mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/04/20 06:31:01
This commit is contained in:
parent
f5037622ac
commit
a3130ae9ba
60 changed files with 302 additions and 233 deletions
|
@ -63,10 +63,10 @@
|
|||
"description": "CVE-2015-4852、CVE-2016-0638、CVE-2016-3510、CVE-2019-2890漏洞POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T09:17:04Z",
|
||||
"updated_at": "2023-04-15T11:06:01Z",
|
||||
"updated_at": "2023-04-20T00:40:35Z",
|
||||
"pushed_at": "2020-08-11T08:36:29Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2016-4010",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T14:17:56Z",
|
||||
"updated_at": "2021-09-13T09:14:53Z",
|
||||
"updated_at": "2023-04-20T01:58:48Z",
|
||||
"pushed_at": "2020-08-10T14:23:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2023-03-29T21:07:01Z",
|
||||
"updated_at": "2023-04-20T01:26:37Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 702,
|
||||
"watchers_count": 702,
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"has_discussions": false,
|
||||
"forks_count": 286,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 286,
|
||||
"watchers": 702,
|
||||
"watchers": 703,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2023-04-18T09:17:33Z",
|
||||
"updated_at": "2023-04-20T04:44:34Z",
|
||||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2023-03-26T13:32:04Z",
|
||||
"updated_at": "2023-04-20T03:33:58Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 452,
|
||||
"watchers_count": 452,
|
||||
"stargazers_count": 453,
|
||||
"watchers_count": 453,
|
||||
"has_discussions": false,
|
||||
"forks_count": 199,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 199,
|
||||
"watchers": 452,
|
||||
"watchers": 453,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -459,10 +459,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2023-04-11T00:26:19Z",
|
||||
"updated_at": "2023-04-20T04:55:15Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 384,
|
||||
"watchers_count": 384,
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -471,7 +471,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 384,
|
||||
"watchers": 385,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-10352 CVE-2017-10271 weblogic-XMLDecoder",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-18T01:40:33Z",
|
||||
"updated_at": "2022-01-24T08:52:47Z",
|
||||
"updated_at": "2023-04-20T00:45:50Z",
|
||||
"pushed_at": "2018-02-25T02:01:19Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-13379",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T09:44:37Z",
|
||||
"updated_at": "2023-02-12T08:42:50Z",
|
||||
"updated_at": "2023-04-20T06:13:29Z",
|
||||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"has_discussions": false,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 249,
|
||||
"watchers": 248,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 485,
|
||||
"watchers_count": 485,
|
||||
"has_discussions": false,
|
||||
"forks_count": 187,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 187,
|
||||
"forks": 188,
|
||||
"watchers": 485,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2993,10 +2993,10 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2023-04-18T03:09:14Z",
|
||||
"updated_at": "2023-04-20T01:50:48Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
|
@ -3005,7 +3005,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 315,
|
||||
"watchers": 316,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-12-09T04:52:20Z",
|
||||
"updated_at": "2023-04-20T00:42:23Z",
|
||||
"pushed_at": "2021-09-13T02:58:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-04-19T10:25:30Z",
|
||||
"updated_at": "2023-04-20T05:24:58Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3730,
|
||||
"watchers_count": 3730,
|
||||
"stargazers_count": 3731,
|
||||
"watchers_count": 3731,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1077,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1077,
|
||||
"watchers": 3730,
|
||||
"watchers": 3731,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T05:07:42Z",
|
||||
"updated_at": "2021-11-24T07:10:19Z",
|
||||
"updated_at": "2023-04-20T01:21:13Z",
|
||||
"pushed_at": "2021-02-09T03:16:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic Unrestricted File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-17T11:12:32Z",
|
||||
"updated_at": "2022-06-28T16:06:36Z",
|
||||
"updated_at": "2023-04-20T00:38:26Z",
|
||||
"pushed_at": "2019-04-17T11:13:29Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-01T16:44:51Z",
|
||||
"updated_at": "2023-02-28T01:22:53Z",
|
||||
"updated_at": "2023-04-20T00:38:01Z",
|
||||
"pushed_at": "2019-11-02T10:47:46Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-2890 Exploit for WebLogic with T3",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-17T02:46:00Z",
|
||||
"updated_at": "2020-10-31T03:19:04Z",
|
||||
"updated_at": "2023-04-20T00:42:35Z",
|
||||
"pushed_at": "2019-10-17T01:25:41Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -187,10 +187,10 @@
|
|||
"description": "CVE-2015-4852、CVE-2016-0638、CVE-2016-3510、CVE-2019-2890漏洞POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T09:17:04Z",
|
||||
"updated_at": "2023-04-15T11:06:01Z",
|
||||
"updated_at": "2023-04-20T00:40:35Z",
|
||||
"pushed_at": "2020-08-11T08:36:29Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-01T20:53:49Z",
|
||||
"updated_at": "2023-03-29T13:08:20Z",
|
||||
"updated_at": "2023-04-20T01:29:55Z",
|
||||
"pushed_at": "2020-05-18T17:36:18Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -41,7 +41,7 @@
|
|||
"vulnerability-detection"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"forks": 28,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-12-09T04:52:20Z",
|
||||
"updated_at": "2023-04-20T00:42:23Z",
|
||||
"pushed_at": "2021-09-13T02:58:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-04-19T10:25:30Z",
|
||||
"updated_at": "2023-04-20T05:24:58Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3730,
|
||||
"watchers_count": 3730,
|
||||
"stargazers_count": 3731,
|
||||
"watchers_count": 3731,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1077,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1077,
|
||||
"watchers": 3730,
|
||||
"watchers": 3731,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "[CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T15:26:28Z",
|
||||
"updated_at": "2023-03-02T06:43:09Z",
|
||||
"updated_at": "2023-04-20T00:43:28Z",
|
||||
"pushed_at": "2020-11-09T17:21:45Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "Weblogic 身份认证绕过漏洞批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-11T08:52:28Z",
|
||||
"updated_at": "2021-02-03T19:49:27Z",
|
||||
"updated_at": "2023-04-20T00:46:50Z",
|
||||
"pushed_at": "2020-11-11T09:12:20Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 630316300,
|
||||
"name": "CVE-2020-17453",
|
||||
"full_name": "karthi-the-hacker\/CVE-2020-17453",
|
||||
"owner": {
|
||||
"login": "karthi-the-hacker",
|
||||
"id": 33289300,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
|
||||
"html_url": "https:\/\/github.com\/karthi-the-hacker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2020-17453",
|
||||
"description": "CVE-2020-17453 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-20T06:00:13Z",
|
||||
"updated_at": "2023-04-20T06:01:06Z",
|
||||
"pushed_at": "2023-04-20T06:03:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -179,10 +179,10 @@
|
|||
"description": "CVE-2020-2551 POC to use in Internet",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T02:56:12Z",
|
||||
"updated_at": "2023-01-26T13:59:12Z",
|
||||
"updated_at": "2023-04-20T00:40:23Z",
|
||||
"pushed_at": "2020-05-26T06:58:10Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -191,7 +191,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Proof of concept for Weblogic CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-13T09:56:48Z",
|
||||
"updated_at": "2021-11-01T14:05:46Z",
|
||||
"updated_at": "2023-04-20T00:41:51Z",
|
||||
"pushed_at": "2020-05-13T10:19:07Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-29T10:14:32Z",
|
||||
"updated_at": "2023-04-02T20:43:55Z",
|
||||
"updated_at": "2023-04-20T05:53:33Z",
|
||||
"pushed_at": "2022-03-03T17:50:03Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-12-09T04:52:20Z",
|
||||
"updated_at": "2023-04-20T00:42:23Z",
|
||||
"pushed_at": "2021-09-13T02:58:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2023-04-19T09:44:21Z",
|
||||
"updated_at": "2023-04-20T00:39:24Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -778,10 +778,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-04-19T18:54:43Z",
|
||||
"updated_at": "2023-04-20T01:45:06Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 878,
|
||||
"watchers_count": 878,
|
||||
"stargazers_count": 879,
|
||||
"watchers_count": 879,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -797,7 +797,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 878,
|
||||
"watchers": 879,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -639,10 +639,10 @@
|
|||
"description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T13:04:07Z",
|
||||
"updated_at": "2023-01-22T22:15:26Z",
|
||||
"updated_at": "2023-04-20T01:09:58Z",
|
||||
"pushed_at": "2022-04-23T03:21:44Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -653,7 +653,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-19T09:10:40Z",
|
||||
"updated_at": "2023-04-19T09:11:50Z",
|
||||
"pushed_at": "2023-04-19T09:16:37Z",
|
||||
"pushed_at": "2023-04-20T05:48:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2023-01-06T21:10:13Z",
|
||||
"updated_at": "2023-04-20T05:32:42Z",
|
||||
"pushed_at": "2021-08-25T01:00:49Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -216,10 +216,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2023-04-19T10:06:46Z",
|
||||
"updated_at": "2023-04-20T02:26:44Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1462,
|
||||
"watchers_count": 1462,
|
||||
"stargazers_count": 1463,
|
||||
"watchers_count": 1463,
|
||||
"has_discussions": false,
|
||||
"forks_count": 485,
|
||||
"allow_forking": true,
|
||||
|
@ -228,7 +228,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 485,
|
||||
"watchers": 1462,
|
||||
"watchers": 1463,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -535,10 +535,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2023-04-09T08:43:34Z",
|
||||
"updated_at": "2023-04-20T02:26:45Z",
|
||||
"pushed_at": "2022-06-22T20:21:42Z",
|
||||
"stargazers_count": 739,
|
||||
"watchers_count": 739,
|
||||
"stargazers_count": 740,
|
||||
"watchers_count": 740,
|
||||
"has_discussions": false,
|
||||
"forks_count": 168,
|
||||
"allow_forking": true,
|
||||
|
@ -554,7 +554,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 168,
|
||||
"watchers": 739,
|
||||
"watchers": 740,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -960,10 +960,10 @@
|
|||
"description": "CVE-2021-40444",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T08:16:07Z",
|
||||
"updated_at": "2023-03-28T13:33:58Z",
|
||||
"updated_at": "2023-04-20T01:23:27Z",
|
||||
"pushed_at": "2021-12-19T08:27:33Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -972,7 +972,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 20,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting: CVE-2021-41349",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-06T09:44:15Z",
|
||||
"updated_at": "2023-04-19T20:40:27Z",
|
||||
"updated_at": "2023-04-20T05:23:55Z",
|
||||
"pushed_at": "2022-01-06T10:57:17Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1259,7 +1259,7 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-04-19T02:20:34Z",
|
||||
"updated_at": "2023-04-20T05:41:41Z",
|
||||
"pushed_at": "2023-03-21T03:01:52Z",
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-22T04:11:03Z",
|
||||
"updated_at": "2023-03-22T14:09:02Z",
|
||||
"pushed_at": "2023-03-23T01:51:28Z",
|
||||
"pushed_at": "2023-04-20T00:54:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T10:03:17Z",
|
||||
"updated_at": "2023-03-14T18:20:52Z",
|
||||
"updated_at": "2023-04-20T05:46:09Z",
|
||||
"pushed_at": "2022-03-07T10:03:26Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-04-15T09:01:30Z",
|
||||
"updated_at": "2023-04-20T04:56:32Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 391,
|
||||
"watchers_count": 391,
|
||||
"stargazers_count": 392,
|
||||
"watchers_count": 392,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 391,
|
||||
"watchers": 392,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Oracle WebLogic Server 12.1.3.0.0 \/ 12.2.1.3.0 \/ 12.2.1.4.0 \/ 14.1.1.0.0 Local File Inclusion",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T14:50:29Z",
|
||||
"updated_at": "2023-04-18T13:38:28Z",
|
||||
"updated_at": "2023-04-20T00:39:59Z",
|
||||
"pushed_at": "2022-01-25T14:52:21Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1302,10 +1302,10 @@
|
|||
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-16T15:27:41Z",
|
||||
"updated_at": "2023-04-19T11:24:43Z",
|
||||
"updated_at": "2023-04-20T03:08:24Z",
|
||||
"pushed_at": "2022-05-16T15:33:37Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -1314,7 +1314,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -709,10 +709,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-04-19T18:54:43Z",
|
||||
"updated_at": "2023-04-20T01:45:06Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 878,
|
||||
"watchers_count": 878,
|
||||
"stargazers_count": 879,
|
||||
"watchers_count": 879,
|
||||
"has_discussions": false,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
|
@ -728,7 +728,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"watchers": 878,
|
||||
"watchers": 879,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1881,10 +1881,10 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2023-04-12T06:30:27Z",
|
||||
"updated_at": "2023-04-20T02:26:01Z",
|
||||
"pushed_at": "2023-01-23T13:00:34Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1893,7 +1893,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T09:59:01Z",
|
||||
"updated_at": "2023-01-13T06:56:58Z",
|
||||
"updated_at": "2023-04-20T02:19:26Z",
|
||||
"pushed_at": "2022-03-31T10:16:08Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -168,10 +168,10 @@
|
|||
"description": "Exploit for CVE-2022–25765 (pdfkit) - Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-10T00:50:35Z",
|
||||
"updated_at": "2023-04-08T03:26:44Z",
|
||||
"updated_at": "2023-04-20T01:49:26Z",
|
||||
"pushed_at": "2023-04-06T18:46:37Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -194,7 +194,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -249,10 +249,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2023-04-18T14:06:23Z",
|
||||
"updated_at": "2023-04-20T01:46:39Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"has_discussions": false,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
|
@ -261,7 +261,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2023-04-05T11:27:34Z",
|
||||
"updated_at": "2023-04-20T02:33:58Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 681,
|
||||
"watchers_count": 681,
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"has_discussions": false,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 681,
|
||||
"watchers": 682,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -830,10 +830,10 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2023-04-14T07:36:47Z",
|
||||
"updated_at": "2023-04-20T01:55:44Z",
|
||||
"pushed_at": "2023-04-13T16:46:26Z",
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -842,7 +842,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 377,
|
||||
"watchers": 378,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-34024.json
Normal file
31
2022/CVE-2022-34024.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 502839678,
|
||||
"name": "bug_report",
|
||||
"full_name": "sorabug\/bug_report",
|
||||
"owner": {
|
||||
"login": "sorabug",
|
||||
"id": 45709238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45709238?v=4",
|
||||
"html_url": "https:\/\/github.com\/sorabug"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sorabug\/bug_report",
|
||||
"description": "CVE-2022-34024",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T06:52:56Z",
|
||||
"updated_at": "2023-04-20T02:30:21Z",
|
||||
"pushed_at": "2022-06-13T07:08:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Windows LPE exploit for CVE-2022-37969",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T21:17:44Z",
|
||||
"updated_at": "2023-04-19T21:25:12Z",
|
||||
"updated_at": "2023-04-20T02:27:07Z",
|
||||
"pushed_at": "2023-04-03T17:47:07Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 36,
|
||||
"forks": 10,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2023-04-13T11:09:03Z",
|
||||
"updated_at": "2023-04-20T01:37:36Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 224,
|
||||
"watchers": 225,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-16T10:05:13Z",
|
||||
"updated_at": "2023-04-19T21:56:40Z",
|
||||
"updated_at": "2023-04-20T03:04:46Z",
|
||||
"pushed_at": "2023-04-18T13:02:21Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2023-21554 unauthenticated RCE in Microsoft Message Queuing (MSMQ)\/QueueJumper",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-19T13:21:17Z",
|
||||
"updated_at": "2023-04-19T13:21:20Z",
|
||||
"updated_at": "2023-04-20T06:05:56Z",
|
||||
"pushed_at": "2023-04-19T13:22:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2023-04-18T03:49:28Z",
|
||||
"updated_at": "2023-04-20T06:16:13Z",
|
||||
"pushed_at": "2023-02-27T04:51:20Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "RTF Crash POC Python 3.11 Windows 10",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T15:03:43Z",
|
||||
"updated_at": "2023-04-14T14:47:41Z",
|
||||
"updated_at": "2023-04-20T01:13:34Z",
|
||||
"pushed_at": "2023-03-07T15:17:47Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-04-19T13:51:23Z",
|
||||
"updated_at": "2023-04-20T03:51:01Z",
|
||||
"pushed_at": "2023-03-03T03:30:04Z",
|
||||
"stargazers_count": 516,
|
||||
"watchers_count": 516,
|
||||
"stargazers_count": 520,
|
||||
"watchers_count": 520,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 516,
|
||||
"watchers": 520,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-21T16:08:56Z",
|
||||
"updated_at": "2023-04-19T12:28:58Z",
|
||||
"updated_at": "2023-04-20T03:13:31Z",
|
||||
"pushed_at": "2023-02-26T06:43:18Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 181,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -137,13 +137,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -168,10 +168,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:43:39Z",
|
||||
"updated_at": "2023-04-20T00:34:57Z",
|
||||
"updated_at": "2023-04-20T02:52:13Z",
|
||||
"pushed_at": "2023-03-17T07:47:40Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -180,7 +180,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 301,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,19 +100,19 @@
|
|||
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-18T21:47:47Z",
|
||||
"updated_at": "2023-04-19T23:21:47Z",
|
||||
"updated_at": "2023-04-20T03:55:27Z",
|
||||
"pushed_at": "2023-04-19T12:03:55Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-27703 An Android version of pikpak version V1.29.2 element debugging interface leakage vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-11T06:24:04Z",
|
||||
"updated_at": "2023-04-19T07:51:41Z",
|
||||
"updated_at": "2023-04-20T06:22:02Z",
|
||||
"pushed_at": "2023-04-11T06:39:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-27T08:53:04Z",
|
||||
"updated_at": "2023-04-19T09:56:02Z",
|
||||
"updated_at": "2023-04-20T01:30:08Z",
|
||||
"pushed_at": "2023-04-04T05:26:59Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -5108,6 +5108,14 @@ Apache Commons Configuration performs variable interpolation, allowing propertie
|
|||
- [sammwyy/CVE-2022-33980-POC](https://github.com/sammwyy/CVE-2022-33980-POC)
|
||||
- [Code-971/CVE-2022-33980-EXP](https://github.com/Code-971/CVE-2022-33980-EXP)
|
||||
|
||||
### CVE-2022-34024 (2022-07-19)
|
||||
|
||||
<code>
|
||||
Barangay Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the resident module editing function at /bmis/pages/resident/resident.php.
|
||||
</code>
|
||||
|
||||
- [sorabug/bug_report](https://github.com/sorabug/bug_report)
|
||||
|
||||
### CVE-2022-34169 (2022-07-19)
|
||||
|
||||
<code>
|
||||
|
@ -17837,6 +17845,7 @@ WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp m
|
|||
</code>
|
||||
|
||||
- [ydycjz6j/CVE-2020-17453-PoC](https://github.com/ydycjz6j/CVE-2020-17453-PoC)
|
||||
- [karthi-the-hacker/CVE-2020-17453](https://github.com/karthi-the-hacker/CVE-2020-17453)
|
||||
|
||||
### CVE-2020-17456 (2020-08-19)
|
||||
|
||||
|
|
Loading…
Reference in a new issue