mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-21 14:45:40 +02:00
Auto Update 2025/03/01 18:31:45
This commit is contained in:
parent
092967fe4f
commit
6928546ce5
28 changed files with 144 additions and 134 deletions
2015
2016
2017
2018
2019
2020
2021
CVE-2021-1675.jsonCVE-2021-22205.jsonCVE-2021-26084.jsonCVE-2021-33909.jsonCVE-2021-40444.jsonCVE-2021-43798.json
2022
2023
2024
2025
README.md
|
@ -85,23 +85,23 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-01T09:00:16Z",
|
||||
"pushed_at": "2025-02-28T16:49:20Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"updated_at": "2025-03-01T15:46:49Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 63,
|
||||
"forks": 3,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -73,23 +73,23 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-01T09:00:16Z",
|
||||
"pushed_at": "2025-02-28T16:49:20Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"updated_at": "2025-03-01T15:46:49Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 63,
|
||||
"forks": 3,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -307,11 +307,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dream434\/CVE-2017-9841-",
|
||||
"description": null,
|
||||
"description": "CVE-2017-9841",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T16:36:48Z",
|
||||
"updated_at": "2025-02-22T19:16:59Z",
|
||||
"pushed_at": "2025-02-22T19:16:57Z",
|
||||
"updated_at": "2025-03-01T16:45:32Z",
|
||||
"pushed_at": "2025-03-01T16:45:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
@ -319,7 +319,9 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"the-cve-2017-9841-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
|
|
|
@ -321,23 +321,23 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-01T09:00:16Z",
|
||||
"pushed_at": "2025-02-28T16:49:20Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"updated_at": "2025-03-01T15:46:49Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 63,
|
||||
"forks": 3,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -369,6 +369,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -11,22 +11,22 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
|
||||
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具,针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ,也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
|
||||
"fork": false,
|
||||
"created_at": "2025-01-27T14:23:31Z",
|
||||
"updated_at": "2025-03-01T09:00:16Z",
|
||||
"pushed_at": "2025-02-28T16:49:20Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"updated_at": "2025-03-01T15:46:49Z",
|
||||
"pushed_at": "2025-03-01T15:46:45Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 63,
|
||||
"forks": 3,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -316,13 +316,13 @@
|
|||
"stargazers_count": 1038,
|
||||
"watchers_count": 1038,
|
||||
"has_discussions": false,
|
||||
"forks_count": 231,
|
||||
"forks_count": 230,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 231,
|
||||
"forks": 230,
|
||||
"watchers": 1038,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
|
|
|
@ -577,15 +577,15 @@
|
|||
{
|
||||
"id": 468414500,
|
||||
"name": "CVE-2021-22205-gitlab",
|
||||
"full_name": "al4xs\/CVE-2021-22205-gitlab",
|
||||
"full_name": "osungjinwoo\/CVE-2021-22205-gitlab",
|
||||
"owner": {
|
||||
"login": "al4xs",
|
||||
"login": "osungjinwoo",
|
||||
"id": 40411471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4",
|
||||
"html_url": "https:\/\/github.com\/al4xs",
|
||||
"html_url": "https:\/\/github.com\/osungjinwoo",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/al4xs\/CVE-2021-22205-gitlab",
|
||||
"html_url": "https:\/\/github.com\/osungjinwoo\/CVE-2021-22205-gitlab",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T16:03:47Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T23:33:44Z",
|
||||
"updated_at": "2025-01-03T19:15:28Z",
|
||||
"updated_at": "2025-03-01T16:23:32Z",
|
||||
"pushed_at": "2021-09-01T01:01:06Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 62,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -236,13 +236,13 @@
|
|||
"stargazers_count": 1613,
|
||||
"watchers_count": 1613,
|
||||
"has_discussions": false,
|
||||
"forks_count": 483,
|
||||
"forks_count": 482,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 483,
|
||||
"forks": 482,
|
||||
"watchers": 1613,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
|
|
|
@ -1271,10 +1271,10 @@
|
|||
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-14T14:06:59Z",
|
||||
"updated_at": "2024-12-15T14:00:48Z",
|
||||
"updated_at": "2025-03-01T14:13:54Z",
|
||||
"pushed_at": "2024-12-14T17:30:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1283,7 +1283,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -138,19 +138,19 @@
|
|||
"description": "CVE-2022-0847 exploit one liner",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T20:57:34Z",
|
||||
"updated_at": "2022-12-09T22:58:15Z",
|
||||
"updated_at": "2025-03-01T17:57:53Z",
|
||||
"pushed_at": "2022-03-07T21:01:15Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -996,15 +996,15 @@
|
|||
{
|
||||
"id": 468416712,
|
||||
"name": "CVE-2022-0847-Dirty-Pipe",
|
||||
"full_name": "al4xs\/CVE-2022-0847-Dirty-Pipe",
|
||||
"full_name": "osungjinwoo\/CVE-2022-0847-Dirty-Pipe",
|
||||
"owner": {
|
||||
"login": "al4xs",
|
||||
"login": "osungjinwoo",
|
||||
"id": 40411471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40411471?v=4",
|
||||
"html_url": "https:\/\/github.com\/al4xs",
|
||||
"html_url": "https:\/\/github.com\/osungjinwoo",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/al4xs\/CVE-2022-0847-Dirty-Pipe",
|
||||
"html_url": "https:\/\/github.com\/osungjinwoo\/CVE-2022-0847-Dirty-Pipe",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T16:09:16Z",
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 497,
|
||||
"watchers_count": 497,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"forks": 67,
|
||||
"watchers": 497,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
"prestashop"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 5,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
33
2022/CVE-2022-38532.json
Normal file
33
2022/CVE-2022-38532.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 525183970,
|
||||
"name": "msi-central_privesc",
|
||||
"full_name": "nam3lum\/msi-central_privesc",
|
||||
"owner": {
|
||||
"login": "nam3lum",
|
||||
"id": 64528432,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64528432?v=4",
|
||||
"html_url": "https:\/\/github.com\/nam3lum",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nam3lum\/msi-central_privesc",
|
||||
"description": "CVE-2022-38532 - Local Privilege Escalation vulnerability in MSI Center Application",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-16T00:49:19Z",
|
||||
"updated_at": "2025-03-01T15:30:14Z",
|
||||
"pushed_at": "2025-02-22T00:06:43Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2025-01-07T00:57:14Z",
|
||||
"updated_at": "2025-03-01T16:01:01Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 301,
|
||||
"watchers": 302,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"description": "A small write-up with examples to understand CVE-2023-43115",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-28T17:30:06Z",
|
||||
"updated_at": "2024-04-09T19:00:53Z",
|
||||
"updated_at": "2025-03-01T17:57:40Z",
|
||||
"pushed_at": "2023-12-26T15:37:47Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
|
|
@ -568,36 +568,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 939996985,
|
||||
"name": "CVE-2024-36401",
|
||||
"full_name": "wingedmicroph\/CVE-2024-36401",
|
||||
"owner": {
|
||||
"login": "wingedmicroph",
|
||||
"id": 199152414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/199152414?v=4",
|
||||
"html_url": "https:\/\/github.com\/wingedmicroph",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wingedmicroph\/CVE-2024-36401",
|
||||
"description": "geoserver图形化漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2025-02-27T12:58:15Z",
|
||||
"updated_at": "2025-02-27T13:58:06Z",
|
||||
"pushed_at": "2025-02-27T12:58:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Makes IDA (most versions) to crash upon opening it. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-25T12:33:14Z",
|
||||
"updated_at": "2025-02-11T17:10:18Z",
|
||||
"updated_at": "2025-03-01T16:40:48Z",
|
||||
"pushed_at": "2024-08-30T09:58:12Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 82,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -2118,10 +2118,10 @@
|
|||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||
"fork": false,
|
||||
"created_at": "2024-07-08T11:27:49Z",
|
||||
"updated_at": "2025-02-27T15:12:39Z",
