mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/06/17 00:15:53
This commit is contained in:
parent
6d96b06166
commit
7a931bb7e8
29 changed files with 161 additions and 114 deletions
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-06-09T11:51:26Z",
|
||||
"updated_at": "2022-06-16T20:16:01Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 320,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-10T21:13:54Z",
|
||||
"updated_at": "2022-06-06T17:04:33Z",
|
||||
"updated_at": "2022-06-16T20:16:00Z",
|
||||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 550,
|
||||
"watchers_count": 550,
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 550,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-06-09T11:51:26Z",
|
||||
"updated_at": "2022-06-16T20:16:01Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 320,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -99,7 +99,7 @@
|
|||
"description": "Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) BlueBorne - Proof of Concept - Unarmed\/Unweaponized - DoS (Crash) only",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-16T10:35:05Z",
|
||||
"updated_at": "2019-11-23T05:24:53Z",
|
||||
"updated_at": "2022-06-16T23:31:04Z",
|
||||
"pushed_at": "2018-02-11T18:25:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2022-06-09T16:30:58Z",
|
||||
"updated_at": "2022-06-16T23:28:13Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 548,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-19T16:50:39Z",
|
||||
"updated_at": "2022-06-04T15:03:36Z",
|
||||
"updated_at": "2022-06-16T20:33:20Z",
|
||||
"pushed_at": "2022-03-07T20:04:08Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 71,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"forks": 72,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2022-06-14T13:47:38Z",
|
||||
"updated_at": "2022-06-16T20:16:13Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"forks_count": 458,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 458,
|
||||
"watchers": 469,
|
||||
"watchers": 467,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2022-06-09T16:30:58Z",
|
||||
"updated_at": "2022-06-16T23:28:13Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 548,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -345,17 +345,17 @@
|
|||
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T14:25:09Z",
|
||||
"updated_at": "2022-06-14T21:50:51Z",
|
||||
"updated_at": "2022-06-16T20:33:07Z",
|
||||
"pushed_at": "2020-10-01T11:51:46Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-30T10:03:36Z",
|
||||
"updated_at": "2021-11-08T16:11:47Z",
|
||||
"updated_at": "2022-06-16T19:05:24Z",
|
||||
"pushed_at": "2020-05-05T23:33:21Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
|
@ -75,7 +75,7 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2022-04-02T09:19:46Z",
|
||||
"updated_at": "2022-06-16T19:05:39Z",
|
||||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2022-06-10T05:50:44Z",
|
||||
"updated_at": "2022-06-16T21:35:22Z",
|
||||
"pushed_at": "2021-12-23T16:29:43Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -264,10 +264,10 @@
|
|||
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-12T15:16:54Z",
|
||||
"updated_at": "2022-03-31T23:49:11Z",
|
||||
"updated_at": "2022-06-16T20:16:19Z",
|
||||
"pushed_at": "2020-01-17T22:01:20Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -280,7 +280,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 37,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-23T19:14:26Z",
|
||||
"updated_at": "2022-03-29T09:44:28Z",
|
||||
"pushed_at": "2022-06-13T18:22:48Z",
|
||||
"pushed_at": "2022-06-16T18:50:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-14T19:12:01Z",
|
||||
"updated_at": "2022-04-02T09:19:46Z",
|
||||
"updated_at": "2022-06-16T19:05:39Z",
|
||||
"pushed_at": "2020-05-05T23:34:04Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
|
|
|
@ -155,17 +155,17 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2022-06-13T02:15:41Z",
|
||||
"updated_at": "2022-06-16T21:42:38Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"stargazers_count": 435,
|
||||
"watchers_count": 435,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 125,
|
||||
"watchers": 434,
|
||||
"watchers": 435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2022-06-07T09:25:48Z",
|
||||
"updated_at": "2022-06-16T22:55:11Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -412,17 +412,17 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T18:57:30Z",
|
||||
"updated_at": "2022-06-15T12:01:14Z",
|
||||
"updated_at": "2022-06-16T21:35:01Z",
|
||||
"pushed_at": "2022-05-02T07:49:01Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -439,17 +439,17 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T05:53:45Z",
|
||||
"updated_at": "2022-06-07T13:15:00Z",
|
||||
"updated_at": "2022-06-16T21:35:31Z",
|
||||
"pushed_at": "2022-05-02T07:49:12Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -634,10 +634,10 @@
|
|||
"description": "CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T02:47:08Z",
|
||||
"updated_at": "2022-06-10T15:56:45Z",
|
||||
"updated_at": "2022-06-16T21:17:10Z",
|
||||
"pushed_at": "2022-03-09T02:47:32Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -646,7 +646,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 24,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:27:11Z",
|
||||
"updated_at": "2022-05-24T02:43:33Z",
|
||||
"updated_at": "2022-06-16T23:11:11Z",
|
||||
"pushed_at": "2022-04-03T01:36:45Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-06-15T19:59:18Z",
|
||||
"updated_at": "2022-06-16T21:43:39Z",
|
||||
"pushed_at": "2022-05-18T18:27:36Z",
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"forks_count": 89,
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -31,8 +31,8 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 89,
|
||||
"watchers": 279,
|
||||
"forks": 90,
|
||||
"watchers": 280,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-06-16T16:22:50Z",
|
||||
"updated_at": "2022-06-17T00:12:45Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 372,
|
||||
"watchers": 373,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-06-16T11:21:34Z",
|
||||
"updated_at": "2022-06-16T18:48:56Z",
|
||||
"pushed_at": "2022-06-14T07:01:40Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -574,10 +574,10 @@
|
|||
"description": "Simple Honeypot for Atlassian Confluence (CVE-2022-26134)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-06T15:44:24Z",
|
||||
"updated_at": "2022-06-16T08:48:47Z",
|
||||
"updated_at": "2022-06-16T19:25:28Z",
|
||||
"pushed_at": "2022-06-07T08:51:53Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -589,7 +589,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/Dylbin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dylbin\/flow_divert",
|
||||
"description": "CVE-2022-26757 discovered by @nedwill",
|
||||
"description": "Flow Divert Race Condition Bug (CVE-2022-26757) discovered by @nedwill",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-16T14:58:25Z",
|
||||
"updated_at": "2022-06-16T14:58:50Z",
|
||||
"updated_at": "2022-06-16T19:15:04Z",
|
||||
"pushed_at": "2022-06-16T15:00:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-29221 Proof of Concept Code",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T06:02:23Z",
|
||||
"updated_at": "2022-05-29T14:56:02Z",
|
||||
"updated_at": "2022-06-16T21:35:39Z",
|
||||
"pushed_at": "2022-05-25T07:11:59Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-30136.json
Normal file
29
2022/CVE-2022-30136.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 504308544,
|
||||
"name": "Cve-2022-30136-RCE",
|
||||
"full_name": "oturu\/Cve-2022-30136-RCE",
|
||||
"owner": {
|
||||
"login": "oturu",
|
||||
"id": 106835379,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
|
||||
"html_url": "https:\/\/github.com\/oturu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oturu\/Cve-2022-30136-RCE",
|
||||
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-16T21:16:53Z",
|
||||
"updated_at": "2022-06-16T21:37:59Z",
|
||||
"pushed_at": "2022-06-16T21:39:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-06-15T07:04:30Z",
|
||||
"updated_at": "2022-06-16T18:30:00Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 43,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -30,8 +30,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 117,
|
||||
"forks": 44,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -784,12 +784,12 @@
|
|||
"pushed_at": "2022-06-06T07:19:53Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 34,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1557,7 +1557,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-11T11:16:56Z",
|
||||
"updated_at": "2022-06-15T10:21:00Z",
|
||||
"pushed_at": "2022-06-15T10:04:39Z",
|
||||
"pushed_at": "2022-06-16T20:44:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -1584,7 +1584,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-12T11:48:22Z",
|
||||
"updated_at": "2022-06-15T10:20:20Z",
|
||||
"pushed_at": "2022-06-15T10:06:47Z",
|
||||
"pushed_at": "2022-06-16T20:59:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🍵 Gitea repository migration remote command execution exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-22T05:15:58Z",
|
||||
"updated_at": "2022-06-16T07:04:12Z",
|
||||
"updated_at": "2022-06-16T21:35:21Z",
|
||||
"pushed_at": "2022-05-26T11:32:21Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
28
README.md
28
README.md
|
@ -2109,6 +2109,14 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f
|
|||
- [SAJIDAMINE/CVE-2022-30075](https://github.com/SAJIDAMINE/CVE-2022-30075)
|
||||
- [trhacknon/CVE-2022-30075](https://github.com/trhacknon/CVE-2022-30075)
|
||||
|
||||
### CVE-2022-30136 (2022-06-15)
|
||||
|
||||
<code>
|
||||
Windows Network File System Remote Code Execution Vulnerability.
|
||||
</code>
|
||||
|
||||
- [oturu/Cve-2022-30136-RCE](https://github.com/oturu/Cve-2022-30136-RCE)
|
||||
|
||||
### CVE-2022-30190 (2022-06-01)
|
||||
|
||||
<code>
|
||||
|
@ -2298,7 +2306,7 @@ mailcow before 2022-05d allows a remote authenticated user to inject OS commands
|
|||
|
||||
- [ly1g3/Mailcow-CVE-2022-31245](https://github.com/ly1g3/Mailcow-CVE-2022-31245)
|
||||
|
||||
### CVE-2022-31294 (-)
|
||||
### CVE-2022-31294 (2022-06-16)
|
||||
|
||||
<code>
|
||||
An issue in the save_users() function of Online Discussion Forum Site 1 allows unauthenticated attackers to arbitrarily create or update user accounts.
|
||||
|
@ -2306,7 +2314,12 @@ An issue in the save_users() function of Online Discussion Forum Site 1 allows u
|
|||
|
||||
- [bigzooooz/CVE-2022-31294](https://github.com/bigzooooz/CVE-2022-31294)
|
||||
|
||||
### CVE-2022-31295
|
||||
### CVE-2022-31295 (2022-06-16)
|
||||
|
||||
<code>
|
||||
An issue in the delete_post() function of Online Discussion Forum Site 1 allows unauthenticated attackers to arbitrarily delete posts.
|
||||
</code>
|
||||
|
||||
- [bigzooooz/CVE-2022-31295](https://github.com/bigzooooz/CVE-2022-31295)
|
||||
|
||||
### CVE-2022-31296
|
||||
|
@ -2315,7 +2328,7 @@ An issue in the save_users() function of Online Discussion Forum Site 1 allows u
|
|||
### CVE-2022-31297
|
||||
- [bigzooooz/CVE-2022-31297](https://github.com/bigzooooz/CVE-2022-31297)
|
||||
|
||||
### CVE-2022-31298 (-)
|
||||
### CVE-2022-31298 (2022-06-16)
|
||||
|
||||
<code>
|
||||
A cross-site scripting vulnerability in the ads comment section of Haraj v3.7 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request.
|
||||
|
@ -2323,7 +2336,12 @@ A cross-site scripting vulnerability in the ads comment section of Haraj v3.7 al
|
|||
|
||||
- [bigzooooz/CVE-2022-31298](https://github.com/bigzooooz/CVE-2022-31298)
|
||||
|
||||
### CVE-2022-31299
|
||||
### CVE-2022-31299 (2022-06-16)
|
||||
|
||||
<code>
|
||||
Haraj v3.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the User Upgrade Form.
|
||||
</code>
|
||||
|
||||
- [bigzooooz/CVE-2022-31299](https://github.com/bigzooooz/CVE-2022-31299)
|
||||
|
||||
### CVE-2022-31300 (2022-06-16)
|
||||
|
@ -2334,7 +2352,7 @@ A cross-site scripting vulnerability in the DM Section component of Haraj v3.7 a
|
|||
|
||||
- [bigzooooz/CVE-2022-31300](https://github.com/bigzooooz/CVE-2022-31300)
|
||||
|
||||
### CVE-2022-31301 (-)
|
||||
### CVE-2022-31301 (2022-06-16)
|
||||
|
||||
<code>
|
||||
Haraj v3.7 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Post Ads component.
|
||||
|
|
Loading…
Reference in a new issue