mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/01/20 18:33:13
This commit is contained in:
parent
e9e58db35c
commit
59c5206ada
33 changed files with 213 additions and 319 deletions
|
@ -49,10 +49,10 @@
|
|||
"description": "Collection of \"modchip\" designs for launching payloads via the Tegra RCM bug (CVE-2018-6242) ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-22T01:15:14Z",
|
||||
"updated_at": "2022-06-14T00:14:06Z",
|
||||
"updated_at": "2023-01-20T17:28:05Z",
|
||||
"pushed_at": "2018-05-22T07:44:42Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 22,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2023-01-13T17:10:31Z",
|
||||
"updated_at": "2023-01-20T14:00:20Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 313,
|
||||
"watchers": 314,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1204,6 +1204,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278269808,
|
||||
"name": "CVE-2019-19781",
|
||||
"full_name": "SharpHack\/CVE-2019-19781",
|
||||
"owner": {
|
||||
"login": "SharpHack",
|
||||
"id": 15997329,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15997329?v=4",
|
||||
"html_url": "https:\/\/github.com\/SharpHack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SharpHack\/CVE-2019-19781",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T05:17:07Z",
|
||||
"updated_at": "2020-07-09T05:17:29Z",
|
||||
"pushed_at": "2020-07-09T05:17:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 278386517,
|
||||
"name": "CVE-2019-19781-poc",
|
||||
|
|
|
@ -146,5 +146,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 591388946,
|
||||
"name": "CVE-2019-9978",
|
||||
"full_name": "grimlockx\/CVE-2019-9978",
|
||||
"owner": {
|
||||
"login": "grimlockx",
|
||||
"id": 95048484,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95048484?v=4",
|
||||
"html_url": "https:\/\/github.com\/grimlockx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/grimlockx\/CVE-2019-9978",
|
||||
"description": "Remote Code Execution in Social Warfare Plugin before 3.5.3 for Wordpress.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-20T16:29:18Z",
|
||||
"updated_at": "2023-01-20T16:31:03Z",
|
||||
"pushed_at": "2023-01-20T16:29:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2023-01-07T09:31:12Z",
|
||||
"updated_at": "2023-01-20T13:38:11Z",
|
||||
"pushed_at": "2021-12-23T16:28:28Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 317,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2023-01-18T14:50:41Z",
|
||||
"updated_at": "2023-01-20T14:57:48Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
"stargazers_count": 655,
|
||||
"watchers_count": 655,
|
||||
"has_discussions": false,
|
||||
"forks_count": 171,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 171,
|
||||
"watchers": 654,
|
||||
"watchers": 655,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2023-01-17T03:41:27Z",
|
||||
"updated_at": "2023-01-20T13:46:13Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 311,
|
||||
"watchers": 312,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ETS5 Password Recovery Tool is a PoC for CVE-2021-36799",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-18T13:59:43Z",
|
||||
"updated_at": "2023-01-10T11:37:25Z",
|
||||
"updated_at": "2023-01-20T12:51:12Z",
|
||||
"pushed_at": "2022-07-23T14:08:41Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for DoS vulnerability CVE-2021-37740 in firmware v3.0.3 of SCN-IP100.03 and SCN-IP000.03 by MDT. The bug has been fixed in firmware v3.0.4.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T18:07:42Z",
|
||||
"updated_at": "2022-11-09T18:15:40Z",
|
||||
"updated_at": "2023-01-20T13:13:42Z",
|
||||
"pushed_at": "2022-07-22T17:16:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -909,12 +909,12 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-01-19T16:46:01Z",
|
||||
"updated_at": "2023-01-20T15:29:21Z",
|
||||
"pushed_at": "2022-09-21T07:49:03Z",
|
||||
"stargazers_count": 1528,
|
||||
"watchers_count": 1528,
|
||||
"stargazers_count": 1529,
|
||||
"watchers_count": 1529,
|
||||
"has_discussions": false,
|
||||
"forks_count": 437,
|
||||
"forks_count": 438,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -925,8 +925,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 437,
|
||||
"watchers": 1528,
|
||||
"forks": 438,
|
||||
"watchers": 1529,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3614,10 +3614,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-01-20T07:21:32Z",
|
||||
"updated_at": "2023-01-20T16:17:19Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3168,
|
||||
"watchers_count": 3168,
|
||||
"stargazers_count": 3169,
|
||||
"watchers_count": 3169,
|
||||
"has_discussions": true,
|
||||
"forks_count": 743,
|
||||
"allow_forking": true,
|
||||
|
@ -3626,7 +3626,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 743,
|
||||
"watchers": 3168,
|
||||
"watchers": 3169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9673,7 +9673,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-24T20:00:12Z",
|
||||
"updated_at": "2022-01-06T13:31:29Z",
|
||||
"pushed_at": "2022-12-23T17:04:12Z",
|
||||
"pushed_at": "2023-01-20T17:03:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-12-16T06:19:48Z",
|
||||
"updated_at": "2023-01-20T16:06:49Z",
|
||||
"pushed_at": "2022-07-23T23:14:02Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 74,
|
||||
"forks": 31,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2285,10 +2285,10 @@
|
|||
"description": "修改版CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T01:21:35Z",
|
||||
"updated_at": "2022-12-15T02:31:36Z",
|
||||
"updated_at": "2023-01-20T18:20:13Z",
|
||||
"pushed_at": "2022-11-21T01:24:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -2297,7 +2297,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -373,13 +373,13 @@
|
|||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1004,7 +1004,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-11T19:33:37Z",
|
||||
"updated_at": "2022-07-04T19:06:44Z",
|
||||
"pushed_at": "2022-07-06T00:56:28Z",
|
||||
"pushed_at": "2023-01-20T17:21:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -223,7 +223,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-13T13:31:34Z",
|
||||
"updated_at": "2023-01-19T18:51:13Z",
|
||||
"pushed_at": "2023-01-18T20:57:25Z",
|
||||
"pushed_at": "2023-01-20T17:42:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-01-19T13:37:58Z",
|
||||
"updated_at": "2023-01-20T15:54:55Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 684,
|
||||
"watchers_count": 684,
|
||||
"stargazers_count": 685,
|
||||
"watchers_count": 685,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"forks_count": 145,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,8 +27,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 684,
|
||||
"forks": 145,
|
||||
"watchers": 685,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -85,34 +85,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 585658055,
|
||||
"name": "CVE-2022-29455",
|
||||
"full_name": "yaudahbanh\/CVE-2022-29455",
|
||||
"owner": {
|
||||
"login": "yaudahbanh",
|
||||
"id": 39010800,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39010800?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaudahbanh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaudahbanh\/CVE-2022-29455",
|
||||
"description": "Mass Scanner for CVE-2022-29455 on Elementor Plugins Wordpress",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T18:29:47Z",
|
||||
"updated_at": "2023-01-05T18:30:11Z",
|
||||
"pushed_at": "2023-01-05T18:30:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-29582 targeting Google's Kernel CTF",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T15:29:04Z",
|
||||
"updated_at": "2023-01-19T21:00:29Z",
|
||||
"updated_at": "2023-01-20T15:50:39Z",
|
||||
"pushed_at": "2022-08-08T04:13:33Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1998,10 +1998,10 @@
|
|||
"description": "Educational Follina PoC Tool",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-25T16:27:59Z",
|
||||
"updated_at": "2022-12-12T02:04:55Z",
|
||||
"updated_at": "2023-01-20T16:04:27Z",
|
||||
"pushed_at": "2022-12-07T17:58:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -2010,7 +2010,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T03:48:11Z",
|
||||
"updated_at": "2023-01-20T06:32:58Z",
|
||||
"updated_at": "2023-01-20T15:35:15Z",
|
||||
"pushed_at": "2023-01-17T12:27:08Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-25T04:34:26Z",
|
||||
"updated_at": "2023-01-10T00:40:56Z",
|
||||
"updated_at": "2023-01-20T16:25:52Z",
|
||||
"pushed_at": "2022-12-27T21:30:08Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Finding CVE-2022-3786 (openssl) with Mayhem",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-11T19:52:43Z",
|
||||
"updated_at": "2023-01-11T19:59:43Z",
|
||||
"updated_at": "2023-01-20T15:05:45Z",
|
||||
"pushed_at": "2023-01-11T19:55:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T21:27:03Z",
|
||||
"updated_at": "2023-01-20T11:01:56Z",
|
||||
"updated_at": "2023-01-20T17:09:56Z",
|
||||
"pushed_at": "2023-01-20T10:31:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-42864.json
Normal file
31
2022/CVE-2022-42864.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 591057092,
|
||||
"name": "CVE-2022-42864",
|
||||
"full_name": "Muirey03\/CVE-2022-42864",
|
||||
"owner": {
|
||||
"login": "Muirey03",
|
||||
"id": 31448720,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31448720?v=4",
|
||||
"html_url": "https:\/\/github.com\/Muirey03"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Muirey03\/CVE-2022-42864",
|
||||
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T20:36:49Z",
|
||||
"updated_at": "2023-01-20T18:05:27Z",
|
||||
"pushed_at": "2023-01-20T17:58:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 585639540,
|
||||
"name": "CVE-2022-44877",
|
||||
"full_name": "numanturle\/CVE-2022-44877",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-44877",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T17:29:10Z",
|
||||
"updated_at": "2023-01-18T13:33:32Z",
|
||||
"pushed_at": "2023-01-05T17:40:18Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 585996269,
|
||||
"name": "CVE-2022-44877-RCE",
|
||||
|
|
|
@ -94,38 +94,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 585629170,
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "sAsPeCt488\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "sAsPeCt488",
|
||||
"id": 55363474,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4",
|
||||
"html_url": "https:\/\/github.com\/sAsPeCt488"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169",
|
||||
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T16:56:06Z",
|
||||
"updated_at": "2023-01-17T17:36:56Z",
|
||||
"pushed_at": "2023-01-06T01:30:33Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cacti",
|
||||
"cve-2022-46169"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 588437634,
|
||||
"name": "CVE-2022-46169",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 585254254,
|
||||
"name": "CVE-2022-46622",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-46622",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46622",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:52:13Z",
|
||||
"updated_at": "2023-01-04T17:52:13Z",
|
||||
"pushed_at": "2023-01-04T17:52:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 585254938,
|
||||
"name": "CVE-2022-46623",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-46623",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46623",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:54:29Z",
|
||||
"updated_at": "2023-01-04T17:54:29Z",
|
||||
"pushed_at": "2023-01-04T17:54:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-01-20T01:37:53Z",
|
||||
"updated_at": "2023-01-20T18:11:44Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 247,
|
||||
"watchers": 248,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,7 +71,7 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-01-19T22:34:57Z",
|
||||
"updated_at": "2023-01-20T13:21:59Z",
|
||||
"pushed_at": "2023-01-06T06:31:57Z",
|
||||
"stargazers_count": 624,
|
||||
"watchers_count": 624,
|
||||
|
@ -221,10 +221,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T21:50:25Z",
|
||||
"updated_at": "2023-01-20T01:35:13Z",
|
||||
"updated_at": "2023-01-20T14:10:20Z",
|
||||
"pushed_at": "2023-01-20T07:14:44Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -252,8 +252,8 @@
|
|||
"description": "Simple customization app using CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-12T14:31:30Z",
|
||||
"updated_at": "2023-01-17T23:51:27Z",
|
||||
"pushed_at": "2023-01-18T00:40:08Z",
|
||||
"updated_at": "2023-01-20T16:22:01Z",
|
||||
"pushed_at": "2023-01-20T16:21:55Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 585255498,
|
||||
"name": "CVE-2022-47102",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-47102",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-47102",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:56:09Z",
|
||||
"updated_at": "2023-01-04T17:56:09Z",
|
||||
"pushed_at": "2023-01-04T17:56:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T21:26:28Z",
|
||||
"updated_at": "2023-01-20T11:50:42Z",
|
||||
"updated_at": "2023-01-20T17:11:52Z",
|
||||
"pushed_at": "2023-01-19T13:10:07Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 39,
|
||||
"forks": 14,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2023-01-20T08:58:48Z",
|
||||
"updated_at": "2023-01-20T16:21:34Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 213,
|
||||
"forks": 46,
|
||||
"watchers": 215,
|
||||
"score": 0
|
||||
}
|
||||
]
|
44
README.md
44
README.md
|
@ -3048,7 +3048,6 @@ DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elem
|
|||
- [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455)
|
||||
- [akhilkoradiya/CVE-2022-29455](https://github.com/akhilkoradiya/CVE-2022-29455)
|
||||
- [Chocapikk/CVE-2022-29455](https://github.com/Chocapikk/CVE-2022-29455)
|
||||
- [yaudahbanh/CVE-2022-29455](https://github.com/yaudahbanh/CVE-2022-29455)
|
||||
|
||||
### CVE-2022-29464 (2022-04-18)
|
||||
|
||||
|
@ -4881,6 +4880,14 @@ A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 th
|
|||
|
||||
- [bryanster/ioc-cve-2022-42475](https://github.com/bryanster/ioc-cve-2022-42475)
|
||||
|
||||
### CVE-2022-42864 (2022-12-15)
|
||||
|
||||
<code>
|
||||
A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
|
||||
</code>
|
||||
|
||||
- [Muirey03/CVE-2022-42864](https://github.com/Muirey03/CVE-2022-42864)
|
||||
|
||||
### CVE-2022-42889 (2022-10-13)
|
||||
|
||||
<code>
|
||||
|
@ -5011,7 +5018,12 @@ In libexpat through 2.4.9, there is a use-after free caused by overeager destruc
|
|||
- [Trinadh465/external_expat-2.1.0_CVE-2022-43680](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680)
|
||||
- [nidhihcl/external_expat_2.1.0_CVE-2022-43680](https://github.com/nidhihcl/external_expat_2.1.0_CVE-2022-43680)
|
||||
|
||||
### CVE-2022-43959
|
||||
### CVE-2022-43959 (2023-01-20)
|
||||
|
||||
<code>
|
||||
Insufficiently Protected Credentials in the AD/LDAP server settings in 1C-Bitrix Bitrix24 through 22.200.200 allow remote administrators to discover an AD/LDAP administrative password by reading the source code of /bitrix/admin/ldap_server_edit.php.
|
||||
</code>
|
||||
|
||||
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
|
||||
|
||||
### CVE-2022-44149 (2023-01-06)
|
||||
|
@ -5067,7 +5079,6 @@ A reflected cross-site scripting (XSS) vulnerability in maccms10 v2022.1000.3032
|
|||
login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
|
||||
</code>
|
||||
|
||||
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
|
||||
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
|
||||
|
||||
### CVE-2022-45025 (2022-12-06)
|
||||
|
@ -5170,7 +5181,6 @@ Cacti is an open source platform which provides a robust and extensible operatio
|
|||
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
|
||||
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
|
||||
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
|
||||
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
|
||||
- [Anthonyc3rb3ru5/CVE-2022-46169](https://github.com/Anthonyc3rb3ru5/CVE-2022-46169)
|
||||
- [hab1b0x/CVE-2022-46169](https://github.com/hab1b0x/CVE-2022-46169)
|
||||
- [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC)
|
||||
|
@ -5222,22 +5232,6 @@ An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check
|
|||
|
||||
- [SmallTown123/details-for-CVE-2022-46505](https://github.com/SmallTown123/details-for-CVE-2022-46505)
|
||||
|
||||
### CVE-2022-46622 (2023-01-12)
|
||||
|
||||
<code>
|
||||
A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-46622](https://github.com/sudoninja-noob/CVE-2022-46622)
|
||||
|
||||
### CVE-2022-46623 (2023-01-12)
|
||||
|
||||
<code>
|
||||
Judging Management System v1.0.0 was discovered to contain a SQL injection vulnerability via the username parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-46623](https://github.com/sudoninja-noob/CVE-2022-46623)
|
||||
|
||||
### CVE-2022-46689 (2022-12-15)
|
||||
|
||||
<code>
|
||||
|
@ -5254,14 +5248,6 @@ A race condition was addressed with additional validation. This issue is fixed i
|
|||
- [straight-tamago/FileSwitcherX](https://github.com/straight-tamago/FileSwitcherX)
|
||||
- [BomberFish/Mandela](https://github.com/BomberFish/Mandela)
|
||||
|
||||
### CVE-2022-47102 (2023-01-12)
|
||||
|
||||
<code>
|
||||
A cross-site scripting (XSS) vulnerability in Student Study Center Management System V 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-47102](https://github.com/sudoninja-noob/CVE-2022-47102)
|
||||
|
||||
### CVE-2022-47952 (2023-01-01)
|
||||
|
||||
<code>
|
||||
|
@ -19190,6 +19176,7 @@ The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-a
|
|||
- [KTN1990/CVE-2019-9978](https://github.com/KTN1990/CVE-2019-9978)
|
||||
- [cved-sources/cve-2019-9978](https://github.com/cved-sources/cve-2019-9978)
|
||||
- [caique-garbim/CVE-2019-9978_Exploit](https://github.com/caique-garbim/CVE-2019-9978_Exploit)
|
||||
- [grimlockx/CVE-2019-9978](https://github.com/grimlockx/CVE-2019-9978)
|
||||
|
||||
### CVE-2019-10008 (2019-04-24)
|
||||
|
||||
|
@ -21314,6 +21301,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
|
|||
- [5l1v3r1/Citrix_CVE-2019-19781](https://github.com/5l1v3r1/Citrix_CVE-2019-19781)
|
||||
- [Roshi99/Remote-Code-Execution-Exploit-for-Citrix-Application-Delivery-Controller-and-Citrix-Gateway-CVE-201](https://github.com/Roshi99/Remote-Code-Execution-Exploit-for-Citrix-Application-Delivery-Controller-and-Citrix-Gateway-CVE-201)
|
||||
- [yukar1z0e/CVE-2019-19781](https://github.com/yukar1z0e/CVE-2019-19781)
|
||||
- [SharpHack/CVE-2019-19781](https://github.com/SharpHack/CVE-2019-19781)
|
||||
- [qiong-qi/CVE-2019-19781-poc](https://github.com/qiong-qi/CVE-2019-19781-poc)
|
||||
- [w4fz5uck5/CVE-2019-19781-CitrixRCE](https://github.com/w4fz5uck5/CVE-2019-19781-CitrixRCE)
|
||||
- [andripwn/CVE-2019-19781](https://github.com/andripwn/CVE-2019-19781)
|
||||
|
|
Loading…
Reference in a new issue