mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/07/14 18:21:48
This commit is contained in:
parent
c5d5f8d7a5
commit
505af1fd02
25 changed files with 197 additions and 129 deletions
|
@ -13,18 +13,18 @@
|
|||
"description": "Lets have fun by digging into a Zyxel router firmware and MIPS Arch",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-11T18:00:36Z",
|
||||
"updated_at": "2022-07-14T10:53:36Z",
|
||||
"updated_at": "2022-07-14T12:32:18Z",
|
||||
"pushed_at": "2019-06-12T20:07:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -68,14 +68,14 @@
|
|||
{
|
||||
"id": 342944268,
|
||||
"name": "CVE-2015-3224-",
|
||||
"full_name": "xda3m00n\/CVE-2015-3224-",
|
||||
"full_name": "n000xy\/CVE-2015-3224-",
|
||||
"owner": {
|
||||
"login": "xda3m00n",
|
||||
"login": "n000xy",
|
||||
"id": 45253703,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45253703?v=4",
|
||||
"html_url": "https:\/\/github.com\/xda3m00n"
|
||||
"html_url": "https:\/\/github.com\/n000xy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xda3m00n\/CVE-2015-3224-",
|
||||
"html_url": "https:\/\/github.com\/n000xy\/CVE-2015-3224-",
|
||||
"description": "CVE-2015-3224 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-27T19:47:14Z",
|
||||
|
|
|
@ -439,10 +439,10 @@
|
|||
"description": "SambaCry exploit (CVE-2017-7494) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-07T11:42:40Z",
|
||||
"updated_at": "2022-07-13T21:04:39Z",
|
||||
"updated_at": "2022-07-14T13:29:36Z",
|
||||
"pushed_at": "2022-05-08T09:02:36Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -450,7 +450,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 33,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3024,13 +3024,13 @@
|
|||
"pushed_at": "2022-03-28T04:10:20Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 244704461,
|
||||
"name": "cve-2019-1458_POC",
|
||||
"full_name": "piotrflorczyk\/cve-2019-1458_POC",
|
||||
"owner": {
|
||||
"login": "piotrflorczyk",
|
||||
"id": 7830144,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
|
||||
"html_url": "https:\/\/github.com\/piotrflorczyk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2019-1458_POC",
|
||||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2022-07-13T12:47:00Z",
|
||||
"pushed_at": "2022-01-17T19:45:41Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 246515470,
|
||||
"name": "CVE-2019-1458",
|
||||
|
|
|
@ -111,6 +111,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 432475559,
|
||||
"name": "CVE-2019-19609-POC-Python",
|
||||
"full_name": "n000xy\/CVE-2019-19609-POC-Python",
|
||||
"owner": {
|
||||
"login": "n000xy",
|
||||
"id": 45253703,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45253703?v=4",
|
||||
"html_url": "https:\/\/github.com\/n000xy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/n000xy\/CVE-2019-19609-POC-Python",
|
||||
"description": "Strapi Framework, 3.0.0-beta.17.4",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-27T13:58:18Z",
|
||||
"updated_at": "2022-07-14T13:47:06Z",
|
||||
"pushed_at": "2021-11-27T14:15:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436300401,
|
||||
"name": "CVE-2019-19609-EXPLOIT",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2022-06-30T06:09:57Z",
|
||||
"updated_at": "2022-07-14T14:40:57Z",
|
||||
"pushed_at": "2022-05-04T14:12:43Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,18 +41,18 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-07-13T08:54:59Z",
|
||||
"updated_at": "2022-07-14T14:57:47Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1478,
|
||||
"watchers_count": 1478,
|
||||
"forks_count": 335,
|
||||
"stargazers_count": 1479,
|
||||
"watchers_count": 1479,
|
||||
"forks_count": 336,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1478,
|
||||
"forks": 336,
|
||||
"watchers": 1479,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -97,10 +97,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-07-13T14:12:26Z",
|
||||
"updated_at": "2022-07-14T14:57:43Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 938,
|
||||
"watchers_count": 938,
|
||||
"stargazers_count": 939,
|
||||
"watchers_count": 939,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 938,
|
||||
"watchers": 939,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exchange2010 authorized RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T10:30:16Z",
|
||||
"updated_at": "2022-06-29T09:48:33Z",
|
||||
"updated_at": "2022-07-14T14:52:00Z",
|
||||
"pushed_at": "2020-12-24T08:11:51Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-07-13T12:10:41Z",
|
||||
"updated_at": "2022-07-14T14:39:06Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1577,
|
||||
"watchers_count": 1577,
|
||||
"stargazers_count": 1578,
|
||||
"watchers_count": 1578,
|
||||
"forks_count": 569,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 569,
|
||||
"watchers": 1577,
|
||||
"watchers": 1578,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,32 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 437822133,
|
||||
"name": "CVE-2021-34527",
|
||||
"full_name": "Amaranese\/CVE-2021-34527",
|
||||
"owner": {
|
||||
"login": "Amaranese",
|
||||
"id": 32201849,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4",
|
||||
"html_url": "https:\/\/github.com\/Amaranese"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Amaranese\/CVE-2021-34527",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:04:49Z",
|
||||
"updated_at": "2021-12-13T10:21:38Z",
|
||||
"pushed_at": "2021-12-13T10:21:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 461336839,
|
||||
"name": "CVE-2021-34527-CVE-2021-1675",
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"pushed_at": "2022-02-11T15:22:20Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 29,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -75,18 +75,18 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-07-13T14:50:35Z",
|
||||
"updated_at": "2022-07-14T13:38:14Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"forks_count": 470,
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"forks_count": 469,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 470,
|
||||
"watchers": 1604,
|
||||
"forks": 469,
|
||||
"watchers": 1605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1884,10 +1884,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-07-07T08:08:07Z",
|
||||
"updated_at": "2022-07-14T15:30:42Z",
|
||||
"pushed_at": "2022-04-19T12:33:32Z",
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1895,7 +1895,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 279,
|
||||
"watchers": 280,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2906,6 +2906,39 @@
|
|||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 455655673,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "rvizx\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "rvizx",
|
||||
"id": 84989569,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
|
||||
"html_url": "https:\/\/github.com\/rvizx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rvizx\/CVE-2021-4034",
|
||||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec in Python",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-04T18:31:15Z",
|
||||
"updated_at": "2022-07-04T18:23:42Z",
|
||||
"pushed_at": "2022-07-14T16:02:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"c",
|
||||
"cve-2021-4034",
|
||||
"cybersecurity",
|
||||
"python3"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 456253867,
|
||||
"name": "Polkit-CVE-2021-4034-HLP",
|
||||
|
|
|
@ -191,10 +191,10 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-07-13T15:48:39Z",
|
||||
"updated_at": "2022-07-14T14:50:33Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -202,7 +202,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-24T06:43:56Z",
|
||||
"updated_at": "2022-07-08T09:40:36Z",
|
||||
"updated_at": "2022-07-14T14:28:17Z",
|
||||
"pushed_at": "2022-03-19T06:32:50Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -737,10 +737,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-07-14T08:29:22Z",
|
||||
"updated_at": "2022-07-14T15:29:46Z",
|
||||
"pushed_at": "2022-06-02T02:16:13Z",
|
||||
"stargazers_count": 416,
|
||||
"watchers_count": 416,
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -753,7 +753,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 416,
|
||||
"watchers": 418,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2015,10 +2015,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-07-13T22:06:26Z",
|
||||
"updated_at": "2022-07-14T14:38:43Z",
|
||||
"pushed_at": "2022-05-17T13:25:17Z",
|
||||
"stargazers_count": 2951,
|
||||
"watchers_count": 2951,
|
||||
"stargazers_count": 2953,
|
||||
"watchers_count": 2953,
|
||||
"forks_count": 718,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2026,7 +2026,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 718,
|
||||
"watchers": 2951,
|
||||
"watchers": 2953,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9018,7 +9018,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-12T11:19:41Z",
|
||||
"updated_at": "2022-07-13T00:54:21Z",
|
||||
"pushed_at": "2022-07-13T06:18:05Z",
|
||||
"pushed_at": "2022-07-14T18:13:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -323,10 +323,10 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-07-13T15:48:39Z",
|
||||
"updated_at": "2022-07-14T14:50:33Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -334,7 +334,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-07-08T12:38:50Z",
|
||||
"pushed_at": "2022-07-14T03:56:53Z",
|
||||
"pushed_at": "2022-07-14T14:55:24Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"forks_count": 92,
|
||||
|
@ -87,7 +87,7 @@
|
|||
"pushed_at": "2022-04-04T14:09:11Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 82,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -104,7 +104,7 @@
|
|||
"working-example"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"forks": 81,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-07-12T08:03:51Z",
|
||||
"updated_at": "2022-07-14T14:28:03Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"stargazers_count": 477,
|
||||
"watchers_count": 477,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 476,
|
||||
"watchers": 477,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -97,10 +97,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T09:08:00Z",
|
||||
"updated_at": "2022-07-14T02:09:32Z",
|
||||
"updated_at": "2022-07-14T12:56:56Z",
|
||||
"pushed_at": "2022-04-15T09:13:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-07-14T09:09:16Z",
|
||||
"updated_at": "2022-07-14T14:20:34Z",
|
||||
"pushed_at": "2022-07-14T04:50:50Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 220,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1447,10 +1447,10 @@
|
|||
"description": "This is a python script that can be used with Shodan CLI to mass hunting Confluence Servers vulnerable to CVE-2022-26134",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-12T05:34:09Z",
|
||||
"updated_at": "2022-07-13T05:34:20Z",
|
||||
"updated_at": "2022-07-14T14:48:57Z",
|
||||
"pushed_at": "2022-07-12T05:52:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1458,7 +1458,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-07-13T11:45:49Z",
|
||||
"updated_at": "2022-07-14T17:48:18Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"stargazers_count": 290,
|
||||
"watchers_count": 290,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 289,
|
||||
"watchers": 290,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -683,7 +683,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-02T06:45:19Z",
|
||||
"updated_at": "2022-07-06T05:22:16Z",
|
||||
"pushed_at": "2022-07-06T04:44:27Z",
|
||||
"pushed_at": "2022-07-14T13:09:11Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
|
@ -1364,7 +1364,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-08T14:20:50Z",
|
||||
"updated_at": "2022-06-08T14:29:37Z",
|
||||
"pushed_at": "2022-06-08T15:08:52Z",
|
||||
"pushed_at": "2022-07-14T16:18:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
13
README.md
13
README.md
|
@ -2254,7 +2254,12 @@ A reflected XSS issue exists in the Management Console of several WSO2 products.
|
|||
### CVE-2022-29554
|
||||
- [ComparedArray/printix-CVE-2022-29554](https://github.com/ComparedArray/printix-CVE-2022-29554)
|
||||
|
||||
### CVE-2022-29593
|
||||
### CVE-2022-29593 (2022-07-14)
|
||||
|
||||
<code>
|
||||
relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
|
||||
</code>
|
||||
|
||||
- [9lyph/CVE-2022-29593](https://github.com/9lyph/CVE-2022-29593)
|
||||
|
||||
### CVE-2022-29597 (2022-06-02)
|
||||
|
@ -3851,6 +3856,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [Ankit-Ojha16/CVE-2021-4034](https://github.com/Ankit-Ojha16/CVE-2021-4034)
|
||||
- [Ph4nt0mh4x0r/auto-CVE-2021-4034](https://github.com/Ph4nt0mh4x0r/auto-CVE-2021-4034)
|
||||
- [drapl0n/pwnKit](https://github.com/drapl0n/pwnKit)
|
||||
- [rvizx/CVE-2021-4034](https://github.com/rvizx/CVE-2021-4034)
|
||||
- [Joffr3y/Polkit-CVE-2021-4034-HLP](https://github.com/Joffr3y/Polkit-CVE-2021-4034-HLP)
|
||||
- [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit)
|
||||
- [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034)
|
||||
|
@ -5548,7 +5554,6 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
Windows Print Spooler Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
|
||||
- [Exploitspacks/CVE-2021-34527-CVE-2021-1675](https://github.com/Exploitspacks/CVE-2021-34527-CVE-2021-1675)
|
||||
- [cyb3rpeace/CVE-2021-34527](https://github.com/cyb3rpeace/CVE-2021-34527)
|
||||
|
||||
|
@ -13022,6 +13027,7 @@ An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll
|
|||
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
|
||||
</code>
|
||||
|
||||
- [piotrflorczyk/cve-2019-1458_POC](https://github.com/piotrflorczyk/cve-2019-1458_POC)
|
||||
- [unamer/CVE-2019-1458](https://github.com/unamer/CVE-2019-1458)
|
||||
- [DreamoneOnly/CVE-2019-1458-malware](https://github.com/DreamoneOnly/CVE-2019-1458-malware)
|
||||
- [Eternit7/CVE-2019-1458](https://github.com/Eternit7/CVE-2019-1458)
|
||||
|
@ -16273,6 +16279,7 @@ The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Executi
|
|||
- [diego-tella/CVE-2019-19609-EXPLOIT](https://github.com/diego-tella/CVE-2019-19609-EXPLOIT)
|
||||
- [guglia001/CVE-2019-19609](https://github.com/guglia001/CVE-2019-19609)
|
||||
- [D3m0nicw0lf/CVE-2019-19609](https://github.com/D3m0nicw0lf/CVE-2019-19609)
|
||||
- [n000xy/CVE-2019-19609-POC-Python](https://github.com/n000xy/CVE-2019-19609-POC-Python)
|
||||
- [RamPanic/CVE-2019-19609-EXPLOIT](https://github.com/RamPanic/CVE-2019-19609-EXPLOIT)
|
||||
- [glowbase/CVE-2019-19609](https://github.com/glowbase/CVE-2019-19609)
|
||||
|
||||
|
@ -24097,7 +24104,7 @@ request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x,
|
|||
|
||||
- [0x00-0x00/CVE-2015-3224](https://github.com/0x00-0x00/CVE-2015-3224)
|
||||
- [0xEval/cve-2015-3224](https://github.com/0xEval/cve-2015-3224)
|
||||
- [xda3m00n/CVE-2015-3224-](https://github.com/xda3m00n/CVE-2015-3224-)
|
||||
- [n000xy/CVE-2015-3224-](https://github.com/n000xy/CVE-2015-3224-)
|
||||
|
||||
### CVE-2015-3306 (2015-05-18)
|
||||
|
||||
|
|
Loading…
Reference in a new issue