mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/12/13 06:20:01
This commit is contained in:
parent
1ae2fa88ff
commit
a52ad632ad
26 changed files with 526 additions and 1837 deletions
|
@ -43,7 +43,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-10-21T06:38:41Z",
|
||||
"updated_at": "2022-12-11T20:33:31Z",
|
||||
"pushed_at": "2022-12-11T21:58:36Z",
|
||||
"pushed_at": "2022-12-13T01:05:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2022-12-09T21:38:45Z",
|
||||
"updated_at": "2022-12-13T02:45:29Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"has_discussions": false,
|
||||
"forks_count": 287,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 287,
|
||||
"watchers": 694,
|
||||
"watchers": 695,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T16:51:39Z",
|
||||
"updated_at": "2022-10-19T10:03:07Z",
|
||||
"updated_at": "2022-12-13T04:50:32Z",
|
||||
"pushed_at": "2020-12-08T15:39:24Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T12:00:24Z",
|
||||
"updated_at": "2022-11-23T02:28:47Z",
|
||||
"updated_at": "2022-12-13T05:56:21Z",
|
||||
"pushed_at": "2021-04-30T02:27:52Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -84,13 +84,13 @@
|
|||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"forks": 32,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -254,10 +254,10 @@
|
|||
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T17:09:24Z",
|
||||
"updated_at": "2022-09-01T00:06:29Z",
|
||||
"updated_at": "2022-12-13T05:28:49Z",
|
||||
"pushed_at": "2020-04-25T05:06:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -273,7 +273,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -362,5 +362,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 577600604,
|
||||
"name": "CVE-2019-11510",
|
||||
"full_name": "trhacknon\/CVE-2019-11510",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-11510",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-12-13T05:09:42Z",
|
||||
"updated_at": "2022-12-13T05:32:09Z",
|
||||
"pushed_at": "2022-12-13T05:12:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1435,5 +1435,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 577607477,
|
||||
"name": "CVE-2019-19781",
|
||||
"full_name": "trhacknon\/CVE-2019-19781",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-19781",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-12-13T05:38:14Z",
|
||||
"updated_at": "2022-12-13T05:40:37Z",
|
||||
"pushed_at": "2022-12-13T05:41:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -53,13 +53,13 @@
|
|||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -79,7 +79,7 @@
|
|||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 62,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T16:51:39Z",
|
||||
"updated_at": "2022-10-19T10:03:07Z",
|
||||
"updated_at": "2022-12-13T04:50:32Z",
|
||||
"pushed_at": "2020-12-08T15:39:24Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-08T15:56:26Z",
|
||||
"updated_at": "2022-11-09T18:07:39Z",
|
||||
"updated_at": "2022-12-13T02:01:21Z",
|
||||
"pushed_at": "2020-05-08T17:10:48Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -53,13 +53,13 @@
|
|||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -244,35 +244,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277626606,
|
||||
"name": "F5-Patch",
|
||||
"full_name": "GoodiesHQ\/F5-Patch",
|
||||
"owner": {
|
||||
"login": "GoodiesHQ",
|
||||
"id": 4576046,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4576046?v=4",
|
||||
"html_url": "https:\/\/github.com\/GoodiesHQ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GoodiesHQ\/F5-Patch",
|
||||
"description": "Patch F5 appliance CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T19:07:33Z",
|
||||
"updated_at": "2020-07-06T19:07:34Z",
|
||||
"pushed_at": "2020-07-06T19:07:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 277692329,
|
||||
"name": "CVE-2020-5902",
|
||||
|
@ -1306,5 +1277,34 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 577594257,
|
||||
"name": "CVE-2020-5902-Scanner",
|
||||
"full_name": "trhacknon\/CVE-2020-5902-Scanner",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2020-5902-Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-12-13T04:42:11Z",
|
||||
"updated_at": "2022-12-13T04:42:26Z",
|
||||
"pushed_at": "2022-12-13T05:30:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2022-11-22T14:31:37Z",
|
||||
"updated_at": "2022-12-13T05:56:18Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 392,
|
||||
"watchers_count": 392,
|
||||
"stargazers_count": 391,
|
||||
"watchers_count": 391,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 392,
|
||||
"watchers": 391,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"forks": 68,
|
||||
"watchers": 228,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -455,10 +455,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2022-12-06T17:50:06Z",
|
||||
"updated_at": "2022-12-13T05:59:07Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 846,
|
||||
"watchers_count": 846,
|
||||
"stargazers_count": 845,
|
||||
"watchers_count": 845,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
@ -467,7 +467,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 846,
|
||||
"watchers": 845,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1924,13 +1924,13 @@
|
|||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 324,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1049,10 +1049,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-12-12T06:47:10Z",
|
||||
"updated_at": "2022-12-13T02:02:54Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3142,
|
||||
"watchers_count": 3142,
|
||||
"stargazers_count": 3141,
|
||||
"watchers_count": 3141,
|
||||
"has_discussions": true,
|
||||
"forks_count": 734,
|
||||
"allow_forking": true,
|
||||
|
@ -1061,7 +1061,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 734,
|
||||
"watchers": 3142,
|
||||
"watchers": 3141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -56,5 +56,34 @@
|
|||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 556684444,
|
||||
"name": "CVE-2022-37042",
|
||||
"full_name": "0xf4n9x\/CVE-2022-37042",
|
||||
"owner": {
|
||||
"login": "0xf4n9x",
|
||||
"id": 40891670,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xf4n9x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-37042",
|
||||
"description": "CVE-2022-37042 Zimbra Auth Bypass leads to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-24T10:10:45Z",
|
||||
"updated_at": "2022-12-13T05:33:58Z",
|
||||
"pushed_at": "2022-12-09T02:45:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 554169656,
|
||||
"name": "-expat_2.1.0_CVE-2022-40674",
|
||||
"full_name": "nidhi7598\/-expat_2.1.0_CVE-2022-40674",
|
||||
"name": "expat_2.1.0_CVE-2022-40674",
|
||||
"full_name": "nidhi7598\/expat_2.1.0_CVE-2022-40674",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/-expat_2.1.0_CVE-2022-40674",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/expat_2.1.0_CVE-2022-40674",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-19T11:15:29Z",
|
||||
"updated_at": "2022-10-19T11:15:29Z",
|
||||
"pushed_at": "2022-10-19T11:15:29Z",
|
||||
"updated_at": "2022-12-13T05:56:49Z",
|
||||
"pushed_at": "2022-12-13T05:57:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -580,10 +580,10 @@
|
|||
"description": "CVE-2022-42889 Text4Shell Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-22T10:30:41Z",
|
||||
"updated_at": "2022-10-22T10:31:54Z",
|
||||
"updated_at": "2022-12-13T04:44:38Z",
|
||||
"pushed_at": "2022-10-22T10:31:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -592,7 +592,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -609,10 +609,10 @@
|
|||
"description": "A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-23T05:48:48Z",
|
||||
"updated_at": "2022-10-24T05:21:27Z",
|
||||
"updated_at": "2022-12-13T04:50:35Z",
|
||||
"pushed_at": "2022-10-23T06:23:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -621,7 +621,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -831,10 +831,10 @@
|
|||
"description": "Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-04T19:26:23Z",
|
||||
"updated_at": "2022-12-09T20:14:16Z",
|
||||
"updated_at": "2022-12-13T04:53:44Z",
|
||||
"pushed_at": "2022-11-21T10:17:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -843,7 +843,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-12-03T11:04:17Z",
|
||||
"updated_at": "2022-12-12T14:00:34Z",
|
||||
"updated_at": "2022-12-13T02:25:37Z",
|
||||
"pushed_at": "2022-12-02T14:38:27Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T22:48:38Z",
|
||||
"updated_at": "2022-12-12T22:22:17Z",
|
||||
"updated_at": "2022-12-13T02:16:18Z",
|
||||
"pushed_at": "2022-12-11T13:37:22Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 61,
|
||||
"forks": 12,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-46169.json
Normal file
31
2022/CVE-2022-46169.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 575651169,
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "0xf4n9x\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "0xf4n9x",
|
||||
"id": 40891670,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xf4n9x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169",
|
||||
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-08T01:52:13Z",
|
||||
"updated_at": "2022-12-13T06:16:32Z",
|
||||
"pushed_at": "2022-12-08T02:50:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Reference in a new issue