mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/10/29 18:17:29
This commit is contained in:
parent
1b3f9eb3bd
commit
6b11d4b3cd
26 changed files with 153 additions and 124 deletions
|
@ -251,6 +251,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217326730,
|
||||
"name": "CVE-2015-7547-Research",
|
||||
"full_name": "Stick-U235\/CVE-2015-7547-Research",
|
||||
"owner": {
|
||||
"login": "Stick-U235",
|
||||
"id": 28267481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28267481?v=4",
|
||||
"html_url": "https:\/\/github.com\/Stick-U235"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Stick-U235\/CVE-2015-7547-Research",
|
||||
"description": "CVE-2015-7547 initial research.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-24T15:02:23Z",
|
||||
"updated_at": "2022-10-29T15:16:19Z",
|
||||
"pushed_at": "2022-10-29T15:15:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263361814,
|
||||
"name": "Glibc-Vulnerability-Exploit-CVE-2015-7547",
|
||||
|
|
|
@ -154,10 +154,10 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-10-04T21:09:27Z",
|
||||
"updated_at": "2022-10-29T01:32:35Z",
|
||||
"pushed_at": "2022-10-29T02:01:31Z",
|
||||
"pushed_at": "2022-10-29T17:51:51Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -168,7 +168,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "OpenEMR < 5.0.1.4 - (Authenticated) File upload - Remote command execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T16:03:38Z",
|
||||
"updated_at": "2021-10-17T04:32:56Z",
|
||||
"updated_at": "2022-10-29T17:15:50Z",
|
||||
"pushed_at": "2021-07-08T19:10:46Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2022-10-25T18:46:58Z",
|
||||
"updated_at": "2022-10-29T16:56:48Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 626,
|
||||
"watchers_count": 626,
|
||||
"stargazers_count": 627,
|
||||
"watchers_count": 627,
|
||||
"forks_count": 203,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -138,7 +138,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 203,
|
||||
"watchers": 626,
|
||||
"watchers": 627,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-03-28T22:09:39Z",
|
||||
"updated_at": "2022-07-23T01:32:06Z",
|
||||
"pushed_at": "2022-10-18T18:32:20Z",
|
||||
"pushed_at": "2022-10-29T16:58:02Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -97,10 +97,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-10-24T22:53:26Z",
|
||||
"updated_at": "2022-10-29T16:31:48Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 960,
|
||||
"watchers": 961,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -368,10 +368,10 @@
|
|||
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-20T05:24:47Z",
|
||||
"updated_at": "2021-10-10T21:13:40Z",
|
||||
"updated_at": "2022-10-29T17:15:48Z",
|
||||
"pushed_at": "2020-10-28T11:21:00Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -379,7 +379,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-7200: HPE Systems Insight Manager (SIM) RCE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T21:05:29Z",
|
||||
"updated_at": "2021-11-27T06:35:11Z",
|
||||
"updated_at": "2022-10-29T17:15:49Z",
|
||||
"pushed_at": "2021-01-17T20:30:38Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -101,7 +101,7 @@
|
|||
"pushed_at": "2021-11-16T17:34:11Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -122,7 +122,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -769,10 +769,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-10-29T07:47:24Z",
|
||||
"updated_at": "2022-10-29T17:05:05Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"stargazers_count": 564,
|
||||
"watchers_count": 564,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -787,7 +787,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 563,
|
||||
"watchers": 564,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T19:07:37Z",
|
||||
"updated_at": "2022-10-18T22:56:15Z",
|
||||
"updated_at": "2022-10-29T17:33:42Z",
|
||||
"pushed_at": "2022-03-08T15:37:34Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2022-10-25T16:41:01Z",
|
||||
"updated_at": "2022-10-29T15:08:28Z",
|
||||
"pushed_at": "2022-07-25T20:41:30Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -390,10 +390,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-10-27T07:09:26Z",
|
||||
"updated_at": "2022-10-29T17:07:31Z",
|
||||
"pushed_at": "2022-09-21T07:49:03Z",
|
||||
"stargazers_count": 1486,
|
||||
"watchers_count": 1486,
|
||||
"stargazers_count": 1487,
|
||||
"watchers_count": 1487,
|
||||
"forks_count": 420,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -406,7 +406,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 420,
|
||||
"watchers": 1486,
|
||||
"watchers": 1487,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1325,10 +1325,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-10-29T06:46:28Z",
|
||||
"updated_at": "2022-10-29T15:20:09Z",
|
||||
"pushed_at": "2022-10-20T15:37:44Z",
|
||||
"stargazers_count": 3086,
|
||||
"watchers_count": 3086,
|
||||
"stargazers_count": 3087,
|
||||
"watchers_count": 3087,
|
||||
"forks_count": 731,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1336,7 +1336,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 731,
|
||||
"watchers": 3086,
|
||||
"watchers": 3087,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-14T06:23:06Z",
|
||||
"updated_at": "2022-02-16T21:53:09Z",
|
||||
"updated_at": "2022-10-29T15:58:17Z",
|
||||
"pushed_at": "2022-02-14T06:23:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2022-10-20T02:18:03Z",
|
||||
"updated_at": "2022-10-29T13:45:07Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1538,10 +1538,10 @@
|
|||
"description": "Spring Cloud Gateway远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-29T03:28:55Z",
|
||||
"updated_at": "2022-10-29T09:26:17Z",
|
||||
"updated_at": "2022-10-29T16:45:01Z",
|
||||
"pushed_at": "2022-10-29T04:34:21Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1549,7 +1549,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -688,10 +688,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-10-29T07:47:24Z",
|
||||
"updated_at": "2022-10-29T17:05:05Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 563,
|
||||
"watchers_count": 563,
|
||||
"stargazers_count": 564,
|
||||
"watchers_count": 564,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -706,7 +706,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 563,
|
||||
"watchers": 564,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2022-10-28T17:55:39Z",
|
||||
"updated_at": "2022-10-29T14:18:33Z",
|
||||
"pushed_at": "2022-10-27T16:35:08Z",
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 362,
|
||||
"watchers": 363,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-10-29T06:02:45Z",
|
||||
"updated_at": "2022-10-29T13:39:01Z",
|
||||
"pushed_at": "2022-09-29T05:09:10Z",
|
||||
"stargazers_count": 841,
|
||||
"watchers_count": 841,
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 147,
|
||||
"watchers": 841,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -311,10 +311,10 @@
|
|||
"description": "[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T11:16:28Z",
|
||||
"updated_at": "2022-10-26T03:36:45Z",
|
||||
"updated_at": "2022-10-29T13:42:12Z",
|
||||
"pushed_at": "2022-06-18T09:27:31Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -327,7 +327,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1111,10 +1111,10 @@
|
|||
"description": "「💥」CVE-2022-26134 - Confluence Pre-Auth RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:50:22Z",
|
||||
"updated_at": "2022-09-21T22:06:43Z",
|
||||
"updated_at": "2022-10-29T13:43:31Z",
|
||||
"pushed_at": "2022-06-19T14:08:28Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1131,7 +1131,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1281,10 +1281,10 @@
|
|||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T04:30:42Z",
|
||||
"updated_at": "2022-09-10T14:31:50Z",
|
||||
"updated_at": "2022-10-29T13:44:19Z",
|
||||
"pushed_at": "2022-08-21T04:13:32Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1297,7 +1297,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1491,10 +1491,10 @@
|
|||
"description": "远程攻击者在Confluence未经身份验证的情况下,可构造OGNL表达式进行注入,实现在Confluence Server或Data Center上执行任意代码,在现有脚本上修改了poc,方便getshell。",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-23T14:38:11Z",
|
||||
"updated_at": "2022-08-05T06:45:59Z",
|
||||
"updated_at": "2022-10-29T13:45:18Z",
|
||||
"pushed_at": "2022-07-25T05:51:13Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1505,7 +1505,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -276,10 +276,10 @@
|
|||
"description": "A loader for zimbra 2022 rce (cve-2022-27925)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T10:33:55Z",
|
||||
"updated_at": "2022-10-17T15:17:27Z",
|
||||
"updated_at": "2022-10-29T12:31:31Z",
|
||||
"pushed_at": "2022-10-25T14:20:58Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -293,7 +293,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Authenticated Remote Command Execution in Gitlab via GitHub import",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-08T11:42:49Z",
|
||||
"updated_at": "2022-10-26T08:38:23Z",
|
||||
"updated_at": "2022-10-29T15:38:07Z",
|
||||
"pushed_at": "2022-10-09T03:54:53Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 28,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 178,
|
||||
"forks": 29,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Apache Spark Shell Command Injection Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T18:52:12Z",
|
||||
"updated_at": "2022-10-25T03:58:40Z",
|
||||
"updated_at": "2022-10-29T13:28:26Z",
|
||||
"pushed_at": "2022-09-07T18:12:27Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 74,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-03T11:39:25Z",
|
||||
"updated_at": "2022-10-29T09:50:45Z",
|
||||
"updated_at": "2022-10-29T14:06:01Z",
|
||||
"pushed_at": "2022-10-10T08:57:29Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -252,10 +252,10 @@
|
|||
"description": "You can find a python script to exploit the vulnerability on Bitbucket related CVE-2022-36804.",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-24T05:04:30Z",
|
||||
"updated_at": "2022-10-25T02:28:57Z",
|
||||
"updated_at": "2022-10-29T14:46:02Z",
|
||||
"pushed_at": "2022-10-25T02:39:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -263,7 +263,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -313,10 +313,10 @@
|
|||
"description": "A loader for bitbucket 2022 rce (cve-2022-36804)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:35:31Z",
|
||||
"updated_at": "2022-10-25T10:33:34Z",
|
||||
"updated_at": "2022-10-29T12:31:30Z",
|
||||
"pushed_at": "2022-10-01T13:03:43Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -331,7 +331,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -277,13 +277,13 @@
|
|||
"pushed_at": "2022-10-25T05:32:54Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 66,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"forks": 67,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-41852 Proof of Concept (unofficial)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T12:09:19Z",
|
||||
"updated_at": "2022-10-29T05:40:45Z",
|
||||
"updated_at": "2022-10-29T14:41:06Z",
|
||||
"pushed_at": "2022-10-20T08:01:38Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -232,7 +232,7 @@
|
|||
"pushed_at": "2022-10-28T15:47:35Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -250,7 +250,7 @@
|
|||
"security-tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -272,13 +272,13 @@
|
|||
"pushed_at": "2022-10-20T12:51:08Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -362,13 +362,13 @@
|
|||
"pushed_at": "2022-10-20T20:03:36Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -26287,6 +26287,7 @@ Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functio
|
|||
- [eSentire/cve-2015-7547-public](https://github.com/eSentire/cve-2015-7547-public)
|
||||
- [bluebluelan/CVE-2015-7547-proj-master](https://github.com/bluebluelan/CVE-2015-7547-proj-master)
|
||||
- [miracle03/CVE-2015-7547-master](https://github.com/miracle03/CVE-2015-7547-master)
|
||||
- [Stick-U235/CVE-2015-7547-Research](https://github.com/Stick-U235/CVE-2015-7547-Research)
|
||||
- [Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547](https://github.com/Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547)
|
||||
|
||||
### CVE-2015-7755 (2015-12-19)
|
||||
|
|
Loading…
Reference in a new issue