mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/04/02 12:14:39
This commit is contained in:
parent
45c2f69254
commit
73b19b5979
46 changed files with 406 additions and 272 deletions
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-04-01T14:56:34Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,7 +27,7 @@
|
|||
"springshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team",
|
||||
"fork": false,
|
||||
"created_at": "2014-05-22T19:14:54Z",
|
||||
"updated_at": "2022-01-19T18:00:51Z",
|
||||
"updated_at": "2022-04-02T10:35:53Z",
|
||||
"pushed_at": "2017-01-23T20:14:14Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,10 +98,10 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2022-02-27T04:13:27Z",
|
||||
"updated_at": "2022-04-02T10:08:46Z",
|
||||
"pushed_at": "2020-07-21T09:46:40Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -116,7 +116,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-04-02T04:25:34Z",
|
||||
"updated_at": "2022-04-02T08:22:56Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1312,
|
||||
"watchers_count": 1312,
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 291,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1312,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1630,5 +1630,36 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 476981161,
|
||||
"name": "CVE-2014-6271",
|
||||
"full_name": "akr3ch\/CVE-2014-6271",
|
||||
"owner": {
|
||||
"login": "akr3ch",
|
||||
"id": 97300177,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300177?v=4",
|
||||
"html_url": "https:\/\/github.com\/akr3ch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/akr3ch\/CVE-2014-6271",
|
||||
"description": "ShellShock interactive-shell exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T07:30:31Z",
|
||||
"updated_at": "2022-04-02T07:33:11Z",
|
||||
"pushed_at": "2022-04-02T07:31:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2014-6271",
|
||||
"shellshock",
|
||||
"shellshock-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-04-02T04:25:34Z",
|
||||
"updated_at": "2022-04-02T08:22:56Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1312,
|
||||
"watchers_count": 1312,
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 291,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1312,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -137,5 +137,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 476996538,
|
||||
"name": "ActiveMQ_Crack",
|
||||
"full_name": "YutuSec\/ActiveMQ_Crack",
|
||||
"owner": {
|
||||
"login": "YutuSec",
|
||||
"id": 41934714,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41934714?v=4",
|
||||
"html_url": "https:\/\/github.com\/YutuSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YutuSec\/ActiveMQ_Crack",
|
||||
"description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T08:40:10Z",
|
||||
"updated_at": "2022-04-02T08:46:24Z",
|
||||
"pushed_at": "2022-04-02T08:55:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-04-02T04:25:34Z",
|
||||
"updated_at": "2022-04-02T08:22:56Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1312,
|
||||
"watchers_count": 1312,
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 291,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1312,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -87,12 +87,12 @@
|
|||
"pushed_at": "2021-11-08T02:19:03Z",
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"forks_count": 177,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"forks": 178,
|
||||
"watchers": 486,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-04-02T04:25:34Z",
|
||||
"updated_at": "2022-04-02T08:22:56Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1312,
|
||||
"watchers_count": 1312,
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 291,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1312,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2834,17 +2834,17 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T10:13:11Z",
|
||||
"updated_at": "2022-03-13T08:18:59Z",
|
||||
"updated_at": "2022-04-02T10:26:21Z",
|
||||
"pushed_at": "2020-07-07T15:28:13Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3036,33 +3036,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 324765199,
|
||||
"name": "CVE-2019-0708",
|
||||
"full_name": "sinlee1\/CVE-2019-0708",
|
||||
"owner": {
|
||||
"login": "sinlee1",
|
||||
"id": 29684167,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29684167?v=4",
|
||||
"html_url": "https:\/\/github.com\/sinlee1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sinlee1\/CVE-2019-0708",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-27T13:15:20Z",
|
||||
"updated_at": "2020-12-27T13:17:33Z",
|
||||
"pushed_at": "2020-12-27T13:17:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 330872202,
|
||||
"name": "CVE-2019-0708-EXP-Windows",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-04-02T00:08:50Z",
|
||||
"updated_at": "2022-04-02T08:09:31Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1711,
|
||||
"watchers_count": 1711,
|
||||
"stargazers_count": 1712,
|
||||
"watchers_count": 1712,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 261,
|
||||
"watchers": 1711,
|
||||
"watchers": 1712,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2022-03-14T01:35:47Z",
|
||||
"updated_at": "2022-04-02T09:19:46Z",
|
||||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -97,7 +97,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-04-02T03:53:13Z",
|
||||
"updated_at": "2022-04-02T06:26:52Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3236,
|
||||
"watchers_count": 3236,
|
||||
"stargazers_count": 3237,
|
||||
"watchers_count": 3237,
|
||||
"forks_count": 957,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 957,
|
||||
"watchers": 3236,
|
||||
"watchers": 3237,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2022-03-07T20:30:34Z",
|
||||
"updated_at": "2022-04-02T07:52:11Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 368,
|
||||
"watchers": 369,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-04-02T04:25:34Z",
|
||||
"updated_at": "2022-04-02T08:22:56Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1312,
|
||||
"watchers_count": 1312,
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 291,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1312,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-02-02T15:46:22Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2022-03-14T01:35:47Z",
|
||||
"updated_at": "2022-04-02T09:19:46Z",
|
||||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-03-31T07:03:22Z",
|
||||
"updated_at": "2022-04-02T11:07:11Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1435,
|
||||
"watchers_count": 1435,
|
||||
"stargazers_count": 1436,
|
||||
"watchers_count": 1436,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1435,
|
||||
"watchers": 1436,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -398,17 +398,17 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2022-03-13T03:57:13Z",
|
||||
"updated_at": "2022-04-02T06:27:28Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-04-02T03:53:13Z",
|
||||
"updated_at": "2022-04-02T06:26:52Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3236,
|
||||
"watchers_count": 3236,
|
||||
"stargazers_count": 3237,
|
||||
"watchers_count": 3237,
|
||||
"forks_count": 957,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 957,
|
||||
"watchers": 3236,
|
||||
"watchers": 3237,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -303,17 +303,17 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2022-04-01T08:34:50Z",
|
||||
"updated_at": "2022-04-02T07:26:35Z",
|
||||
"pushed_at": "2022-03-29T02:08:45Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 28,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 115,
|
||||
"forks": 29,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-04-01T15:38:51Z",
|
||||
"updated_at": "2022-04-02T11:53:21Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"stargazers_count": 934,
|
||||
"watchers_count": 934,
|
||||
"forks_count": 294,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 294,
|
||||
"watchers": 933,
|
||||
"watchers": 934,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -364,10 +364,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2022-03-27T02:41:23Z",
|
||||
"updated_at": "2022-04-02T09:00:45Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -380,7 +380,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 241,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-04-02T04:25:34Z",
|
||||
"updated_at": "2022-04-02T08:22:56Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1312,
|
||||
"watchers_count": 1312,
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 291,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1312,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -235,7 +235,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-07T10:59:36Z",
|
||||
"updated_at": "2022-02-07T12:49:21Z",
|
||||
"pushed_at": "2022-04-01T22:38:24Z",
|
||||
"pushed_at": "2022-04-02T08:55:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-04-01T15:38:51Z",
|
||||
"updated_at": "2022-04-02T11:53:21Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"stargazers_count": 934,
|
||||
"watchers_count": 934,
|
||||
"forks_count": 294,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 294,
|
||||
"watchers": 933,
|
||||
"watchers": 934,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-05-10T02:08:26Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2022-04-01T08:28:46Z",
|
||||
"updated_at": "2022-04-02T07:06:25Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-14T05:03:54Z",
|
||||
"updated_at": "2022-03-25T06:26:31Z",
|
||||
"updated_at": "2022-04-02T08:57:13Z",
|
||||
"pushed_at": "2022-03-14T05:07:01Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -130,17 +130,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2022-04-01T10:16:21Z",
|
||||
"updated_at": "2022-04-02T11:47:53Z",
|
||||
"pushed_at": "2022-02-11T15:22:20Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -188,12 +188,12 @@
|
|||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"forks": 32,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-01T18:07:42Z",
|
||||
"updated_at": "2022-04-01T18:47:44Z",
|
||||
"pushed_at": "2022-04-01T22:20:15Z",
|
||||
"pushed_at": "2022-04-02T11:58:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -3784,7 +3784,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-01T19:51:18Z",
|
||||
"updated_at": "2022-04-01T20:22:13Z",
|
||||
"pushed_at": "2022-04-01T20:56:05Z",
|
||||
"pushed_at": "2022-04-02T08:10:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T09:10:14Z",
|
||||
"updated_at": "2022-04-02T04:43:26Z",
|
||||
"pushed_at": "2022-04-01T18:04:15Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"updated_at": "2022-04-02T08:33:31Z",
|
||||
"pushed_at": "2022-04-02T07:12:17Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -421,14 +421,14 @@
|
|||
"pushed_at": "2022-02-24T12:04:51Z",
|
||||
"stargazers_count": 972,
|
||||
"watchers_count": 972,
|
||||
"forks_count": 431,
|
||||
"forks_count": 432,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 431,
|
||||
"forks": 432,
|
||||
"watchers": 972,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -9619,10 +9619,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2022-04-01T17:12:15Z",
|
||||
"updated_at": "2022-04-02T06:37:59Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -9634,7 +9634,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -179,7 +179,7 @@
|
|||
"pushed_at": "2021-12-31T08:30:33Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -187,7 +187,7 @@
|
|||
"cve-2021-45232"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-03-29T13:11:59Z",
|
||||
"updated_at": "2022-04-02T06:40:15Z",
|
||||
"pushed_at": "2022-03-16T06:48:01Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -368,12 +368,12 @@
|
|||
"pushed_at": "2022-03-08T13:15:35Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1101,17 +1101,17 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-04-01T14:01:17Z",
|
||||
"updated_at": "2022-04-02T08:39:09Z",
|
||||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 194,
|
||||
"watchers": 195,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1342,14 +1342,14 @@
|
|||
{
|
||||
"id": 470957000,
|
||||
"name": "CVE-2022-0847_DirtyPipe_Exploits",
|
||||
"full_name": "LP-H4cmilo\/CVE-2022-0847_DirtyPipe_Exploits",
|
||||
"full_name": "logm1lo\/CVE-2022-0847_DirtyPipe_Exploits",
|
||||
"owner": {
|
||||
"login": "LP-H4cmilo",
|
||||
"login": "logm1lo",
|
||||
"id": 55241926,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55241926?v=4",
|
||||
"html_url": "https:\/\/github.com\/LP-H4cmilo"
|
||||
"html_url": "https:\/\/github.com\/logm1lo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LP-H4cmilo\/CVE-2022-0847_DirtyPipe_Exploits",
|
||||
"html_url": "https:\/\/github.com\/logm1lo\/CVE-2022-0847_DirtyPipe_Exploits",
|
||||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-17T11:01:48Z",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2022-04-02T04:07:16Z",
|
||||
"updated_at": "2022-04-02T07:18:13Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 422,
|
||||
"watchers": 424,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:27:11Z",
|
||||
"updated_at": "2022-04-02T05:23:54Z",
|
||||
"updated_at": "2022-04-02T11:10:20Z",
|
||||
"pushed_at": "2022-04-02T05:23:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-04-01T03:55:33Z",
|
||||
"updated_at": "2022-04-02T09:56:09Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 551,
|
||||
"watchers_count": 551,
|
||||
"forks_count": 109,
|
||||
"stargazers_count": 552,
|
||||
"watchers_count": 552,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,8 +25,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 551,
|
||||
"forks": 108,
|
||||
"watchers": 552,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-22639.json
Normal file
29
2022/CVE-2022-22639.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 470871002,
|
||||
"name": "CVE-2022-22639",
|
||||
"full_name": "jhftss\/CVE-2022-22639",
|
||||
"owner": {
|
||||
"login": "jhftss",
|
||||
"id": 10210124,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10210124?v=4",
|
||||
"html_url": "https:\/\/github.com\/jhftss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jhftss\/CVE-2022-22639",
|
||||
"description": "Exploitation of CVE-2022-22639",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-17T06:16:54Z",
|
||||
"updated_at": "2022-04-02T11:53:39Z",
|
||||
"pushed_at": "2022-03-17T13:01:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-22963 PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T05:04:24Z",
|
||||
"updated_at": "2022-04-02T06:02:51Z",
|
||||
"updated_at": "2022-04-02T11:22:32Z",
|
||||
"pushed_at": "2022-03-30T06:01:04Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 82,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T11:36:42Z",
|
||||
"updated_at": "2022-03-31T01:34:21Z",
|
||||
"updated_at": "2022-04-02T09:12:27Z",
|
||||
"pushed_at": "2022-03-30T11:54:22Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -234,11 +234,11 @@
|
|||
"description": "This includes CVE-2022-22963, a Spring SpEL \/ Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc\/spring-webflux RCE termed \"SpringShell\".",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T20:19:51Z",
|
||||
"updated_at": "2022-04-01T08:51:18Z",
|
||||
"updated_at": "2022-04-02T07:04:29Z",
|
||||
"pushed_at": "2022-03-31T20:58:54Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -251,8 +251,8 @@
|
|||
"springshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/Information CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-04-02T05:46:30Z",
|
||||
"updated_at": "2022-04-02T12:01:27Z",
|
||||
"pushed_at": "2022-04-01T15:21:36Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 56,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -28,8 +28,8 @@
|
|||
"springshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 142,
|
||||
"forks": 58,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -46,11 +46,11 @@
|
|||
"description": "CVE-2022-22965 : about spring core rce",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T14:35:00Z",
|
||||
"updated_at": "2022-04-02T05:17:58Z",
|
||||
"updated_at": "2022-04-02T11:20:01Z",
|
||||
"pushed_at": "2022-04-01T15:34:03Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 11,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -60,8 +60,8 @@
|
|||
"spring-security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 30,
|
||||
"forks": 13,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -78,11 +78,11 @@
|
|||
"description": "Spring4Shell - Spring Core RCE - CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T17:05:46Z",
|
||||
"updated_at": "2022-04-02T05:33:50Z",
|
||||
"updated_at": "2022-04-02T07:44:26Z",
|
||||
"pushed_at": "2022-04-01T00:13:55Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 48,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -98,8 +98,8 @@
|
|||
"working-example"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 48,
|
||||
"forks": 49,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -116,17 +116,17 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2022-04-02T03:17:08Z",
|
||||
"updated_at": "2022-04-02T12:14:48Z",
|
||||
"pushed_at": "2022-04-02T01:10:43Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 103,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 108,
|
||||
"forks": 109,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -147,12 +147,12 @@
|
|||
"pushed_at": "2022-04-01T12:10:21Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -174,7 +174,7 @@
|
|||
"pushed_at": "2022-04-01T14:56:34Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -184,7 +184,7 @@
|
|||
"springshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -202,17 +202,17 @@
|
|||
"description": "spring框架RCE漏洞 CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T12:41:29Z",
|
||||
"updated_at": "2022-04-02T05:39:56Z",
|
||||
"updated_at": "2022-04-02T09:21:27Z",
|
||||
"pushed_at": "2022-04-02T03:50:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -233,12 +233,12 @@
|
|||
"pushed_at": "2022-04-01T10:58:04Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -314,17 +314,17 @@
|
|||
"description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T16:58:56Z",
|
||||
"updated_at": "2022-04-02T02:59:39Z",
|
||||
"updated_at": "2022-04-02T11:16:14Z",
|
||||
"pushed_at": "2022-03-31T17:17:31Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 25,
|
||||
"forks": 4,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -372,12 +372,12 @@
|
|||
"pushed_at": "2022-04-01T14:21:55Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -449,17 +449,17 @@
|
|||
"description": "SpringFramework 远程代码执行漏洞CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T04:51:44Z",
|
||||
"updated_at": "2022-04-01T14:47:01Z",
|
||||
"updated_at": "2022-04-02T10:36:36Z",
|
||||
"pushed_at": "2022-04-01T12:08:45Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 7,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -504,7 +504,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-01T06:50:21Z",
|
||||
"updated_at": "2022-04-02T02:04:24Z",
|
||||
"pushed_at": "2022-04-02T01:15:14Z",
|
||||
"pushed_at": "2022-04-02T07:35:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
|
@ -530,17 +530,17 @@
|
|||
"description": "批量无损检测",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T07:55:26Z",
|
||||
"updated_at": "2022-04-02T00:58:35Z",
|
||||
"updated_at": "2022-04-02T06:31:30Z",
|
||||
"pushed_at": "2022-04-01T08:44:19Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -639,7 +639,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-01T12:18:29Z",
|
||||
"updated_at": "2022-04-02T02:08:46Z",
|
||||
"pushed_at": "2022-04-01T12:26:55Z",
|
||||
"pushed_at": "2022-04-02T09:50:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
@ -665,17 +665,17 @@
|
|||
"description": "CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T13:46:55Z",
|
||||
"updated_at": "2022-04-02T02:09:57Z",
|
||||
"updated_at": "2022-04-02T11:31:12Z",
|
||||
"pushed_at": "2022-04-01T14:31:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -692,17 +692,44 @@
|
|||
"description": "CVE-2022-22965 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:17:48Z",
|
||||
"updated_at": "2022-04-02T03:46:43Z",
|
||||
"pushed_at": "2022-04-02T03:46:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2022-04-02T11:13:22Z",
|
||||
"pushed_at": "2022-04-02T08:45:17Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 477004407,
|
||||
"name": "CVE-2022-22965_Spring_Core_RCE",
|
||||
"full_name": "wjl110\/CVE-2022-22965_Spring_Core_RCE",
|
||||
"owner": {
|
||||
"login": "wjl110",
|
||||
"id": 53851034,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53851034?v=4",
|
||||
"html_url": "https:\/\/github.com\/wjl110"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wjl110\/CVE-2022-22965_Spring_Core_RCE",
|
||||
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T09:13:54Z",
|
||||
"updated_at": "2022-04-02T10:14:14Z",
|
||||
"pushed_at": "2022-04-02T10:14:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-24181.json
Normal file
29
2022/CVE-2022-24181.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 472668953,
|
||||
"name": "CVE-2022-24181",
|
||||
"full_name": "comrade99\/CVE-2022-24181",
|
||||
"owner": {
|
||||
"login": "comrade99",
|
||||
"id": 101915378,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101915378?v=4",
|
||||
"html_url": "https:\/\/github.com\/comrade99"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/comrade99\/CVE-2022-24181",
|
||||
"description": "XSS via Host Header injection and Steal Password Reset Token of another user",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-22T08:06:53Z",
|
||||
"updated_at": "2022-04-02T06:42:38Z",
|
||||
"pushed_at": "2022-04-02T06:25:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T09:59:01Z",
|
||||
"updated_at": "2022-03-31T16:33:55Z",
|
||||
"updated_at": "2022-04-02T10:22:37Z",
|
||||
"pushed_at": "2022-03-31T10:16:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2022-27666",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T22:54:28Z",
|
||||
"updated_at": "2022-04-02T06:13:31Z",
|
||||
"updated_at": "2022-04-02T10:45:35Z",
|
||||
"pushed_at": "2022-03-28T18:21:00Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 115,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
22
README.md
22
README.md
|
@ -157,7 +157,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847)
|
||||
- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker)
|
||||
- [LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits](https://github.com/LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits)
|
||||
- [logm1lo/CVE-2022-0847_DirtyPipe_Exploits](https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits)
|
||||
- [LudovicPatho/CVE-2022-0847](https://github.com/LudovicPatho/CVE-2022-0847)
|
||||
- [DanaEpp/pwncat_dirtypipe](https://github.com/DanaEpp/pwncat_dirtypipe)
|
||||
- [tmoneypenny/CVE-2022-0847](https://github.com/tmoneypenny/CVE-2022-0847)
|
||||
|
@ -355,6 +355,14 @@ The issue was addressed with improved permissions logic. This issue is fixed in
|
|||
|
||||
- [KlinKlinKlin/MSF-screenrecord-on-MacOS](https://github.com/KlinKlinKlin/MSF-screenrecord-on-MacOS)
|
||||
|
||||
### CVE-2022-22639 (2022-03-18)
|
||||
|
||||
<code>
|
||||
A logic issue was addressed with improved state management. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. An application may be able to gain elevated privileges.
|
||||
</code>
|
||||
|
||||
- [jhftss/CVE-2022-22639](https://github.com/jhftss/CVE-2022-22639)
|
||||
|
||||
### CVE-2022-22828 (2022-01-27)
|
||||
|
||||
<code>
|
||||
|
@ -515,6 +523,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [Joe1sn/CVE-2022-22965](https://github.com/Joe1sn/CVE-2022-22965)
|
||||
- [wshon/spring-framework-rce](https://github.com/wshon/spring-framework-rce)
|
||||
- [Wrin9/CVE-2022-22965](https://github.com/Wrin9/CVE-2022-22965)
|
||||
- [wjl110/CVE-2022-22965_Spring_Core_RCE](https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE)
|
||||
|
||||
### CVE-2022-23046 (2022-01-19)
|
||||
|
||||
|
@ -686,6 +695,14 @@ The matchmaking servers of Bandai Namco FromSoftware Dark Souls III through 2022
|
|||
|
||||
- [tremwil/ds3-nrssr-rce](https://github.com/tremwil/ds3-nrssr-rce)
|
||||
|
||||
### CVE-2022-24181 (2022-04-01)
|
||||
|
||||
<code>
|
||||
Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System 2.4.8 >= 3.3 allows remote attackers to inject arbitary code via the X-Forwarded-Host Header.
|
||||
</code>
|
||||
|
||||
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
|
||||
|
||||
### CVE-2022-24348 (2022-02-04)
|
||||
|
||||
<code>
|
||||
|
@ -10159,7 +10176,6 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
|
||||
- [GryllsAaron/CVE-2019-0708-POC](https://github.com/GryllsAaron/CVE-2019-0708-POC)
|
||||
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
|
||||
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
|
||||
- [Haruster/Haruster-CVE-2019-0708-Exploit](https://github.com/Haruster/Haruster-CVE-2019-0708-Exploit)
|
||||
- [SurrealSky/CVE20190708SCAN](https://github.com/SurrealSky/CVE20190708SCAN)
|
||||
|
@ -20038,6 +20054,7 @@ The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remot
|
|||
- [cyberaguiar/CVE-2016-3088](https://github.com/cyberaguiar/CVE-2016-3088)
|
||||
- [vonderchild/CVE-2016-3088](https://github.com/vonderchild/CVE-2016-3088)
|
||||
- [cl4ym0re/CVE-2016-3088](https://github.com/cl4ym0re/CVE-2016-3088)
|
||||
- [YutuSec/ActiveMQ_Crack](https://github.com/YutuSec/ActiveMQ_Crack)
|
||||
|
||||
### CVE-2016-3113 (2017-08-07)
|
||||
|
||||
|
@ -22366,6 +22383,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
|||
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
|
||||
- [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271)
|
||||
- [0bfxgh0st-secondary/ShellShock](https://github.com/0bfxgh0st-secondary/ShellShock)
|
||||
- [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271)
|
||||
|
||||
### CVE-2014-6287 (2014-10-07)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue