mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/08/04 00:19:15
This commit is contained in:
parent
dcd91cb9bd
commit
899904bcc5
26 changed files with 87 additions and 185 deletions
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 500290836,
|
||||
"name": "CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service",
|
||||
"full_name": "RakeshShinde97\/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service",
|
||||
"owner": {
|
||||
"login": "RakeshShinde97",
|
||||
"id": 22909509,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22909509?v=4",
|
||||
"html_url": "https:\/\/github.com\/RakeshShinde97"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RakeshShinde97\/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service",
|
||||
"description": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-06T04:30:03Z",
|
||||
"updated_at": "2022-06-06T04:30:03Z",
|
||||
"pushed_at": "2022-06-06T04:33:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 257726272,
|
||||
"name": "shiguresh",
|
||||
"full_name": "sinkaroid\/shiguresh",
|
||||
"owner": {
|
||||
"login": "sinkaroid",
|
||||
"id": 12372481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12372481?v=4",
|
||||
"html_url": "https:\/\/github.com\/sinkaroid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sinkaroid\/shiguresh",
|
||||
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-21T22:03:18Z",
|
||||
"updated_at": "2020-08-22T13:10:27Z",
|
||||
"pushed_at": "2020-04-21T22:24:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"arbitrary-code-execution",
|
||||
"bash",
|
||||
"cpanel",
|
||||
"regex"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263513846,
|
||||
"name": "shiguresh",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2022-07-27T07:08:30Z",
|
||||
"updated_at": "2022-08-03T22:09:11Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"forks_count": 194,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 194,
|
||||
"watchers": 444,
|
||||
"watchers": 445,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -181,8 +181,8 @@
|
|||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T21:57:03Z",
|
||||
"updated_at": "2022-07-09T19:50:57Z",
|
||||
"pushed_at": "2018-01-26T14:28:58Z",
|
||||
"updated_at": "2022-08-03T20:02:39Z",
|
||||
"pushed_at": "2022-08-03T20:07:09Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 39,
|
||||
|
|
|
@ -1,32 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 84158718,
|
||||
"name": "S2-045",
|
||||
"full_name": "PolarisLab\/S2-045",
|
||||
"owner": {
|
||||
"login": "PolarisLab",
|
||||
"id": 25890110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
|
||||
"html_url": "https:\/\/github.com\/PolarisLab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
|
||||
"description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-07T05:30:30Z",
|
||||
"updated_at": "2022-03-22T17:04:53Z",
|
||||
"pushed_at": "2017-03-07T05:37:55Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 84186490,
|
||||
"name": "Struts2-045-Exp",
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-26T01:13:42Z",
|
||||
"updated_at": "2022-07-18T02:45:48Z",
|
||||
"updated_at": "2022-08-03T19:27:39Z",
|
||||
"pushed_at": "2022-05-26T19:14:20Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 5,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"forks": 6,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1541,13 +1541,13 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 861,
|
||||
"watchers_count": 861,
|
||||
"forks_count": 283,
|
||||
"forks_count": 284,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 283,
|
||||
"forks": 284,
|
||||
"watchers": 861,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1729,
|
||||
"watchers_count": 1729,
|
||||
"forks_count": 263,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 263,
|
||||
"forks": 262,
|
||||
"watchers": 1729,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-08-03T17:48:17Z",
|
||||
"updated_at": "2022-08-03T21:49:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3459,
|
||||
"watchers_count": 3459,
|
||||
"stargazers_count": 3460,
|
||||
"watchers_count": 3460,
|
||||
"forks_count": 1026,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -72,7 +72,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1026,
|
||||
"watchers": 3459,
|
||||
"watchers": 3460,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T07:35:29Z",
|
||||
"updated_at": "2022-06-21T12:20:46Z",
|
||||
"updated_at": "2022-08-03T21:38:41Z",
|
||||
"pushed_at": "2020-06-25T07:49:34Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 54,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-08-03T17:48:17Z",
|
||||
"updated_at": "2022-08-03T21:49:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3459,
|
||||
"watchers_count": 3459,
|
||||
"stargazers_count": 3460,
|
||||
"watchers_count": 3460,
|
||||
"forks_count": 1026,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1026,
|
||||
"watchers": 3459,
|
||||
"watchers": 3460,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T15:54:46Z",
|
||||
"updated_at": "2022-07-18T08:25:42Z",
|
||||
"updated_at": "2022-08-03T20:49:54Z",
|
||||
"pushed_at": "2020-06-10T10:49:38Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,10 +90,10 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2022-07-26T12:47:54Z",
|
||||
"updated_at": "2022-08-03T20:49:56Z",
|
||||
"pushed_at": "2021-12-18T20:52:39Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -101,7 +101,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2022-06-18T01:45:47Z",
|
||||
"updated_at": "2022-08-03T23:05:56Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -619,10 +619,10 @@
|
|||
"description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T13:04:07Z",
|
||||
"updated_at": "2022-06-21T16:41:26Z",
|
||||
"updated_at": "2022-08-03T23:25:44Z",
|
||||
"pushed_at": "2022-04-23T03:21:44Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -632,7 +632,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -218,10 +218,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T20:47:16Z",
|
||||
"updated_at": "2022-07-27T07:12:56Z",
|
||||
"updated_at": "2022-08-03T20:07:28Z",
|
||||
"pushed_at": "2021-06-29T21:09:41Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -229,7 +229,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,15 +13,18 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2022-08-03T17:30:26Z",
|
||||
"pushed_at": "2022-08-03T17:30:23Z",
|
||||
"updated_at": "2022-08-03T19:38:09Z",
|
||||
"pushed_at": "2022-08-03T18:29:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2021-36260",
|
||||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
|
|
|
@ -906,10 +906,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-08-03T06:43:33Z",
|
||||
"updated_at": "2022-08-03T20:07:34Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 576,
|
||||
"watchers_count": 576,
|
||||
"stargazers_count": 577,
|
||||
"watchers_count": 577,
|
||||
"forks_count": 119,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -919,7 +919,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 119,
|
||||
"watchers": 576,
|
||||
"watchers": 577,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1253,13 +1253,13 @@
|
|||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 24,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"forks": 23,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T02:28:41Z",
|
||||
"updated_at": "2022-05-12T16:02:24Z",
|
||||
"updated_at": "2022-08-03T18:35:01Z",
|
||||
"pushed_at": "2021-12-22T23:54:18Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-07-29T15:35:46Z",
|
||||
"updated_at": "2022-08-03T19:59:04Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1126,
|
||||
"watchers_count": 1126,
|
||||
"stargazers_count": 1127,
|
||||
"watchers_count": 1127,
|
||||
"forks_count": 294,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 294,
|
||||
"watchers": 1126,
|
||||
"watchers": 1127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -6169,10 +6169,10 @@
|
|||
"description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T17:53:31Z",
|
||||
"updated_at": "2022-07-23T17:46:11Z",
|
||||
"updated_at": "2022-08-03T21:21:42Z",
|
||||
"pushed_at": "2021-12-19T22:09:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -6180,7 +6180,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-08-03T05:34:47Z",
|
||||
"updated_at": "2022-08-03T18:56:46Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"stargazers_count": 959,
|
||||
"watchers_count": 959,
|
||||
"forks_count": 208,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 208,
|
||||
"watchers": 958,
|
||||
"watchers": 959,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -605,13 +605,13 @@
|
|||
"pushed_at": "2022-03-09T02:01:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-08-01T17:07:16Z",
|
||||
"updated_at": "2022-08-03T23:25:49Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 297,
|
||||
"watchers": 298,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T10:05:55Z",
|
||||
"updated_at": "2022-07-25T15:22:00Z",
|
||||
"updated_at": "2022-08-03T21:33:27Z",
|
||||
"pushed_at": "2022-07-25T06:33:54Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -153,10 +153,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T09:52:02Z",
|
||||
"updated_at": "2022-08-03T16:23:24Z",
|
||||
"updated_at": "2022-08-03T23:03:37Z",
|
||||
"pushed_at": "2022-08-02T11:04:56Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -20955,7 +20955,6 @@ Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524
|
|||
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
||||
</code>
|
||||
|
||||
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
|
||||
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
|
||||
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
|
||||
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
|
||||
|
@ -27519,14 +27518,6 @@ PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and
|
|||
|
||||
|
||||
## 2004
|
||||
### CVE-2004-0230 (2004-05-05)
|
||||
|
||||
<code>
|
||||
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
|
||||
</code>
|
||||
|
||||
- [RakeshShinde97/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service](https://github.com/RakeshShinde97/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service)
|
||||
|
||||
### CVE-2004-0558 (2004-09-17)
|
||||
|
||||
<code>
|
||||
|
@ -27552,7 +27543,6 @@ Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute
|
|||
The "Allow cPanel users to reset their password via email" feature in cPanel 9.1.0 build 34 and earlier, including 8.x, allows remote attackers to execute arbitrary code via the user parameter to resetpass.
|
||||
</code>
|
||||
|
||||
- [sinkaroid/shiguresh](https://github.com/sinkaroid/shiguresh)
|
||||
- [Redsplit/shiguresh](https://github.com/Redsplit/shiguresh)
|
||||
|
||||
### CVE-2004-2167 (2005-07-10)
|
||||
|
|
Loading…
Reference in a new issue