mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/05/26 12:29:25
This commit is contained in:
parent
bde7e9a53e
commit
4d7c1122e6
39 changed files with 292 additions and 211 deletions
|
@ -52,7 +52,7 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -63,7 +63,7 @@
|
|||
"gitlab"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -86,13 +86,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Demonstration of Go's dsa.Verify bug (CVE-2019-17596)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-19T23:32:02Z",
|
||||
"updated_at": "2019-10-24T17:18:50Z",
|
||||
"updated_at": "2023-05-26T08:27:51Z",
|
||||
"pushed_at": "2019-10-24T15:00:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -100,10 +100,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2023-05-26T00:53:57Z",
|
||||
"updated_at": "2023-05-26T09:02:42Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 891,
|
||||
"watchers_count": 891,
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 891,
|
||||
"watchers": 892,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1607,10 +1607,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2023-05-04T05:35:52Z",
|
||||
"updated_at": "2023-05-26T10:23:31Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -1619,7 +1619,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload ",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-15T01:50:36Z",
|
||||
"updated_at": "2023-03-01T06:36:15Z",
|
||||
"updated_at": "2023-05-26T07:32:53Z",
|
||||
"pushed_at": "2023-01-06T23:08:57Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": true,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -64,7 +64,7 @@
|
|||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
"sigred"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"forks": 76,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -165,10 +165,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2023-04-20T07:53:15Z",
|
||||
"updated_at": "2023-05-26T07:53:04Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 526,
|
||||
"watchers_count": 526,
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
|
@ -177,7 +177,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 526,
|
||||
"watchers": 527,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1763,6 +1763,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 603449630,
|
||||
"name": "CVE-2020-1472-LAB",
|
||||
"full_name": "RicYaben\/CVE-2020-1472-LAB",
|
||||
"owner": {
|
||||
"login": "RicYaben",
|
||||
"id": 32867697,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32867697?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicYaben"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicYaben\/CVE-2020-1472-LAB",
|
||||
"description": "Lab introduction to ZeroLogon",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-18T14:52:17Z",
|
||||
"updated_at": "2023-02-18T15:12:45Z",
|
||||
"pushed_at": "2023-02-21T14:04:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 606729349,
|
||||
"name": "zero-effort",
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2023-05-24T02:33:07Z",
|
||||
"updated_at": "2023-05-26T07:48:48Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1027,
|
||||
"watchers_count": 1027,
|
||||
"stargazers_count": 1028,
|
||||
"watchers_count": 1028,
|
||||
"has_discussions": false,
|
||||
"forks_count": 324,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 324,
|
||||
"watchers": 1027,
|
||||
"watchers": 1028,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -332,10 +332,10 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T05:17:09Z",
|
||||
"updated_at": "2023-05-04T05:35:50Z",
|
||||
"updated_at": "2023-05-26T10:23:30Z",
|
||||
"pushed_at": "2020-02-22T05:23:53Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -344,7 +344,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-24T09:10:17Z",
|
||||
"updated_at": "2023-05-18T10:12:27Z",
|
||||
"updated_at": "2023-05-26T07:33:01Z",
|
||||
"pushed_at": "2020-12-25T09:51:37Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1659,5 +1659,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 598558288,
|
||||
"name": "CVE-2020-5902",
|
||||
"full_name": "amitlttwo\/CVE-2020-5902",
|
||||
"owner": {
|
||||
"login": "amitlttwo",
|
||||
"id": 55759090,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55759090?v=4",
|
||||
"html_url": "https:\/\/github.com\/amitlttwo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amitlttwo\/CVE-2020-5902",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T11:07:23Z",
|
||||
"updated_at": "2023-02-07T11:08:25Z",
|
||||
"pushed_at": "2023-02-07T11:12:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 604312152,
|
||||
"name": "CVE-2020-7384",
|
||||
"full_name": "0xCarsonS\/CVE-2020-7384",
|
||||
"owner": {
|
||||
"login": "0xCarsonS",
|
||||
"id": 125919527,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125919527?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xCarsonS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xCarsonS\/CVE-2020-7384",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T19:42:38Z",
|
||||
"updated_at": "2023-02-20T19:59:00Z",
|
||||
"pushed_at": "2023-02-21T15:18:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2023-05-20T15:47:04Z",
|
||||
"updated_at": "2023-05-26T09:06:44Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1692,
|
||||
"watchers_count": 1692,
|
||||
"stargazers_count": 1693,
|
||||
"watchers_count": 1693,
|
||||
"has_discussions": false,
|
||||
"forks_count": 589,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 589,
|
||||
"watchers": 1692,
|
||||
"watchers": 1693,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2023-05-25T07:24:01Z",
|
||||
"updated_at": "2023-05-26T07:40:37Z",
|
||||
"pushed_at": "2021-12-30T12:26:11Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -56,7 +56,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2023-05-24T02:33:07Z",
|
||||
"updated_at": "2023-05-26T07:48:48Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1027,
|
||||
"watchers_count": 1027,
|
||||
"stargazers_count": 1028,
|
||||
"watchers_count": 1028,
|
||||
"has_discussions": false,
|
||||
"forks_count": 324,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 324,
|
||||
"watchers": 1027,
|
||||
"watchers": 1028,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -960,35 +960,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 421299784,
|
||||
"name": "CVE-2021-26084",
|
||||
"full_name": "lleavesl\/CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "lleavesl",
|
||||
"id": 91398948,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91398948?v=4",
|
||||
"html_url": "https:\/\/github.com\/lleavesl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lleavesl\/CVE-2021-26084",
|
||||
"description": "CVE-2021-26084,Atlassian Confluence OGNL注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-26T06:01:38Z",
|
||||
"updated_at": "2022-09-03T22:05:44Z",
|
||||
"pushed_at": "2021-10-27T02:30:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 431232449,
|
||||
"name": "conflucheck",
|
||||
|
|
|
@ -455,10 +455,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-05-21T08:16:22Z",
|
||||
"updated_at": "2023-05-26T11:02:11Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 872,
|
||||
"watchers_count": 872,
|
||||
"stargazers_count": 873,
|
||||
"watchers_count": 873,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -467,7 +467,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 872,
|
||||
"watchers": 873,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2023-05-26T03:18:19Z",
|
||||
"updated_at": "2023-05-26T12:10:25Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -144,7 +144,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 75,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2023-05-26T05:44:17Z",
|
||||
"updated_at": "2023-05-26T11:02:22Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1816,
|
||||
"watchers_count": 1816,
|
||||
"stargazers_count": 1818,
|
||||
"watchers_count": 1818,
|
||||
"has_discussions": false,
|
||||
"forks_count": 510,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 510,
|
||||
"watchers": 1816,
|
||||
"watchers": 1818,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 421957912,
|
||||
"name": "CVE-2021-41728",
|
||||
"full_name": "whoissecure\/CVE-2021-41728",
|
||||
"owner": {
|
||||
"login": "whoissecure",
|
||||
"id": 22798238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
|
||||
"html_url": "https:\/\/github.com\/whoissecure"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whoissecure\/CVE-2021-41728",
|
||||
"description": "Information about CVE-2021-41728, a reflected XSS in the search function.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T20:04:12Z",
|
||||
"updated_at": "2021-10-27T20:05:53Z",
|
||||
"pushed_at": "2021-10-27T20:05:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -909,12 +909,12 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-05-24T22:56:09Z",
|
||||
"updated_at": "2023-05-26T10:24:46Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1586,
|
||||
"watchers_count": 1586,
|
||||
"stargazers_count": 1587,
|
||||
"watchers_count": 1587,
|
||||
"has_discussions": false,
|
||||
"forks_count": 466,
|
||||
"forks_count": 467,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -925,8 +925,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 466,
|
||||
"watchers": 1586,
|
||||
"forks": 467,
|
||||
"watchers": 1587,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1409,10 +1409,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2023-05-24T05:54:55Z",
|
||||
"updated_at": "2023-05-26T07:37:31Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 848,
|
||||
"watchers_count": 848,
|
||||
"stargazers_count": 849,
|
||||
"watchers_count": 849,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
|
@ -1434,7 +1434,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 848,
|
||||
"watchers": 849,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3502,10 +3502,10 @@
|
|||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2023-05-25T13:07:38Z",
|
||||
"updated_at": "2023-05-26T11:58:44Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -3514,7 +3514,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5098,10 +5098,10 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2023-04-17T22:30:36Z",
|
||||
"updated_at": "2023-05-26T12:19:33Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -5110,7 +5110,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 288,
|
||||
"watchers": 289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-05-24T12:15:29Z",
|
||||
"updated_at": "2023-05-26T07:48:09Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 407,
|
||||
"watchers": 408,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T19:37:35Z",
|
||||
"updated_at": "2023-05-25T06:34:55Z",
|
||||
"updated_at": "2023-05-26T07:05:06Z",
|
||||
"pushed_at": "2022-04-22T17:55:37Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-17T05:44:45Z",
|
||||
"updated_at": "2023-05-12T17:07:48Z",
|
||||
"updated_at": "2023-05-26T07:04:02Z",
|
||||
"pushed_at": "2022-04-17T05:53:54Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-05-25T13:14:14Z",
|
||||
"updated_at": "2023-05-26T07:33:35Z",
|
||||
"pushed_at": "2023-03-23T10:26:41Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1635,5 +1635,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 645770114,
|
||||
"name": "CVE-2022-22947",
|
||||
"full_name": "Le1a\/CVE-2022-22947",
|
||||
"owner": {
|
||||
"login": "Le1a",
|
||||
"id": 97610822,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97610822?v=4",
|
||||
"html_url": "https:\/\/github.com\/Le1a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Le1a\/CVE-2022-22947",
|
||||
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行Exp",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-26T11:52:22Z",
|
||||
"updated_at": "2023-05-26T11:53:14Z",
|
||||
"pushed_at": "2023-05-26T12:06:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2023-05-23T07:42:04Z",
|
||||
"updated_at": "2023-05-26T11:17:20Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 683,
|
||||
"watchers_count": 683,
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 683,
|
||||
"watchers": 684,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2353,7 +2353,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-02T07:56:28Z",
|
||||
"updated_at": "2023-05-02T07:58:56Z",
|
||||
"pushed_at": "2023-05-26T02:41:28Z",
|
||||
"pushed_at": "2023-05-26T10:28:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -100,19 +100,19 @@
|
|||
"description": "Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-20T02:35:53Z",
|
||||
"updated_at": "2022-10-25T11:10:13Z",
|
||||
"updated_at": "2023-05-26T07:58:31Z",
|
||||
"pushed_at": "2022-09-24T20:52:18Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,10 +134,10 @@
|
|||
"description": "CVE-2023-21839 Python版本",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-15T08:57:10Z",
|
||||
"updated_at": "2023-05-15T07:30:13Z",
|
||||
"updated_at": "2023-05-26T07:46:52Z",
|
||||
"pushed_at": "2023-04-21T07:53:54Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -146,7 +146,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T15:19:23Z",
|
||||
"updated_at": "2023-05-25T06:06:56Z",
|
||||
"updated_at": "2023-05-26T08:25:36Z",
|
||||
"pushed_at": "2023-02-15T18:10:53Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T18:26:10Z",
|
||||
"updated_at": "2023-04-10T04:43:02Z",
|
||||
"updated_at": "2023-05-26T07:10:00Z",
|
||||
"pushed_at": "2023-04-07T20:09:28Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,10 +46,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-05-25T17:47:33Z",
|
||||
"updated_at": "2023-05-26T06:51:32Z",
|
||||
"pushed_at": "2023-05-24T18:29:42Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-25T13:25:10Z",
|
||||
"updated_at": "2023-05-26T06:29:43Z",
|
||||
"updated_at": "2023-05-26T10:34:38Z",
|
||||
"pushed_at": "2023-05-25T16:13:23Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,8 +27,8 @@
|
|||
"gitlab"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"forks": 9,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2023-28771 based on Rapid7's excellent writeup",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-23T02:37:39Z",
|
||||
"updated_at": "2023-05-24T09:51:47Z",
|
||||
"updated_at": "2023-05-26T09:47:40Z",
|
||||
"pushed_at": "2023-05-23T02:49:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-29922 Batch detection script",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-23T06:06:50Z",
|
||||
"updated_at": "2023-05-26T05:31:18Z",
|
||||
"updated_at": "2023-05-26T12:09:27Z",
|
||||
"pushed_at": "2023-05-23T06:48:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-25T12:35:27Z",
|
||||
"updated_at": "2023-05-26T00:19:35Z",
|
||||
"pushed_at": "2023-05-25T19:49:08Z",
|
||||
"pushed_at": "2023-05-26T12:07:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -56,5 +56,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 645721252,
|
||||
"name": "CVE-2023-30212-Lab",
|
||||
"full_name": "mallutrojan\/CVE-2023-30212-Lab",
|
||||
"owner": {
|
||||
"login": "mallutrojan",
|
||||
"id": 71654039,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71654039?v=4",
|
||||
"html_url": "https:\/\/github.com\/mallutrojan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mallutrojan\/CVE-2023-30212-Lab",
|
||||
"description": "GitHub repository with Dockerfile and files to create a vulnerable environment for CVE-2023-30212, enabling exploration of the exploitability of this security vulnerability. Ideal for research and security enthusiasts to study and understand the impact of the vulnerability in a controlled setting.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-26T09:33:23Z",
|
||||
"updated_at": "2023-05-26T09:34:38Z",
|
||||
"pushed_at": "2023-05-26T09:34:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-05-26T03:09:41Z",
|
||||
"updated_at": "2023-05-26T11:31:56Z",
|
||||
"pushed_at": "2023-05-25T20:14:10Z",
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 418,
|
||||
"watchers": 420,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
14
README.md
14
README.md
|
@ -1210,6 +1210,7 @@ OURPHP <= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage
|
|||
|
||||
- [kuttappu123/CVE-2023-30212-LAB](https://github.com/kuttappu123/CVE-2023-30212-LAB)
|
||||
- [Rishipatidar/CVE-2023-30212-POC-DOCKER-FILE](https://github.com/Rishipatidar/CVE-2023-30212-POC-DOCKER-FILE)
|
||||
- [mallutrojan/CVE-2023-30212-Lab](https://github.com/mallutrojan/CVE-2023-30212-Lab)
|
||||
|
||||
### CVE-2023-30256 (2023-05-11)
|
||||
|
||||
|
@ -3108,6 +3109,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
|
|||
- [qq87234770/CVE-2022-22947](https://github.com/qq87234770/CVE-2022-22947)
|
||||
- [Zh0um1/CVE-2022-22947](https://github.com/Zh0um1/CVE-2022-22947)
|
||||
- [wallbreak1991/cve-2022-22947](https://github.com/wallbreak1991/cve-2022-22947)
|
||||
- [Le1a/CVE-2022-22947](https://github.com/Le1a/CVE-2022-22947)
|
||||
|
||||
### CVE-2022-22954 (2022-04-11)
|
||||
|
||||
|
@ -10275,7 +10277,6 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [orangmuda/CVE-2021-26084](https://github.com/orangmuda/CVE-2021-26084)
|
||||
- [TheclaMcentire/CVE-2021-26084_Confluence](https://github.com/TheclaMcentire/CVE-2021-26084_Confluence)
|
||||
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
|
||||
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
|
||||
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
|
||||
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
|
||||
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
|
||||
|
@ -12848,14 +12849,6 @@ The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL
|
|||
|
||||
- [likeww/CVE-2021-41653](https://github.com/likeww/CVE-2021-41653)
|
||||
|
||||
### CVE-2021-41728 (2021-10-28)
|
||||
|
||||
<code>
|
||||
Cross Site Scripting (XSS) vulnerability exists in Sourcecodester News247 CMS 1.0 via the search function in articles.
|
||||
</code>
|
||||
|
||||
- [whoissecure/CVE-2021-41728](https://github.com/whoissecure/CVE-2021-41728)
|
||||
|
||||
### CVE-2021-41730
|
||||
- [IBUILI/CVE-2021-41730](https://github.com/IBUILI/CVE-2021-41730)
|
||||
|
||||
|
@ -15601,6 +15594,7 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
|
|||
- [guglia001/MassZeroLogon](https://github.com/guglia001/MassZeroLogon)
|
||||
- [likeww/MassZeroLogon](https://github.com/likeww/MassZeroLogon)
|
||||
- [dr4g0n23/CVE-2020-1472](https://github.com/dr4g0n23/CVE-2020-1472)
|
||||
- [RicYaben/CVE-2020-1472-LAB](https://github.com/RicYaben/CVE-2020-1472-LAB)
|
||||
- [n3rada/zero-effort](https://github.com/n3rada/zero-effort)
|
||||
- [Akash7350/CVE-2020-1472](https://github.com/Akash7350/CVE-2020-1472)
|
||||
- [G0urmetD/Zerologon-CVE-2020-1472](https://github.com/G0urmetD/Zerologon-CVE-2020-1472)
|
||||
|
@ -16264,6 +16258,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
|
||||
- [z3n70/CVE-2020-5902](https://github.com/z3n70/CVE-2020-5902)
|
||||
- [34zY/APT-Backpack](https://github.com/34zY/APT-Backpack)
|
||||
- [amitlttwo/CVE-2020-5902](https://github.com/amitlttwo/CVE-2020-5902)
|
||||
|
||||
### CVE-2020-5903 (2020-07-01)
|
||||
|
||||
|
@ -16456,6 +16451,7 @@ Rapid7's Metasploit msfvenom framework handles APK files in a way that allows fo
|
|||
</code>
|
||||
|
||||
- [nikhil1232/CVE-2020-7384](https://github.com/nikhil1232/CVE-2020-7384)
|
||||
- [0xCarsonS/CVE-2020-7384](https://github.com/0xCarsonS/CVE-2020-7384)
|
||||
|
||||
### CVE-2020-7388 (2021-07-22)
|
||||
|
||||
|
|
Loading…
Reference in a new issue