mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2022/11/19 12:17:32
This commit is contained in:
parent
396d67a1a7
commit
9aa06addcd
17 changed files with 96 additions and 57 deletions
|
@ -390,10 +390,10 @@
|
|||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T15:59:14Z",
|
||||
"updated_at": "2022-11-12T07:33:44Z",
|
||||
"updated_at": "2022-11-19T08:57:18Z",
|
||||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
|
@ -402,7 +402,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -459,10 +459,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-11-12T19:03:00Z",
|
||||
"updated_at": "2022-11-19T12:10:01Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -471,7 +471,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 364,
|
||||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 34,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-11-19T04:29:36Z",
|
||||
"updated_at": "2022-11-19T07:03:50Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3605,
|
||||
"watchers_count": 3605,
|
||||
"stargazers_count": 3604,
|
||||
"watchers_count": 3604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1042,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1042,
|
||||
"watchers": 3605,
|
||||
"watchers": 3604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "Test a host for susceptibility to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:26:16Z",
|
||||
"updated_at": "2022-11-09T18:05:51Z",
|
||||
"updated_at": "2022-11-19T08:00:33Z",
|
||||
"pushed_at": "2020-10-23T19:35:42Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -117,7 +117,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2022-11-12T19:03:00Z",
|
||||
"updated_at": "2022-11-19T12:10:01Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 364,
|
||||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-11-19T04:29:36Z",
|
||||
"updated_at": "2022-11-19T07:03:50Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3605,
|
||||
"watchers_count": 3605,
|
||||
"stargazers_count": 3604,
|
||||
"watchers_count": 3604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1042,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1042,
|
||||
"watchers": 3605,
|
||||
"watchers": 3604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2022-11-16T12:59:19Z",
|
||||
"updated_at": "2022-11-19T08:06:32Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 138,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "POC for LFI related to CVE-2021-27905",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-03T00:41:16Z",
|
||||
"updated_at": "2022-11-04T00:56:54Z",
|
||||
"updated_at": "2022-11-19T12:17:04Z",
|
||||
"pushed_at": "2022-11-17T06:27:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1652,10 +1652,10 @@
|
|||
"description": "利用sudo提权,只针对cnetos7",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-03T13:10:23Z",
|
||||
"updated_at": "2022-11-15T13:00:44Z",
|
||||
"updated_at": "2022-11-19T12:17:27Z",
|
||||
"pushed_at": "2022-11-03T13:52:35Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1664,7 +1664,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2232,10 +2232,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-16T03:44:14Z",
|
||||
"updated_at": "2022-11-18T16:57:17Z",
|
||||
"updated_at": "2022-11-19T10:04:55Z",
|
||||
"pushed_at": "2022-11-16T03:50:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2244,7 +2244,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2022-11-16T01:14:45Z",
|
||||
"updated_at": "2022-11-19T09:24:43Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 525,
|
||||
"watchers_count": 525,
|
||||
"stargazers_count": 526,
|
||||
"watchers_count": 526,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 525,
|
||||
"watchers": 526,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-3992.json
Normal file
31
2022/CVE-2022-3992.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 568063140,
|
||||
"name": "CVE-2022-3992",
|
||||
"full_name": "Urban4\/CVE-2022-3992",
|
||||
"owner": {
|
||||
"login": "Urban4",
|
||||
"id": 81638590,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81638590?v=4",
|
||||
"html_url": "https:\/\/github.com\/Urban4"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Urban4\/CVE-2022-3992",
|
||||
"description": "Cross Site Scripting on sanitization-management-system",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-19T10:36:37Z",
|
||||
"updated_at": "2022-11-19T10:36:37Z",
|
||||
"pushed_at": "2022-11-19T11:42:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T13:19:23Z",
|
||||
"updated_at": "2022-11-19T04:23:03Z",
|
||||
"pushed_at": "2022-11-18T13:26:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"updated_at": "2022-11-19T07:33:11Z",
|
||||
"pushed_at": "2022-11-19T10:35:50Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Zimbra <9.0.0.p27 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T20:58:08Z",
|
||||
"updated_at": "2022-11-18T23:48:19Z",
|
||||
"updated_at": "2022-11-19T07:55:04Z",
|
||||
"pushed_at": "2022-11-14T17:54:57Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -685,6 +685,14 @@ A vulnerability, which was classified as problematic, has been found in Sourceco
|
|||
|
||||
- [maikroservice/CVE-2022-3949](https://github.com/maikroservice/CVE-2022-3949)
|
||||
|
||||
### CVE-2022-3992 (2022-11-14)
|
||||
|
||||
<code>
|
||||
A vulnerability classified as problematic was found in SourceCodester Sanitization Management System. Affected by this vulnerability is an unknown functionality of the file admin/?page=system_info of the component Banner Image Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-213571.
|
||||
</code>
|
||||
|
||||
- [Urban4/CVE-2022-3992](https://github.com/Urban4/CVE-2022-3992)
|
||||
|
||||
### CVE-2022-5555
|
||||
- [huihuo123/CVE-2022-5555](https://github.com/huihuo123/CVE-2022-5555)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue