mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/07/29 18:18:54
This commit is contained in:
parent
767eb9fa8a
commit
a298d81aa8
29 changed files with 201 additions and 157 deletions
|
@ -223,13 +223,13 @@
|
|||
"pushed_at": "2022-03-16T12:08:54Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"forks_count": 146,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"forks": 147,
|
||||
"watchers": 414,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-03T03:11:24Z",
|
||||
"updated_at": "2022-07-28T19:00:25Z",
|
||||
"updated_at": "2022-07-29T12:51:31Z",
|
||||
"pushed_at": "2021-05-18T16:24:42Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,11 +41,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-07-28T00:38:29Z",
|
||||
"updated_at": "2022-07-29T12:53:48Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3448,
|
||||
"watchers_count": 3448,
|
||||
"forks_count": 1022,
|
||||
"stargazers_count": 3449,
|
||||
"watchers_count": 3449,
|
||||
"forks_count": 1023,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -71,8 +71,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1022,
|
||||
"watchers": 3448,
|
||||
"forks": 1023,
|
||||
"watchers": 3449,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "macOS Kernel Exploit for CVE-2019-8781. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T17:59:26Z",
|
||||
"updated_at": "2022-07-28T13:40:48Z",
|
||||
"updated_at": "2022-07-29T13:40:56Z",
|
||||
"pushed_at": "2019-10-15T17:05:38Z",
|
||||
"stargazers_count": 290,
|
||||
"watchers_count": 290,
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 290,
|
||||
"watchers": 291,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2022-07-27T07:11:59Z",
|
||||
"updated_at": "2022-07-29T13:43:40Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
"stargazers_count": 633,
|
||||
"watchers_count": 633,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 632,
|
||||
"watchers": 633,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1380,10 +1380,10 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2022-07-23T15:43:12Z",
|
||||
"updated_at": "2022-07-29T13:48:41Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"stargazers_count": 466,
|
||||
"watchers_count": 466,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1397,7 +1397,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"watchers": 465,
|
||||
"watchers": 466,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T13:08:21Z",
|
||||
"updated_at": "2022-07-03T05:49:41Z",
|
||||
"updated_at": "2022-07-29T12:41:07Z",
|
||||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-07-28T00:38:29Z",
|
||||
"updated_at": "2022-07-29T12:53:48Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3448,
|
||||
"watchers_count": 3448,
|
||||
"forks_count": 1022,
|
||||
"stargazers_count": 3449,
|
||||
"watchers_count": 3449,
|
||||
"forks_count": 1023,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -43,8 +43,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1022,
|
||||
"watchers": 3448,
|
||||
"forks": 1023,
|
||||
"watchers": 3449,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-01-26T01:01:15Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -75,10 +75,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-07-28T12:41:04Z",
|
||||
"updated_at": "2022-07-29T14:28:13Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1622,
|
||||
"watchers_count": 1622,
|
||||
"stargazers_count": 1621,
|
||||
"watchers_count": 1621,
|
||||
"forks_count": 476,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 476,
|
||||
"watchers": 1622,
|
||||
"watchers": 1621,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -906,10 +906,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-07-29T06:06:37Z",
|
||||
"updated_at": "2022-07-29T13:49:12Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 572,
|
||||
"watchers_count": 572,
|
||||
"stargazers_count": 573,
|
||||
"watchers_count": 573,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -919,7 +919,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 572,
|
||||
"watchers": 573,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1884,10 +1884,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-07-28T11:56:00Z",
|
||||
"updated_at": "2022-07-29T12:19:43Z",
|
||||
"pushed_at": "2022-04-19T12:33:32Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1895,7 +1895,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 292,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-07-28T17:48:37Z",
|
||||
"updated_at": "2022-07-29T16:22:40Z",
|
||||
"pushed_at": "2022-04-25T07:53:41Z",
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 369,
|
||||
"watchers": 370,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-07-28T17:48:05Z",
|
||||
"updated_at": "2022-07-29T15:35:46Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1127,
|
||||
"watchers_count": 1127,
|
||||
"stargazers_count": 1126,
|
||||
"watchers_count": 1126,
|
||||
"forks_count": 294,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 294,
|
||||
"watchers": 1127,
|
||||
"watchers": 1126,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T00:26:40Z",
|
||||
"updated_at": "2022-07-28T09:56:20Z",
|
||||
"updated_at": "2022-07-29T12:52:32Z",
|
||||
"pushed_at": "2022-01-28T00:27:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -501,7 +501,7 @@
|
|||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 829,
|
||||
"watchers_count": 829,
|
||||
"forks_count": 130,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -527,7 +527,7 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"forks": 129,
|
||||
"watchers": 829,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -545,10 +545,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-07-27T09:50:26Z",
|
||||
"updated_at": "2022-07-29T16:40:25Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1434,
|
||||
"watchers_count": 1434,
|
||||
"stargazers_count": 1435,
|
||||
"watchers_count": 1435,
|
||||
"forks_count": 394,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 394,
|
||||
"watchers": 1434,
|
||||
"watchers": 1435,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1869,10 +1869,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-07-29T11:41:44Z",
|
||||
"updated_at": "2022-07-29T15:12:08Z",
|
||||
"pushed_at": "2022-07-20T08:14:48Z",
|
||||
"stargazers_count": 2994,
|
||||
"watchers_count": 2994,
|
||||
"stargazers_count": 2995,
|
||||
"watchers_count": 2995,
|
||||
"forks_count": 722,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1880,7 +1880,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 722,
|
||||
"watchers": 2994,
|
||||
"watchers": 2995,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2552,34 +2552,6 @@
|
|||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437995131,
|
||||
"name": "l4j-info",
|
||||
"full_name": "ben-smash\/l4j-info",
|
||||
"owner": {
|
||||
"login": "ben-smash",
|
||||
"id": 95368649,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
|
||||
"html_url": "https:\/\/github.com\/ben-smash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
|
||||
"description": "Compiling links of value i find regarding CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T19:14:23Z",
|
||||
"updated_at": "2021-12-13T21:11:09Z",
|
||||
"pushed_at": "2021-12-13T21:11:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438012376,
|
||||
"name": "nmap-log4shell",
|
||||
|
@ -3260,7 +3232,7 @@
|
|||
"pushed_at": "2022-01-27T16:08:20Z",
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"forks_count": 94,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -3275,7 +3247,7 @@
|
|||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"forks": 93,
|
||||
"watchers": 425,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -240,10 +240,10 @@
|
|||
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T04:13:10Z",
|
||||
"updated_at": "2022-05-29T08:53:44Z",
|
||||
"updated_at": "2022-07-29T14:33:32Z",
|
||||
"pushed_at": "2022-01-13T05:12:49Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -251,7 +251,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-19T08:10:46Z",
|
||||
"updated_at": "2022-07-27T07:13:26Z",
|
||||
"updated_at": "2022-07-29T12:49:11Z",
|
||||
"pushed_at": "2022-03-19T12:01:26Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 272,
|
||||
"watchers": 273,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -353,7 +353,7 @@
|
|||
"pushed_at": "2022-05-09T14:20:40Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -362,7 +362,7 @@
|
|||
"f5-big-ip-icontrol-rest-rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "CVE-2022-2022",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T12:57:22Z",
|
||||
"updated_at": "2022-07-29T12:18:01Z",
|
||||
"updated_at": "2022-07-29T17:52:02Z",
|
||||
"pushed_at": "2022-07-27T07:01:33Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 61,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 144,
|
||||
"forks": 64,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -194,5 +194,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 519281774,
|
||||
"name": "CVE-2022-21449-showcase",
|
||||
"full_name": "Skipper7718\/CVE-2022-21449-showcase",
|
||||
"owner": {
|
||||
"login": "Skipper7718",
|
||||
"id": 66838226,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66838226?v=4",
|
||||
"html_url": "https:\/\/github.com\/Skipper7718"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Skipper7718\/CVE-2022-21449-showcase",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-29T16:33:10Z",
|
||||
"updated_at": "2022-07-29T16:33:26Z",
|
||||
"pushed_at": "2022-07-29T16:33:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,10 +125,10 @@
|
|||
"description": "WordPress WP_Query SQL Injection POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-28T13:12:51Z",
|
||||
"updated_at": "2022-07-29T04:51:07Z",
|
||||
"updated_at": "2022-07-29T12:42:08Z",
|
||||
"pushed_at": "2022-07-29T07:42:16Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -126,13 +126,13 @@
|
|||
"pushed_at": "2022-06-10T17:34:08Z",
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"forks_count": 206,
|
||||
"forks_count": 207,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 206,
|
||||
"forks": 207,
|
||||
"watchers": 264,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-07-27T07:13:26Z",
|
||||
"updated_at": "2022-07-29T15:25:28Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 392,
|
||||
"watchers_count": 392,
|
||||
"stargazers_count": 393,
|
||||
"watchers_count": 393,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"watchers": 392,
|
||||
"watchers": 393,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -815,7 +815,7 @@
|
|||
"description": "Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection ",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T11:17:25Z",
|
||||
"updated_at": "2022-06-30T06:00:56Z",
|
||||
"updated_at": "2022-07-29T16:55:14Z",
|
||||
"pushed_at": "2022-07-24T06:12:44Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
@ -325,10 +325,10 @@
|
|||
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T14:26:38Z",
|
||||
"updated_at": "2022-07-28T01:52:07Z",
|
||||
"updated_at": "2022-07-29T18:06:46Z",
|
||||
"pushed_at": "2022-05-22T14:08:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -343,7 +343,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -500,10 +500,10 @@
|
|||
"description": "metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T09:22:09Z",
|
||||
"updated_at": "2022-07-06T06:05:40Z",
|
||||
"updated_at": "2022-07-29T13:41:20Z",
|
||||
"pushed_at": "2022-07-04T09:22:21Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -511,7 +511,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -640,18 +640,18 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2022-07-29T10:54:16Z",
|
||||
"updated_at": "2022-07-29T17:06:51Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 49,
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 200,
|
||||
"forks": 50,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-03-28T18:21:00Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 36,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -245,10 +245,10 @@
|
|||
"description": "Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T18:00:42Z",
|
||||
"updated_at": "2022-07-25T16:13:07Z",
|
||||
"updated_at": "2022-07-29T16:12:57Z",
|
||||
"pushed_at": "2022-06-08T15:18:45Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -262,7 +262,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,10 +772,10 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2022-07-29T08:41:24Z",
|
||||
"updated_at": "2022-07-29T12:48:12Z",
|
||||
"pushed_at": "2022-06-06T07:19:53Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -783,7 +783,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 321,
|
||||
"watchers": 322,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
36
2022/CVE-2022-30591.json
Normal file
36
2022/CVE-2022-30591.json
Normal file
|
@ -0,0 +1,36 @@
|
|||
[
|
||||
{
|
||||
"id": 509190703,
|
||||
"name": "QUIC-attacks",
|
||||
"full_name": "efchatz\/QUIC-attacks",
|
||||
"owner": {
|
||||
"login": "efchatz",
|
||||
"id": 43434138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434138?v=4",
|
||||
"html_url": "https:\/\/github.com\/efchatz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/efchatz\/QUIC-attacks",
|
||||
"description": "Attacks against QUIC (CVE-2022-30591)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T18:25:23Z",
|
||||
"updated_at": "2022-07-29T15:59:30Z",
|
||||
"pushed_at": "2022-07-12T21:12:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-30591",
|
||||
"flooding",
|
||||
"quic",
|
||||
"slowloris",
|
||||
"vulnerabilities"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-30929 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T05:36:18Z",
|
||||
"updated_at": "2022-07-07T05:44:51Z",
|
||||
"updated_at": "2022-07-29T18:21:18Z",
|
||||
"pushed_at": "2022-07-04T06:19:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-07-28T11:22:13Z",
|
||||
"updated_at": "2022-07-28T19:43:23Z",
|
||||
"pushed_at": "2022-07-29T08:55:04Z",
|
||||
"pushed_at": "2022-07-29T13:08:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
10
README.md
10
README.md
|
@ -624,6 +624,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
|
|||
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
|
||||
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
|
||||
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
|
||||
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
|
||||
|
||||
### CVE-2022-21658 (2022-01-20)
|
||||
|
||||
|
@ -2595,6 +2596,14 @@ A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W)
|
|||
- [furkanzengin/CVE-2022-30525](https://github.com/furkanzengin/CVE-2022-30525)
|
||||
- [ProngedFork/CVE-2022-30525](https://github.com/ProngedFork/CVE-2022-30525)
|
||||
|
||||
### CVE-2022-30591 (2022-07-06)
|
||||
|
||||
<code>
|
||||
** DISPUTED ** quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List.
|
||||
</code>
|
||||
|
||||
- [efchatz/QUIC-attacks](https://github.com/efchatz/QUIC-attacks)
|
||||
|
||||
### CVE-2022-30594 (2022-05-12)
|
||||
|
||||
<code>
|
||||
|
@ -6888,7 +6897,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
|
||||
- [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor)
|
||||
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
|
||||
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
|
||||
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
|
||||
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
|
||||
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
|
||||
|
|
Loading…
Add table
Reference in a new issue