mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/11/18 18:26:09
This commit is contained in:
parent
bd6f1419ad
commit
3cd1d9ba3c
38 changed files with 254 additions and 180 deletions
|
@ -143,5 +143,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 567728889,
|
||||
"name": "CVE-2012-1823",
|
||||
"full_name": "daai1\/CVE-2012-1823",
|
||||
"owner": {
|
||||
"login": "daai1",
|
||||
"id": 86880819,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86880819?v=4",
|
||||
"html_url": "https:\/\/github.com\/daai1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/daai1\/CVE-2012-1823",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T12:46:10Z",
|
||||
"updated_at": "2022-11-18T12:47:34Z",
|
||||
"pushed_at": "2022-11-18T12:47:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,7 +47,7 @@
|
|||
"stargazers_count": 1539,
|
||||
"watchers_count": 1539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -74,7 +74,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1539,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
|
||||
"fork": false,
|
||||
"created_at": "2016-01-24T13:49:03Z",
|
||||
"updated_at": "2022-07-20T11:41:39Z",
|
||||
"updated_at": "2022-11-18T12:24:19Z",
|
||||
"pushed_at": "2016-01-24T22:20:44Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 76,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "PoC code for 32 bit Android OS",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-12T01:31:36Z",
|
||||
"updated_at": "2022-09-13T10:00:24Z",
|
||||
"updated_at": "2022-11-18T12:24:17Z",
|
||||
"pushed_at": "2015-12-15T05:42:02Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"has_discussions": false,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 131,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1539,
|
||||
"watchers_count": 1539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1539,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"stargazers_count": 1539,
|
||||
"watchers_count": 1539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -74,7 +74,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1539,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -76,13 +76,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -158,12 +158,12 @@
|
|||
"description": "Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T21:09:27Z",
|
||||
"updated_at": "2022-11-16T14:15:53Z",
|
||||
"updated_at": "2022-11-18T13:59:19Z",
|
||||
"pushed_at": "2022-11-16T22:49:39Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -174,8 +174,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 33,
|
||||
"forks": 6,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T16:51:26Z",
|
||||
"updated_at": "2022-08-13T08:25:28Z",
|
||||
"updated_at": "2022-11-18T14:12:47Z",
|
||||
"pushed_at": "2018-11-07T04:00:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -573,7 +573,7 @@
|
|||
"stargazers_count": 1539,
|
||||
"watchers_count": 1539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -600,7 +600,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1539,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T15:54:55Z",
|
||||
"updated_at": "2020-07-13T12:07:03Z",
|
||||
"updated_at": "2022-11-18T13:46:41Z",
|
||||
"pushed_at": "2019-06-12T12:25:42Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -192,7 +192,7 @@
|
|||
"stargazers_count": 1539,
|
||||
"watchers_count": 1539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -219,7 +219,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1539,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -366,13 +366,13 @@
|
|||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 34,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 24,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept code for CVE-2020-0728",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-12T22:32:28Z",
|
||||
"updated_at": "2022-10-04T23:08:25Z",
|
||||
"updated_at": "2022-11-18T13:46:43Z",
|
||||
"pushed_at": "2020-02-12T22:50:22Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T15:56:50Z",
|
||||
"updated_at": "2022-11-09T18:08:47Z",
|
||||
"updated_at": "2022-11-18T13:46:47Z",
|
||||
"pushed_at": "2020-07-30T07:48:40Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -110,10 +110,10 @@
|
|||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2022-11-09T18:08:59Z",
|
||||
"updated_at": "2022-11-18T13:46:48Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -126,7 +126,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -390,10 +390,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2022-11-18T05:10:43Z",
|
||||
"updated_at": "2022-11-18T13:30:29Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
|
@ -408,7 +408,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 275,
|
||||
"watchers": 276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1539,
|
||||
"watchers_count": 1539,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"forks": 312,
|
||||
"watchers": 1539,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -795,10 +795,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-11-18T11:41:04Z",
|
||||
"updated_at": "2022-11-18T12:41:14Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 616,
|
||||
"watchers_count": 616,
|
||||
"stargazers_count": 617,
|
||||
"watchers_count": 617,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -814,7 +814,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 616,
|
||||
"watchers": 617,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -77,19 +77,19 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-11-17T08:09:34Z",
|
||||
"updated_at": "2022-11-18T12:41:55Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1701,
|
||||
"watchers_count": 1701,
|
||||
"stargazers_count": 1702,
|
||||
"watchers_count": 1702,
|
||||
"has_discussions": false,
|
||||
"forks_count": 488,
|
||||
"forks_count": 489,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 488,
|
||||
"watchers": 1701,
|
||||
"forks": 489,
|
||||
"watchers": 1702,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1287,5 +1287,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 567720828,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "12345qwert123456\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "12345qwert123456",
|
||||
"id": 63474188,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
|
||||
"html_url": "https:\/\/github.com\/12345qwert123456"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-41773",
|
||||
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T12:23:04Z",
|
||||
"updated_at": "2022-11-18T18:02:12Z",
|
||||
"pushed_at": "2022-11-18T18:04:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -455,5 +455,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 567841093,
|
||||
"name": "CVE-2021-42013",
|
||||
"full_name": "12345qwert123456\/CVE-2021-42013",
|
||||
"owner": {
|
||||
"login": "12345qwert123456",
|
||||
"id": 63474188,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
|
||||
"html_url": "https:\/\/github.com\/12345qwert123456"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-42013",
|
||||
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T17:53:46Z",
|
||||
"updated_at": "2022-11-18T18:02:31Z",
|
||||
"pushed_at": "2022-11-18T18:03:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2022-11-15T13:10:15Z",
|
||||
"updated_at": "2022-11-18T13:39:11Z",
|
||||
"pushed_at": "2022-07-25T20:41:30Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -411,10 +411,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-11-18T03:08:35Z",
|
||||
"updated_at": "2022-11-18T16:06:12Z",
|
||||
"pushed_at": "2022-11-18T08:36:03Z",
|
||||
"stargazers_count": 542,
|
||||
"watchers_count": 542,
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -428,7 +428,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 542,
|
||||
"watchers": 543,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2291,35 +2291,6 @@
|
|||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438650245,
|
||||
"name": "log4j_temp_CVE-2021-44228",
|
||||
"full_name": "111coding\/log4j_temp_CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "111coding",
|
||||
"id": 49793527,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4",
|
||||
"html_url": "https:\/\/github.com\/111coding"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T14:01:23Z",
|
||||
"updated_at": "2021-12-18T17:13:29Z",
|
||||
"pushed_at": "2021-12-18T17:13:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438689577,
|
||||
"name": "Log4j",
|
||||
|
@ -3257,35 +3228,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439658571,
|
||||
"name": "log4j-pcap-activity",
|
||||
"full_name": "Apipia\/log4j-pcap-activity",
|
||||
"owner": {
|
||||
"login": "Apipia",
|
||||
"id": 17787069,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4",
|
||||
"html_url": "https:\/\/github.com\/Apipia"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Apipia\/log4j-pcap-activity",
|
||||
"description": "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T16:09:49Z",
|
||||
"updated_at": "2022-10-18T10:59:33Z",
|
||||
"pushed_at": "2021-12-18T16:51:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439698618,
|
||||
"name": "log4shell-docker-lab",
|
||||
|
|
|
@ -111,7 +111,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-11-08T15:22:55Z",
|
||||
"updated_at": "2022-11-08T15:54:59Z",
|
||||
"pushed_at": "2022-11-08T16:22:07Z",
|
||||
"pushed_at": "2022-11-18T15:29:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -2232,10 +2232,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-16T03:44:14Z",
|
||||
"updated_at": "2022-11-18T00:05:55Z",
|
||||
"updated_at": "2022-11-18T16:57:17Z",
|
||||
"pushed_at": "2022-11-16T03:50:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2244,7 +2244,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "lpe poc for cve-2022-21882 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T03:45:36Z",
|
||||
"updated_at": "2022-11-09T18:15:15Z",
|
||||
"updated_at": "2022-11-18T13:47:02Z",
|
||||
"pushed_at": "2022-02-07T03:49:37Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -116,7 +116,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2022-11-15T17:36:03Z",
|
||||
"updated_at": "2022-11-18T14:35:52Z",
|
||||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -712,10 +712,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-11-18T11:41:04Z",
|
||||
"updated_at": "2022-11-18T12:41:14Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 616,
|
||||
"watchers_count": 616,
