mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/01/08 18:29:08
This commit is contained in:
parent
d0cc5cc583
commit
90608a1599
28 changed files with 133 additions and 103 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-28T10:28:16Z",
|
||||
"updated_at": "2022-12-09T06:53:33Z",
|
||||
"updated_at": "2023-01-08T15:36:00Z",
|
||||
"pushed_at": "2019-01-30T21:36:22Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -438,7 +438,7 @@
|
|||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"has_discussions": false,
|
||||
"forks_count": 415,
|
||||
"forks_count": 416,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -448,7 +448,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 415,
|
||||
"forks": 416,
|
||||
"watchers": 698,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-01-06T06:19:15Z",
|
||||
"updated_at": "2023-01-08T15:16:59Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3652,
|
||||
"watchers_count": 3652,
|
||||
"stargazers_count": 3653,
|
||||
"watchers_count": 3653,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1051,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1051,
|
||||
"watchers": 3652,
|
||||
"watchers": 3653,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"forks": 29,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2023-01-05T16:19:36Z",
|
||||
"updated_at": "2023-01-08T13:06:03Z",
|
||||
"pushed_at": "2021-09-01T08:56:40Z",
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"stargazers_count": 663,
|
||||
"watchers_count": 663,
|
||||
"has_discussions": false,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 662,
|
||||
"watchers": 663,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-03-16T16:55:18Z",
|
||||
"updated_at": "2022-04-03T03:13:00Z",
|
||||
"pushed_at": "2022-04-03T03:13:45Z",
|
||||
"pushed_at": "2023-01-08T17:11:55Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-01-06T06:19:15Z",
|
||||
"updated_at": "2023-01-08T15:16:59Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3652,
|
||||
"watchers_count": 3652,
|
||||
"stargazers_count": 3653,
|
||||
"watchers_count": 3653,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1051,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1051,
|
||||
"watchers": 3652,
|
||||
"watchers": 3653,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2023-01-08T05:15:07Z",
|
||||
"updated_at": "2023-01-08T17:17:43Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 308,
|
||||
"watchers": 309,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 1648,
|
||||
"watchers_count": 1648,
|
||||
"has_discussions": false,
|
||||
"forks_count": 582,
|
||||
"forks_count": 583,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 582,
|
||||
"forks": 583,
|
||||
"watchers": 1648,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -778,10 +778,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-01-08T11:15:50Z",
|
||||
"updated_at": "2023-01-08T14:24:01Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 800,
|
||||
"watchers_count": 800,
|
||||
"stargazers_count": 801,
|
||||
"watchers_count": 801,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
@ -797,7 +797,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 800,
|
||||
"watchers": 801,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T21:19:42Z",
|
||||
"updated_at": "2022-08-24T20:48:06Z",
|
||||
"updated_at": "2023-01-08T15:44:11Z",
|
||||
"pushed_at": "2022-05-24T07:48:39Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2022-11-25T12:38:02Z",
|
||||
"updated_at": "2023-01-08T15:44:59Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -493,10 +493,10 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T05:53:45Z",
|
||||
"updated_at": "2022-11-19T21:34:32Z",
|
||||
"updated_at": "2023-01-08T13:49:55Z",
|
||||
"pushed_at": "2022-05-02T07:49:12Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -505,7 +505,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -908,10 +908,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-01-08T09:57:02Z",
|
||||
"updated_at": "2023-01-08T14:41:08Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 712,
|
||||
"watchers_count": 712,
|
||||
"stargazers_count": 713,
|
||||
"watchers_count": 713,
|
||||
"has_discussions": false,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 147,
|
||||
"watchers": 712,
|
||||
"watchers": 713,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -3614,10 +3614,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-01-06T05:58:41Z",
|
||||
"updated_at": "2023-01-08T15:28:19Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3159,
|
||||
"watchers_count": 3159,
|
||||
"stargazers_count": 3158,
|
||||
"watchers_count": 3158,
|
||||
"has_discussions": true,
|
||||
"forks_count": 739,
|
||||
"allow_forking": true,
|
||||
|
@ -3626,7 +3626,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 739,
|
||||
"watchers": 3159,
|
||||
"watchers": 3158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2023-01-04T09:55:52Z",
|
||||
"updated_at": "2023-01-08T14:04:01Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1003,
|
||||
"watchers_count": 1003,
|
||||
"stargazers_count": 1004,
|
||||
"watchers_count": 1004,
|
||||
"has_discussions": false,
|
||||
"forks_count": 218,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 218,
|
||||
"watchers": 1003,
|
||||
"watchers": 1004,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -123,5 +123,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 586568152,
|
||||
"name": "CVE-2022-1040",
|
||||
"full_name": "kevinsmith96\/CVE-2022-1040",
|
||||
"owner": {
|
||||
"login": "kevinsmith96",
|
||||
"id": 113975732,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
|
||||
"html_url": "https:\/\/github.com\/kevinsmith96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kevinsmith96\/CVE-2022-1040",
|
||||
"description": "Sophos EXploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-08T15:46:00Z",
|
||||
"updated_at": "2023-01-08T15:46:00Z",
|
||||
"pushed_at": "2023-01-08T15:48:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -680,10 +680,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-01-08T11:15:50Z",
|
||||
"updated_at": "2023-01-08T14:24:01Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 800,
|
||||
"watchers_count": 800,
|
||||
"stargazers_count": 801,
|
||||
"watchers_count": 801,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
@ -699,7 +699,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 800,
|
||||
"watchers": 801,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2023-01-07T12:45:44Z",
|
||||
"updated_at": "2023-01-08T18:25:46Z",
|
||||
"pushed_at": "2022-11-09T15:46:06Z",
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 310,
|
||||
"watchers": 311,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "SQL Injection Vulnerability on PhpIPAM v1.4.4",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-15T00:00:22Z",
|
||||
"updated_at": "2022-02-15T07:12:02Z",
|
||||
"updated_at": "2023-01-08T14:52:29Z",
|
||||
"pushed_at": "2022-02-15T00:25:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"forks": 55,
|
||||
"watchers": 403,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -863,13 +863,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Case for CVE-2022-30778",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-23T07:04:54Z",
|
||||
"updated_at": "2022-10-13T20:15:13Z",
|
||||
"updated_at": "2023-01-08T16:46:42Z",
|
||||
"pushed_at": "2022-08-23T01:11:15Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -134,7 +134,7 @@
|
|||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -152,7 +152,7 @@
|
|||
"ssrf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -233,13 +233,13 @@
|
|||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T17:29:10Z",
|
||||
"updated_at": "2023-01-08T12:00:26Z",
|
||||
"updated_at": "2023-01-08T14:25:26Z",
|
||||
"pushed_at": "2023-01-05T17:40:18Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 58,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-17T16:45:24Z",
|
||||
"updated_at": "2023-01-08T00:33:43Z",
|
||||
"updated_at": "2023-01-08T15:54:31Z",
|
||||
"pushed_at": "2022-12-21T17:53:19Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 217,
|
||||
"forks": 18,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-01-08T12:33:48Z",
|
||||
"updated_at": "2023-01-08T15:03:30Z",
|
||||
"pushed_at": "2023-01-06T06:31:57Z",
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"stargazers_count": 581,
|
||||
"watchers_count": 581,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 580,
|
||||
"watchers": 581,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -158,10 +158,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T05:08:20Z",
|
||||
"updated_at": "2023-01-07T13:58:44Z",
|
||||
"updated_at": "2023-01-08T14:50:51Z",
|
||||
"pushed_at": "2023-01-04T05:32:52Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -170,7 +170,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -187,10 +187,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T21:50:25Z",
|
||||
"updated_at": "2023-01-08T12:13:59Z",
|
||||
"updated_at": "2023-01-08T15:10:37Z",
|
||||
"pushed_at": "2023-01-06T09:22:51Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -201,7 +201,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -338,6 +338,7 @@ An authentication bypass vulnerability in the User Portal and Webadmin allows a
|
|||
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
|
||||
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
|
||||
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
|
||||
- [kevinsmith96/CVE-2022-1040](https://github.com/kevinsmith96/CVE-2022-1040)
|
||||
|
||||
### CVE-2022-1051 (2022-05-16)
|
||||
|
||||
|
|
Loading…
Reference in a new issue