mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/04/22 18:28:33
This commit is contained in:
parent
e6e5088621
commit
75d7d365cb
25 changed files with 169 additions and 100 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2015-1157 telnet server",
|
||||
"fork": false,
|
||||
"created_at": "2015-10-14T04:43:29Z",
|
||||
"updated_at": "2016-10-02T14:49:36Z",
|
||||
"updated_at": "2023-04-22T17:30:32Z",
|
||||
"pushed_at": "2015-10-28T04:49:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-10T21:13:54Z",
|
||||
"updated_at": "2023-03-14T19:59:25Z",
|
||||
"updated_at": "2023-04-22T15:38:54Z",
|
||||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"has_discussions": false,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 177,
|
||||
"watchers": 546,
|
||||
"watchers": 547,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1832,13 +1832,13 @@
|
|||
"stargazers_count": 1136,
|
||||
"watchers_count": 1136,
|
||||
"has_discussions": false,
|
||||
"forks_count": 355,
|
||||
"forks_count": 354,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"forks": 354,
|
||||
"watchers": 1136,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2023-03-18T17:14:43Z",
|
||||
"updated_at": "2023-04-22T13:23:16Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 170,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -79,7 +79,7 @@
|
|||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"forks": 64,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2023-04-05T09:34:43Z",
|
||||
"updated_at": "2023-04-22T15:39:57Z",
|
||||
"pushed_at": "2021-08-16T18:16:20Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -42,7 +42,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2022-11-09T18:09:49Z",
|
||||
"updated_at": "2023-04-22T16:30:44Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 183,
|
||||
"watchers": 184,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,7 +43,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-20T06:00:13Z",
|
||||
"updated_at": "2023-04-20T06:01:06Z",
|
||||
"pushed_at": "2023-04-20T06:03:46Z",
|
||||
"pushed_at": "2023-04-22T14:18:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -778,10 +778,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-04-22T10:02:09Z",
|
||||
"updated_at": "2023-04-22T14:04:39Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 880,
|
||||
"watchers_count": 880,
|
||||
"stargazers_count": 881,
|
||||
"watchers_count": 881,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -797,7 +797,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 880,
|
||||
"watchers": 881,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1919,10 +1919,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2023-04-22T09:27:30Z",
|
||||
"updated_at": "2023-04-22T13:55:38Z",
|
||||
"pushed_at": "2023-01-12T19:23:29Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -1931,7 +1931,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 332,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2023-04-21T14:21:45Z",
|
||||
"updated_at": "2023-04-22T14:33:42Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1025,
|
||||
"watchers_count": 1025,
|
||||
"stargazers_count": 1026,
|
||||
"watchers_count": 1026,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"watchers": 1025,
|
||||
"watchers": 1026,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -361,10 +361,10 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2023-04-04T14:09:54Z",
|
||||
"updated_at": "2023-04-22T14:34:38Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -373,7 +373,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -564,10 +564,10 @@
|
|||
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:13:24Z",
|
||||
"updated_at": "2023-04-06T07:35:34Z",
|
||||
"updated_at": "2023-04-22T14:34:30Z",
|
||||
"pushed_at": "2022-03-18T09:32:30Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -576,7 +576,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -885,10 +885,10 @@
|
|||
"description": "Container Excape PoC for CVE-2022-0847 \"DirtyPipe\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T19:38:44Z",
|
||||
"updated_at": "2023-01-28T01:26:56Z",
|
||||
"updated_at": "2023-04-22T14:34:47Z",
|
||||
"pushed_at": "2022-04-20T20:23:36Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -897,7 +897,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1088,10 +1088,10 @@
|
|||
"description": "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T08:22:56Z",
|
||||
"updated_at": "2023-01-04T09:54:14Z",
|
||||
"updated_at": "2023-04-22T14:34:51Z",
|
||||
"pushed_at": "2022-03-23T22:46:58Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -1100,7 +1100,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-04-21T15:37:42Z",
|
||||
"updated_at": "2023-04-22T14:34:01Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 393,
|
||||
"watchers_count": 393,
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 393,
|
||||
"watchers": 394,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -85,5 +85,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 631257182,
|
||||
"name": "cve-2022-1609-exploit",
|
||||
"full_name": "realsiao\/cve-2022-1609-exploit",
|
||||
"owner": {
|
||||
"login": "realsiao",
|
||||
"id": 119853210,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119853210?v=4",
|
||||
"html_url": "https:\/\/github.com\/realsiao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/realsiao\/cve-2022-1609-exploit",
|
||||
"description": "Exploit for CVE-2022-1609 WordPress Weblizar Backdoor.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-22T12:51:09Z",
|
||||
"updated_at": "2023-04-22T12:51:42Z",
|
||||
"pushed_at": "2023-04-22T12:51:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Hotel Druid 3.0.3 Code Injection to Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-17T17:18:02Z",
|
||||
"updated_at": "2023-04-14T16:51:33Z",
|
||||
"updated_at": "2023-04-22T17:50:35Z",
|
||||
"pushed_at": "2022-10-31T16:28:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -709,10 +709,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-04-22T10:02:09Z",
|
||||
"updated_at": "2023-04-22T14:04:39Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 880,
|
||||
"watchers_count": 880,
|
||||
"stargazers_count": 881,
|
||||
"watchers_count": 881,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -728,7 +728,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 880,
|
||||
"watchers": 881,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2023-04-22T12:02:27Z",
|
||||
"updated_at": "2023-04-22T17:07:42Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"has_discussions": false,
|
||||
"forks_count": 91,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"watchers": 346,
|
||||
"watchers": 347,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-36946 linux kernel panic in netfilter_queue",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-28T11:22:13Z",
|
||||
"updated_at": "2023-03-20T03:42:39Z",
|
||||
"updated_at": "2023-04-22T14:31:39Z",
|
||||
"pushed_at": "2023-04-08T15:43:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-09T14:15:30Z",
|
||||
"updated_at": "2023-04-12T12:07:32Z",
|
||||
"updated_at": "2023-04-22T16:43:06Z",
|
||||
"pushed_at": "2022-12-05T23:36:42Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Windows LPE exploit for CVE-2022-37969",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T21:17:44Z",
|
||||
"updated_at": "2023-04-21T23:30:28Z",
|
||||
"updated_at": "2023-04-22T16:49:53Z",
|
||||
"pushed_at": "2023-04-03T17:47:07Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-04-21T14:45:19Z",
|
||||
"updated_at": "2023-04-22T14:41:59Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 231,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-04-14T16:51:38Z",
|
||||
"updated_at": "2023-04-22T16:16:30Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 343,
|
||||
"watchers": 344,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -615,10 +615,10 @@
|
|||
"description": "Perform with Dork Scanner and Massive with Joomla 4.2.8",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-09T13:20:48Z",
|
||||
"updated_at": "2023-04-22T05:31:44Z",
|
||||
"updated_at": "2023-04-22T15:54:17Z",
|
||||
"pushed_at": "2023-04-22T10:33:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -627,7 +627,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-18T21:47:47Z",
|
||||
"updated_at": "2023-04-21T14:19:58Z",
|
||||
"updated_at": "2023-04-22T16:02:41Z",
|
||||
"pushed_at": "2023-04-21T14:22:41Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-21T09:19:13Z",
|
||||
"updated_at": "2023-04-21T10:49:25Z",
|
||||
"pushed_at": "2023-04-21T11:03:29Z",
|
||||
"pushed_at": "2023-04-22T14:47:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
31
2023/CVE-2023-30458.json
Normal file
31
2023/CVE-2023-30458.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 628370385,
|
||||
"name": "CVE-2023-30458",
|
||||
"full_name": "d34dun1c02n\/CVE-2023-30458",
|
||||
"owner": {
|
||||
"login": "d34dun1c02n",
|
||||
"id": 16107315,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16107315?v=4",
|
||||
"html_url": "https:\/\/github.com\/d34dun1c02n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d34dun1c02n\/CVE-2023-30458",
|
||||
"description": "Area to show CVE's I have discovered along with PoC code when I have the time. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-15T18:27:42Z",
|
||||
"updated_at": "2023-04-22T18:23:05Z",
|
||||
"pushed_at": "2023-04-22T18:21:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
13
README.md
13
README.md
|
@ -863,6 +863,9 @@ Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to
|
|||
|
||||
- [ohnonoyesyes/CVE-2023-29084](https://github.com/ohnonoyesyes/CVE-2023-29084)
|
||||
|
||||
### CVE-2023-30458
|
||||
- [d34dun1c02n/CVE-2023-30458](https://github.com/d34dun1c02n/CVE-2023-30458)
|
||||
|
||||
### CVE-2023-30459 (2023-04-14)
|
||||
|
||||
<code>
|
||||
|
@ -1451,6 +1454,7 @@ The WPQA Builder WordPress plugin before 5.4 which is a companion to the Discy a
|
|||
- [savior-only/CVE-2022-1609](https://github.com/savior-only/CVE-2022-1609)
|
||||
- [0xSojalSec/CVE-2022-1609](https://github.com/0xSojalSec/CVE-2022-1609)
|
||||
- [0xSojalSec/-CVE-2022-1609](https://github.com/0xSojalSec/-CVE-2022-1609)
|
||||
- [realsiao/cve-2022-1609-exploit](https://github.com/realsiao/cve-2022-1609-exploit)
|
||||
|
||||
### CVE-2022-1679 (2022-05-16)
|
||||
|
||||
|
@ -1763,7 +1767,12 @@ THe WCFM Membership plugin for WordPress is vulnerable to privilege escalation i
|
|||
|
||||
- [BaconCriCRi/PoC-CVE-2022-4939-](https://github.com/BaconCriCRi/PoC-CVE-2022-4939-)
|
||||
|
||||
### CVE-2022-4944
|
||||
### CVE-2022-4944 (-)
|
||||
|
||||
<code>
|
||||
Eine problematische Schwachstelle wurde in kalcaddle KodExplorer bis 4.49 entdeckt. Davon betroffen ist unbekannter Code. Durch Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.50 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
|
||||
</code>
|
||||
|
||||
- [MrEmpy/CVE-2022-4944](https://github.com/MrEmpy/CVE-2022-4944)
|
||||
|
||||
### CVE-2022-5561
|
||||
|
@ -7126,7 +7135,7 @@ Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through
|
|||
### CVE-2022-48150 (2023-04-21)
|
||||
|
||||
<code>
|
||||
Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability.
|
||||
Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI.
|
||||
</code>
|
||||
|
||||
- [sahilop123/-CVE-2022-48150](https://github.com/sahilop123/-CVE-2022-48150)
|
||||
|
|
Loading…
Reference in a new issue