|
||||
"updated_at": "2025-03-01T13:27:24Z",
|
||||
"pushed_at": "2024-08-22T08:50:25Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -2130,7 +2130,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Poc exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I\/O ring IOP_MC_BUFFER_ENTRY",
|
||||
"fork": false,
|
||||
"created_at": "2025-02-27T12:36:55Z",
|
||||
"updated_at": "2025-03-01T11:11:59Z",
|
||||
"updated_at": "2025-03-01T18:24:34Z",
|
||||
"pushed_at": "2025-02-27T14:37:39Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 51,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of Concept (POC) for the CVE-2025-25296 vulnerability affecting Label Studio versions prior to 1.16.0",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-01T02:08:01Z",
|
||||
"updated_at": "2025-03-01T02:09:10Z",
|
||||
"updated_at": "2025-03-01T14:08:33Z",
|
||||
"pushed_at": "2025-03-01T02:09:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/A17-ba\/CVE-2025-26202-Details",
|
||||
"description": null,
|
||||
"description": "CVE-2025-26202",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-01T12:05:27Z",
|
||||
"updated_at": "2025-03-01T12:17:07Z",
|
||||
"updated_at": "2025-03-01T12:50:08Z",
|
||||
"pushed_at": "2025-03-01T12:17:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Critical security vulnerability in NVDA remote connection add-ons.",
|
||||
"fork": false,
|
||||
"created_at": "2025-02-25T21:04:45Z",
|
||||
"updated_at": "2025-02-25T21:07:06Z",
|
||||
"pushed_at": "2025-02-25T21:07:02Z",
|
||||
"updated_at": "2025-03-01T13:02:51Z",
|
||||
"pushed_at": "2025-03-01T13:02:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
12
README.md
12
README.md
|
@ -6298,7 +6298,6 @@
|
|||
- [0x0d3ad/CVE-2024-36401](https://github.com/0x0d3ad/CVE-2024-36401)
|
||||
- [whitebear-ch/GeoServerExploit](https://github.com/whitebear-ch/GeoServerExploit)
|
||||
- [unlinedvol/CVE-2024-36401](https://github.com/unlinedvol/CVE-2024-36401)
|
||||
- [wingedmicroph/CVE-2024-36401](https://github.com/wingedmicroph/CVE-2024-36401)
|
||||
|
||||
### CVE-2024-36416 (2024-06-10)
|
||||
|
||||
|
@ -18400,7 +18399,7 @@
|
|||
- [edsonjt81/CVE-2022-0847-Linux](https://github.com/edsonjt81/CVE-2022-0847-Linux)
|
||||
- [chenaotian/CVE-2022-0847](https://github.com/chenaotian/CVE-2022-0847)
|
||||
- [V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit)
|
||||
- [al4xs/CVE-2022-0847-Dirty-Pipe](https://github.com/al4xs/CVE-2022-0847-Dirty-Pipe)
|
||||
- [osungjinwoo/CVE-2022-0847-Dirty-Pipe](https://github.com/osungjinwoo/CVE-2022-0847-Dirty-Pipe)
|
||||
- [Greetdawn/CVE-2022-0847-DirtyPipe-](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-)
|
||||
- [crusoe112/DirtyPipePython](https://github.com/crusoe112/DirtyPipePython)
|
||||
- [nanaao/dirtyPipe-automaticRoot](https://github.com/nanaao/dirtyPipe-automaticRoot)
|
||||
|
@ -23338,6 +23337,13 @@
|
|||
- [azhurtanov/CVE-2022-38374](https://github.com/azhurtanov/CVE-2022-38374)
|
||||
- [M4fiaB0y/CVE-2022-38374](https://github.com/M4fiaB0y/CVE-2022-38374)
|
||||
|
||||
### CVE-2022-38532 (2022-09-19)
|
||||
|
||||
<code>Micro-Star International Co., Ltd MSI Center 1.0.50.0 was discovered to contain a vulnerability in the component C_Features of MSI.CentralServer.exe. This vulnerability allows attackers to escalate privileges via running a crafted executable.
|
||||
</code>
|
||||
|
||||
- [nam3lum/msi-central_privesc](https://github.com/nam3lum/msi-central_privesc)
|
||||
|
||||
### CVE-2022-38553 (2022-09-26)
|
||||
|
||||
<code>Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.
|
||||
|
@ -26909,7 +26915,7 @@
|
|||
- [pizza-power/Golang-CVE-2021-22205-POC](https://github.com/pizza-power/Golang-CVE-2021-22205-POC)
|
||||
- [DIVD-NL/GitLab-cve-2021-22205-nse](https://github.com/DIVD-NL/GitLab-cve-2021-22205-nse)
|
||||
- [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205)
|
||||
- [al4xs/CVE-2021-22205-gitlab](https://github.com/al4xs/CVE-2021-22205-gitlab)
|
||||
- [osungjinwoo/CVE-2021-22205-gitlab](https://github.com/osungjinwoo/CVE-2021-22205-gitlab)
|
||||
- [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205)
|
||||
- [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-)
|
||||
- [keven1z/CVE-2021-22205](https://github.com/keven1z/CVE-2021-22205)
|
||||
|
|
Loading…
Add table
Reference in a new issue