mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/10/13 00:17:37
This commit is contained in:
parent
053bca58aa
commit
618bc3ef8f
24 changed files with 198 additions and 80 deletions
File diff suppressed because one or more lines are too long
|
@ -69,10 +69,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T17:35:50Z",
|
||||
"updated_at": "2022-10-10T13:06:34Z",
|
||||
"updated_at": "2022-10-12T21:10:35Z",
|
||||
"pushed_at": "2022-04-23T17:30:03Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2022-10-10T15:42:55Z",
|
||||
"updated_at": "2022-10-12T19:23:28Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 714,
|
||||
"watchers_count": 714,
|
||||
"stargazers_count": 715,
|
||||
"watchers_count": 715,
|
||||
"forks_count": 183,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 183,
|
||||
"watchers": 714,
|
||||
"watchers": 715,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -131,10 +131,10 @@
|
|||
"description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-30T15:08:32Z",
|
||||
"updated_at": "2022-07-25T06:41:55Z",
|
||||
"updated_at": "2022-10-12T21:36:21Z",
|
||||
"pushed_at": "2021-10-31T07:06:25Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -142,7 +142,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -99,10 +99,10 @@
|
|||
"description": "Aggressor Script to launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-10T09:30:18Z",
|
||||
"updated_at": "2022-06-13T06:40:43Z",
|
||||
"updated_at": "2022-10-12T20:05:51Z",
|
||||
"pushed_at": "2018-02-10T19:39:10Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -110,7 +110,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2022-10-08T18:17:50Z",
|
||||
"updated_at": "2022-10-12T19:09:02Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -683,5 +683,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 550531926,
|
||||
"name": "CVE-2019-14287",
|
||||
"full_name": "MariliaMeira\/CVE-2019-14287",
|
||||
"owner": {
|
||||
"login": "MariliaMeira",
|
||||
"id": 111706139,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111706139?v=4",
|
||||
"html_url": "https:\/\/github.com\/MariliaMeira"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MariliaMeira\/CVE-2019-14287",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-12T23:33:05Z",
|
||||
"updated_at": "2022-10-12T23:37:08Z",
|
||||
"pushed_at": "2022-10-12T23:37:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -72,10 +72,10 @@
|
|||
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T03:52:49Z",
|
||||
"updated_at": "2022-07-21T02:10:57Z",
|
||||
"updated_at": "2022-10-12T19:30:49Z",
|
||||
"pushed_at": "2020-01-26T21:04:27Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1605,10 +1605,10 @@
|
|||
"description": "CVE-2020-1472 C++",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-31T06:01:02Z",
|
||||
"updated_at": "2022-09-28T01:23:46Z",
|
||||
"updated_at": "2022-10-12T19:27:25Z",
|
||||
"pushed_at": "2022-09-02T16:25:01Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1616,7 +1616,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -140,10 +140,10 @@
|
|||
"description": "An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-02T05:13:07Z",
|
||||
"updated_at": "2022-09-16T11:01:53Z",
|
||||
"updated_at": "2022-10-12T18:50:27Z",
|
||||
"pushed_at": "2021-07-20T03:03:30Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -151,7 +151,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2022-09-22T10:39:58Z",
|
||||
"updated_at": "2022-10-12T19:56:55Z",
|
||||
"pushed_at": "2021-09-20T07:58:29Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -138,13 +138,13 @@
|
|||
"pushed_at": "2022-02-11T15:22:20Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 41,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"forks": 42,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2022-10-10T15:36:07Z",
|
||||
"updated_at": "2022-10-13T00:14:51Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -55,7 +55,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -190,7 +190,7 @@
|
|||
"pushed_at": "2022-09-29T11:01:50Z",
|
||||
"stargazers_count": 1013,
|
||||
"watchers_count": 1013,
|
||||
"forks_count": 455,
|
||||
"forks_count": 456,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -198,7 +198,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 455,
|
||||
"forks": 456,
|
||||
"watchers": 1013,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -390,10 +390,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-10-09T18:29:24Z",
|
||||
"updated_at": "2022-10-13T00:08:49Z",
|
||||
"pushed_at": "2022-09-21T07:49:03Z",
|
||||
"stargazers_count": 1481,
|
||||
"watchers_count": 1481,
|
||||
"stargazers_count": 1482,
|
||||
"watchers_count": 1482,
|
||||
"forks_count": 409,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -406,7 +406,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 409,
|
||||
"watchers": 1481,
|
||||
"watchers": 1482,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2142,5 +2142,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 550418551,
|
||||
"name": "CVE-2022-0847-DirtyPipe-",
|
||||
"full_name": "edsonjt81\/CVE-2022-0847-DirtyPipe-",
|
||||
"owner": {
|
||||
"login": "edsonjt81",
|
||||
"id": 27496739,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4",
|
||||
"html_url": "https:\/\/github.com\/edsonjt81"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/edsonjt81\/CVE-2022-0847-DirtyPipe-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-12T18:26:55Z",
|
||||
"updated_at": "2022-10-12T18:27:13Z",
|
||||
"pushed_at": "2022-10-12T18:27:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -488,10 +488,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-05T20:35:38Z",
|
||||
"updated_at": "2022-09-24T17:01:49Z",
|
||||
"updated_at": "2022-10-12T18:28:08Z",
|
||||
"pushed_at": "2022-06-08T15:35:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -499,7 +499,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -130,10 +130,10 @@
|
|||
"description": "Zimbra CVE-2022-27925 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T15:58:29Z",
|
||||
"updated_at": "2022-10-11T22:17:43Z",
|
||||
"updated_at": "2022-10-12T20:45:30Z",
|
||||
"pushed_at": "2022-08-27T20:30:21Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -147,7 +147,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -248,10 +248,10 @@
|
|||
"description": "CVE-2022-27925",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-25T15:09:49Z",
|
||||
"updated_at": "2022-09-26T01:46:08Z",
|
||||
"updated_at": "2022-10-12T20:20:47Z",
|
||||
"pushed_at": "2022-09-25T15:10:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -259,7 +259,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Authenticated Remote Command Execution in Gitlab via GitHub import",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-08T11:42:49Z",
|
||||
"updated_at": "2022-10-12T18:07:23Z",
|
||||
"updated_at": "2022-10-13T00:15:29Z",
|
||||
"pushed_at": "2022-10-09T03:54:53Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"forks_count": 24,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 135,
|
||||
"forks": 25,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -153,7 +153,7 @@
|
|||
"description": "Bitbucket CVE-2022-36804 unauthenticated remote command execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-21T10:36:50Z",
|
||||
"updated_at": "2022-10-10T21:53:18Z",
|
||||
"updated_at": "2022-10-12T21:37:19Z",
|
||||
"pushed_at": "2022-09-21T22:26:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
@ -161,7 +161,22 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"atlassian",
|
||||
"atlassian-bitbucket",
|
||||
"bitbucket",
|
||||
"bug-bounty",
|
||||
"cve-2022-36804",
|
||||
"exploit",
|
||||
"hack",
|
||||
"hacking",
|
||||
"infosec",
|
||||
"penetration-testing",
|
||||
"penetration-testing-tools",
|
||||
"poc",
|
||||
"rce",
|
||||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
|
@ -274,7 +289,7 @@
|
|||
"pushed_at": "2022-10-01T13:03:43Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -287,7 +302,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
30
2022/CVE-2022-40471.json
Normal file
30
2022/CVE-2022-40471.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 550513650,
|
||||
"name": "CVE-2022-40471",
|
||||
"full_name": "RashidKhanPathan\/CVE-2022-40471",
|
||||
"owner": {
|
||||
"login": "RashidKhanPathan",
|
||||
"id": 65374016,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65374016?v=4",
|
||||
"html_url": "https:\/\/github.com\/RashidKhanPathan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RashidKhanPathan\/CVE-2022-40471",
|
||||
"description": "RCE Exploit and Research ",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-12T22:33:31Z",
|
||||
"updated_at": "2022-10-12T23:55:43Z",
|
||||
"pushed_at": "2022-10-12T23:55:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-10-12T14:44:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -125,7 +125,7 @@
|
|||
"description": "CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-09T15:27:40Z",
|
||||
"updated_at": "2022-10-12T17:55:00Z",
|
||||
"updated_at": "2022-10-12T21:35:49Z",
|
||||
"pushed_at": "2022-10-09T16:11:09Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
|
@ -133,7 +133,19 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"bug-bounty",
|
||||
"bugbounty",
|
||||
"cve-2022-41040",
|
||||
"exploit",
|
||||
"hacking",
|
||||
"microsoft",
|
||||
"microsoft-exchange",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"security",
|
||||
"ssrf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 26,
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-10-01T12:19:53Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -248,6 +248,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [Gustavo-Nogueira/Dirty-Pipe-Exploits](https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits)
|
||||
- [trhacknon/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/trhacknon/CVE-2022-0847-DirtyPipe-Exploit)
|
||||
- [badboy-sft/Dirty-Pipe-Oneshot](https://github.com/badboy-sft/Dirty-Pipe-Oneshot)
|
||||
- [edsonjt81/CVE-2022-0847-DirtyPipe-](https://github.com/edsonjt81/CVE-2022-0847-DirtyPipe-)
|
||||
|
||||
### CVE-2022-0848 (2022-03-04)
|
||||
|
||||
|
@ -3851,6 +3852,9 @@ OpenKM 6.3.11 allows stored XSS related to the javascript: substring i
|
|||
|
||||
- [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317)
|
||||
|
||||
### CVE-2022-40471
|
||||
- [RashidKhanPathan/CVE-2022-40471](https://github.com/RashidKhanPathan/CVE-2022-40471)
|
||||
|
||||
### CVE-2022-40490
|
||||
- [whitej3rry/CVE-2022-40490](https://github.com/whitej3rry/CVE-2022-40490)
|
||||
|
||||
|
@ -16761,6 +16765,7 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can
|
|||
- [k4u5h41/CVE-2019-14287](https://github.com/k4u5h41/CVE-2019-14287)
|
||||
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
|
||||
- [5l1v3r1/cve-2019-14287sudoexp](https://github.com/5l1v3r1/cve-2019-14287sudoexp)
|
||||
- [MariliaMeira/CVE-2019-14287](https://github.com/MariliaMeira/CVE-2019-14287)
|
||||
|
||||
### CVE-2019-14314 (2019-08-27)
|
||||
|
||||
|
|
Loading…
Reference in a new issue