mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/03/11 12:14:28
This commit is contained in:
parent
dec4638eb3
commit
80bd20debc
39 changed files with 317 additions and 219 deletions
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-03-05T21:52:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -33,7 +33,7 @@
|
|||
"vulnerable-server"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -67,7 +67,7 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2022-03-10T02:59:56Z",
|
||||
"updated_at": "2022-03-11T10:15:39Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 897,
|
||||
"watchers_count": 897,
|
||||
|
@ -1065,17 +1065,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-03-11T04:35:59Z",
|
||||
"updated_at": "2022-03-11T11:47:04Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 36,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 116,
|
||||
"forks": 37,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -429,17 +429,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-03-11T05:48:10Z",
|
||||
"updated_at": "2022-03-11T11:08:22Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 320,
|
||||
"watchers": 321,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2018/CVE-2018-1263.json
Normal file
29
2018/CVE-2018-1263.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 468735837,
|
||||
"name": "CVE-2018-1263-Demo",
|
||||
"full_name": "sakib570\/CVE-2018-1263-Demo",
|
||||
"owner": {
|
||||
"login": "sakib570",
|
||||
"id": 6813201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6813201?v=4",
|
||||
"html_url": "https:\/\/github.com\/sakib570"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sakib570\/CVE-2018-1263-Demo",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T12:07:16Z",
|
||||
"updated_at": "2022-03-11T12:07:16Z",
|
||||
"pushed_at": "2022-03-11T12:07:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2018-10-26T17:54:54Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 50,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"forks": 51,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2018-11-06T10:10:31Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,7 +26,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2022-02-13T00:28:55Z",
|
||||
"updated_at": "2022-03-11T06:35:26Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"forks_count": 205,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -54,7 +54,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 205,
|
||||
"watchers": 473,
|
||||
"watchers": 474,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-03-05T16:43:16Z",
|
||||
"updated_at": "2022-03-11T06:50:16Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1701,
|
||||
"watchers_count": 1701,
|
||||
"stargazers_count": 1702,
|
||||
"watchers_count": 1702,
|
||||
"forks_count": 255,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 255,
|
||||
"watchers": 1701,
|
||||
"watchers": 1702,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-03-11T05:48:10Z",
|
||||
"updated_at": "2022-03-11T11:08:22Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 320,
|
||||
"watchers": 321,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 609,
|
||||
"watchers_count": 609,
|
||||
"forks_count": 158,
|
||||
"forks_count": 159,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"forks": 159,
|
||||
"watchers": 609,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1366,17 +1366,17 @@
|
|||
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T09:09:02Z",
|
||||
"updated_at": "2021-11-19T02:08:12Z",
|
||||
"updated_at": "2022-03-11T09:59:14Z",
|
||||
"pushed_at": "2020-06-05T16:21:55Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 12,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2022-03-07T07:55:18Z",
|
||||
"updated_at": "2022-03-11T07:37:57Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -138,7 +138,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -303,17 +303,17 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2022-02-27T11:07:58Z",
|
||||
"updated_at": "2022-03-11T08:39:16Z",
|
||||
"pushed_at": "2020-12-01T05:08:41Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-36188 &&Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T06:29:38Z",
|
||||
"updated_at": "2022-01-09T23:42:39Z",
|
||||
"updated_at": "2022-03-11T08:06:41Z",
|
||||
"pushed_at": "2021-01-11T06:29:59Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -207,17 +207,17 @@
|
|||
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T17:28:56Z",
|
||||
"updated_at": "2021-12-28T12:54:32Z",
|
||||
"updated_at": "2022-03-11T10:24:30Z",
|
||||
"pushed_at": "2022-01-20T18:36:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2022-03-10T03:08:51Z",
|
||||
"updated_at": "2022-03-11T07:54:55Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"forks_count": 112,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 369,
|
||||
"forks": 113,
|
||||
"watchers": 371,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2022-02-21T02:58:06Z",
|
||||
"updated_at": "2022-03-11T11:54:11Z",
|
||||
"pushed_at": "2022-01-16T04:17:08Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-04-22T14:04:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-29T15:00:00Z",
|
||||
"updated_at": "2022-02-18T08:21:56Z",
|
||||
"pushed_at": "2022-02-18T08:22:36Z",
|
||||
"pushed_at": "2022-03-11T10:44:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -106,17 +106,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-03-11T02:04:45Z",
|
||||
"updated_at": "2022-03-11T10:18:20Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1398,
|
||||
"watchers_count": 1398,
|
||||
"forks_count": 407,
|
||||
"stargazers_count": 1400,
|
||||
"watchers_count": 1400,
|
||||
"forks_count": 408,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 407,
|
||||
"watchers": 1398,
|
||||
"forks": 408,
|
||||
"watchers": 1400,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1822,7 +1822,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-03-08T20:48:21Z",
|
||||
"pushed_at": "2022-03-04T14:44:49Z",
|
||||
"pushed_at": "2022-03-11T09:49:22Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-03-09T06:55:38Z",
|
||||
"updated_at": "2022-03-11T10:26:21Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1382,
|
||||
"watchers_count": 1382,
|
||||
"stargazers_count": 1383,
|
||||
"watchers_count": 1383,
|
||||
"forks_count": 453,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 453,
|
||||
"watchers": 1382,
|
||||
"watchers": 1383,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -300,5 +300,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 468638331,
|
||||
"name": "CVE-2021-41277",
|
||||
"full_name": "Chen-ling-afk\/CVE-2021-41277",
|
||||
"owner": {
|
||||
"login": "Chen-ling-afk",
|
||||
"id": 76235286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76235286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chen-ling-afk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chen-ling-afk\/CVE-2021-41277",
|
||||
"description": "MetaBase 任意文件读取",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T06:39:38Z",
|
||||
"updated_at": "2022-03-11T07:35:31Z",
|
||||
"pushed_at": "2022-03-11T07:48:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 411250558,
|
||||
"name": "CVE-2021-41822",
|
||||
"full_name": "badboycxcc\/CVE-2021-41822",
|
||||
"owner": {
|
||||
"login": "badboycxcc",
|
||||
"id": 72059221,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4",
|
||||
"html_url": "https:\/\/github.com\/badboycxcc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/badboycxcc\/CVE-2021-41822",
|
||||
"description": "个人CVE",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-28T11:17:41Z",
|
||||
"updated_at": "2021-11-03T03:53:59Z",
|
||||
"pushed_at": "2021-10-20T10:15:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -354,17 +354,17 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-03-11T03:52:23Z",
|
||||
"updated_at": "2022-03-11T09:51:44Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Windows Common Log File System Driver POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T01:51:41Z",
|
||||
"updated_at": "2022-03-10T03:09:07Z",
|
||||
"updated_at": "2022-03-11T07:33:01Z",
|
||||
"pushed_at": "2021-12-21T06:57:06Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 23,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 76,
|
||||
"forks": 25,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -417,10 +417,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2022-03-09T12:49:02Z",
|
||||
"updated_at": "2022-03-11T09:26:10Z",
|
||||
"pushed_at": "2022-02-24T12:04:51Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"stargazers_count": 962,
|
||||
"watchers_count": 962,
|
||||
"forks_count": 400,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -429,7 +429,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 400,
|
||||
"watchers": 960,
|
||||
"watchers": 962,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-03-10T20:51:36Z",
|
||||
"updated_at": "2022-03-11T09:45:18Z",
|
||||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1268,
|
||||
"watchers_count": 1268,
|
||||
"stargazers_count": 1269,
|
||||
"watchers_count": 1269,
|
||||
"forks_count": 346,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 346,
|
||||
"watchers": 1268,
|
||||
"watchers": 1269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -10598,7 +10598,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-12T11:19:41Z",
|
||||
"updated_at": "2022-03-07T10:11:58Z",
|
||||
"pushed_at": "2022-03-07T10:11:54Z",
|
||||
"pushed_at": "2022-03-11T11:58:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -79,5 +79,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 468660841,
|
||||
"name": "CVE-2022-0492",
|
||||
"full_name": "chenaotian\/CVE-2022-0492",
|
||||
"owner": {
|
||||
"login": "chenaotian",
|
||||
"id": 86546351,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
|
||||
"html_url": "https:\/\/github.com\/chenaotian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-0492",
|
||||
"description": "CVE-2022-0492 EXP and Analysis write up",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T08:02:46Z",
|
||||
"updated_at": "2022-03-11T08:06:36Z",
|
||||
"pushed_at": "2022-03-11T09:33:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-03-11T04:35:59Z",
|
||||
"updated_at": "2022-03-11T11:47:04Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 36,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 116,
|
||||
"forks": 37,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,17 +121,17 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-03-11T06:14:40Z",
|
||||
"updated_at": "2022-03-11T10:04:16Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 736,
|
||||
"watchers_count": 736,
|
||||
"forks_count": 141,
|
||||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"forks_count": 145,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 736,
|
||||
"forks": 145,
|
||||
"watchers": 768,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -337,17 +337,17 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2022-03-10T22:39:01Z",
|
||||
"updated_at": "2022-03-11T09:24:27Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1005,5 +1005,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 468666839,
|
||||
"name": "DirtyPipePython",
|
||||
"full_name": "crusoe112\/DirtyPipePython",
|
||||
"owner": {
|
||||
"login": "crusoe112",
|
||||
"id": 6531586,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531586?v=4",
|
||||
"html_url": "https:\/\/github.com\/crusoe112"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/crusoe112\/DirtyPipePython",
|
||||
"description": "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T08:22:56Z",
|
||||
"updated_at": "2022-03-11T10:59:23Z",
|
||||
"pushed_at": "2022-03-11T08:31:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-0848.json
Normal file
29
2022/CVE-2022-0848.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 468650717,
|
||||
"name": "CVE-2022-0848",
|
||||
"full_name": "dskmehra\/CVE-2022-0848",
|
||||
"owner": {
|
||||
"login": "dskmehra",
|
||||
"id": 18103236,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18103236?v=4",
|
||||
"html_url": "https:\/\/github.com\/dskmehra"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dskmehra\/CVE-2022-0848",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T07:26:04Z",
|
||||
"updated_at": "2022-03-11T07:27:11Z",
|
||||
"pushed_at": "2022-03-11T07:29:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T09:10:56Z",
|
||||
"updated_at": "2022-03-11T00:31:36Z",
|
||||
"updated_at": "2022-03-11T08:17:56Z",
|
||||
"pushed_at": "2022-03-10T09:28:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2022-03-08T09:16:56Z",
|
||||
"updated_at": "2022-03-11T11:56:34Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 41,
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 221,
|
||||
"forks": 42,
|
||||
"watchers": 222,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-03-10T18:57:09Z",
|
||||
"updated_at": "2022-03-11T07:35:21Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"forks_count": 115,
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 389,
|
||||
"forks": 116,
|
||||
"watchers": 390,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-03T11:25:14Z",
|
||||
"updated_at": "2022-03-11T01:22:08Z",
|
||||
"updated_at": "2022-03-11T09:19:10Z",
|
||||
"pushed_at": "2022-02-04T02:20:47Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 132,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-03-09T11:40:55Z",
|
||||
"updated_at": "2022-03-11T07:53:51Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T18:53:56Z",
|
||||
"updated_at": "2022-03-10T13:59:11Z",
|
||||
"updated_at": "2022-03-11T09:12:59Z",
|
||||
"pushed_at": "2022-02-26T19:12:12Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-03-09T18:53:59Z",
|
||||
"updated_at": "2022-03-11T11:42:19Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 485,
|
||||
"watchers_count": 485,
|
||||
"forks_count": 91,
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,8 +25,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"watchers": 485,
|
||||
"forks": 93,
|
||||
"watchers": 486,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -339,17 +339,17 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-03-11T03:52:23Z",
|
||||
"updated_at": "2022-03-11T09:51:44Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -447,17 +447,17 @@
|
|||
"description": "CVE-2022-22947批量检测脚本,超时时间不超过2s,已更新可反弹shell的EXP,欢迎师傅们试用",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T11:31:00Z",
|
||||
"updated_at": "2022-03-10T02:31:00Z",
|
||||
"updated_at": "2022-03-11T08:54:48Z",
|
||||
"pushed_at": "2022-03-08T09:43:50Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -744,17 +744,17 @@
|
|||
"description": "CVE-2022-22947 Exploit script",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T03:51:47Z",
|
||||
"updated_at": "2022-03-10T08:44:28Z",
|
||||
"updated_at": "2022-03-11T06:35:31Z",
|
||||
"pushed_at": "2022-03-10T08:43:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-06T17:05:02Z",
|
||||
"updated_at": "2022-03-07T15:32:26Z",
|
||||
"pushed_at": "2022-03-10T19:18:41Z",
|
||||
"pushed_at": "2022-03-11T06:38:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -52,32 +52,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 468562369,
|
||||
"name": "CVE-2022-24990-EXP",
|
||||
"full_name": "VVeakee\/CVE-2022-24990-EXP",
|
||||
"owner": {
|
||||
"login": "VVeakee",
|
||||
"id": 85714114,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85714114?v=4",
|
||||
"html_url": "https:\/\/github.com\/VVeakee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/VVeakee\/CVE-2022-24990-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-11T01:06:26Z",
|
||||
"updated_at": "2022-03-11T01:06:26Z",
|
||||
"pushed_at": "2022-03-11T01:21:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-03-02T15:29:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,7 +27,7 @@
|
|||
"printix"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
23
README.md
23
README.md
|
@ -47,6 +47,7 @@ A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in
|
|||
- [PaloAltoNetworks/can-ctr-escape-cve-2022-0492](https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492)
|
||||
- [SofianeHamlaoui/CVE-2022-0492-Checker](https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker)
|
||||
- [puckiestyle/CVE-2022-0492](https://github.com/puckiestyle/CVE-2022-0492)
|
||||
- [chenaotian/CVE-2022-0492](https://github.com/chenaotian/CVE-2022-0492)
|
||||
|
||||
### CVE-2022-0529 (2022-02-09)
|
||||
|
||||
|
@ -116,6 +117,15 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [michaelklaan/CVE-2022-0847-Dirty-Pipe](https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe)
|
||||
- [terabitSec/dirtyPipe-automaticRoot](https://github.com/terabitSec/dirtyPipe-automaticRoot)
|
||||
- [Greetdawn/CVE-2022-0847-DirtyPipe-](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-)
|
||||
- [crusoe112/DirtyPipePython](https://github.com/crusoe112/DirtyPipePython)
|
||||
|
||||
### CVE-2022-0848 (2022-03-04)
|
||||
|
||||
<code>
|
||||
OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.
|
||||
</code>
|
||||
|
||||
- [dskmehra/CVE-2022-0848](https://github.com/dskmehra/CVE-2022-0848)
|
||||
|
||||
### CVE-2022-0853
|
||||
- [ByteHackr/CVE-2022-0853](https://github.com/ByteHackr/CVE-2022-0853)
|
||||
|
@ -480,7 +490,6 @@ ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution v
|
|||
### CVE-2022-24990
|
||||
- [Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-](https://github.com/Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-)
|
||||
- [VVeakee/CVE-2022-24990-POC](https://github.com/VVeakee/CVE-2022-24990-POC)
|
||||
- [VVeakee/CVE-2022-24990-EXP](https://github.com/VVeakee/CVE-2022-24990-EXP)
|
||||
|
||||
### CVE-2022-25018 (2022-02-28)
|
||||
|
||||
|
@ -3266,6 +3275,7 @@ Metabase is an open source data analytics platform. In affected versions a secur
|
|||
- [zer0yu/CVE-2021-41277](https://github.com/zer0yu/CVE-2021-41277)
|
||||
- [sasukeourad/CVE-2021-41277_SSRF](https://github.com/sasukeourad/CVE-2021-41277_SSRF)
|
||||
- [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script)
|
||||
- [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277)
|
||||
|
||||
### CVE-2021-41349 (2021-11-09)
|
||||
|
||||
|
@ -3369,9 +3379,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
|
||||
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
|
||||
|
||||
### CVE-2021-41822
|
||||
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
|
||||
|
||||
### CVE-2021-41962 (2021-12-16)
|
||||
|
||||
<code>
|
||||
|
@ -13540,6 +13547,14 @@ Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used
|
|||
|
||||
- [tafamace/CVE-2018-1259](https://github.com/tafamace/CVE-2018-1259)
|
||||
|
||||
### CVE-2018-1263 (2018-05-15)
|
||||
|
||||
<code>
|
||||
Addresses partial fix in CVE-2018-1261. Pivotal spring-integration-zip, versions prior to 1.0.2, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
|
||||
</code>
|
||||
|
||||
- [sakib570/CVE-2018-1263-Demo](https://github.com/sakib570/CVE-2018-1263-Demo)
|
||||
|
||||
### CVE-2018-1270 (2018-04-06)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue