mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/09/19 18:20:25
This commit is contained in:
parent
6ca6f0e2a4
commit
43403ff2c1
31 changed files with 286 additions and 146 deletions
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-18T09:36:01Z",
|
||||
"updated_at": "2022-09-19T12:49:56Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1507,
|
||||
"watchers_count": 1507,
|
||||
"stargazers_count": 1508,
|
||||
"watchers_count": 1508,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1507,
|
||||
"watchers": 1508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-18T09:36:01Z",
|
||||
"updated_at": "2022-09-19T12:49:56Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1507,
|
||||
"watchers_count": 1507,
|
||||
"stargazers_count": 1508,
|
||||
"watchers_count": 1508,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1507,
|
||||
"watchers": 1508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2022-09-01T15:21:28Z",
|
||||
"updated_at": "2022-09-19T16:36:21Z",
|
||||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-18T09:36:01Z",
|
||||
"updated_at": "2022-09-19T12:49:56Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1507,
|
||||
"watchers_count": 1507,
|
||||
"stargazers_count": 1508,
|
||||
"watchers_count": 1508,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1507,
|
||||
"watchers": 1508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -51,10 +51,10 @@
|
|||
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T23:51:12Z",
|
||||
"updated_at": "2022-07-27T07:08:54Z",
|
||||
"updated_at": "2022-09-19T12:51:38Z",
|
||||
"pushed_at": "2018-02-27T05:22:38Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 546,
|
||||
"watchers": 547,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"pushed_at": "2022-07-18T16:24:55Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 107,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"sambacry"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"forks": 108,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -549,10 +549,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-18T09:36:01Z",
|
||||
"updated_at": "2022-09-19T12:49:56Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1507,
|
||||
"watchers_count": 1507,
|
||||
"stargazers_count": 1508,
|
||||
"watchers_count": 1508,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -581,7 +581,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1507,
|
||||
"watchers": 1508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -97,10 +97,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2022-09-19T10:53:13Z",
|
||||
"updated_at": "2022-09-19T13:38:32Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 837,
|
||||
"watchers_count": 837,
|
||||
"stargazers_count": 838,
|
||||
"watchers_count": 838,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 174,
|
||||
"watchers": 837,
|
||||
"watchers": 838,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -181,10 +181,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-18T09:36:01Z",
|
||||
"updated_at": "2022-09-19T12:49:56Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1507,
|
||||
"watchers_count": 1507,
|
||||
"stargazers_count": 1508,
|
||||
"watchers_count": 1508,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -213,7 +213,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1507,
|
||||
"watchers": 1508,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-09T02:18:37Z",
|
||||
"updated_at": "2022-08-11T10:15:00Z",
|
||||
"updated_at": "2022-09-19T12:14:36Z",
|
||||
"pushed_at": "2019-11-03T17:29:56Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-09-17T03:38:41Z",
|
||||
"updated_at": "2022-09-19T13:00:40Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"stargazers_count": 953,
|
||||
"watchers_count": 953,
|
||||
"forks_count": 268,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"watchers": 952,
|
||||
"watchers": 953,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-18T09:36:01Z",
|
||||
"updated_at": "2022-09-19T12:49:56Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1507,
|
||||
"watchers_count": 1507,
|
||||
"stargazers_count": 1508,
|
||||
"watchers_count": 1508,
|
||||
"forks_count": 307,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 307,
|
||||
"watchers": 1507,
|
||||
"watchers": 1508,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-09-17T03:03:09Z",
|
||||
"updated_at": "2022-09-19T13:02:38Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1613,
|
||||
"watchers_count": 1613,
|
||||
"stargazers_count": 1614,
|
||||
"watchers_count": 1614,
|
||||
"forks_count": 578,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 578,
|
||||
"watchers": 1613,
|
||||
"watchers": 1614,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2022-09-17T13:43:23Z",
|
||||
"updated_at": "2022-09-19T17:41:46Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 7,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 59,
|
||||
"forks": 8,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Investigating the bug behind CVE-2021-26708",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T20:27:06Z",
|
||||
"updated_at": "2022-09-15T10:27:33Z",
|
||||
"updated_at": "2022-09-19T17:59:32Z",
|
||||
"pushed_at": "2021-02-16T03:03:54Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,7 +45,7 @@
|
|||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-09-19T11:40:02Z",
|
||||
"updated_at": "2022-09-19T12:51:39Z",
|
||||
"pushed_at": "2022-09-01T21:30:25Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-01-28T00:27:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -222,11 +222,11 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2022-09-11T18:35:07Z",
|
||||
"updated_at": "2022-09-19T16:40:30Z",
|
||||
"pushed_at": "2022-08-02T13:18:24Z",
|
||||
"stargazers_count": 1005,
|
||||
"watchers_count": 1005,
|
||||
"forks_count": 449,
|
||||
"stargazers_count": 1006,
|
||||
"watchers_count": 1006,
|
||||
"forks_count": 448,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -234,8 +234,8 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 449,
|
||||
"watchers": 1005,
|
||||
"forks": 448,
|
||||
"watchers": 1006,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -426,7 +426,7 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-09-18T11:41:28Z",
|
||||
"updated_at": "2022-09-19T16:40:27Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1471,
|
||||
"watchers_count": 1471,
|
||||
|
@ -523,10 +523,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-09-15T09:35:57Z",
|
||||
"updated_at": "2022-09-19T17:40:24Z",
|
||||
"pushed_at": "2022-08-31T05:56:13Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -539,7 +539,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 508,
|
||||
"watchers": 509,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1337,7 +1337,7 @@
|
|||
"pushed_at": "2022-05-05T08:50:49Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1349,7 +1349,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1479,10 +1479,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-09-19T06:27:57Z",
|
||||
"updated_at": "2022-09-19T17:46:07Z",
|
||||
"pushed_at": "2022-09-11T03:55:38Z",
|
||||
"stargazers_count": 3049,
|
||||
"watchers_count": 3049,
|
||||
"stargazers_count": 3048,
|
||||
"watchers_count": 3048,
|
||||
"forks_count": 728,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1490,7 +1490,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 728,
|
||||
"watchers": 3049,
|
||||
"watchers": 3048,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2227,10 +2227,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-09-15T19:43:29Z",
|
||||
"updated_at": "2022-09-19T14:56:07Z",
|
||||
"pushed_at": "2022-04-24T08:56:47Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2244,7 +2244,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 352,
|
||||
"watchers": 353,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5885,7 +5885,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-24T20:00:12Z",
|
||||
"updated_at": "2022-01-06T13:31:29Z",
|
||||
"pushed_at": "2022-08-19T17:30:14Z",
|
||||
"pushed_at": "2022-09-19T17:30:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -657,10 +657,10 @@
|
|||
"description": "CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T02:47:08Z",
|
||||
"updated_at": "2022-09-15T07:14:09Z",
|
||||
"updated_at": "2022-09-19T14:03:55Z",
|
||||
"pushed_at": "2022-03-09T02:47:32Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -670,7 +670,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -122,18 +122,18 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2022-09-18T10:02:20Z",
|
||||
"updated_at": "2022-09-19T15:08:45Z",
|
||||
"pushed_at": "2022-08-04T18:26:18Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 213,
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"forks_count": 212,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 213,
|
||||
"watchers": 267,
|
||||
"forks": 212,
|
||||
"watchers": 268,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -58,10 +58,10 @@
|
|||
"description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T04:36:50Z",
|
||||
"updated_at": "2022-09-19T10:46:53Z",
|
||||
"updated_at": "2022-09-19T14:28:27Z",
|
||||
"pushed_at": "2022-09-02T11:00:28Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -69,7 +69,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2022-09-12T14:59:22Z",
|
||||
"updated_at": "2022-09-19T14:10:54Z",
|
||||
"pushed_at": "2022-08-11T06:04:18Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 83,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -125,18 +125,18 @@
|
|||
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T21:35:19Z",
|
||||
"updated_at": "2022-09-19T02:38:20Z",
|
||||
"updated_at": "2022-09-19T13:10:06Z",
|
||||
"pushed_at": "2022-09-18T21:38:47Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-09-19T09:16:09Z",
|
||||
"updated_at": "2022-09-19T14:12:08Z",
|
||||
"pushed_at": "2022-08-29T12:54:56Z",
|
||||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"forks_count": 138,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 138,
|
||||
"watchers": 768,
|
||||
"watchers": 769,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-09-19T09:46:17Z",
|
||||
"updated_at": "2022-09-19T15:00:45Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"watchers": 309,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -773,10 +773,10 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2022-09-15T14:21:09Z",
|
||||
"updated_at": "2022-09-19T17:19:31Z",
|
||||
"pushed_at": "2022-06-06T07:19:53Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -784,7 +784,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 332,
|
||||
"watchers": 333,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1950,15 +1950,20 @@
|
|||
"description": "Proof of concept for CVE-2022-30190 (Follina).",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T16:12:57Z",
|
||||
"updated_at": "2022-09-16T01:01:09Z",
|
||||
"pushed_at": "2022-09-16T18:46:13Z",
|
||||
"updated_at": "2022-09-19T17:13:56Z",
|
||||
"pushed_at": "2022-09-19T17:32:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2021-40444",
|
||||
"follina",
|
||||
"remote-code-execution",
|
||||
"trojan"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
|
|
35
2022/CVE-2022-31814.json
Normal file
35
2022/CVE-2022-31814.json
Normal file
|
@ -0,0 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 538083210,
|
||||
"name": "SenselessViolence",
|
||||
"full_name": "EvergreenCartoons\/SenselessViolence",
|
||||
"owner": {
|
||||
"login": "EvergreenCartoons",
|
||||
"id": 113829980,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113829980?v=4",
|
||||
"html_url": "https:\/\/github.com\/EvergreenCartoons"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EvergreenCartoons\/SenselessViolence",
|
||||
"description": "CVE-2022-31814 Exploitation Toolkit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T11:10:04Z",
|
||||
"updated_at": "2022-09-19T13:55:37Z",
|
||||
"pushed_at": "2022-09-19T13:24:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"hacking",
|
||||
"pfsense",
|
||||
"security-tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Turning Your Computer Into a GPS Tracker With Apple Maps",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T15:51:52Z",
|
||||
"updated_at": "2022-09-19T07:30:38Z",
|
||||
"updated_at": "2022-09-19T16:41:57Z",
|
||||
"pushed_at": "2022-09-18T16:57:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"macos"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -79,18 +79,18 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-20T22:52:43Z",
|
||||
"updated_at": "2022-07-25T09:44:37Z",
|
||||
"updated_at": "2022-09-19T13:06:15Z",
|
||||
"pushed_at": "2022-07-20T22:53:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -61,6 +61,34 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 533698492,
|
||||
"name": "CVE-2022-36804",
|
||||
"full_name": "notdls\/CVE-2022-36804",
|
||||
"owner": {
|
||||
"login": "notdls",
|
||||
"id": 25024098,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25024098?v=4",
|
||||
"html_url": "https:\/\/github.com\/notdls"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/notdls\/CVE-2022-36804",
|
||||
"description": "A real exploit for BitBucket RCE CVE-2022-36804",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-07T09:35:49Z",
|
||||
"updated_at": "2022-09-19T16:14:37Z",
|
||||
"pushed_at": "2022-09-07T12:09:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 534942603,
|
||||
"name": "CVE-2022-36804-MASS-RCE",
|
||||
|
@ -116,5 +144,61 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 538498180,
|
||||
"name": "CVE-2022-36804-POC-RCE",
|
||||
"full_name": "CEOrbey\/CVE-2022-36804-POC-RCE",
|
||||
"owner": {
|
||||
"login": "CEOrbey",
|
||||
"id": 112818434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112818434?v=4",
|
||||
"html_url": "https:\/\/github.com\/CEOrbey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CEOrbey\/CVE-2022-36804-POC-RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-19T12:46:33Z",
|
||||
"updated_at": "2022-09-19T12:53:13Z",
|
||||
"pushed_at": "2022-09-19T13:03:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 538510407,
|
||||
"name": "CVE-2022-36804-PoC",
|
||||
"full_name": "notxesh\/CVE-2022-36804-PoC",
|
||||
"owner": {
|
||||
"login": "notxesh",
|
||||
"id": 49665312,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49665312?v=4",
|
||||
"html_url": "https:\/\/github.com\/notxesh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/notxesh\/CVE-2022-36804-PoC",
|
||||
"description": "Proof of Concept exploit for CVE-2022-36804 affecting BitBucket versions <8.3.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-19T13:15:13Z",
|
||||
"updated_at": "2022-09-19T17:24:58Z",
|
||||
"pushed_at": "2022-09-19T13:49:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2022-09-19T06:24:07Z",
|
||||
"updated_at": "2022-09-19T17:55:22Z",
|
||||
"pushed_at": "2022-09-14T07:45:40Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 145,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
18
README.md
18
README.md
|
@ -3190,6 +3190,14 @@ do_request in request.c in muhttpd before 1.1.7 allows remote attackers to read
|
|||
|
||||
- [xpgdgit/CVE-2022-31793](https://github.com/xpgdgit/CVE-2022-31793)
|
||||
|
||||
### CVE-2022-31814 (2022-09-05)
|
||||
|
||||
<code>
|
||||
pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.
|
||||
</code>
|
||||
|
||||
- [EvergreenCartoons/SenselessViolence](https://github.com/EvergreenCartoons/SenselessViolence)
|
||||
|
||||
### CVE-2022-31854 (2022-07-07)
|
||||
|
||||
<code>
|
||||
|
@ -3543,8 +3551,11 @@ Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 befor
|
|||
|
||||
- [cryptolakk/CVE-2022-36804-RCE](https://github.com/cryptolakk/CVE-2022-36804-RCE)
|
||||
- [CEOrbey/CVE-2022-36804-POC](https://github.com/CEOrbey/CVE-2022-36804-POC)
|
||||
- [notdls/CVE-2022-36804](https://github.com/notdls/CVE-2022-36804)
|
||||
- [CEOrbey/CVE-2022-36804-MASS-RCE](https://github.com/CEOrbey/CVE-2022-36804-MASS-RCE)
|
||||
- [CEOrbey/CVE-2022-36804-RCE](https://github.com/CEOrbey/CVE-2022-36804-RCE)
|
||||
- [CEOrbey/CVE-2022-36804-POC-RCE](https://github.com/CEOrbey/CVE-2022-36804-POC-RCE)
|
||||
- [notxesh/CVE-2022-36804-PoC](https://github.com/notxesh/CVE-2022-36804-PoC)
|
||||
|
||||
### CVE-2022-36946 (2022-07-27)
|
||||
|
||||
|
@ -3591,7 +3602,12 @@ JFinal CMS 5.1.0 is vulnerable to SQL Injection.
|
|||
### CVE-2022-37202
|
||||
- [AgainstTheLight/CVE-2022-37202](https://github.com/AgainstTheLight/CVE-2022-37202)
|
||||
|
||||
### CVE-2022-37203
|
||||
### CVE-2022-37203 (2022-09-19)
|
||||
|
||||
<code>
|
||||
JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
|
||||
</code>
|
||||
|
||||
- [AgainstTheLight/CVE-2022-37203](https://github.com/AgainstTheLight/CVE-2022-37203)
|
||||
|
||||
### CVE-2022-37204
|
||||
|
|
Loading…
Reference in a new issue