn/BEAST-PoC](https://github.com/mpgn/BEAST-PoC)
|
||||
|
||||
### CVE-2011-3556 (2011-10-19)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue