mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/11/21 12:20:04
This commit is contained in:
parent
6fe2afc44e
commit
335961aaf4
43 changed files with 264 additions and 180 deletions
31
1999/CVE-1999-1053.json
Normal file
31
1999/CVE-1999-1053.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 568784366,
|
||||
"name": "CVE-1999-1053-PoC",
|
||||
"full_name": "siunam321\/CVE-1999-1053-PoC",
|
||||
"owner": {
|
||||
"login": "siunam321",
|
||||
"id": 104430134,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104430134?v=4",
|
||||
"html_url": "https:\/\/github.com\/siunam321"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/siunam321\/CVE-1999-1053-PoC",
|
||||
"description": "CVE-1999-1053 Proof-of-Concept Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T12:02:42Z",
|
||||
"updated_at": "2022-11-21T12:04:08Z",
|
||||
"pushed_at": "2022-11-21T12:04:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2022-11-10T10:23:56Z",
|
||||
"updated_at": "2022-11-21T10:47:03Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2280,
|
||||
"watchers_count": 2280,
|
||||
"stargazers_count": 2281,
|
||||
"watchers_count": 2281,
|
||||
"has_discussions": false,
|
||||
"forks_count": 485,
|
||||
"forks_count": 486,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 485,
|
||||
"watchers": 2280,
|
||||
"forks": 486,
|
||||
"watchers": 2281,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-22T05:31:13Z",
|
||||
"updated_at": "2022-11-15T23:34:58Z",
|
||||
"updated_at": "2022-11-21T09:27:33Z",
|
||||
"pushed_at": "2018-02-25T08:49:07Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 103,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1507,10 +1507,10 @@
|
|||
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T16:13:26Z",
|
||||
"updated_at": "2022-11-21T03:41:26Z",
|
||||
"updated_at": "2022-11-21T09:12:33Z",
|
||||
"pushed_at": "2018-05-13T16:14:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -1519,7 +1519,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -429,13 +429,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-17T23:48:15Z",
|
||||
"updated_at": "2022-10-25T13:25:42Z",
|
||||
"updated_at": "2022-11-21T11:23:50Z",
|
||||
"pushed_at": "2019-11-15T08:12:32Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 138,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T14:23:18Z",
|
||||
"updated_at": "2022-11-12T12:58:10Z",
|
||||
"updated_at": "2022-11-21T06:29:11Z",
|
||||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 341,
|
||||
"watchers": 340,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2018-8581",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T06:08:23Z",
|
||||
"updated_at": "2022-11-15T17:35:21Z",
|
||||
"updated_at": "2022-11-21T10:17:14Z",
|
||||
"pushed_at": "2022-10-21T08:29:33Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,19 +42,19 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2022-11-17T02:31:17Z",
|
||||
"updated_at": "2022-11-21T11:21:09Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"has_discussions": false,
|
||||
"forks_count": 104,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 104,
|
||||
"watchers": 185,
|
||||
"forks": 105,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2022-11-15T17:26:00Z",
|
||||
"updated_at": "2022-11-21T08:20:54Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-11-19T07:03:50Z",
|
||||
"updated_at": "2022-11-21T10:45:04Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3604,
|
||||
"watchers_count": 3604,
|
||||
"stargazers_count": 3605,
|
||||
"watchers_count": 3605,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1042,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1042,
|
||||
"watchers": 3604,
|
||||
"watchers": 3605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2022-11-18T10:13:55Z",
|
||||
"updated_at": "2022-11-21T06:28:07Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 626,
|
||||
"watchers_count": 626,
|
||||
"stargazers_count": 625,
|
||||
"watchers_count": 625,
|
||||
"has_discussions": false,
|
||||
"forks_count": 158,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"watchers": 626,
|
||||
"watchers": 625,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-23T10:24:07Z",
|
||||
"updated_at": "2022-11-09T18:10:12Z",
|
||||
"updated_at": "2022-11-21T08:00:34Z",
|
||||
"pushed_at": "2021-03-16T13:53:37Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-11-19T07:03:50Z",
|
||||
"updated_at": "2022-11-21T10:45:04Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3604,
|
||||
"watchers_count": 3604,
|
||||
"stargazers_count": 3605,
|
||||
"watchers_count": 3605,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1042,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1042,
|
||||
"watchers": 3604,
|
||||
"watchers": 3605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -62,19 +62,19 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2022-11-09T18:09:54Z",
|
||||
"updated_at": "2022-11-21T09:48:53Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 266,
|
||||
"forks": 58,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -606,10 +606,10 @@
|
|||
"description": "F5 BIG-IP 任意文件读取+远程命令执行RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-08T04:02:07Z",
|
||||
"updated_at": "2022-07-18T20:15:56Z",
|
||||
"updated_at": "2022-11-21T11:39:03Z",
|
||||
"pushed_at": "2020-07-08T04:10:12Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -618,7 +618,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-30T10:15:10Z",
|
||||
"updated_at": "2022-11-09T18:12:30Z",
|
||||
"updated_at": "2022-11-21T11:52:35Z",
|
||||
"pushed_at": "2021-11-16T17:34:11Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -127,7 +127,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 28,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -795,10 +795,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-11-21T06:15:32Z",
|
||||
"updated_at": "2022-11-21T09:40:10Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -814,7 +814,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 627,
|
||||
"watchers": 629,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2022-11-19T21:32:52Z",
|
||||
"updated_at": "2022-11-21T11:39:37Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -196,10 +196,10 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-11-19T21:32:04Z",
|
||||
"updated_at": "2022-11-21T11:35:04Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -208,7 +208,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 91,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2022-11-15T17:26:00Z",
|
||||
"updated_at": "2022-11-21T08:20:54Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-11-19T14:44:08Z",
|
||||
"updated_at": "2022-11-21T09:28:49Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1703,
|
||||
"watchers_count": 1703,
|
||||
"stargazers_count": 1702,
|
||||
"watchers_count": 1702,
|
||||
"has_discussions": false,
|
||||
"forks_count": 491,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 491,
|
||||
"watchers": 1703,
|
||||
"watchers": 1702,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-15T14:48:14Z",
|
||||
"updated_at": "2022-11-13T16:48:19Z",
|
||||
"updated_at": "2022-11-21T09:19:55Z",
|
||||
"pushed_at": "2022-11-10T22:30:12Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1302,7 +1302,7 @@
|
|||
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T12:23:04Z",
|
||||
"updated_at": "2022-11-18T18:02:12Z",
|
||||
"updated_at": "2022-11-21T09:02:13Z",
|
||||
"pushed_at": "2022-11-18T18:04:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -1311,7 +1311,14 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"apache",
|
||||
"cve",
|
||||
"cve-2021-41773",
|
||||
"http-server",
|
||||
"lfi",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -470,7 +470,7 @@
|
|||
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T17:53:46Z",
|
||||
"updated_at": "2022-11-18T18:02:31Z",
|
||||
"updated_at": "2022-11-21T09:01:11Z",
|
||||
"pushed_at": "2022-11-18T18:03:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -479,7 +479,15 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"apache",
|
||||
"cve",
|
||||
"cve-2021-42013",
|
||||
"http-server",
|
||||
"lfi",
|
||||
"rce",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -340,10 +340,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-11-21T02:45:34Z",
|
||||
"updated_at": "2022-11-21T09:16:10Z",
|
||||
"pushed_at": "2022-09-21T07:49:03Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"has_discussions": false,
|
||||
"forks_count": 430,
|
||||
"allow_forking": true,
|
||||
|
@ -357,7 +357,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 430,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Environment with vulnerable kernel for exploitation of CVE-2021-44733",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T17:45:35Z",
|
||||
"updated_at": "2022-10-30T02:42:42Z",
|
||||
"updated_at": "2022-11-21T11:41:41Z",
|
||||
"pushed_at": "2021-12-28T07:57:13Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept exploit (SQLI BookingPress before 1.0.11)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-30T19:32:15Z",
|
||||
"updated_at": "2022-11-20T18:55:54Z",
|
||||
"updated_at": "2022-11-21T07:46:21Z",
|
||||
"pushed_at": "2022-10-30T19:38:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-11-16T04:09:41Z",
|
||||
"updated_at": "2022-11-21T11:01:10Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 657,
|
||||
"watchers_count": 657,
|
||||
"stargazers_count": 656,
|
||||
"watchers_count": 656,
|
||||
"has_discussions": false,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 657,
|
||||
"watchers": 656,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1505,10 +1505,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T06:38:46Z",
|
||||
"updated_at": "2022-08-29T03:56:44Z",
|
||||
"updated_at": "2022-11-21T11:01:37Z",
|
||||
"pushed_at": "2022-08-23T06:40:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1517,7 +1517,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1563,10 +1563,10 @@
|
|||
"description": "Spring Cloud Gateway远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-29T03:28:55Z",
|
||||
"updated_at": "2022-11-18T09:30:52Z",
|
||||
"updated_at": "2022-11-21T06:53:54Z",
|
||||
"pushed_at": "2022-10-29T04:34:21Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -1575,7 +1575,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -712,10 +712,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-11-21T06:15:32Z",
|
||||
"updated_at": "2022-11-21T09:40:10Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -731,7 +731,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 627,
|
||||
"watchers": 629,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1439,13 +1439,13 @@
|
|||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -285,10 +285,10 @@
|
|||
"description": "A loader for zimbra 2022 rce (cve-2022-27925)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T10:33:55Z",
|
||||
"updated_at": "2022-11-02T08:31:55Z",
|
||||
"updated_at": "2022-11-21T07:45:13Z",
|
||||
"pushed_at": "2022-10-25T14:20:58Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -303,7 +303,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -81,10 +81,10 @@
|
|||
"description": "CVE-2022-30190 Follina POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T06:45:25Z",
|
||||
"updated_at": "2022-11-06T20:54:15Z",
|
||||
"updated_at": "2022-11-21T07:33:34Z",
|
||||
"pushed_at": "2022-05-31T09:35:37Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2207,10 +2207,10 @@
|
|||
"description": "A Command Line based python tool for exploit Zero-Day vulnerability in MSDT (Microsoft Support Diagnostic Tool) also know as 'Follina' CVE-2022-30190.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-19T18:09:47Z",
|
||||
"updated_at": "2022-11-21T03:37:28Z",
|
||||
"updated_at": "2022-11-21T06:33:31Z",
|
||||
"pushed_at": "2022-11-19T18:41:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2219,7 +2219,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2022-11-20T18:30:25Z",
|
||||
"updated_at": "2022-11-21T08:59:17Z",
|
||||
"pushed_at": "2022-11-07T16:21:14Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 305,
|
||||
"watchers": 306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-11-05T13:28:27Z",
|
||||
"updated_at": "2022-11-16T14:11:50Z",
|
||||
"pushed_at": "2022-11-05T13:49:31Z",
|
||||
"pushed_at": "2022-11-21T09:09:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-09T14:15:30Z",
|
||||
"updated_at": "2022-11-20T22:53:31Z",
|
||||
"updated_at": "2022-11-21T09:31:51Z",
|
||||
"pushed_at": "2022-11-09T14:42:56Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2022-11-09T18:16:14Z",
|
||||
"updated_at": "2022-11-21T11:02:28Z",
|
||||
"pushed_at": "2022-09-19T19:41:34Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,10 +220,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2022-11-17T08:50:12Z",
|
||||
"updated_at": "2022-11-21T09:43:01Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -236,7 +236,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2022-11-17T12:47:06Z",
|
||||
"updated_at": "2022-11-21T07:09:19Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 288,
|
||||
"watchers": 289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-09T15:27:40Z",
|
||||
"updated_at": "2022-11-16T13:06:30Z",
|
||||
"updated_at": "2022-11-21T12:02:34Z",
|
||||
"pushed_at": "2022-10-09T16:11:09Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -153,7 +153,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,12 +42,12 @@
|
|||
"description": "Zimbra <9.0.0.p27 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T20:58:08Z",
|
||||
"updated_at": "2022-11-21T01:56:49Z",
|
||||
"updated_at": "2022-11-21T07:58:09Z",
|
||||
"pushed_at": "2022-11-14T17:54:57Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -60,8 +60,37 @@
|
|||
"zimbra"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 70,
|
||||
"forks": 15,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 568677659,
|
||||
"name": "cve-2022-41352-zimbra-rce",
|
||||
"full_name": "aryrz\/cve-2022-41352-zimbra-rce",
|
||||
"owner": {
|
||||
"login": "aryrz",
|
||||
"id": 87161647,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87161647?v=4",
|
||||
"html_url": "https:\/\/github.com\/aryrz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aryrz\/cve-2022-41352-zimbra-rce",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T07:10:12Z",
|
||||
"updated_at": "2022-11-21T07:10:50Z",
|
||||
"pushed_at": "2022-11-21T07:10:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -313,10 +313,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-19T20:14:22Z",
|
||||
"updated_at": "2022-11-21T05:39:27Z",
|
||||
"updated_at": "2022-11-21T11:02:13Z",
|
||||
"pushed_at": "2022-10-20T12:51:08Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 40,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -831,10 +831,10 @@
|
|||
"description": "Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-04T19:26:23Z",
|
||||
"updated_at": "2022-11-20T11:54:11Z",
|
||||
"pushed_at": "2022-11-17T07:28:22Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"updated_at": "2022-11-21T10:27:22Z",
|
||||
"pushed_at": "2022-11-21T10:17:03Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -843,7 +843,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -4249,6 +4249,7 @@ An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacke
|
|||
|
||||
- [segfault-it/cve-2022-41352](https://github.com/segfault-it/cve-2022-41352)
|
||||
- [Cr4ckC4t/cve-2022-41352-zimbra-rce](https://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce)
|
||||
- [aryrz/cve-2022-41352-zimbra-rce](https://github.com/aryrz/cve-2022-41352-zimbra-rce)
|
||||
|
||||
### CVE-2022-41358 (2022-10-19)
|
||||
|
||||
|
@ -29541,4 +29542,12 @@ A DNS server allows zone transfers.
|
|||
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)
|
||||
- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test)
|
||||
|
||||
### CVE-1999-1053 (2001-09-12)
|
||||
|
||||
<code>
|
||||
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
|
||||
</code>
|
||||
|
||||
- [siunam321/CVE-1999-1053-PoC](https://github.com/siunam321/CVE-1999-1053-PoC)
|
||||
|
||||
|
||||
|
|
Loading…
Reference in a new issue