mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2022/05/17 06:15:55
This commit is contained in:
parent
9bdde3f34c
commit
50eab077e9
39 changed files with 250 additions and 223 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2022-05-06T13:20:50Z",
|
||||
"updated_at": "2022-05-17T03:36:18Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2273,
|
||||
"watchers_count": 2273,
|
||||
"stargazers_count": 2272,
|
||||
"watchers_count": 2272,
|
||||
"forks_count": 483,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"watchers": 2273,
|
||||
"watchers": 2272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-16T02:18:34Z",
|
||||
"updated_at": "2022-05-17T01:01:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1354,
|
||||
"watchers_count": 1354,
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1354,
|
||||
"watchers": 1355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-16T02:18:34Z",
|
||||
"updated_at": "2022-05-17T01:01:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1354,
|
||||
"watchers_count": 1354,
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1354,
|
||||
"watchers": 1355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -179,12 +179,12 @@
|
|||
"pushed_at": "2018-01-26T14:28:58Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 40,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 39,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,29 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 123458951,
|
||||
"id": 141677703,
|
||||
"name": "Jackson-CVE-2017-17485",
|
||||
"full_name": "maxbitcoin\/Jackson-CVE-2017-17485",
|
||||
"full_name": "rootsecurity\/Jackson-CVE-2017-17485",
|
||||
"owner": {
|
||||
"login": "maxbitcoin",
|
||||
"id": 5998127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5998127?v=4",
|
||||
"html_url": "https:\/\/github.com\/maxbitcoin"
|
||||
"login": "rootsecurity",
|
||||
"id": 3953477,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3953477?v=4",
|
||||
"html_url": "https:\/\/github.com\/rootsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maxbitcoin\/Jackson-CVE-2017-17485",
|
||||
"html_url": "https:\/\/github.com\/rootsecurity\/Jackson-CVE-2017-17485",
|
||||
"description": "Jackson 反序列化",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-01T16:09:20Z",
|
||||
"updated_at": "2021-01-03T06:19:34Z",
|
||||
"pushed_at": "2018-01-24T03:03:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 9,
|
||||
"created_at": "2018-07-20T07:18:09Z",
|
||||
"updated_at": "2022-05-17T03:24:41Z",
|
||||
"pushed_at": "2018-05-09T19:26:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-16T02:18:34Z",
|
||||
"updated_at": "2022-05-17T01:01:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1354,
|
||||
"watchers_count": 1354,
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1354,
|
||||
"watchers": 1355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2017-07-26T13:07:51Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 60,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"forks": 59,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -71,7 +71,7 @@
|
|||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 105,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -82,7 +82,7 @@
|
|||
"sambacry"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"forks": 104,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -131,12 +131,12 @@
|
|||
"pushed_at": "2021-10-31T07:06:25Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 25,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 24,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -148,17 +148,17 @@
|
|||
"description": "CVE-2018-14667-poc Richfaces漏洞环境及PoC",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T07:45:01Z",
|
||||
"updated_at": "2021-01-07T08:24:16Z",
|
||||
"updated_at": "2022-05-17T01:44:07Z",
|
||||
"pushed_at": "2019-09-24T05:00:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -148,7 +148,7 @@
|
|||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2022-03-29T14:48:08Z",
|
||||
"updated_at": "2022-05-17T00:52:14Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
|
@ -175,17 +175,17 @@
|
|||
"description": "Laravel RCE exploit. CVE-2018-15133",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T22:02:08Z",
|
||||
"updated_at": "2022-05-16T21:25:32Z",
|
||||
"updated_at": "2022-05-17T05:09:02Z",
|
||||
"pushed_at": "2022-03-22T17:56:41Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 9,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 21,
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2018-2628 & CVE-2018-2893",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-18T05:41:23Z",
|
||||
"updated_at": "2022-05-04T13:21:42Z",
|
||||
"updated_at": "2022-05-17T02:14:07Z",
|
||||
"pushed_at": "2018-07-20T01:24:36Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-16T02:18:34Z",
|
||||
"updated_at": "2022-05-17T01:01:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1354,
|
||||
"watchers_count": 1354,
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1354,
|
||||
"watchers": 1355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2018-10-24T17:42:47Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 26,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 25,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -310,10 +310,10 @@
|
|||
"description": "Tries to exploit a WordPress vulnerability (CVE-2018-6389) which can be used to cause a Denial of Service.",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T13:33:15Z",
|
||||
"updated_at": "2018-09-18T13:02:37Z",
|
||||
"updated_at": "2022-05-17T03:08:33Z",
|
||||
"pushed_at": "2018-03-10T11:57:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -328,7 +328,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-05-14T07:51:10Z",
|
||||
"updated_at": "2022-05-17T05:49:17Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1717,
|
||||
"watchers_count": 1717,
|
||||
"stargazers_count": 1718,
|
||||
"watchers_count": 1718,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 1717,
|
||||
"watchers": 1718,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 99,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"forks": 100,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T22:18:45Z",
|
||||
"updated_at": "2021-12-05T22:08:03Z",
|
||||
"updated_at": "2022-05-17T03:03:55Z",
|
||||
"pushed_at": "2019-10-20T21:36:23Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2019-12725 ZeroShell 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T03:36:33Z",
|
||||
"updated_at": "2021-12-18T11:13:16Z",
|
||||
"updated_at": "2022-05-17T02:20:21Z",
|
||||
"pushed_at": "2021-07-02T06:51:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-05-16T10:05:56Z",
|
||||
"updated_at": "2022-05-17T05:39:20Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3314,
|
||||
"watchers_count": 3314,
|
||||
"forks_count": 993,
|
||||
"stargazers_count": 3315,
|
||||
"watchers_count": 3315,
|
||||
"forks_count": 994,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 993,
|
||||
"watchers": 3314,
|
||||
"forks": 994,
|
||||
"watchers": 3315,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-16T02:18:34Z",
|
||||
"updated_at": "2022-05-17T01:01:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1354,
|
||||
"watchers_count": 1354,
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1354,
|
||||
"watchers": 1355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2022-04-26T07:11:35Z",
|
||||
"updated_at": "2022-05-17T02:17:05Z",
|
||||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 582,
|
||||
"watchers_count": 582,
|
||||
"stargazers_count": 583,
|
||||
"watchers_count": 583,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 582,
|
||||
"watchers": 583,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-05-16T10:05:56Z",
|
||||
"updated_at": "2022-05-17T05:39:20Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3314,
|
||||
"watchers_count": 3314,
|
||||
"forks_count": 993,
|
||||
"stargazers_count": 3315,
|
||||
"watchers_count": 3315,
|
||||
"forks_count": 994,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 993,
|
||||
"watchers": 3314,
|
||||
"forks": 994,
|
||||
"watchers": 3315,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-16T02:18:34Z",
|
||||
"updated_at": "2022-05-17T01:01:44Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1354,
|
||||
"watchers_count": 1354,
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"forks_count": 295,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 295,
|
||||
"watchers": 1354,
|
||||
"watchers": 1355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T13:57:14Z",
|
||||
"updated_at": "2022-01-13T11:57:21Z",
|
||||
"updated_at": "2022-05-17T01:10:34Z",
|
||||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-05-16T03:00:23Z",
|
||||
"updated_at": "2022-05-17T04:47:22Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1560,
|
||||
"watchers_count": 1560,
|
||||
"stargazers_count": 1561,
|
||||
"watchers_count": 1561,
|
||||
"forks_count": 561,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 561,
|
||||
"watchers": 1560,
|
||||
"watchers": 1561,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -152,17 +152,17 @@
|
|||
"description": "CVE-2021-25646 Apache Druid 远程代码执行漏洞 Wker脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T15:36:04Z",
|
||||
"updated_at": "2021-04-22T07:56:07Z",
|
||||
"updated_at": "2022-05-17T02:20:31Z",
|
||||
"pushed_at": "2021-04-15T09:55:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2022-05-13T12:52:39Z",
|
||||
"updated_at": "2022-05-17T01:55:13Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -260,17 +260,17 @@
|
|||
"description": "Add revert shell ",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-08T06:34:17Z",
|
||||
"updated_at": "2022-05-16T16:20:14Z",
|
||||
"updated_at": "2022-05-17T05:08:54Z",
|
||||
"pushed_at": "2022-04-08T06:59:38Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -875,10 +875,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-05-12T15:15:43Z",
|
||||
"updated_at": "2022-05-17T05:55:17Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 505,
|
||||
"watchers_count": 505,
|
||||
"stargazers_count": 506,
|
||||
"watchers_count": 506,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -887,7 +887,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 505,
|
||||
"watchers": 506,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T09:10:14Z",
|
||||
"updated_at": "2022-04-25T14:08:56Z",
|
||||
"updated_at": "2022-05-17T03:29:04Z",
|
||||
"pushed_at": "2022-04-04T08:33:41Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -107,37 +107,6 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435877595,
|
||||
"name": "CVE-2021-43798",
|
||||
"full_name": "Mr-xn\/CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
|
||||
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T12:47:58Z",
|
||||
"updated_at": "2022-04-11T04:08:51Z",
|
||||
"pushed_at": "2021-12-07T16:27:56Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-43798",
|
||||
"grafana",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435904073,
|
||||
"name": "CVE-2021-43798-Grafana-Exp",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-12-15T06:18:15Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2306,10 +2306,10 @@
|
|||
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T11:26:42Z",
|
||||
"updated_at": "2022-05-15T16:56:25Z",
|
||||
"updated_at": "2022-05-17T04:56:08Z",
|
||||
"pushed_at": "2021-12-12T17:37:11Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2324,7 +2324,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3406,17 +3406,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-05-16T19:48:10Z",
|
||||
"updated_at": "2022-05-17T05:02:46Z",
|
||||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2879,
|
||||
"watchers_count": 2879,
|
||||
"stargazers_count": 2880,
|
||||
"watchers_count": 2880,
|
||||
"forks_count": 709,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 709,
|
||||
"watchers": 2879,
|
||||
"watchers": 2880,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9393,10 +9393,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2022-05-05T06:12:56Z",
|
||||
"updated_at": "2022-05-17T04:22:44Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -9408,7 +9408,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9554,6 +9554,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 443941194,
|
||||
"name": "log4j2-test",
|
||||
"full_name": "mklinkj\/log4j2-test",
|
||||
"owner": {
|
||||
"login": "mklinkj",
|
||||
"id": 96992046,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96992046?v=4",
|
||||
"html_url": "https:\/\/github.com\/mklinkj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mklinkj\/log4j2-test",
|
||||
"description": "Log4j2 LDAP 취약점 테스트 (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T04:36:41Z",
|
||||
"updated_at": "2022-01-09T19:59:25Z",
|
||||
"pushed_at": "2022-05-17T05:17:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"log4j2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 444275342,
|
||||
"name": "4jfinder.github.io",
|
||||
|
|
|
@ -283,17 +283,17 @@
|
|||
"description": "POC for CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T11:46:45Z",
|
||||
"updated_at": "2022-05-16T14:05:14Z",
|
||||
"updated_at": "2022-05-17T04:29:10Z",
|
||||
"pushed_at": "2022-05-09T20:52:07Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 28,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 189,
|
||||
"forks": 29,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -310,10 +310,10 @@
|
|||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T14:01:38Z",
|
||||
"updated_at": "2022-05-16T12:50:20Z",
|
||||
"updated_at": "2022-05-17T01:16:18Z",
|
||||
"pushed_at": "2022-05-09T14:20:40Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -323,7 +323,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -425,12 +425,12 @@
|
|||
"pushed_at": "2022-05-09T16:14:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1254,5 +1254,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 493080053,
|
||||
"name": "F5-BIG-IP-exploit",
|
||||
"full_name": "getdrive\/F5-BIG-IP-exploit",
|
||||
"owner": {
|
||||
"login": "getdrive",
|
||||
"id": 20697688,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4",
|
||||
"html_url": "https:\/\/github.com\/getdrive"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/getdrive\/F5-BIG-IP-exploit",
|
||||
"description": "CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-17T03:23:39Z",
|
||||
"updated_at": "2022-05-17T03:24:54Z",
|
||||
"pushed_at": "2022-05-17T03:35:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": " The plugin, used as a companion for the Discy and Himer themes, does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-16T15:33:48Z",
|
||||
"updated_at": "2022-05-16T15:33:48Z",
|
||||
"updated_at": "2022-05-17T03:10:49Z",
|
||||
"pushed_at": "2022-05-16T15:53:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,12 +47,12 @@
|
|||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"forks_count": 44,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"forks": 45,
|
||||
"watchers": 258,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1070,17 +1070,17 @@
|
|||
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T21:01:26Z",
|
||||
"updated_at": "2022-05-02T18:26:49Z",
|
||||
"updated_at": "2022-05-17T01:58:50Z",
|
||||
"pushed_at": "2022-04-07T16:04:53Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:07:51Z",
|
||||
"updated_at": "2022-05-16T09:05:09Z",
|
||||
"updated_at": "2022-05-17T00:48:44Z",
|
||||
"pushed_at": "2022-05-11T02:02:59Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-14T09:27:06Z",
|
||||
"updated_at": "2022-05-16T11:08:46Z",
|
||||
"updated_at": "2022-05-17T05:45:38Z",
|
||||
"pushed_at": "2022-05-14T20:56:39Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Django QuerySet.annotate(), aggregate(), extra() SQL 注入",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T14:47:56Z",
|
||||
"updated_at": "2022-05-16T00:54:14Z",
|
||||
"updated_at": "2022-05-17T02:28:35Z",
|
||||
"pushed_at": "2022-05-13T08:58:13Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-05-16T09:18:47Z",
|
||||
"updated_at": "2022-05-17T05:09:21Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 658,
|
||||
"watchers_count": 658,
|
||||
"stargazers_count": 661,
|
||||
"watchers_count": 661,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 658,
|
||||
"watchers": 661,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T10:06:59Z",
|
||||
"updated_at": "2022-05-16T19:17:33Z",
|
||||
"updated_at": "2022-05-17T04:57:51Z",
|
||||
"pushed_at": "2022-05-14T06:21:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -330,6 +330,7 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
|
|||
- [PsychoSec2/CVE-2022-1388-POC](https://github.com/PsychoSec2/CVE-2022-1388-POC)
|
||||
- [iveresk/cve-2022-1388-iveresk-command-shell](https://github.com/iveresk/cve-2022-1388-iveresk-command-shell)
|
||||
- [Wrin9/CVE-2022-1388](https://github.com/Wrin9/CVE-2022-1388)
|
||||
- [getdrive/F5-BIG-IP-exploit](https://github.com/getdrive/F5-BIG-IP-exploit)
|
||||
|
||||
### CVE-2022-1598
|
||||
- [V35HR4J/CVE-2022-1598](https://github.com/V35HR4J/CVE-2022-1598)
|
||||
|
@ -5133,7 +5134,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
|
||||
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
|
||||
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
|
||||
- [Mr-xn/CVE-2021-43798](https://github.com/Mr-xn/CVE-2021-43798)
|
||||
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
|
||||
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
|
||||
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
|
||||
|
@ -5610,6 +5610,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
|
||||
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
|
||||
- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
|
||||
- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
|
||||
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
|
||||
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
|
||||
- [kanitan/log4j2-web-vulnerable](https://github.com/kanitan/log4j2-web-vulnerable)
|
||||
|
@ -20707,7 +20708,7 @@ Huawei HG255s-10 V100R001C163B025SP02 has a path traversal vulnerability due to
|
|||
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
|
||||
</code>
|
||||
|
||||
- [maxbitcoin/Jackson-CVE-2017-17485](https://github.com/maxbitcoin/Jackson-CVE-2017-17485)
|
||||
- [rootsecurity/Jackson-CVE-2017-17485](https://github.com/rootsecurity/Jackson-CVE-2017-17485)
|
||||
- [tafamace/CVE-2017-17485](https://github.com/tafamace/CVE-2017-17485)
|
||||
- [x7iaob/cve-2017-17485](https://github.com/x7iaob/cve-2017-17485)
|
||||
- [Al1ex/CVE-2017-17485](https://github.com/Al1ex/CVE-2017-17485)
|
||||
|
|
Loading…
Add table
Reference in a new issue