mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/11/21 18:20:17
This commit is contained in:
parent
335961aaf4
commit
8ce5944ef2
39 changed files with 254 additions and 139 deletions
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-11-21T12:02:42Z",
|
||||
"updated_at": "2022-11-21T12:04:08Z",
|
||||
"pushed_at": "2022-11-21T12:04:04Z",
|
||||
"pushed_at": "2022-11-21T12:41:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-11-18T07:29:12Z",
|
||||
"updated_at": "2022-11-21T12:34:05Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-11-18T07:29:12Z",
|
||||
"updated_at": "2022-11-21T12:34:05Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -255,10 +255,10 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2022-11-05T10:18:08Z",
|
||||
"updated_at": "2022-11-21T14:40:17Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 119,
|
||||
"allow_forking": true,
|
||||
|
@ -271,7 +271,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 119,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -459,10 +459,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-11-19T12:10:01Z",
|
||||
"updated_at": "2022-11-21T14:44:13Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"stargazers_count": 366,
|
||||
"watchers_count": 366,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -471,7 +471,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 365,
|
||||
"watchers": 366,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1507,10 +1507,10 @@
|
|||
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T16:13:26Z",
|
||||
"updated_at": "2022-11-21T09:12:33Z",
|
||||
"updated_at": "2022-11-21T17:30:11Z",
|
||||
"pushed_at": "2018-05-13T16:14:53Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -1519,7 +1519,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -337,5 +337,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 568897117,
|
||||
"name": "CVE-2017-9841-",
|
||||
"full_name": "Jhonsonwannaa\/CVE-2017-9841-",
|
||||
"owner": {
|
||||
"login": "Jhonsonwannaa",
|
||||
"id": 114837630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2017-9841-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T16:36:48Z",
|
||||
"updated_at": "2022-11-21T16:37:26Z",
|
||||
"pushed_at": "2022-11-21T16:37:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-02T19:01:17Z",
|
||||
"updated_at": "2022-08-08T22:31:25Z",
|
||||
"updated_at": "2022-11-21T14:02:34Z",
|
||||
"pushed_at": "2018-12-03T21:13:00Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,7 +71,7 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2022-11-09T17:59:56Z",
|
||||
"updated_at": "2022-11-21T13:18:02Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
|
|
|
@ -2935,10 +2935,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T10:13:11Z",
|
||||
"updated_at": "2022-11-15T17:39:53Z",
|
||||
"updated_at": "2022-11-21T12:35:32Z",
|
||||
"pushed_at": "2020-07-07T15:28:13Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -2947,7 +2947,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2022-11-17T15:25:22Z",
|
||||
"updated_at": "2022-11-21T12:28:18Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-11-19T12:10:01Z",
|
||||
"updated_at": "2022-11-21T14:44:13Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"stargazers_count": 366,
|
||||
"watchers_count": 366,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 365,
|
||||
"watchers": 366,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"tesla"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"has_discussions": false,
|
||||
"forks_count": 350,
|
||||
"forks_count": 349,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 350,
|
||||
"forks": 349,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -100,10 +100,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-11-20T22:37:47Z",
|
||||
"updated_at": "2022-11-21T15:18:44Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 972,
|
||||
"watchers_count": 972,
|
||||
"stargazers_count": 973,
|
||||
"watchers_count": 973,
|
||||
"has_discussions": false,
|
||||
"forks_count": 268,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"watchers": 972,
|
||||
"watchers": 973,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,7 +134,7 @@
|
|||
"stargazers_count": 995,
|
||||
"watchers_count": 995,
|
||||
"has_discussions": false,
|
||||
"forks_count": 315,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -144,7 +144,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 315,
|
||||
"forks": 316,
|
||||
"watchers": 995,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2022-11-16T07:24:31Z",
|
||||
"updated_at": "2022-11-21T13:00:08Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,19 +42,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-21T03:13:58Z",
|
||||
"updated_at": "2022-11-14T03:33:07Z",
|
||||
"updated_at": "2022-11-21T13:16:58Z",
|
||||
"pushed_at": "2021-05-21T03:24:25Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -100,10 +100,10 @@
|
|||
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-30T10:15:10Z",
|
||||
"updated_at": "2022-11-21T11:52:35Z",
|
||||
"updated_at": "2022-11-21T17:03:46Z",
|
||||
"pushed_at": "2021-11-16T17:34:11Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -127,7 +127,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -795,10 +795,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-11-21T09:40:10Z",
|
||||
"updated_at": "2022-11-21T13:55:27Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -814,7 +814,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-11T04:34:07Z",
|
||||
"updated_at": "2022-11-09T18:14:22Z",
|
||||
"updated_at": "2022-11-21T15:40:50Z",
|
||||
"pushed_at": "2022-01-16T15:54:14Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,7 +134,7 @@
|
|||
"stargazers_count": 995,
|
||||
"watchers_count": 995,
|
||||
"has_discussions": false,
|
||||
"forks_count": 315,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -144,7 +144,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 315,
|
||||
"forks": 316,
|
||||
"watchers": 995,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:22:07Z",
|
||||
"updated_at": "2022-09-06T16:33:10Z",
|
||||
"updated_at": "2022-11-21T14:55:27Z",
|
||||
"pushed_at": "2021-03-16T08:34:14Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"forks": 65,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1039,10 +1039,10 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2022-11-21T03:26:52Z",
|
||||
"updated_at": "2022-11-21T12:35:26Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 550,
|
||||
"watchers_count": 550,
|
||||
"stargazers_count": 551,
|
||||
"watchers_count": 551,
|
||||
"has_discussions": false,
|
||||
"forks_count": 152,
|
||||
"allow_forking": true,
|
||||
|
@ -1051,7 +1051,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"watchers": 550,
|
||||
"watchers": 551,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2022-11-11T02:29:04Z",
|
||||
"updated_at": "2022-11-21T16:43:23Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -409,10 +409,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2022-11-02T14:36:48Z",
|
||||
"updated_at": "2022-11-21T15:34:17Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -430,7 +430,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1302,8 +1302,8 @@
|
|||
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T12:23:04Z",
|
||||
"updated_at": "2022-11-21T09:02:13Z",
|
||||
"pushed_at": "2022-11-18T18:04:17Z",
|
||||
"updated_at": "2022-11-21T16:25:14Z",
|
||||
"pushed_at": "2022-11-21T16:20:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -1315,6 +1315,7 @@
|
|||
"apache",
|
||||
"cve",
|
||||
"cve-2021-41773",
|
||||
"docker",
|
||||
"http-server",
|
||||
"lfi",
|
||||
"vulnerability"
|
||||
|
|
|
@ -470,8 +470,8 @@
|
|||
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T17:53:46Z",
|
||||
"updated_at": "2022-11-21T09:01:11Z",
|
||||
"pushed_at": "2022-11-18T18:03:19Z",
|
||||
"updated_at": "2022-11-21T17:11:21Z",
|
||||
"pushed_at": "2022-11-21T17:10:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -483,6 +483,7 @@
|
|||
"apache",
|
||||
"cve",
|
||||
"cve-2021-42013",
|
||||
"docker",
|
||||
"http-server",
|
||||
"lfi",
|
||||
"rce",
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-11-17T07:44:37Z",
|
||||
"updated_at": "2022-11-21T15:21:26Z",
|
||||
"pushed_at": "2022-09-01T21:30:25Z",
|
||||
"stargazers_count": 471,
|
||||
"watchers_count": 471,
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 471,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -340,12 +340,12 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-11-21T09:16:10Z",
|
||||
"updated_at": "2022-11-21T12:38:16Z",
|
||||
"pushed_at": "2022-09-21T07:49:03Z",
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"stargazers_count": 1503,
|
||||
"watchers_count": 1503,
|
||||
"has_discussions": false,
|
||||
"forks_count": 430,
|
||||
"forks_count": 431,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -356,8 +356,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 430,
|
||||
"watchers": 1502,
|
||||
"forks": 431,
|
||||
"watchers": 1503,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1178,19 +1178,19 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-11-18T06:11:50Z",
|
||||
"updated_at": "2022-11-21T13:25:26Z",
|
||||
"pushed_at": "2022-10-20T15:37:44Z",
|
||||
"stargazers_count": 3111,
|
||||
"watchers_count": 3111,
|
||||
"stargazers_count": 3112,
|
||||
"watchers_count": 3112,
|
||||
"has_discussions": true,
|
||||
"forks_count": 732,
|
||||
"forks_count": 731,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 732,
|
||||
"watchers": 3111,
|
||||
"forks": 731,
|
||||
"watchers": 3112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-11-21T11:01:10Z",
|
||||
"updated_at": "2022-11-21T13:58:54Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 656,
|
||||
"watchers_count": 656,
|
||||
"stargazers_count": 657,
|
||||
"watchers_count": 657,
|
||||
"has_discussions": false,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 656,
|
||||
"watchers": 657,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -712,10 +712,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-11-21T09:40:10Z",
|
||||
"updated_at": "2022-11-21T13:55:27Z",
|
||||
"pushed_at": "2022-10-28T14:26:56Z",
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -731,7 +731,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 629,
|
||||
"watchers": 630,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,13 +109,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2022-11-18T20:17:01Z",
|
||||
"updated_at": "2022-11-21T17:11:32Z",
|
||||
"pushed_at": "2022-10-27T16:35:08Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 371,
|
||||
"watchers": 372,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-11-21T05:01:31Z",
|
||||
"updated_at": "2022-11-21T14:10:20Z",
|
||||
"pushed_at": "2022-11-06T09:44:23Z",
|
||||
"stargazers_count": 864,
|
||||
"watchers_count": 864,
|
||||
"stargazers_count": 865,
|
||||
"watchers_count": 865,
|
||||
"has_discussions": true,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"watchers": 864,
|
||||
"watchers": 865,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -643,5 +643,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 568830815,
|
||||
"name": "CVE-2022-29464-",
|
||||
"full_name": "Jhonsonwannaa\/CVE-2022-29464-",
|
||||
"owner": {
|
||||
"login": "Jhonsonwannaa",
|
||||
"id": 114837630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2022-29464-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T13:57:53Z",
|
||||
"updated_at": "2022-11-21T13:58:32Z",
|
||||
"pushed_at": "2022-11-21T13:58:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"forks": 52,
|
||||
"watchers": 306,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2022-11-20T12:51:08Z",
|
||||
"updated_at": "2022-11-21T15:27:11Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -935,5 +935,42 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 568929458,
|
||||
"name": "Text4shell-exploit",
|
||||
"full_name": "pwnb0y\/Text4shell-exploit",
|
||||
"owner": {
|
||||
"login": "pwnb0y",
|
||||
"id": 96813659,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96813659?v=4",
|
||||
"html_url": "https:\/\/github.com\/pwnb0y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pwnb0y\/Text4shell-exploit",
|
||||
"description": "Python Script to exploit RCE of CVE-2022-42889 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T18:01:28Z",
|
||||
"updated_at": "2022-11-21T18:21:17Z",
|
||||
"pushed_at": "2022-11-21T18:17:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache-common-text",
|
||||
"cve-2022-42889",
|
||||
"cve-2022-42889-expliot",
|
||||
"java-vulnerability",
|
||||
"rce",
|
||||
"text4shell",
|
||||
"text4shell-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -2827,6 +2827,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
|
||||
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
|
||||
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
|
||||
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
|
||||
|
||||
### CVE-2022-29548 (2022-04-20)
|
||||
|
||||
|
@ -4148,7 +4149,12 @@ OpenKM 6.3.11 allows stored XSS related to the javascript&colon; substring i
|
|||
|
||||
- [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317)
|
||||
|
||||
### CVE-2022-40470
|
||||
### CVE-2022-40470 (2022-11-21)
|
||||
|
||||
<code>
|
||||
Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
|
||||
</code>
|
||||
|
||||
- [RashidKhanPathan/CVE-2022-40470](https://github.com/RashidKhanPathan/CVE-2022-40470)
|
||||
|
||||
### CVE-2022-40471 (2022-10-31)
|
||||
|
@ -4343,6 +4349,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d
|
|||
- [sunnyvale-it/CVE-2022-42889-PoC](https://github.com/sunnyvale-it/CVE-2022-42889-PoC)
|
||||
- [QAInsights/cve-2022-42889-jmeter](https://github.com/QAInsights/cve-2022-42889-jmeter)
|
||||
- [adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889](https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889)
|
||||
- [pwnb0y/Text4shell-exploit](https://github.com/pwnb0y/Text4shell-exploit)
|
||||
|
||||
### CVE-2022-42899 (2022-10-12)
|
||||
|
||||
|
@ -4360,7 +4367,12 @@ Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via
|
|||
|
||||
- [ProxyStaffy/Mediatrix-CVE-2022-43096](https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096)
|
||||
|
||||
### CVE-2022-43117
|
||||
### CVE-2022-43117 (2022-11-21)
|
||||
|
||||
<code>
|
||||
Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Name, Username, Description and Site Feature parameters.
|
||||
</code>
|
||||
|
||||
- [RashidKhanPathan/CVE-2022-43117](https://github.com/RashidKhanPathan/CVE-2022-43117)
|
||||
|
||||
### CVE-2022-43144 (2022-11-08)
|
||||
|
@ -4382,7 +4394,12 @@ A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers
|
|||
### CVE-2022-43959
|
||||
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
|
||||
|
||||
### CVE-2022-44830
|
||||
### CVE-2022-44830 (2022-11-21)
|
||||
|
||||
<code>
|
||||
Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file.
|
||||
</code>
|
||||
|
||||
- [RashidKhanPathan/CVE-2022-44830](https://github.com/RashidKhanPathan/CVE-2022-44830)
|
||||
|
||||
|
||||
|
@ -23462,6 +23479,7 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem
|
|||
- [Invertebr4do/cve-2017-9841](https://github.com/Invertebr4do/cve-2017-9841)
|
||||
- [yoloskr/CVE-2017-9841-Scan](https://github.com/yoloskr/CVE-2017-9841-Scan)
|
||||
- [mileticluka1/eval-stdin](https://github.com/mileticluka1/eval-stdin)
|
||||
- [Jhonsonwannaa/CVE-2017-9841-](https://github.com/Jhonsonwannaa/CVE-2017-9841-)
|
||||
|
||||
### CVE-2017-9934 (2017-07-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue