mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/04/18 12:16:15
This commit is contained in:
parent
bbe4c703b4
commit
700cccc144
49 changed files with 488 additions and 338 deletions
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-04-07T17:05:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2017-12149 jboss反序列化 可回显",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:52:47Z",
|
||||
"updated_at": "2022-04-08T01:37:39Z",
|
||||
"updated_at": "2022-04-18T07:20:26Z",
|
||||
"pushed_at": "2019-03-13T08:57:50Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 146,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T19:44:19Z",
|
||||
"updated_at": "2022-04-13T19:45:07Z",
|
||||
"updated_at": "2022-04-18T10:56:11Z",
|
||||
"pushed_at": "2022-04-13T19:46:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2022-04-14T21:37:45Z",
|
||||
"updated_at": "2022-04-18T10:06:33Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2022-04-15T13:08:36Z",
|
||||
"updated_at": "2022-04-18T08:37:21Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"forks_count": 122,
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -62,8 +62,8 @@
|
|||
"xss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 122,
|
||||
"watchers": 538,
|
||||
"forks": 121,
|
||||
"watchers": 539,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -553,5 +553,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 482821096,
|
||||
"name": "CVE-2019-15107",
|
||||
"full_name": "f0rkr\/CVE-2019-15107",
|
||||
"owner": {
|
||||
"login": "f0rkr",
|
||||
"id": 39636110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39636110?v=4",
|
||||
"html_url": "https:\/\/github.com\/f0rkr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f0rkr\/CVE-2019-15107",
|
||||
"description": "CVE-2019-15107",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T11:25:42Z",
|
||||
"updated_at": "2022-04-18T11:25:42Z",
|
||||
"pushed_at": "2022-04-18T11:25:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2022-04-12T06:13:46Z",
|
||||
"updated_at": "2022-04-18T09:33:07Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 618,
|
||||
"watchers_count": 618,
|
||||
"stargazers_count": 619,
|
||||
"watchers_count": 619,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"watchers": 618,
|
||||
"watchers": 619,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2022-04-05T22:54:44Z",
|
||||
"updated_at": "2022-04-18T09:33:39Z",
|
||||
"pushed_at": "2022-03-17T12:24:02Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 482826360,
|
||||
"name": "packages_apps_Settings_AOSP10_r33_CVE-2020-0219",
|
||||
"full_name": "Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2020-0219",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2020-0219",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T11:45:18Z",
|
||||
"updated_at": "2022-04-18T11:48:23Z",
|
||||
"pushed_at": "2022-04-18T11:48:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2022-04-15T08:07:00Z",
|
||||
"updated_at": "2022-04-18T08:13:43Z",
|
||||
"pushed_at": "2021-12-23T16:28:28Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 294,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-04-17T10:14:17Z",
|
||||
"updated_at": "2022-04-18T11:35:15Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 915,
|
||||
"watchers_count": 915,
|
||||
"stargazers_count": 916,
|
||||
"watchers_count": 916,
|
||||
"forks_count": 257,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 257,
|
||||
"watchers": 915,
|
||||
"watchers": 916,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "S2-061 的payload,以及对应简单的PoC\/Exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T17:42:37Z",
|
||||
"updated_at": "2022-04-15T12:00:35Z",
|
||||
"updated_at": "2022-04-18T06:16:06Z",
|
||||
"pushed_at": "2020-12-18T00:57:50Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T10:49:40Z",
|
||||
"updated_at": "2022-04-12T06:14:41Z",
|
||||
"updated_at": "2022-04-18T11:38:43Z",
|
||||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2022-03-17T05:12:18Z",
|
||||
"updated_at": "2022-04-18T09:28:27Z",
|
||||
"pushed_at": "2022-04-08T15:39:42Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -36,7 +36,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 49,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-0319.json
Normal file
29
2021/CVE-2021-0319.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 482789876,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2021-0319",
|
||||
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0319",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0319",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T09:31:22Z",
|
||||
"updated_at": "2022-04-18T09:36:22Z",
|
||||
"pushed_at": "2022-04-18T09:35:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T14:11:58Z",
|
||||
"updated_at": "2022-04-01T14:16:52Z",
|
||||
"updated_at": "2022-04-18T09:32:07Z",
|
||||
"pushed_at": "2022-04-01T14:18:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T05:45:49Z",
|
||||
"updated_at": "2022-04-15T05:45:49Z",
|
||||
"pushed_at": "2022-04-15T05:45:50Z",
|
||||
"updated_at": "2022-04-18T10:44:56Z",
|
||||
"pushed_at": "2022-04-18T10:45:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
29
2021/CVE-2021-0478.json
Normal file
29
2021/CVE-2021-0478.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 482818616,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2021-0478",
|
||||
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0478",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0478",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T11:16:45Z",
|
||||
"updated_at": "2022-04-18T11:23:22Z",
|
||||
"pushed_at": "2022-04-18T11:22:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-0705.json
Normal file
29
2021/CVE-2021-0705.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 482745572,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2021-0705",
|
||||
"full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0705",
|
||||
"owner": {
|
||||
"login": "ShaikUsaf",
|
||||
"id": 100413972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0705",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T06:51:16Z",
|
||||
"updated_at": "2022-04-18T07:06:25Z",
|
||||
"pushed_at": "2022-04-18T07:06:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-03-03T17:50:03Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -57,17 +57,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2022-04-17T16:38:11Z",
|
||||
"updated_at": "2022-04-18T09:49:38Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -236,17 +236,17 @@
|
|||
"description": "GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T04:56:18Z",
|
||||
"updated_at": "2022-04-18T04:57:35Z",
|
||||
"updated_at": "2022-04-18T07:41:30Z",
|
||||
"pushed_at": "2022-04-18T04:56:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -287,17 +287,17 @@
|
|||
"description": "Laravel RCE (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2022-04-18T05:12:47Z",
|
||||
"updated_at": "2022-04-18T09:54:17Z",
|
||||
"pushed_at": "2022-04-16T17:28:47Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T01:50:14Z",
|
||||
"updated_at": "2022-04-18T02:30:05Z",
|
||||
"updated_at": "2022-04-18T09:14:48Z",
|
||||
"pushed_at": "2022-04-17T08:19:59Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 40,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 78,
|
||||
"forks": 44,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T04:23:44Z",
|
||||
"updated_at": "2022-04-17T05:59:48Z",
|
||||
"updated_at": "2022-04-18T07:04:06Z",
|
||||
"pushed_at": "2022-04-15T08:52:11Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -94,17 +94,17 @@
|
|||
"description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T11:30:26Z",
|
||||
"updated_at": "2022-04-18T06:09:05Z",
|
||||
"updated_at": "2022-04-18T06:42:53Z",
|
||||
"pushed_at": "2022-04-15T15:25:08Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 9,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 10,
|
||||
"forks": 11,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -148,17 +148,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T05:28:52Z",
|
||||
"updated_at": "2022-04-18T05:30:09Z",
|
||||
"pushed_at": "2022-04-18T05:31:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"updated_at": "2022-04-18T06:16:47Z",
|
||||
"pushed_at": "2022-04-18T08:26:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -130,17 +130,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2022-04-14T08:03:44Z",
|
||||
"updated_at": "2022-04-18T09:42:15Z",
|
||||
"pushed_at": "2022-02-11T15:22:20Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -292,10 +292,10 @@
|
|||
"description": "f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-13T10:12:51Z",
|
||||
"updated_at": "2022-02-14T02:08:54Z",
|
||||
"updated_at": "2022-04-18T09:39:38Z",
|
||||
"pushed_at": "2022-02-13T11:16:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -309,7 +309,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 428966283,
|
||||
"name": "CVE-2021-37580",
|
||||
"full_name": "rabbitsafe\/CVE-2021-37580",
|
||||
"owner": {
|
||||
"login": "rabbitsafe",
|
||||
"id": 33046073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-37580",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-17T08:33:25Z",
|
||||
"updated_at": "2022-01-08T10:58:31Z",
|
||||
"pushed_at": "2021-11-18T04:41:44Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 429055913,
|
||||
"name": "CVE-2021-37580",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-04-16T16:37:23Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-04-18T02:05:44Z",
|
||||
"updated_at": "2022-04-18T09:58:14Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1470,
|
||||
"watchers_count": 1470,
|
||||
"forks_count": 430,
|
||||
"stargazers_count": 1473,
|
||||
"watchers_count": 1473,
|
||||
"forks_count": 431,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 430,
|
||||
"watchers": 1470,
|
||||
"forks": 431,
|
||||
"watchers": 1473,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1228,10 +1228,10 @@
|
|||
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:01:26Z",
|
||||
"updated_at": "2022-03-28T20:01:58Z",
|
||||
"updated_at": "2022-04-18T08:29:36Z",
|
||||
"pushed_at": "2022-02-07T15:42:00Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1254,7 +1254,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1788,17 +1788,17 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-04-17T15:22:09Z",
|
||||
"updated_at": "2022-04-18T11:11:24Z",
|
||||
"pushed_at": "2022-04-09T08:06:43Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 30,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 232,
|
||||
"forks": 31,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2251,17 +2251,17 @@
|
|||
"description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T15:16:44Z",
|
||||
"updated_at": "2022-03-31T04:30:51Z",
|
||||
"updated_at": "2022-04-18T06:30:50Z",
|
||||
"pushed_at": "2022-01-28T15:17:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-04-16T21:40:26Z",
|
||||
"updated_at": "2022-04-18T08:50:37Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1391,
|
||||
"watchers_count": 1391,
|
||||
"stargazers_count": 1392,
|
||||
"watchers_count": 1392,
|
||||
"forks_count": 455,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 455,
|
||||
"watchers": 1391,
|
||||
"watchers": 1392,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -120,33 +120,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 427815832,
|
||||
"name": "POC-CVE-2021-41773",
|
||||
"full_name": "kubota\/POC-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "kubota",
|
||||
"id": 119277,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
|
||||
"html_url": "https:\/\/github.com\/kubota"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-14T02:02:45Z",
|
||||
"updated_at": "2021-11-16T20:42:27Z",
|
||||
"pushed_at": "2021-11-16T20:42:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438514241,
|
||||
"name": "MASS_CVE-2021-41773",
|
||||
|
|
|
@ -84,33 +84,6 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 427958357,
|
||||
"name": "CVE-2021-42013-ApacheRCE",
|
||||
"full_name": "xMohamed0\/CVE-2021-42013-ApacheRCE",
|
||||
"owner": {
|
||||
"login": "xMohamed0",
|
||||
"id": 94008154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
|
||||
"html_url": "https:\/\/github.com\/xMohamed0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-42013-ApacheRCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-14T14:58:26Z",
|
||||
"updated_at": "2021-11-14T14:59:00Z",
|
||||
"pushed_at": "2021-11-14T14:58:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439885699,
|
||||
"name": "CVE-2021-42013",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 428081760,
|
||||
"name": "CVE-2021-43616",
|
||||
"full_name": "icatalina\/CVE-2021-43616",
|
||||
"owner": {
|
||||
"login": "icatalina",
|
||||
"id": 4542735,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4542735?v=4",
|
||||
"html_url": "https:\/\/github.com\/icatalina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/icatalina\/CVE-2021-43616",
|
||||
"description": "Repo demonstrating CVE-2021-43616 \/ https:\/\/github.com\/npm\/cli\/issues\/2701",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-15T01:06:10Z",
|
||||
"updated_at": "2022-04-12T02:59:18Z",
|
||||
"pushed_at": "2021-11-15T01:06:23Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2022-04-10T14:18:56Z",
|
||||
"updated_at": "2022-04-18T06:27:18Z",
|
||||
"pushed_at": "2021-12-15T06:18:15Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1208,10 +1208,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-04-18T02:38:57Z",
|
||||
"updated_at": "2022-04-18T07:51:55Z",
|
||||
"pushed_at": "2022-04-16T04:01:01Z",
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1223,7 +1223,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 297,
|
||||
"watchers": 298,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -10752,5 +10752,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 482785359,
|
||||
"name": "CVE-2021-44228-Mass-RCE-Log4j",
|
||||
"full_name": "ExploitPwner\/CVE-2021-44228-Mass-RCE-Log4j",
|
||||
"owner": {
|
||||
"login": "ExploitPwner",
|
||||
"id": 103929208,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
|
||||
"html_url": "https:\/\/github.com\/ExploitPwner"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2021-44228-Mass-RCE-Log4j",
|
||||
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T09:16:05Z",
|
||||
"updated_at": "2022-04-18T09:28:12Z",
|
||||
"pushed_at": "2022-04-18T09:19:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-44255.json
Normal file
29
2021/CVE-2021-44255.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 420164946,
|
||||
"name": "motioneye-authenticated-RCE",
|
||||
"full_name": "pizza-power\/motioneye-authenticated-RCE",
|
||||
"owner": {
|
||||
"login": "pizza-power",
|
||||
"id": 6135659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
|
||||
"html_url": "https:\/\/github.com\/pizza-power"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pizza-power\/motioneye-authenticated-RCE",
|
||||
"description": "A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. CVE-2021-44255",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-22T16:15:08Z",
|
||||
"updated_at": "2022-04-18T11:39:50Z",
|
||||
"pushed_at": "2022-02-20T14:55:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,35 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T18:09:06Z",
|
||||
"updated_at": "2022-04-04T18:09:36Z",
|
||||
"updated_at": "2022-04-18T09:43:17Z",
|
||||
"pushed_at": "2022-04-07T12:58:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 482761729,
|
||||
"name": "CVE-2022-0778-POC",
|
||||
"full_name": "jkakavas\/CVE-2022-0778-POC",
|
||||
"owner": {
|
||||
"login": "jkakavas",
|
||||
"id": 10281256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10281256?v=4",
|
||||
"html_url": "https:\/\/github.com\/jkakavas"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jkakavas\/CVE-2022-0778-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T07:51:18Z",
|
||||
"updated_at": "2022-04-18T07:51:58Z",
|
||||
"pushed_at": "2022-04-18T07:55:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -1628,14 +1628,25 @@
|
|||
"description": "Scripted Linux Privilege Escalation for the CVE-2022-0847 \"Dirty Pipe\" vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-17T04:28:24Z",
|
||||
"updated_at": "2022-04-17T10:02:56Z",
|
||||
"pushed_at": "2022-04-17T06:56:03Z",
|
||||
"updated_at": "2022-04-18T07:24:21Z",
|
||||
"pushed_at": "2022-04-18T10:20:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2021-3560",
|
||||
"cve-2022-0847",
|
||||
"dirtypipe",
|
||||
"exploit",
|
||||
"hackthebox",
|
||||
"infosec",
|
||||
"privesc",
|
||||
"privilege-escalation",
|
||||
"redteam-tools",
|
||||
"security-tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:27:11Z",
|
||||
"updated_at": "2022-04-14T12:51:18Z",
|
||||
"updated_at": "2022-04-18T06:44:00Z",
|
||||
"pushed_at": "2022-04-03T01:36:45Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 146,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T19:37:35Z",
|
||||
"updated_at": "2022-04-17T23:08:38Z",
|
||||
"updated_at": "2022-04-18T10:56:20Z",
|
||||
"pushed_at": "2022-04-16T07:00:38Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,10 +40,10 @@
|
|||
"description": "WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-17T05:44:45Z",
|
||||
"updated_at": "2022-04-18T05:58:14Z",
|
||||
"updated_at": "2022-04-18T10:54:51Z",
|
||||
"pushed_at": "2022-04-17T05:53:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -56,7 +56,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": "A REAL DoS exploit for CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T10:53:28Z",
|
||||
"updated_at": "2022-04-18T06:02:28Z",
|
||||
"updated_at": "2022-04-18T09:40:39Z",
|
||||
"pushed_at": "2022-04-13T05:48:04Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 99,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-04-17T02:51:03Z",
|
||||
"updated_at": "2022-04-18T11:04:27Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 261,
|
||||
"watchers": 262,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-04-16T07:22:28Z",
|
||||
"updated_at": "2022-04-18T10:03:37Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 567,
|
||||
"watchers_count": 567,
|
||||
"stargazers_count": 568,
|
||||
"watchers_count": 568,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 567,
|
||||
"watchers": 568,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,17 +43,17 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2022-04-18T05:36:03Z",
|
||||
"updated_at": "2022-04-18T10:03:49Z",
|
||||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 196,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,17 +151,17 @@
|
|||
"description": "CVE-2022-22954-VMware-RCE批量检测POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T05:48:24Z",
|
||||
"updated_at": "2022-04-16T02:55:41Z",
|
||||
"updated_at": "2022-04-18T10:17:05Z",
|
||||
"pushed_at": "2022-04-12T12:00:26Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -340,17 +340,17 @@
|
|||
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T16:18:56Z",
|
||||
"updated_at": "2022-04-17T15:36:55Z",
|
||||
"updated_at": "2022-04-18T08:25:36Z",
|
||||
"pushed_at": "2022-04-14T13:36:54Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"forks": 5,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -589,17 +589,17 @@
|
|||
"description": "批量无损检测CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T07:55:26Z",
|
||||
"updated_at": "2022-04-08T07:21:07Z",
|
||||
"updated_at": "2022-04-18T08:27:45Z",
|
||||
"pushed_at": "2022-04-01T08:44:19Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "TightVNC Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:49:43Z",
|
||||
"updated_at": "2022-04-12T09:18:57Z",
|
||||
"updated_at": "2022-04-18T09:06:27Z",
|
||||
"pushed_at": "2022-01-26T18:53:03Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T03:41:32Z",
|
||||
"updated_at": "2022-04-18T04:14:45Z",
|
||||
"updated_at": "2022-04-18T10:50:13Z",
|
||||
"pushed_at": "2022-04-18T03:28:10Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -123,17 +123,17 @@
|
|||
"description": "CVE-2022-26809-RCE-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T04:13:22Z",
|
||||
"updated_at": "2022-04-18T03:16:50Z",
|
||||
"updated_at": "2022-04-18T10:14:47Z",
|
||||
"pushed_at": "2022-04-15T03:54:36Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 13,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 44,
|
||||
"forks": 14,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -177,17 +177,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T14:09:59Z",
|
||||
"updated_at": "2022-04-18T04:32:47Z",
|
||||
"updated_at": "2022-04-18T10:29:13Z",
|
||||
"pushed_at": "2022-04-18T03:41:05Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"forks": 3,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2022-04-15T14:20:48Z",
|
||||
"updated_at": "2022-04-18T07:04:34Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 304,
|
||||
"watchers": 305,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-08T02:49:09Z",
|
||||
"updated_at": "2022-04-18T04:44:13Z",
|
||||
"updated_at": "2022-04-18T11:04:22Z",
|
||||
"pushed_at": "2022-04-08T15:21:26Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 10,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,8 +29,8 @@
|
|||
"webauthn"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 64,
|
||||
"forks": 11,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-04-18T06:17:26Z",
|
||||
"updated_at": "2022-04-18T12:17:02Z",
|
||||
"pushed_at": "2022-04-17T19:08:43Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 35,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 190,
|
||||
"forks": 43,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
}
|
||||
]
|
47
README.md
47
README.md
|
@ -96,6 +96,7 @@ The BN_mod_sqrt() function, which computes a modular square root, contains a bug
|
|||
|
||||
- [drago-96/CVE-2022-0778](https://github.com/drago-96/CVE-2022-0778)
|
||||
- [yywing/cve-2022-0778](https://github.com/yywing/cve-2022-0778)
|
||||
- [jkakavas/CVE-2022-0778-POC](https://github.com/jkakavas/CVE-2022-0778-POC)
|
||||
|
||||
### CVE-2022-0811 (2022-03-16)
|
||||
|
||||
|
@ -1188,6 +1189,14 @@ In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds wr
|
|||
|
||||
- [Satheesh575555/system_bt_AOSP_10_r33_CVE-2021-0316](https://github.com/Satheesh575555/system_bt_AOSP_10_r33_CVE-2021-0316)
|
||||
|
||||
### CVE-2021-0319 (2021-01-11)
|
||||
|
||||
<code>
|
||||
In checkCallerIsSystemOr of CompanionDeviceManagerService.java, there is a possible way to get a nearby Bluetooth device's MAC address without appropriate permissions due to a permissions bypass. This could lead to local escalation of privilege that grants access to nearby MAC addresses, with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-167244818.
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319)
|
||||
|
||||
### CVE-2021-0325 (2021-02-10)
|
||||
|
||||
<code>
|
||||
|
@ -1268,6 +1277,14 @@ In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a r
|
|||
|
||||
- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0476](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0476)
|
||||
|
||||
### CVE-2021-0478 (2021-06-21)
|
||||
|
||||
<code>
|
||||
In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0478](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0478)
|
||||
|
||||
### CVE-2021-0506 (2021-06-21)
|
||||
|
||||
<code>
|
||||
|
@ -1333,6 +1350,14 @@ In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass du
|
|||
|
||||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0688](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0688)
|
||||
|
||||
### CVE-2021-0705 (2021-10-22)
|
||||
|
||||
<code>
|
||||
In sanitizeSbn of NotificationManagerService.java, there is a possible way to keep service running in foreground and keep granted permissions due to Bypass of Background Service Restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-185388103
|
||||
</code>
|
||||
|
||||
- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705)
|
||||
|
||||
### CVE-2021-0928 (2021-12-15)
|
||||
|
||||
<code>
|
||||
|
@ -3715,7 +3740,6 @@ Windows Elevation of Privilege Vulnerability
|
|||
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
|
||||
</code>
|
||||
|
||||
- [rabbitsafe/CVE-2021-37580](https://github.com/rabbitsafe/CVE-2021-37580)
|
||||
- [fengwenhua/CVE-2021-37580](https://github.com/fengwenhua/CVE-2021-37580)
|
||||
- [Osyanina/westone-CVE-2021-37580-scanner](https://github.com/Osyanina/westone-CVE-2021-37580-scanner)
|
||||
- [ZororoZ/CVE-2021-37580](https://github.com/ZororoZ/CVE-2021-37580)
|
||||
|
@ -4056,7 +4080,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773)
|
||||
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
|
||||
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
|
||||
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
|
||||
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
|
||||
|
@ -4104,7 +4127,6 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
|
|||
- [Vulnmachines/cve-2021-42013](https://github.com/Vulnmachines/cve-2021-42013)
|
||||
- [twseptian/cve-2021-42013-docker-lab](https://github.com/twseptian/cve-2021-42013-docker-lab)
|
||||
- [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013)
|
||||
- [xMohamed0/CVE-2021-42013-ApacheRCE](https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE)
|
||||
- [awsassets/CVE-2021-42013](https://github.com/awsassets/CVE-2021-42013)
|
||||
- [asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp](https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp)
|
||||
- [rnsss/CVE-2021-42013](https://github.com/rnsss/CVE-2021-42013)
|
||||
|
@ -4381,14 +4403,6 @@ The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without ve
|
|||
|
||||
- [xvnpw/k8s-CVE-2021-43557-poc](https://github.com/xvnpw/k8s-CVE-2021-43557-poc)
|
||||
|
||||
### CVE-2021-43616 (2021-11-13)
|
||||
|
||||
<code>
|
||||
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.
|
||||
</code>
|
||||
|
||||
- [icatalina/CVE-2021-43616](https://github.com/icatalina/CVE-2021-43616)
|
||||
|
||||
### CVE-2021-43617 (2021-11-14)
|
||||
|
||||
<code>
|
||||
|
@ -4943,10 +4957,19 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [cryst4lliz3/CVE-2021-44228](https://github.com/cryst4lliz3/CVE-2021-44228)
|
||||
- [cryst4lliz3/CVE-2021-44228-vuln-app](https://github.com/cryst4lliz3/CVE-2021-44228-vuln-app)
|
||||
- [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner)
|
||||
- [ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j)
|
||||
|
||||
### CVE-2021-44229
|
||||
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
|
||||
|
||||
### CVE-2021-44255 (2022-01-31)
|
||||
|
||||
<code>
|
||||
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
|
||||
</code>
|
||||
|
||||
- [pizza-power/motioneye-authenticated-RCE](https://github.com/pizza-power/motioneye-authenticated-RCE)
|
||||
|
||||
### CVE-2021-44270
|
||||
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
|
||||
|
||||
|
@ -5446,6 +5469,7 @@ In onCreate of SliceDeepLinkSpringBoard.java there is a possible insecure Intent
|
|||
</code>
|
||||
|
||||
- [pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219](https://github.com/pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219)
|
||||
- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219)
|
||||
|
||||
### CVE-2020-0225 (2020-07-17)
|
||||
|
||||
|
@ -13280,6 +13304,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_chan
|
|||
- [darrenmartyn/CVE-2019-15107](https://github.com/darrenmartyn/CVE-2019-15107)
|
||||
- [hacknotes/CVE-2019-15107-Exploit](https://github.com/hacknotes/CVE-2019-15107-Exploit)
|
||||
- [Tuz-Wwsd/CVE-2019-15107_detection](https://github.com/Tuz-Wwsd/CVE-2019-15107_detection)
|
||||
- [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107)
|
||||
|
||||
### CVE-2019-15120 (2019-08-16)
|
||||
|
||||
|
|
Loading…
Reference in a new issue