|
||||
"stargazers_count": 617,
|
||||
"watchers_count": 617,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -731,7 +731,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 616,
|
||||
"watchers": 617,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T15:31:56Z",
|
||||
"updated_at": "2022-11-15T17:40:54Z",
|
||||
"updated_at": "2022-11-18T15:23:38Z",
|
||||
"pushed_at": "2022-09-05T14:25:17Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2022-11-18T07:26:44Z",
|
||||
"updated_at": "2022-11-18T13:34:29Z",
|
||||
"pushed_at": "2022-11-07T16:21:14Z",
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 299,
|
||||
"forks": 51,
|
||||
"watchers": 300,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,11 +14,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2022-11-16T01:14:45Z",
|
||||
"pushed_at": "2022-11-17T12:24:25Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 525,
|
||||
"watchers_count": 525,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"spookyssl"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"forks": 115,
|
||||
"watchers": 525,
|
||||
"score": 0
|
||||
},
|
||||
|
|
36
2022/CVE-2022-40127.json
Normal file
36
2022/CVE-2022-40127.json
Normal file
|
@ -0,0 +1,36 @@
|
|||
[
|
||||
{
|
||||
"id": 567740887,
|
||||
"name": "CVE-2022-40127",
|
||||
"full_name": "Mr-xn\/CVE-2022-40127",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-40127",
|
||||
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T13:19:23Z",
|
||||
"updated_at": "2022-11-18T15:25:45Z",
|
||||
"pushed_at": "2022-11-18T13:26:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache-airflow",
|
||||
"cve",
|
||||
"poc",
|
||||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,12 +42,12 @@
|
|||
"description": "Zimbra <9.0.0.p27 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T20:58:08Z",
|
||||
"updated_at": "2022-11-17T15:23:09Z",
|
||||
"updated_at": "2022-11-18T16:48:31Z",
|
||||
"pushed_at": "2022-11-14T17:54:57Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -60,8 +60,8 @@
|
|||
"zimbra"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 63,
|
||||
"forks": 14,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T21:20:29Z",
|
||||
"updated_at": "2022-11-18T09:47:09Z",
|
||||
"updated_at": "2022-11-18T14:59:55Z",
|
||||
"pushed_at": "2022-10-20T17:37:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
13
README.md
13
README.md
|
@ -4087,6 +4087,14 @@ A misconfiguration in the Service Mode profile directory of Clash for Windows v0
|
|||
|
||||
- [LovelyWei/CVE-2022-40126](https://github.com/LovelyWei/CVE-2022-40126)
|
||||
|
||||
### CVE-2022-40127 (2022-11-14)
|
||||
|
||||
<code>
|
||||
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.
|
||||
</code>
|
||||
|
||||
- [Mr-xn/CVE-2022-40127](https://github.com/Mr-xn/CVE-2022-40127)
|
||||
|
||||
### CVE-2022-40140 (2022-09-19)
|
||||
|
||||
<code>
|
||||
|
@ -7900,6 +7908,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [juuso0/CVE-2021-41773](https://github.com/juuso0/CVE-2021-41773)
|
||||
- [aqiao-jashell/CVE-2021-41773](https://github.com/aqiao-jashell/CVE-2021-41773)
|
||||
- [aqiao-jashell/py-CVE-2021-41773](https://github.com/aqiao-jashell/py-CVE-2021-41773)
|
||||
- [12345qwert123456/CVE-2021-41773](https://github.com/12345qwert123456/CVE-2021-41773)
|
||||
|
||||
### CVE-2021-41946 (2022-05-18)
|
||||
|
||||
|
@ -7938,6 +7947,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
|
|||
- [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013)
|
||||
- [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L)
|
||||
- [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get)
|
||||
- [12345qwert123456/CVE-2021-42013](https://github.com/12345qwert123456/CVE-2021-42013)
|
||||
|
||||
### CVE-2021-42056 (2022-06-24)
|
||||
|
||||
|
@ -8485,7 +8495,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
|
||||
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
|
||||
- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
|
||||
- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228)
|
||||
- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
|
||||
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
|
||||
- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228)
|
||||
|
@ -8517,7 +8526,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [ankur-katiyar/log4j-docker](https://github.com/ankur-katiyar/log4j-docker)
|
||||
- [immunityinc/Log4j-JNDIServer](https://github.com/immunityinc/Log4j-JNDIServer)
|
||||
- [DANSI/PowerShell-Log4J-Scanner](https://github.com/DANSI/PowerShell-Log4J-Scanner)
|
||||
- [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity)
|
||||
- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab)
|
||||
- [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study)
|
||||
- [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228)
|
||||
|
@ -27966,6 +27974,7 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured
|
|||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
|
||||
- [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823)
|
||||
- [daai1/CVE-2012-1823](https://github.com/daai1/CVE-2012-1823)
|
||||
|
||||
### CVE-2012-1870 (2012-07-10)
|
||||
|
||||
|
|
Loading…
Reference in a new issue