mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/12/19 06:19:54
This commit is contained in:
parent
65209b5266
commit
8a2032ec0c
23 changed files with 106 additions and 76 deletions
|
@ -13,10 +13,10 @@
|
||||||
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
|
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-08-17T23:48:15Z",
|
"created_at": "2018-08-17T23:48:15Z",
|
||||||
"updated_at": "2022-12-12T14:04:45Z",
|
"updated_at": "2022-12-19T02:37:07Z",
|
||||||
"pushed_at": "2019-11-15T08:12:32Z",
|
"pushed_at": "2019-11-15T08:12:32Z",
|
||||||
"stargazers_count": 138,
|
"stargazers_count": 139,
|
||||||
"watchers_count": 138,
|
"watchers_count": 139,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 34,
|
"forks_count": 34,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -34,7 +34,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 34,
|
"forks": 34,
|
||||||
"watchers": 138,
|
"watchers": 139,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -42,10 +42,10 @@
|
||||||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-12-21T22:45:55Z",
|
"created_at": "2019-12-21T22:45:55Z",
|
||||||
"updated_at": "2022-12-04T04:31:51Z",
|
"updated_at": "2022-12-19T02:43:35Z",
|
||||||
"pushed_at": "2020-01-05T21:46:25Z",
|
"pushed_at": "2020-01-05T21:46:25Z",
|
||||||
"stargazers_count": 587,
|
"stargazers_count": 588,
|
||||||
"watchers_count": 587,
|
"watchers_count": 588,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 128,
|
"forks_count": 128,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -67,7 +67,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 128,
|
"forks": 128,
|
||||||
"watchers": 587,
|
"watchers": 588,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -42,10 +42,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-12-17T13:20:58Z",
|
"updated_at": "2022-12-19T00:58:48Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3639,
|
"stargazers_count": 3640,
|
||||||
"watchers_count": 3639,
|
"watchers_count": 3640,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1049,
|
"forks_count": 1049,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -74,7 +74,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1049,
|
"forks": 1049,
|
||||||
"watchers": 3639,
|
"watchers": 3640,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-11T16:42:34Z",
|
"created_at": "2020-02-11T16:42:34Z",
|
||||||
"updated_at": "2022-11-29T15:20:57Z",
|
"updated_at": "2022-12-19T02:12:09Z",
|
||||||
"pushed_at": "2021-12-23T16:28:28Z",
|
"pushed_at": "2021-12-23T16:28:28Z",
|
||||||
"stargazers_count": 313,
|
"stargazers_count": 314,
|
||||||
"watchers_count": 313,
|
"watchers_count": 314,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 53,
|
"forks_count": 53,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 53,
|
"forks": 53,
|
||||||
"watchers": 313,
|
"watchers": 314,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -432,10 +432,10 @@
|
||||||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-12T18:34:40Z",
|
"created_at": "2020-03-12T18:34:40Z",
|
||||||
"updated_at": "2022-12-03T22:35:28Z",
|
"updated_at": "2022-12-19T01:43:25Z",
|
||||||
"pushed_at": "2022-11-28T04:18:42Z",
|
"pushed_at": "2022-11-28T04:18:42Z",
|
||||||
"stargazers_count": 292,
|
"stargazers_count": 293,
|
||||||
"watchers_count": 292,
|
"watchers_count": 293,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 115,
|
"forks_count": 115,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -449,7 +449,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 115,
|
"forks": 115,
|
||||||
"watchers": 292,
|
"watchers": 293,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -165,10 +165,10 @@
|
||||||
"description": "Exploit for zerologon cve-2020-1472",
|
"description": "Exploit for zerologon cve-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-14T19:19:07Z",
|
"created_at": "2020-09-14T19:19:07Z",
|
||||||
"updated_at": "2022-12-15T22:15:52Z",
|
"updated_at": "2022-12-19T06:18:23Z",
|
||||||
"pushed_at": "2020-10-15T18:31:15Z",
|
"pushed_at": "2020-10-15T18:31:15Z",
|
||||||
"stargazers_count": 496,
|
"stargazers_count": 497,
|
||||||
"watchers_count": 496,
|
"watchers_count": 497,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 138,
|
"forks_count": 138,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -177,7 +177,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 138,
|
"forks": 138,
|
||||||
"watchers": 496,
|
"watchers": 497,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-12-17T13:20:58Z",
|
"updated_at": "2022-12-19T00:58:48Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3639,
|
"stargazers_count": 3640,
|
||||||
"watchers_count": 3639,
|
"watchers_count": 3640,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1049,
|
"forks_count": 1049,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -45,7 +45,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1049,
|
"forks": 1049,
|
||||||
"watchers": 3639,
|
"watchers": 3640,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -196,13 +196,13 @@
|
||||||
"stargazers_count": 102,
|
"stargazers_count": 102,
|
||||||
"watchers_count": 102,
|
"watchers_count": 102,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 54,
|
"forks_count": 55,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 54,
|
"forks": 55,
|
||||||
"watchers": 102,
|
"watchers": 102,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-11-06T22:12:35Z",
|
"created_at": "2021-11-06T22:12:35Z",
|
||||||
"updated_at": "2022-08-26T14:19:20Z",
|
"updated_at": "2022-08-26T14:19:20Z",
|
||||||
"pushed_at": "2022-12-15T05:05:01Z",
|
"pushed_at": "2022-12-19T05:08:23Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 5,
|
"watchers_count": 5,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "exploit for CVE-2021-43848",
|
"description": "exploit for CVE-2021-43848",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-03T16:31:13Z",
|
"created_at": "2022-02-03T16:31:13Z",
|
||||||
"updated_at": "2022-11-02T05:43:04Z",
|
"updated_at": "2022-12-19T02:59:41Z",
|
||||||
"pushed_at": "2022-02-03T16:36:55Z",
|
"pushed_at": "2022-02-03T16:36:55Z",
|
||||||
"stargazers_count": 9,
|
"stargazers_count": 10,
|
||||||
"watchers_count": 9,
|
"watchers_count": 10,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 9,
|
"watchers": 10,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1020,10 +1020,10 @@
|
||||||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-13T03:57:50Z",
|
"created_at": "2021-12-13T03:57:50Z",
|
||||||
"updated_at": "2022-12-18T17:06:57Z",
|
"updated_at": "2022-12-19T03:39:54Z",
|
||||||
"pushed_at": "2022-11-23T18:23:24Z",
|
"pushed_at": "2022-11-23T18:23:24Z",
|
||||||
"stargazers_count": 3144,
|
"stargazers_count": 3145,
|
||||||
"watchers_count": 3144,
|
"watchers_count": 3145,
|
||||||
"has_discussions": true,
|
"has_discussions": true,
|
||||||
"forks_count": 736,
|
"forks_count": 736,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1032,7 +1032,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 736,
|
"forks": 736,
|
||||||
"watchers": 3144,
|
"watchers": 3145,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Adobe Reader DC Information Leak Exploit ",
|
"description": "Adobe Reader DC Information Leak Exploit ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-13T16:42:10Z",
|
"created_at": "2022-10-13T16:42:10Z",
|
||||||
"updated_at": "2022-12-16T07:31:31Z",
|
"updated_at": "2022-12-19T02:05:20Z",
|
||||||
"pushed_at": "2022-10-13T17:00:50Z",
|
"pushed_at": "2022-10-13T17:00:50Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1535,11 +1535,11 @@
|
||||||
"html_url": "https:\/\/github.com\/tmoneypenny"
|
"html_url": "https:\/\/github.com\/tmoneypenny"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/tmoneypenny\/CVE-2022-0847",
|
"html_url": "https:\/\/github.com\/tmoneypenny\/CVE-2022-0847",
|
||||||
"description": "Poc",
|
"description": "Dirty Pipe - CVE-2022-0847",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-22T03:17:51Z",
|
"created_at": "2022-03-22T03:17:51Z",
|
||||||
"updated_at": "2022-09-13T01:14:52Z",
|
"updated_at": "2022-12-19T06:10:11Z",
|
||||||
"pushed_at": "2022-09-12T21:28:34Z",
|
"pushed_at": "2022-12-19T06:10:52Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -1418,10 +1418,10 @@
|
||||||
"description": "Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境",
|
"description": "Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-06-25T05:02:06Z",
|
"created_at": "2022-06-25T05:02:06Z",
|
||||||
"updated_at": "2022-12-05T09:03:26Z",
|
"updated_at": "2022-12-19T03:03:13Z",
|
||||||
"pushed_at": "2022-06-25T13:43:53Z",
|
"pushed_at": "2022-06-25T13:43:53Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1430,7 +1430,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -47,13 +47,13 @@
|
||||||
"stargazers_count": 25,
|
"stargazers_count": 25,
|
||||||
"watchers_count": 25,
|
"watchers_count": 25,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 9,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 9,
|
"forks": 10,
|
||||||
"watchers": 25,
|
"watchers": 25,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,12 +13,12 @@
|
||||||
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-12-02T18:52:20Z",
|
"created_at": "2022-12-02T18:52:20Z",
|
||||||
"updated_at": "2022-12-19T00:21:13Z",
|
"updated_at": "2022-12-19T04:11:45Z",
|
||||||
"pushed_at": "2022-12-16T05:29:11Z",
|
"pushed_at": "2022-12-16T05:29:11Z",
|
||||||
"stargazers_count": 67,
|
"stargazers_count": 71,
|
||||||
"watchers_count": 67,
|
"watchers_count": 71,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 11,
|
"forks_count": 13,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -35,8 +35,8 @@
|
||||||
"use-after-free"
|
"use-after-free"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 11,
|
"forks": 13,
|
||||||
"watchers": 67,
|
"watchers": 71,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -18,13 +18,13 @@
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 31,
|
||||||
"watchers_count": 31,
|
"watchers_count": 31,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 9,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 9,
|
"forks": 10,
|
||||||
"watchers": 31,
|
"watchers": 31,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -220,10 +220,10 @@
|
||||||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-09-26T08:58:21Z",
|
"created_at": "2022-09-26T08:58:21Z",
|
||||||
"updated_at": "2022-12-15T07:35:27Z",
|
"updated_at": "2022-12-19T04:10:20Z",
|
||||||
"pushed_at": "2022-09-26T13:20:38Z",
|
"pushed_at": "2022-09-26T13:20:38Z",
|
||||||
"stargazers_count": 174,
|
"stargazers_count": 176,
|
||||||
"watchers_count": 174,
|
"watchers_count": 176,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 32,
|
"forks_count": 32,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -236,7 +236,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 32,
|
"forks": 32,
|
||||||
"watchers": 174,
|
"watchers": 176,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -228,10 +228,10 @@
|
||||||
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
|
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-10-20T03:11:03Z",
|
"created_at": "2022-10-20T03:11:03Z",
|
||||||
"updated_at": "2022-11-16T07:01:01Z",
|
"updated_at": "2022-12-19T04:32:38Z",
|
||||||
"pushed_at": "2022-10-20T06:36:42Z",
|
"pushed_at": "2022-10-20T06:36:42Z",
|
||||||
"stargazers_count": 24,
|
"stargazers_count": 23,
|
||||||
"watchers_count": 24,
|
"watchers_count": 23,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 16,
|
"forks_count": 16,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -240,7 +240,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 16,
|
"forks": 16,
|
||||||
"watchers": 24,
|
"watchers": 23,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -85,5 +85,34 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 579853949,
|
||||||
|
"name": "external_expat_2.1.0_CVE-2022-43680",
|
||||||
|
"full_name": "nidhihcl\/external_expat_2.1.0_CVE-2022-43680",
|
||||||
|
"owner": {
|
||||||
|
"login": "nidhihcl",
|
||||||
|
"id": 121002296,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121002296?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/nidhihcl"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/nidhihcl\/external_expat_2.1.0_CVE-2022-43680",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-12-19T05:09:12Z",
|
||||||
|
"updated_at": "2022-12-19T05:25:40Z",
|
||||||
|
"pushed_at": "2022-12-19T05:26:36Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -18,13 +18,13 @@
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 7,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 4,
|
||||||
"watchers": 7,
|
"watchers": 7,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,19 +13,19 @@
|
||||||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-12-17T16:45:24Z",
|
"created_at": "2022-12-17T16:45:24Z",
|
||||||
"updated_at": "2022-12-18T23:48:41Z",
|
"updated_at": "2022-12-19T06:12:10Z",
|
||||||
"pushed_at": "2022-12-17T16:45:42Z",
|
"pushed_at": "2022-12-17T16:45:42Z",
|
||||||
"stargazers_count": 66,
|
"stargazers_count": 75,
|
||||||
"watchers_count": 66,
|
"watchers_count": 75,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 3,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 4,
|
||||||
"watchers": 66,
|
"watchers": 75,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -4715,6 +4715,7 @@ In libexpat through 2.4.9, there is a use-after free caused by overeager destruc
|
||||||
- [nidhi7598/G3_expat-2.2.6_CVE-2022-43680](https://github.com/nidhi7598/G3_expat-2.2.6_CVE-2022-43680)
|
- [nidhi7598/G3_expat-2.2.6_CVE-2022-43680](https://github.com/nidhi7598/G3_expat-2.2.6_CVE-2022-43680)
|
||||||
- [nidhi7598/expat_2.1.0-_CVE-2022-43680](https://github.com/nidhi7598/expat_2.1.0-_CVE-2022-43680)
|
- [nidhi7598/expat_2.1.0-_CVE-2022-43680](https://github.com/nidhi7598/expat_2.1.0-_CVE-2022-43680)
|
||||||
- [Trinadh465/external_expat-2.1.0_CVE-2022-43680](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680)
|
- [Trinadh465/external_expat-2.1.0_CVE-2022-43680](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680)
|
||||||
|
- [nidhihcl/external_expat_2.1.0_CVE-2022-43680](https://github.com/nidhihcl/external_expat_2.1.0_CVE-2022-43680)
|
||||||
|
|
||||||
### CVE-2022-43959
|
### CVE-2022-43959
|
||||||
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
|
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
|
||||||
|
|
Loading…
Reference in a new issue