mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/08/18 12:17:27
This commit is contained in:
parent
ff7d41e00f
commit
705d111ec2
54 changed files with 630 additions and 206 deletions
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-08-17T14:50:53Z",
|
||||
"updated_at": "2022-08-18T08:21:37Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1480,
|
||||
"watchers_count": 1480,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 1477,
|
||||
"watchers": 1480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Experiments related to CVE-2015-3456",
|
||||
"fork": false,
|
||||
"created_at": "2015-05-17T20:14:47Z",
|
||||
"updated_at": "2020-08-18T07:34:43Z",
|
||||
"updated_at": "2022-08-18T07:17:35Z",
|
||||
"pushed_at": "2015-05-27T13:58:46Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2022-08-12T10:12:07Z",
|
||||
"updated_at": "2022-08-18T09:58:12Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 151,
|
||||
"watchers": 330,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-08-17T14:50:53Z",
|
||||
"updated_at": "2022-08-18T08:21:37Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1480,
|
||||
"watchers_count": 1480,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 1477,
|
||||
"watchers": 1480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -69,10 +69,10 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2022-06-26T22:05:36Z",
|
||||
"updated_at": "2022-08-18T08:28:09Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 902,
|
||||
"watchers_count": 902,
|
||||
"stargazers_count": 903,
|
||||
"watchers_count": 903,
|
||||
"forks_count": 410,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 410,
|
||||
"watchers": 902,
|
||||
"watchers": 903,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -419,10 +419,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2022-08-18T02:07:50Z",
|
||||
"updated_at": "2022-08-18T08:30:00Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"forks_count": 400,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -434,7 +434,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 400,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -27,6 +27,34 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 95974378,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "zcgonvh\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
|
||||
"description": "CVE-2017-0213 for command line",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-01T16:07:04Z",
|
||||
"updated_at": "2022-06-16T11:45:53Z",
|
||||
"pushed_at": "2017-07-01T16:19:12Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 105444160,
|
||||
"name": "CVE-2017-0213",
|
||||
|
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 96219146,
|
||||
"name": "CVE-2017-3241-POC",
|
||||
"full_name": "xfei3\/CVE-2017-3241-POC",
|
||||
"owner": {
|
||||
"login": "xfei3",
|
||||
"id": 29874084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4",
|
||||
"html_url": "https:\/\/github.com\/xfei3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
|
||||
"description": "POC for java RMI deserialization vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-04T13:05:46Z",
|
||||
"updated_at": "2020-03-29T07:05:46Z",
|
||||
"pushed_at": "2017-07-19T23:55:49Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 419955901,
|
||||
"name": "CVE-2017-3241",
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-08-17T14:50:53Z",
|
||||
"updated_at": "2022-08-18T08:21:37Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1480,
|
||||
"watchers_count": 1480,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 1477,
|
||||
"watchers": 1480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -26,5 +26,33 @@
|
|||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96573883,
|
||||
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"owner": {
|
||||
"login": "homjxi0e",
|
||||
"id": 25440152,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
||||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T20:21:51Z",
|
||||
"updated_at": "2017-08-23T09:24:55Z",
|
||||
"pushed_at": "2017-07-11T15:36:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 107852472,
|
||||
"name": "wpUsersScan",
|
||||
"full_name": "teambugsbunny\/wpUsersScan",
|
||||
"owner": {
|
||||
"login": "teambugsbunny",
|
||||
"id": 32997799,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4",
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
|
||||
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-22T09:22:28Z",
|
||||
"updated_at": "2020-04-06T12:23:41Z",
|
||||
"pushed_at": "2017-06-11T16:47:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121831599,
|
||||
"name": "wpUsersScan",
|
||||
|
|
|
@ -1068,6 +1068,34 @@
|
|||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98150795,
|
||||
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"owner": {
|
||||
"login": "R4v3nBl4ck",
|
||||
"id": 30399308,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
|
||||
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||||
"description": "Exploit created by: R4v3nBl4ck end Pacman",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-24T05:05:28Z",
|
||||
"updated_at": "2020-07-12T14:06:08Z",
|
||||
"pushed_at": "2017-07-24T23:55:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100141854,
|
||||
"name": "CVE-2017-5638",
|
||||
|
@ -1183,6 +1211,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 107489354,
|
||||
"name": "Apache-Struts",
|
||||
"full_name": "c002\/Apache-Struts",
|
||||
"owner": {
|
||||
"login": "c002",
|
||||
"id": 26592580,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
|
||||
"html_url": "https:\/\/github.com\/c002"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
|
||||
"description": " An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T02:40:45Z",
|
||||
"updated_at": "2020-05-17T04:32:06Z",
|
||||
"pushed_at": "2017-05-28T14:03:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 108805305,
|
||||
"name": "Common-Vulnerability-and-Exploit",
|
||||
|
|
|
@ -83,6 +83,34 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 98579784,
|
||||
"name": "amt_auth_bypass_poc",
|
||||
"full_name": "embedi\/amt_auth_bypass_poc",
|
||||
"owner": {
|
||||
"login": "embedi",
|
||||
"id": 24190344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
|
||||
"html_url": "https:\/\/github.com\/embedi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
|
||||
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-27T21:06:08Z",
|
||||
"updated_at": "2022-03-06T01:51:18Z",
|
||||
"pushed_at": "2017-07-27T21:08:49Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 385968702,
|
||||
"name": "CVE-2017-5689-Checker",
|
||||
|
|
58
2017/CVE-2017-7047.json
Normal file
58
2017/CVE-2017-7047.json
Normal file
|
@ -0,0 +1,58 @@
|
|||
[
|
||||
{
|
||||
"id": 99396176,
|
||||
"name": "Triple_Fetch-Kernel-Creds",
|
||||
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"owner": {
|
||||
"login": "JosephShenton",
|
||||
"id": 12966231,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4",
|
||||
"html_url": "https:\/\/github.com\/JosephShenton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
|
||||
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-05T03:23:13Z",
|
||||
"updated_at": "2020-08-25T15:10:04Z",
|
||||
"pushed_at": "2017-08-05T09:21:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 99915573,
|
||||
"name": "Triple_fetch",
|
||||
"full_name": "q1f3\/Triple_fetch",
|
||||
"owner": {
|
||||
"login": "q1f3",
|
||||
"id": 9603950,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4",
|
||||
"html_url": "https:\/\/github.com\/q1f3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
|
||||
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-10T11:24:47Z",
|
||||
"updated_at": "2020-04-07T05:58:43Z",
|
||||
"pushed_at": "2017-08-03T23:47:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -368,6 +368,34 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201442014,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "ThanHuuTuan\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "ThanHuuTuan",
|
||||
"id": 32167814,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T10:01:50Z",
|
||||
"updated_at": "2019-08-09T10:01:53Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 97701175,
|
||||
"name": "CVE-2017-7529",
|
||||
"full_name": "liusec\/CVE-2017-7529",
|
||||
"owner": {
|
||||
"login": "liusec",
|
||||
"id": 13982415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
|
||||
"html_url": "https:\/\/github.com\/liusec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-07-19T09:55:42Z",
|
||||
"updated_at": "2022-05-13T08:51:10Z",
|
||||
"pushed_at": "2017-07-21T06:29:35Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138050203,
|
||||
"name": "CVE-2017-7529_PoC",
|
||||
|
|
|
@ -1,4 +1,60 @@
|
|||
[
|
||||
{
|
||||
"id": 96536969,
|
||||
"name": "s2-048",
|
||||
"full_name": "IanSmith123\/s2-048",
|
||||
"owner": {
|
||||
"login": "IanSmith123",
|
||||
"id": 19611084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
|
||||
"html_url": "https:\/\/github.com\/IanSmith123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
|
||||
"description": "Apache struts struts 2 048, CVE-2017-9791.",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T12:35:55Z",
|
||||
"updated_at": "2017-07-07T14:05:07Z",
|
||||
"pushed_at": "2017-07-07T17:10:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 96565902,
|
||||
"name": "Struts2-048",
|
||||
"full_name": "dragoneeg\/Struts2-048",
|
||||
"owner": {
|
||||
"login": "dragoneeg",
|
||||
"id": 4232461,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4",
|
||||
"html_url": "https:\/\/github.com\/dragoneeg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
|
||||
"description": "CVE-2017-9791",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-07T18:27:31Z",
|
||||
"updated_at": "2022-07-06T23:36:24Z",
|
||||
"pushed_at": "2017-07-08T02:08:36Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 104592299,
|
||||
"name": "CVE-2017-9791",
|
||||
|
|
|
@ -653,7 +653,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T15:48:11Z",
|
||||
"updated_at": "2022-02-21T04:07:24Z",
|
||||
"updated_at": "2022-08-18T08:33:31Z",
|
||||
"pushed_at": "2021-12-16T12:28:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -549,10 +549,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-08-17T14:50:53Z",
|
||||
"updated_at": "2022-08-18T08:21:37Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1480,
|
||||
"watchers_count": 1480,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -581,7 +581,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 1477,
|
||||
"watchers": 1480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2022-08-16T07:56:41Z",
|
||||
"updated_at": "2022-08-18T08:48:14Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"stargazers_count": 457,
|
||||
"watchers_count": 457,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 456,
|
||||
"watchers": 457,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2022-08-08T04:14:40Z",
|
||||
"updated_at": "2022-08-18T09:10:52Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -97,7 +97,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 528,
|
||||
"watchers": 527,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T12:00:24Z",
|
||||
"updated_at": "2022-04-08T08:51:57Z",
|
||||
"updated_at": "2022-08-18T07:51:33Z",
|
||||
"pushed_at": "2021-04-30T02:27:52Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T13:18:54Z",
|
||||
"updated_at": "2022-02-14T08:03:59Z",
|
||||
"updated_at": "2022-08-18T07:51:59Z",
|
||||
"pushed_at": "2021-02-24T13:19:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-08-17T15:25:12Z",
|
||||
"updated_at": "2022-08-18T08:41:13Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3489,
|
||||
"watchers_count": 3489,
|
||||
"stargazers_count": 3491,
|
||||
"watchers_count": 3491,
|
||||
"forks_count": 1030,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -72,7 +72,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1030,
|
||||
"watchers": 3489,
|
||||
"watchers": 3491,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -97,10 +97,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2022-08-18T02:22:32Z",
|
||||
"updated_at": "2022-08-18T08:24:29Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 827,
|
||||
"watchers_count": 827,
|
||||
"stargazers_count": 828,
|
||||
"watchers_count": 828,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 827,
|
||||
"watchers": 828,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -181,10 +181,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-08-17T14:50:53Z",
|
||||
"updated_at": "2022-08-18T08:21:37Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1480,
|
||||
"watchers_count": 1480,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -213,7 +213,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 1477,
|
||||
"watchers": 1480,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -153,10 +153,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T13:17:41Z",
|
||||
"updated_at": "2022-02-14T08:03:59Z",
|
||||
"updated_at": "2022-08-18T07:51:48Z",
|
||||
"pushed_at": "2021-02-24T13:18:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -117,10 +117,10 @@
|
|||
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-14T21:55:57Z",
|
||||
"updated_at": "2022-03-26T02:54:17Z",
|
||||
"updated_at": "2022-08-18T07:05:31Z",
|
||||
"pushed_at": "2020-07-19T02:29:33Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -128,7 +128,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -229,10 +229,10 @@
|
|||
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T23:00:00Z",
|
||||
"updated_at": "2022-07-27T07:12:04Z",
|
||||
"updated_at": "2022-08-18T06:46:01Z",
|
||||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -240,7 +240,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 231,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:14:27Z",
|
||||
"updated_at": "2022-07-18T09:34:18Z",
|
||||
"updated_at": "2022-08-18T10:46:37Z",
|
||||
"pushed_at": "2022-05-03T10:40:14Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-08-17T15:25:12Z",
|
||||
"updated_at": "2022-08-18T08:41:13Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3489,
|
||||
"watchers_count": 3489,
|
||||
"stargazers_count": 3491,
|
||||
"watchers_count": 3491,
|
||||
"forks_count": 1030,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1030,
|
||||
"watchers": 3489,
|
||||
"watchers": 3491,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T19:05:38Z",
|
||||
"updated_at": "2022-08-17T19:22:33Z",
|
||||
"updated_at": "2022-08-18T07:54:33Z",
|
||||
"pushed_at": "2022-08-17T19:20:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-08-17T14:50:53Z",
|
||||
"updated_at": "2022-08-18T08:21:37Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1477,
|
||||
"watchers_count": 1477,
|
||||
"stargazers_count": 1480,
|
||||
"watchers_count": 1480,
|
||||
"forks_count": 303,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 303,
|
||||
"watchers": 1477,
|
||||
"watchers": 1480,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-10T08:23:05Z",
|
||||
"updated_at": "2022-07-31T07:40:38Z",
|
||||
"updated_at": "2022-08-18T07:34:20Z",
|
||||
"pushed_at": "2022-01-26T07:12:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-08-18T06:11:39Z",
|
||||
"updated_at": "2022-08-18T10:23:50Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1595,
|
||||
"watchers_count": 1595,
|
||||
"stargazers_count": 1596,
|
||||
"watchers_count": 1596,
|
||||
"forks_count": 573,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 573,
|
||||
"watchers": 1595,
|
||||
"watchers": 1596,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2022-08-10T03:05:38Z",
|
||||
"updated_at": "2022-08-18T08:53:01Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 27,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"exiftool"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"forks": 26,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 44,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"forks": 45,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2022-08-17T16:50:59Z",
|
||||
"updated_at": "2022-08-18T07:40:08Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 816,
|
||||
"watchers_count": 816,
|
||||
"stargazers_count": 817,
|
||||
"watchers_count": 817,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 816,
|
||||
"watchers": 817,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -163,7 +163,7 @@
|
|||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 899,
|
||||
"watchers_count": 899,
|
||||
"forks_count": 293,
|
||||
"forks_count": 294,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -173,7 +173,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 293,
|
||||
"forks": 294,
|
||||
"watchers": 899,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,18 +41,18 @@
|
|||
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T17:55:52Z",
|
||||
"updated_at": "2022-08-17T01:16:25Z",
|
||||
"updated_at": "2022-08-18T09:46:29Z",
|
||||
"pushed_at": "2022-03-05T18:34:25Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 25,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 45,
|
||||
"forks": 26,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -254,7 +254,7 @@
|
|||
"pushed_at": "2022-08-02T13:18:24Z",
|
||||
"stargazers_count": 1001,
|
||||
"watchers_count": 1001,
|
||||
"forks_count": 447,
|
||||
"forks_count": 448,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -262,7 +262,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 447,
|
||||
"forks": 448,
|
||||
"watchers": 1001,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -7218,7 +7218,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-03T04:36:41Z",
|
||||
"updated_at": "2022-01-09T19:59:25Z",
|
||||
"pushed_at": "2022-08-11T15:52:24Z",
|
||||
"pushed_at": "2022-08-18T09:43:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -8506,34 +8506,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 515332940,
|
||||
"name": "Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
|
||||
"full_name": "tharindudh\/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "tharindudh",
|
||||
"id": 71964544,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
|
||||
"html_url": "https:\/\/github.com\/tharindudh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tharindudh\/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
|
||||
"description": "Remote Code Execution attacks are one of the most frequent methods employed by cybercriminals to compromise susceptible computers. In the previous year, a serious zero-day vulnerability was identified in Log4j, a java program used by developers for debugging and application modification loggings. This is also a significant vulnerability that affects the so-called Ghidra reverse engineering tool.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T20:33:10Z",
|
||||
"updated_at": "2022-07-18T20:33:10Z",
|
||||
"pushed_at": "2022-07-18T20:33:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 515475941,
|
||||
"name": "CVE-2021-44228-Mass-RCE-Log4j",
|
||||
|
@ -8654,5 +8626,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 526103436,
|
||||
"name": "tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
|
||||
"full_name": "tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "tharindudh",
|
||||
"id": 71964544,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
|
||||
"html_url": "https:\/\/github.com\/tharindudh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-18T07:27:32Z",
|
||||
"updated_at": "2022-08-18T07:27:32Z",
|
||||
"pushed_at": "2022-08-18T07:30:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-04-03T01:36:45Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 34,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-18T06:04:41Z",
|
||||
"updated_at": "2022-08-18T06:04:41Z",
|
||||
"pushed_at": "2022-08-18T06:04:42Z",
|
||||
"updated_at": "2022-08-18T06:22:42Z",
|
||||
"pushed_at": "2022-08-18T06:24:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
30
2022/CVE-2022-20229.json
Normal file
30
2022/CVE-2022-20229.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 526095462,
|
||||
"name": "system_bt_AOSP10_r33_CVE-2022-20229",
|
||||
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
|
||||
"owner": {
|
||||
"login": "ShaikUsaf",
|
||||
"id": 100413972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-18T07:02:43Z",
|
||||
"updated_at": "2022-08-18T07:06:27Z",
|
||||
"pushed_at": "2022-08-18T07:07:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T19:05:38Z",
|
||||
"updated_at": "2022-08-17T19:22:33Z",
|
||||
"updated_at": "2022-08-18T07:54:33Z",
|
||||
"pushed_at": "2022-08-17T19:20:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -911,10 +911,10 @@
|
|||
"description": "CVE-2022-22947_POC_EXP",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-17T09:12:51Z",
|
||||
"updated_at": "2022-08-15T15:42:13Z",
|
||||
"updated_at": "2022-08-18T06:37:41Z",
|
||||
"pushed_at": "2022-03-17T09:58:23Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -922,7 +922,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-08-15T15:42:16Z",
|
||||
"updated_at": "2022-08-18T08:01:03Z",
|
||||
"pushed_at": "2022-07-14T14:55:24Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-08-18T03:03:39Z",
|
||||
"updated_at": "2022-08-18T06:47:31Z",
|
||||
"pushed_at": "2022-08-15T07:00:18Z",
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"stargazers_count": 667,
|
||||
"watchers_count": 667,
|
||||
"forks_count": 126,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"watchers": 666,
|
||||
"watchers": 667,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -69,10 +69,10 @@
|
|||
"description": "A powershell poc to load and automatically run Certify and Rubeus from memory.",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T21:13:49Z",
|
||||
"updated_at": "2022-08-18T02:22:03Z",
|
||||
"updated_at": "2022-08-18T06:58:11Z",
|
||||
"pushed_at": "2022-08-17T21:25:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-06T17:29:04Z",
|
||||
"updated_at": "2022-08-18T04:32:58Z",
|
||||
"updated_at": "2022-08-18T11:18:45Z",
|
||||
"pushed_at": "2022-08-17T02:33:15Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 15,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 69,
|
||||
"forks": 17,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Zimbra RCE simple poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-12T18:35:52Z",
|
||||
"updated_at": "2022-08-18T06:20:27Z",
|
||||
"updated_at": "2022-08-18T11:35:42Z",
|
||||
"pushed_at": "2022-08-13T18:54:58Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 40,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -41,10 +41,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-14T22:22:55Z",
|
||||
"updated_at": "2022-08-18T05:17:39Z",
|
||||
"updated_at": "2022-08-18T10:00:03Z",
|
||||
"pushed_at": "2022-08-14T22:25:03Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-29221 Proof of Concept Code",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T06:02:23Z",
|
||||
"updated_at": "2022-08-01T17:34:13Z",
|
||||
"updated_at": "2022-08-18T10:35:01Z",
|
||||
"pushed_at": "2022-05-25T07:11:59Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-08-15T15:42:26Z",
|
||||
"updated_at": "2022-08-18T07:34:31Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -49,10 +49,10 @@
|
|||
"description": "CVE-2022-30190 Follina POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T06:45:25Z",
|
||||
"updated_at": "2022-07-25T16:12:48Z",
|
||||
"updated_at": "2022-08-18T06:59:30Z",
|
||||
"pushed_at": "2022-05-31T09:35:37Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:35:12Z",
|
||||
"updated_at": "2022-08-15T15:42:33Z",
|
||||
"updated_at": "2022-08-18T07:47:02Z",
|
||||
"pushed_at": "2022-07-05T02:58:30Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -153,10 +153,10 @@
|
|||
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T09:52:02Z",
|
||||
"updated_at": "2022-08-18T03:13:11Z",
|
||||
"updated_at": "2022-08-18T07:11:58Z",
|
||||
"pushed_at": "2022-08-13T08:14:07Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 144,
|
||||
"watchers": 145,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
README.md
30
README.md
|
@ -618,6 +618,14 @@ In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read d
|
|||
|
||||
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224)
|
||||
|
||||
### CVE-2022-20229 (2022-07-13)
|
||||
|
||||
<code>
|
||||
In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184
|
||||
</code>
|
||||
|
||||
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229)
|
||||
|
||||
### CVE-2022-20361 (2022-08-09)
|
||||
|
||||
<code>
|
||||
|
@ -7389,11 +7397,11 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [jaehnri/CVE-2021-44228](https://github.com/jaehnri/CVE-2021-44228)
|
||||
- [ra890927/Log4Shell-CVE-2121-44228-Demo](https://github.com/ra890927/Log4Shell-CVE-2121-44228-Demo)
|
||||
- [bughuntar/log4j-scan](https://github.com/bughuntar/log4j-scan)
|
||||
- [tharindudh/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
|
||||
- [cybersecurityresearcher/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/cybersecurityresearcher/CVE-2021-44228-Mass-RCE-Log4j)
|
||||
- [vidrez/Ethical-Hacking-Report-Log4j](https://github.com/vidrez/Ethical-Hacking-Report-Log4j)
|
||||
- [vino-theva/CVE-2021-44228](https://github.com/vino-theva/CVE-2021-44228)
|
||||
- [nemesi-ita/autoL4s](https://github.com/nemesi-ita/autoL4s)
|
||||
- [tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
|
||||
|
||||
### CVE-2021-44229
|
||||
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
|
||||
|
@ -20804,6 +20812,7 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1,
|
|||
</code>
|
||||
|
||||
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
|
||||
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
|
||||
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
|
||||
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
|
||||
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
|
||||
|
@ -21083,6 +21092,7 @@ An attacker who is able to send and receive messages to an authoritative DNS ser
|
|||
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
|
||||
</code>
|
||||
|
||||
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
|
||||
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
|
||||
|
||||
### CVE-2017-3248 (2017-01-27)
|
||||
|
@ -21135,6 +21145,7 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i
|
|||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-)
|
||||
|
||||
### CVE-2017-4878
|
||||
- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples)
|
||||
|
@ -21205,6 +21216,7 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre
|
|||
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
|
||||
</code>
|
||||
|
||||
- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan)
|
||||
- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan)
|
||||
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
|
||||
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
|
||||
|
@ -21262,10 +21274,12 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
|
|||
- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638)
|
||||
- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
|
||||
- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638)
|
||||
- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-)
|
||||
- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638)
|
||||
- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
|
||||
- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser)
|
||||
- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638)
|
||||
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
|
||||
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
|
||||
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
|
||||
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
|
||||
|
@ -21315,6 +21329,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int
|
|||
- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689)
|
||||
- [robhax/amthoneypot](https://github.com/robhax/amthoneypot)
|
||||
- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass)
|
||||
- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc)
|
||||
- [TheWay-hue/CVE-2017-5689-Checker](https://github.com/TheWay-hue/CVE-2017-5689-Checker)
|
||||
|
||||
### CVE-2017-5693 (2018-07-31)
|
||||
|
@ -21493,6 +21508,15 @@ A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.
|
|||
|
||||
- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038)
|
||||
|
||||
### CVE-2017-7047 (2017-07-20)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
||||
</code>
|
||||
|
||||
- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds)
|
||||
- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch)
|
||||
|
||||
### CVE-2017-7089 (2017-10-22)
|
||||
|
||||
<code>
|
||||
|
@ -21554,6 +21578,7 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
|
|||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [k4u5h41/CVE-2017-7269](https://github.com/k4u5h41/CVE-2017-7269)
|
||||
|
||||
### CVE-2017-7374 (2017-03-31)
|
||||
|
@ -21622,6 +21647,7 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2
|
|||
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
|
||||
</code>
|
||||
|
||||
- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529)
|
||||
- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC)
|
||||
- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529)
|
||||
- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC)
|
||||
|
@ -22019,6 +22045,8 @@ OCaml compiler allows attackers to have unspecified impact via unknown vectors,
|
|||
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
|
||||
</code>
|
||||
|
||||
- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048)
|
||||
- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048)
|
||||
- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791)
|
||||
|
||||
### CVE-2017-9798 (2017-09-18)
|
||||
|
|
Loading…
Reference in a new issue