mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/03/06 06:14:14
This commit is contained in:
parent
641c734a0e
commit
75fe78c2ef
31 changed files with 124 additions and 261 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
|
||||
"fork": false,
|
||||
"created_at": "2014-06-12T04:44:13Z",
|
||||
"updated_at": "2021-07-19T01:55:06Z",
|
||||
"updated_at": "2022-03-06T03:23:13Z",
|
||||
"pushed_at": "2014-07-24T20:47:27Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-02-17T21:04:44Z",
|
||||
"updated_at": "2022-03-06T02:27:34Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 316,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-02-17T21:04:44Z",
|
||||
"updated_at": "2022-03-06T02:27:34Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 316,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2022-03-05T06:44:23Z",
|
||||
"updated_at": "2022-03-06T02:16:11Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 671,
|
||||
"watchers_count": 671,
|
||||
"stargazers_count": 672,
|
||||
"watchers_count": 672,
|
||||
"forks_count": 294,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 294,
|
||||
"watchers": 671,
|
||||
"watchers": 672,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -429,17 +429,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-02-23T01:48:08Z",
|
||||
"updated_at": "2022-03-06T03:18:30Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 317,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-01T14:04:58Z",
|
||||
"updated_at": "2021-05-04T04:23:05Z",
|
||||
"pushed_at": "2021-05-04T04:23:04Z",
|
||||
"updated_at": "2022-03-06T05:15:35Z",
|
||||
"pushed_at": "2022-03-06T05:15:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-27T21:06:08Z",
|
||||
"updated_at": "2022-03-04T20:59:30Z",
|
||||
"updated_at": "2022-03-06T01:51:18Z",
|
||||
"pushed_at": "2017-07-27T21:08:49Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,32 +25,5 @@
|
|||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 365731888,
|
||||
"name": "CVE-2018-8060",
|
||||
"full_name": "Crystalware\/CVE-2018-8060",
|
||||
"owner": {
|
||||
"login": "Crystalware",
|
||||
"id": 49976592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
|
||||
"html_url": "https:\/\/github.com\/Crystalware"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2018-8060",
|
||||
"description": "Proof of concept for the HWiNFO AMD64 Null Pointer Dereference vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-09T11:04:59Z",
|
||||
"updated_at": "2021-05-09T11:07:53Z",
|
||||
"pushed_at": "2021-05-09T11:07:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,37 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 295028706,
|
||||
"name": "CVE-2019-13600",
|
||||
"full_name": "Crystalware\/CVE-2019-13600",
|
||||
"owner": {
|
||||
"login": "Crystalware",
|
||||
"id": 49976592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
|
||||
"html_url": "https:\/\/github.com\/Crystalware"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2019-13600",
|
||||
"description": "My first zero day.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-12T21:25:14Z",
|
||||
"updated_at": "2021-09-05T04:14:43Z",
|
||||
"pushed_at": "2021-07-10T22:54:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"binary",
|
||||
"c",
|
||||
"cve-2019-13600",
|
||||
"exploit",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3195,
|
||||
"watchers_count": 3195,
|
||||
"forks_count": 948,
|
||||
"forks_count": 947,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,7 +69,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 948,
|
||||
"forks": 947,
|
||||
"watchers": 3195,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-02-23T01:48:08Z",
|
||||
"updated_at": "2022-03-06T03:18:30Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 317,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -222,17 +222,17 @@
|
|||
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T23:00:00Z",
|
||||
"updated_at": "2022-01-24T21:03:40Z",
|
||||
"updated_at": "2022-03-06T03:42:04Z",
|
||||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 233,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3195,
|
||||
"watchers_count": 3195,
|
||||
"forks_count": 948,
|
||||
"forks_count": 947,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,7 +42,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 948,
|
||||
"forks": 947,
|
||||
"watchers": 3195,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 365756839,
|
||||
"name": "CVE-2020-14979",
|
||||
"full_name": "Crystalware\/CVE-2020-14979",
|
||||
"owner": {
|
||||
"login": "Crystalware",
|
||||
"id": 49976592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
|
||||
"html_url": "https:\/\/github.com\/Crystalware"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2020-14979",
|
||||
"description": "Exploit proof of concept for EVGA's WinRing0 device driver.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-09T13:16:03Z",
|
||||
"updated_at": "2021-09-08T14:02:47Z",
|
||||
"pushed_at": "2021-06-21T01:53:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 390601262,
|
||||
"name": "CVE-2020-9014",
|
||||
"full_name": "Crystalware\/CVE-2020-9014",
|
||||
"owner": {
|
||||
"login": "Crystalware",
|
||||
"id": 49976592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
|
||||
"html_url": "https:\/\/github.com\/Crystalware"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2020-9014",
|
||||
"description": "Proof of concept code for CVE-2020-9014",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T04:37:09Z",
|
||||
"updated_at": "2021-07-29T04:51:30Z",
|
||||
"pushed_at": "2021-07-29T04:51:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-01-16T04:17:08Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 46,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"forks": 47,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2022-02-07T12:09:15Z",
|
||||
"updated_at": "2022-03-06T04:57:33Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"forks_count": 44,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 177,
|
||||
"forks": 45,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,29 +42,29 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390672212,
|
||||
"id": 423304617,
|
||||
"name": "CVE-2021-27965",
|
||||
"full_name": "Crystalware\/CVE-2021-27965",
|
||||
"full_name": "Jeromeyoung\/CVE-2021-27965",
|
||||
"owner": {
|
||||
"login": "Crystalware",
|
||||
"id": 49976592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
|
||||
"html_url": "https:\/\/github.com\/Crystalware"
|
||||
"login": "Jeromeyoung",
|
||||
"id": 39945364,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jeromeyoung"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2021-27965",
|
||||
"html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-27965",
|
||||
"description": "Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T09:32:56Z",
|
||||
"updated_at": "2021-10-31T02:39:44Z",
|
||||
"created_at": "2021-11-01T01:41:37Z",
|
||||
"updated_at": "2021-11-01T01:41:37Z",
|
||||
"pushed_at": "2021-10-31T02:39:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -52,12 +52,12 @@
|
|||
"pushed_at": "2021-06-02T14:54:14Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T12:41:03Z",
|
||||
"updated_at": "2022-03-05T22:36:34Z",
|
||||
"updated_at": "2022-03-06T01:45:04Z",
|
||||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 190,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -726,17 +726,17 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2022-03-05T03:59:08Z",
|
||||
"updated_at": "2022-03-06T02:12:05Z",
|
||||
"pushed_at": "2022-02-13T12:21:53Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 44,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"forks": 45,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -106,17 +106,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-03-05T11:59:55Z",
|
||||
"updated_at": "2022-03-06T01:02:09Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1378,
|
||||
"watchers_count": 1378,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 394,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 394,
|
||||
"watchers": 1378,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -908,10 +908,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-03-05T18:37:28Z",
|
||||
"updated_at": "2022-03-06T01:14:12Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -920,7 +920,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 445,
|
||||
"watchers": 447,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3154,7 +3154,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-14T22:09:44Z",
|
||||
"updated_at": "2022-03-02T19:20:59Z",
|
||||
"pushed_at": "2022-03-04T20:45:04Z",
|
||||
"pushed_at": "2022-03-06T05:46:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -354,17 +354,17 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-03-05T10:48:51Z",
|
||||
"updated_at": "2022-03-06T05:54:27Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1972,12 +1972,12 @@
|
|||
"pushed_at": "2021-12-11T10:39:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 37,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3208,17 +3208,17 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2022-03-02T06:30:38Z",
|
||||
"updated_at": "2022-03-06T03:42:40Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 321,
|
||||
"watchers": 320,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3552,12 +3552,12 @@
|
|||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2768,
|
||||
"watchers_count": 2768,
|
||||
"forks_count": 671,
|
||||
"forks_count": 672,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 671,
|
||||
"forks": 672,
|
||||
"watchers": 2768,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -5422,10 +5422,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2022-03-02T03:30:20Z",
|
||||
"updated_at": "2022-03-06T00:38:15Z",
|
||||
"pushed_at": "2022-01-27T16:08:20Z",
|
||||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"forks_count": 89,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5441,7 +5441,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 89,
|
||||
"watchers": 406,
|
||||
"watchers": 407,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-28T01:25:26Z",
|
||||
"updated_at": "2022-03-05T19:14:43Z",
|
||||
"updated_at": "2022-03-06T06:01:46Z",
|
||||
"pushed_at": "2022-02-28T01:25:57Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,17 +10,22 @@
|
|||
"html_url": "https:\/\/github.com\/faisalfs10x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x\/Webmin-CVE-2022-0824-revshell",
|
||||
"description": "Webmin CVE-2022-0824 Reverse Shell",
|
||||
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-06T00:03:31Z",
|
||||
"updated_at": "2022-03-06T00:06:58Z",
|
||||
"pushed_at": "2022-03-06T00:06:55Z",
|
||||
"updated_at": "2022-03-06T06:15:29Z",
|
||||
"pushed_at": "2022-03-06T00:36:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve",
|
||||
"exploit",
|
||||
"proof-of-concept",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-03-05T08:02:05Z",
|
||||
"updated_at": "2022-03-06T05:58:52Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 195,
|
||||
"watchers": 196,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-03-05T08:59:41Z",
|
||||
"updated_at": "2022-03-06T01:03:22Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"stargazers_count": 475,
|
||||
"watchers_count": 475,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 474,
|
||||
"watchers": 475,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2022-03-05T14:33:14Z",
|
||||
"updated_at": "2022-03-06T05:21:32Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 140,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -339,17 +339,17 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-03-05T10:48:51Z",
|
||||
"updated_at": "2022-03-06T05:54:27Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
22
README.md
22
README.md
|
@ -2169,7 +2169,7 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
|
|||
</code>
|
||||
|
||||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
|
||||
- [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965)
|
||||
|
||||
### CVE-2021-28079 (2021-04-26)
|
||||
|
||||
|
@ -6337,14 +6337,6 @@ Stored Cross-site scripting (XSS) vulnerability in Blackboard Learn/PeopleTool v
|
|||
|
||||
- [kyletimmermans/blackboard-xss](https://github.com/kyletimmermans/blackboard-xss)
|
||||
|
||||
### CVE-2020-9014 (2021-02-05)
|
||||
|
||||
<code>
|
||||
In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to cause a denial of service (BSOD) via crafted input to the virtual audio device driver with IOCTL 0x9C402402, 0x9C402406, or 0x9C40240A. \Device\EMPNSAUIO and \DosDevices\EMPNSAU are similarly affected.
|
||||
</code>
|
||||
|
||||
- [Crystalware/CVE-2020-9014](https://github.com/Crystalware/CVE-2020-9014)
|
||||
|
||||
### CVE-2020-9038 (2020-02-17)
|
||||
|
||||
<code>
|
||||
|
@ -7657,14 +7649,6 @@ On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to th
|
|||
|
||||
- [g-rubert/CVE-2020-14965](https://github.com/g-rubert/CVE-2020-14965)
|
||||
|
||||
### CVE-2020-14979 (2020-08-11)
|
||||
|
||||
<code>
|
||||
The WinRing0.sys and WinRing0x64.sys drivers 1.2.0 in EVGA Precision X1 through 1.0.6 allow local users, including low integrity processes, to read and write to arbitrary memory locations. This allows any user to gain NT AUTHORITY\SYSTEM privileges by mapping \Device\PhysicalMemory into the calling process.
|
||||
</code>
|
||||
|
||||
- [Crystalware/CVE-2020-14979](https://github.com/Crystalware/CVE-2020-14979)
|
||||
|
||||
### CVE-2020-15002 (2020-10-23)
|
||||
|
||||
<code>
|
||||
|
@ -11893,9 +11877,6 @@ In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image f
|
|||
|
||||
- [masahiro331/CVE-2019-13574](https://github.com/masahiro331/CVE-2019-13574)
|
||||
|
||||
### CVE-2019-13600
|
||||
- [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600)
|
||||
|
||||
### CVE-2019-13633 (2020-10-19)
|
||||
|
||||
<code>
|
||||
|
@ -14508,7 +14489,6 @@ HWiNFO AMD64 Kernel driver version 8.98 and lower allows an unprivileged user to
|
|||
</code>
|
||||
|
||||
- [otavioarj/SIOCtl](https://github.com/otavioarj/SIOCtl)
|
||||
- [Crystalware/CVE-2018-8060](https://github.com/Crystalware/CVE-2018-8060)
|
||||
|
||||
### CVE-2018-8065 (2018-03-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue