mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/06/02 00:16:40
This commit is contained in:
parent
0df8f5f8a4
commit
a133cd6408
21 changed files with 386 additions and 123 deletions
|
@ -1071,10 +1071,10 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2022-05-12T13:47:15Z",
|
||||
"updated_at": "2022-06-01T20:19:35Z",
|
||||
"pushed_at": "2017-10-30T22:46:11Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1088,7 +1088,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Verification tools for CVE-2016-1287",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-08T19:43:18Z",
|
||||
"updated_at": "2020-02-07T20:18:36Z",
|
||||
"updated_at": "2022-06-01T23:46:17Z",
|
||||
"pushed_at": "2017-03-15T20:25:40Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -330,5 +330,37 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498394246,
|
||||
"name": "CVE-2018-16763-FuelCMS-1.4.1-RCE",
|
||||
"full_name": "p0dalirius\/CVE-2018-16763-FuelCMS-1.4.1-RCE",
|
||||
"owner": {
|
||||
"login": "p0dalirius",
|
||||
"id": 79218792,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
|
||||
"html_url": "https:\/\/github.com\/p0dalirius"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2018-16763-FuelCMS-1.4.1-RCE",
|
||||
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T15:31:37Z",
|
||||
"updated_at": "2022-06-01T21:00:18Z",
|
||||
"pushed_at": "2022-06-01T20:45:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cms",
|
||||
"cve-2018-16763",
|
||||
"exploit",
|
||||
"fuelcms"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -75,7 +75,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-12T20:39:24Z",
|
||||
"updated_at": "2020-10-09T06:41:30Z",
|
||||
"pushed_at": "2022-04-29T14:26:02Z",
|
||||
"pushed_at": "2022-06-01T19:52:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -2915,17 +2915,17 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T19:33:53Z",
|
||||
"updated_at": "2022-05-16T18:32:30Z",
|
||||
"updated_at": "2022-06-01T19:19:21Z",
|
||||
"pushed_at": "2022-03-28T04:10:20Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -370,5 +370,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498888915,
|
||||
"name": "CVE-2019-16759",
|
||||
"full_name": "trhacknon\/CVE-2019-16759",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-16759",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T20:28:43Z",
|
||||
"updated_at": "2022-06-01T20:28:59Z",
|
||||
"pushed_at": "2022-06-01T20:28:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-01T02:28:58Z",
|
||||
"updated_at": "2022-06-01T21:12:45Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3336,
|
||||
"watchers_count": 3336,
|
||||
"stargazers_count": 3337,
|
||||
"watchers_count": 3337,
|
||||
"forks_count": 997,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 997,
|
||||
"watchers": 3336,
|
||||
"watchers": 3337,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-06-01T07:04:31Z",
|
||||
"updated_at": "2022-06-01T19:23:32Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1461,
|
||||
"watchers_count": 1461,
|
||||
"stargazers_count": 1462,
|
||||
"watchers_count": 1462,
|
||||
"forks_count": 333,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"watchers": 1461,
|
||||
"watchers": 1462,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-01T02:28:58Z",
|
||||
"updated_at": "2022-06-01T21:12:45Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3336,
|
||||
"watchers_count": 3336,
|
||||
"stargazers_count": 3337,
|
||||
"watchers_count": 3337,
|
||||
"forks_count": 997,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 997,
|
||||
"watchers": 3336,
|
||||
"watchers": 3337,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -412,17 +412,17 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T18:57:30Z",
|
||||
"updated_at": "2022-06-01T13:47:13Z",
|
||||
"updated_at": "2022-06-01T19:07:47Z",
|
||||
"pushed_at": "2022-05-02T07:49:01Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T18:14:46Z",
|
||||
"updated_at": "2022-05-19T03:05:47Z",
|
||||
"updated_at": "2022-06-01T21:34:42Z",
|
||||
"pushed_at": "2022-03-16T18:01:04Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -875,19 +875,19 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-06-01T02:27:15Z",
|
||||
"updated_at": "2022-06-01T19:45:31Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 518,
|
||||
"watchers_count": 518,
|
||||
"forks_count": 102,
|
||||
"stargazers_count": 519,
|
||||
"watchers_count": 519,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 518,
|
||||
"forks": 103,
|
||||
"watchers": 519,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-06-01T07:23:44Z",
|
||||
"updated_at": "2022-06-01T19:10:16Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1421,
|
||||
"watchers_count": 1421,
|
||||
"forks_count": 468,
|
||||
"stargazers_count": 1422,
|
||||
"watchers_count": 1422,
|
||||
"forks_count": 469,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 468,
|
||||
"watchers": 1421,
|
||||
"forks": 469,
|
||||
"watchers": 1422,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,10 +40,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2022-06-01T14:43:49Z",
|
||||
"pushed_at": "2022-05-31T12:26:19Z",
|
||||
"stargazers_count": 643,
|
||||
"watchers_count": 643,
|
||||
"updated_at": "2022-06-01T22:57:29Z",
|
||||
"pushed_at": "2022-06-01T21:10:46Z",
|
||||
"stargazers_count": 647,
|
||||
"watchers_count": 647,
|
||||
"forks_count": 145,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 145,
|
||||
"watchers": 643,
|
||||
"watchers": 647,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T17:55:52Z",
|
||||
"updated_at": "2022-05-16T15:39:19Z",
|
||||
"updated_at": "2022-06-01T22:04:06Z",
|
||||
"pushed_at": "2022-03-05T18:34:25Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-05-23T18:50:28Z",
|
||||
"updated_at": "2022-06-01T19:20:33Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1094,
|
||||
"watchers_count": 1094,
|
||||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 287,
|
||||
"watchers": 1094,
|
||||
"watchers": 1095,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 498603505,
|
||||
"name": "cve-2022-193372",
|
||||
"full_name": "Ran-Xing\/cve-2022-193372",
|
||||
"owner": {
|
||||
"login": "Ran-Xing",
|
||||
"id": 73819467,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73819467?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ran-Xing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ran-Xing\/cve-2022-193372",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T05:32:09Z",
|
||||
"updated_at": "2022-06-01T05:32:09Z",
|
||||
"pushed_at": "2022-06-01T05:32:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-02-17T03:59:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -460,5 +460,59 @@
|
|||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498855865,
|
||||
"name": "CVE-2022-22954-PoC",
|
||||
"full_name": "trhacknon\/CVE-2022-22954-PoC",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22954-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T18:33:45Z",
|
||||
"updated_at": "2022-06-01T22:41:09Z",
|
||||
"pushed_at": "2022-06-01T22:41:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498873517,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "Chocapikk\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954",
|
||||
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T19:33:32Z",
|
||||
"updated_at": "2022-06-01T23:50:54Z",
|
||||
"pushed_at": "2022-06-01T23:50:18Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-06-01T14:32:11Z",
|
||||
"updated_at": "2022-06-01T21:17:08Z",
|
||||
"pushed_at": "2022-05-31T19:13:34Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 53,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -48,17 +48,44 @@
|
|||
"description": "CVE-2022-30190 Follina POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T06:45:25Z",
|
||||
"updated_at": "2022-06-01T18:13:00Z",
|
||||
"updated_at": "2022-06-01T23:09:21Z",
|
||||
"pushed_at": "2022-05-31T09:35:37Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 41,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498253545,
|
||||
"name": "CVE-2022-30190",
|
||||
"full_name": "2867a0\/CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "2867a0",
|
||||
"id": 42805417,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42805417?v=4",
|
||||
"html_url": "https:\/\/github.com\/2867a0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/2867a0\/CVE-2022-30190",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T08:39:09Z",
|
||||
"updated_at": "2022-06-01T23:05:08Z",
|
||||
"pushed_at": "2022-05-31T08:43:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -75,17 +102,17 @@
|
|||
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T12:15:18Z",
|
||||
"updated_at": "2022-06-01T13:30:26Z",
|
||||
"updated_at": "2022-06-01T19:43:10Z",
|
||||
"pushed_at": "2022-05-31T12:27:50Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -102,17 +129,17 @@
|
|||
"description": "This Repository Talks about the Follina MSDT from Defender Perspective",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T14:10:11Z",
|
||||
"updated_at": "2022-06-01T16:40:26Z",
|
||||
"updated_at": "2022-06-01T19:11:13Z",
|
||||
"pushed_at": "2022-06-01T14:59:58Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -210,10 +237,10 @@
|
|||
"description": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T18:00:42Z",
|
||||
"updated_at": "2022-06-01T16:05:43Z",
|
||||
"updated_at": "2022-06-01T19:24:42Z",
|
||||
"pushed_at": "2022-05-31T19:31:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -223,7 +250,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -355,10 +382,10 @@
|
|||
"description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T09:02:00Z",
|
||||
"updated_at": "2022-06-01T13:33:13Z",
|
||||
"updated_at": "2022-06-01T20:19:42Z",
|
||||
"pushed_at": "2022-06-01T09:31:58Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -371,7 +398,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -446,12 +473,12 @@
|
|||
"pushed_at": "2022-06-01T13:58:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -508,5 +535,145 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498863365,
|
||||
"name": "CVE-2022-30190-NSIS",
|
||||
"full_name": "rouben\/CVE-2022-30190-NSIS",
|
||||
"owner": {
|
||||
"login": "rouben",
|
||||
"id": 2985666,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2985666?v=4",
|
||||
"html_url": "https:\/\/github.com\/rouben"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rouben\/CVE-2022-30190-NSIS",
|
||||
"description": "An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T18:58:07Z",
|
||||
"updated_at": "2022-06-01T22:37:03Z",
|
||||
"pushed_at": "2022-06-01T22:23:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2022-30190",
|
||||
"microsoft",
|
||||
"msdt",
|
||||
"nsis"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498888452,
|
||||
"name": "Follina-Remediation",
|
||||
"full_name": "Cosmo121\/Follina-Remediation",
|
||||
"owner": {
|
||||
"login": "Cosmo121",
|
||||
"id": 3526206,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cosmo121"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation",
|
||||
"description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T20:26:56Z",
|
||||
"updated_at": "2022-06-01T20:28:33Z",
|
||||
"pushed_at": "2022-06-01T20:29:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498904586,
|
||||
"name": "CVE-2022-30190",
|
||||
"full_name": "rayorole\/CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "rayorole",
|
||||
"id": 87602506,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87602506?v=4",
|
||||
"html_url": "https:\/\/github.com\/rayorole"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rayorole\/CVE-2022-30190",
|
||||
"description": "CVE-2022-30190 or \"Follina\" 0day proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T21:33:18Z",
|
||||
"updated_at": "2022-06-01T21:36:47Z",
|
||||
"pushed_at": "2022-06-01T21:36:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498924006,
|
||||
"name": "2022_PoC-MSDT-Follina-CVE-2022-30190",
|
||||
"full_name": "ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "ImproveCybersecurityJaro",
|
||||
"id": 106711305,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106711305?v=4",
|
||||
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
|
||||
"description": "Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T23:07:26Z",
|
||||
"updated_at": "2022-06-01T23:07:26Z",
|
||||
"pushed_at": "2022-06-01T23:30:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498927734,
|
||||
"name": "CVE-2022-30190",
|
||||
"full_name": "sudoaza\/CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "sudoaza",
|
||||
"id": 555365,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/555365?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoaza"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoaza\/CVE-2022-30190",
|
||||
"description": "MS-MSDT Follina CVE-2022-30190 PoC document generator",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T23:27:14Z",
|
||||
"updated_at": "2022-06-01T23:30:29Z",
|
||||
"pushed_at": "2022-06-01T23:30:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
20
README.md
20
README.md
|
@ -737,6 +737,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
|
|||
- [tyleraharrison/VMware-CVE-2022-22954-Command-Injector](https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector)
|
||||
- [3SsFuck/CVE-2022-22954-POC](https://github.com/3SsFuck/CVE-2022-22954-POC)
|
||||
- [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954)
|
||||
- [trhacknon/CVE-2022-22954-PoC](https://github.com/trhacknon/CVE-2022-22954-PoC)
|
||||
- [Chocapikk/CVE-2022-22954](https://github.com/Chocapikk/CVE-2022-22954)
|
||||
|
||||
### CVE-2022-22963 (2022-04-01)
|
||||
|
||||
|
@ -1897,9 +1899,15 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l
|
|||
|
||||
- [Le1a/CVE-2022-30040](https://github.com/Le1a/CVE-2022-30040)
|
||||
|
||||
### CVE-2022-30190
|
||||
### CVE-2022-30190 (2022-06-01)
|
||||
|
||||
<code>
|
||||
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
|
||||
</code>
|
||||
|
||||
- [JMousqueton/PoC-CVE-2022-30190](https://github.com/JMousqueton/PoC-CVE-2022-30190)
|
||||
- [onecloudemoji/CVE-2022-30190](https://github.com/onecloudemoji/CVE-2022-30190)
|
||||
- [2867a0/CVE-2022-30190](https://github.com/2867a0/CVE-2022-30190)
|
||||
- [bytecaps/CVE-2022-30190](https://github.com/bytecaps/CVE-2022-30190)
|
||||
- [archanchoudhury/MSDT_CVE-2022-30190](https://github.com/archanchoudhury/MSDT_CVE-2022-30190)
|
||||
- [rickhenderson/cve-2022-30190](https://github.com/rickhenderson/cve-2022-30190)
|
||||
|
@ -1916,6 +1924,11 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l
|
|||
- [drgreenthumb93/CVE-2022-30190-follina](https://github.com/drgreenthumb93/CVE-2022-30190-follina)
|
||||
- [mitespsoc/CVE-2022-30190-POC](https://github.com/mitespsoc/CVE-2022-30190-POC)
|
||||
- [Vaisakhkm2625/MSDT-0-Day-CVE-2022-30190-Poc](https://github.com/Vaisakhkm2625/MSDT-0-Day-CVE-2022-30190-Poc)
|
||||
- [rouben/CVE-2022-30190-NSIS](https://github.com/rouben/CVE-2022-30190-NSIS)
|
||||
- [Cosmo121/Follina-Remediation](https://github.com/Cosmo121/Follina-Remediation)
|
||||
- [rayorole/CVE-2022-30190](https://github.com/rayorole/CVE-2022-30190)
|
||||
- [ImproveCybersecurityJaro/2022_PoC-MSDT-Follina-CVE-2022-30190](https://github.com/ImproveCybersecurityJaro/2022_PoC-MSDT-Follina-CVE-2022-30190)
|
||||
- [sudoaza/CVE-2022-30190](https://github.com/sudoaza/CVE-2022-30190)
|
||||
|
||||
### CVE-2022-30292 (2022-05-04)
|
||||
|
||||
|
@ -1997,9 +2010,6 @@ mailcow before 2022-05d allows a remote authenticated user to inject OS commands
|
|||
|
||||
- [ly1g3/Mailcow-CVE-2022-31245](https://github.com/ly1g3/Mailcow-CVE-2022-31245)
|
||||
|
||||
### CVE-2022-193372
|
||||
- [Ran-Xing/cve-2022-193372](https://github.com/Ran-Xing/cve-2022-193372)
|
||||
|
||||
|
||||
## 2021
|
||||
### CVE-2021-0302 (2021-02-10)
|
||||
|
@ -14811,6 +14821,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
|
|||
- [sunian19/CVE-2019-16759](https://github.com/sunian19/CVE-2019-16759)
|
||||
- [ludy-dev/vBulletin_Routestring-RCE](https://github.com/ludy-dev/vBulletin_Routestring-RCE)
|
||||
- [apidotmy/CVE-2019-16759](https://github.com/apidotmy/CVE-2019-16759)
|
||||
- [trhacknon/CVE-2019-16759](https://github.com/trhacknon/CVE-2019-16759)
|
||||
|
||||
### CVE-2019-16784 (2020-01-14)
|
||||
|
||||
|
@ -18277,6 +18288,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
|
|||
- [k4u5h41/CVE-2018-16763](https://github.com/k4u5h41/CVE-2018-16763)
|
||||
- [BrunoPincho/cve-2018-16763-rust](https://github.com/BrunoPincho/cve-2018-16763-rust)
|
||||
- [NaturalT314/CVE-2018-16763](https://github.com/NaturalT314/CVE-2018-16763)
|
||||
- [p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE)
|
||||
|
||||
### CVE-2018-16809 (2019-03-07)
|
||||
|
||||
|
|
Loading…
Reference in a new issue