mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 11:21:36 +01:00
Auto Update 2022/09/01 00:16:54
This commit is contained in:
parent
781805edd0
commit
a802f68386
30 changed files with 98 additions and 473 deletions
File diff suppressed because one or more lines are too long
|
@ -69,10 +69,10 @@
|
||||||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-10-21T11:19:21Z",
|
"created_at": "2016-10-21T11:19:21Z",
|
||||||
"updated_at": "2022-08-26T13:10:30Z",
|
"updated_at": "2022-08-31T19:54:06Z",
|
||||||
"pushed_at": "2021-02-03T16:03:40Z",
|
"pushed_at": "2021-02-03T16:03:40Z",
|
||||||
"stargazers_count": 903,
|
"stargazers_count": 904,
|
||||||
"watchers_count": 903,
|
"watchers_count": 904,
|
||||||
"forks_count": 410,
|
"forks_count": 410,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -80,7 +80,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 410,
|
"forks": 410,
|
||||||
"watchers": 903,
|
"watchers": 904,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "jenkins CVE-2017-1000353 POC",
|
"description": "jenkins CVE-2017-1000353 POC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-04-12T13:24:26Z",
|
"created_at": "2019-04-12T13:24:26Z",
|
||||||
"updated_at": "2022-06-27T03:34:44Z",
|
"updated_at": "2022-08-31T23:02:43Z",
|
||||||
"pushed_at": "2020-06-11T00:16:40Z",
|
"pushed_at": "2020-06-11T00:16:40Z",
|
||||||
"stargazers_count": 47,
|
"stargazers_count": 48,
|
||||||
"watchers_count": 47,
|
"watchers_count": 48,
|
||||||
"forks_count": 62,
|
"forks_count": 62,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -24,7 +24,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 62,
|
"forks": 62,
|
||||||
"watchers": 47,
|
"watchers": 48,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-01-16T00:23:34Z",
|
"created_at": "2018-01-16T00:23:34Z",
|
||||||
"updated_at": "2022-08-08T18:04:34Z",
|
"updated_at": "2022-08-31T20:25:00Z",
|
||||||
"pushed_at": "2020-12-22T03:10:47Z",
|
"pushed_at": "2020-12-22T03:10:47Z",
|
||||||
"stargazers_count": 124,
|
"stargazers_count": 125,
|
||||||
"watchers_count": 124,
|
"watchers_count": 125,
|
||||||
"forks_count": 43,
|
"forks_count": 43,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -24,7 +24,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 43,
|
"forks": 43,
|
||||||
"watchers": 124,
|
"watchers": 125,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1,30 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 140411928,
|
|
||||||
"name": "CVE-2018-12463",
|
|
||||||
"full_name": "alt3kx\/CVE-2018-12463",
|
|
||||||
"owner": {
|
|
||||||
"login": "alt3kx",
|
|
||||||
"id": 3140111,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/alt3kx"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
|
|
||||||
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-10T09:51:40Z",
|
|
||||||
"updated_at": "2021-10-08T04:36:54Z",
|
|
||||||
"pushed_at": "2022-04-07T19:09:31Z",
|
|
||||||
"stargazers_count": 6,
|
|
||||||
"watchers_count": 6,
|
|
||||||
"forks_count": 3,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 3,
|
|
||||||
"watchers": 6,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -1,30 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 141165293,
|
|
||||||
"name": "prestashop-exploits",
|
|
||||||
"full_name": "ambionics\/prestashop-exploits",
|
|
||||||
"owner": {
|
|
||||||
"login": "ambionics",
|
|
||||||
"id": 29630660,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/ambionics"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
|
|
||||||
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-16T16:33:41Z",
|
|
||||||
"updated_at": "2022-06-20T03:15:38Z",
|
|
||||||
"pushed_at": "2018-07-17T09:02:34Z",
|
|
||||||
"stargazers_count": 49,
|
|
||||||
"watchers_count": 49,
|
|
||||||
"forks_count": 14,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 14,
|
|
||||||
"watchers": 49,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -423,34 +423,6 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 139417715,
|
|
||||||
"name": "CVE-2018-2628",
|
|
||||||
"full_name": "likescam\/CVE-2018-2628",
|
|
||||||
"owner": {
|
|
||||||
"login": "likescam",
|
|
||||||
"id": 2469038,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/likescam"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-2628",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-02T09:00:34Z",
|
|
||||||
"updated_at": "2019-05-26T06:58:12Z",
|
|
||||||
"pushed_at": "2018-07-02T09:00:52Z",
|
|
||||||
"stargazers_count": 3,
|
|
||||||
"watchers_count": 3,
|
|
||||||
"forks_count": 1,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 1,
|
|
||||||
"watchers": 3,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 147341225,
|
"id": 147341225,
|
||||||
"name": "WebLogic-RCE-exploit",
|
"name": "WebLogic-RCE-exploit",
|
||||||
|
|
|
@ -1,60 +1,4 @@
|
||||||
[
|
[
|
||||||
{
|
|
||||||
"id": 141531715,
|
|
||||||
"name": "CVE-2018-2893",
|
|
||||||
"full_name": "sry309\/CVE-2018-2893",
|
|
||||||
"owner": {
|
|
||||||
"login": "sry309",
|
|
||||||
"id": 15671013,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15671013?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/sry309"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/sry309\/CVE-2018-2893",
|
|
||||||
"description": "CVE-2018-2893",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-19T06:06:10Z",
|
|
||||||
"updated_at": "2022-01-28T05:45:12Z",
|
|
||||||
"pushed_at": "2018-07-19T05:59:00Z",
|
|
||||||
"stargazers_count": 2,
|
|
||||||
"watchers_count": 2,
|
|
||||||
"forks_count": 43,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 43,
|
|
||||||
"watchers": 2,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": 141534186,
|
|
||||||
"name": "CVE-2018-2893",
|
|
||||||
"full_name": "ryanInf\/CVE-2018-2893",
|
|
||||||
"owner": {
|
|
||||||
"login": "ryanInf",
|
|
||||||
"id": 19621374,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19621374?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/ryanInf"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/ryanInf\/CVE-2018-2893",
|
|
||||||
"description": "CVE-2018-2893 PoC",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-19T06:28:12Z",
|
|
||||||
"updated_at": "2022-07-25T02:34:20Z",
|
|
||||||
"pushed_at": "2018-07-19T06:12:51Z",
|
|
||||||
"stargazers_count": 30,
|
|
||||||
"watchers_count": 30,
|
|
||||||
"forks_count": 37,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 37,
|
|
||||||
"watchers": 30,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 141678694,
|
"id": 141678694,
|
||||||
"name": "CVE-2018-2893",
|
"name": "CVE-2018-2893",
|
||||||
|
|
|
@ -1,60 +1,4 @@
|
||||||
[
|
[
|
||||||
{
|
|
||||||
"id": 141601079,
|
|
||||||
"name": "cve-2018-2894",
|
|
||||||
"full_name": "111ddea\/cve-2018-2894",
|
|
||||||
"owner": {
|
|
||||||
"login": "111ddea",
|
|
||||||
"id": 41444127,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/111ddea"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/111ddea\/cve-2018-2894",
|
|
||||||
"description": "cve-2018-2894 不同别人的利用方法。",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-19T15:50:35Z",
|
|
||||||
"updated_at": "2021-10-22T07:46:36Z",
|
|
||||||
"pushed_at": "2018-07-22T08:34:27Z",
|
|
||||||
"stargazers_count": 15,
|
|
||||||
"watchers_count": 15,
|
|
||||||
"forks_count": 7,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 7,
|
|
||||||
"watchers": 15,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": 141661586,
|
|
||||||
"name": "CVE-2018-2894",
|
|
||||||
"full_name": "LandGrey\/CVE-2018-2894",
|
|
||||||
"owner": {
|
|
||||||
"login": "LandGrey",
|
|
||||||
"id": 16769779,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16769779?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/LandGrey"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/LandGrey\/CVE-2018-2894",
|
|
||||||
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-20T03:59:18Z",
|
|
||||||
"updated_at": "2022-07-22T01:55:17Z",
|
|
||||||
"pushed_at": "2018-07-20T12:46:50Z",
|
|
||||||
"stargazers_count": 134,
|
|
||||||
"watchers_count": 134,
|
|
||||||
"forks_count": 53,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 53,
|
|
||||||
"watchers": 134,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 151928392,
|
"id": 151928392,
|
||||||
"name": "CVE-2018-2894",
|
"name": "CVE-2018-2894",
|
||||||
|
|
|
@ -27,34 +27,6 @@
|
||||||
"watchers": 118,
|
"watchers": 118,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 141314432,
|
|
||||||
"name": "CVE-2018-4121",
|
|
||||||
"full_name": "likescam\/CVE-2018-4121",
|
|
||||||
"owner": {
|
|
||||||
"login": "likescam",
|
|
||||||
"id": 2469038,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/likescam"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-4121",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-17T16:15:29Z",
|
|
||||||
"updated_at": "2018-07-17T16:15:44Z",
|
|
||||||
"pushed_at": "2018-07-17T16:15:42Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 147746670,
|
"id": 147746670,
|
||||||
"name": "CVE-2018-4121",
|
"name": "CVE-2018-4121",
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-04-28T11:50:00Z",
|
"created_at": "2018-04-28T11:50:00Z",
|
||||||
"updated_at": "2022-08-26T21:27:37Z",
|
"updated_at": "2022-08-31T19:31:13Z",
|
||||||
"pushed_at": "2018-08-30T05:37:03Z",
|
"pushed_at": "2018-08-30T05:37:03Z",
|
||||||
"stargazers_count": 459,
|
"stargazers_count": 458,
|
||||||
"watchers_count": 459,
|
"watchers_count": 458,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 459,
|
"watchers": 458,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -41,10 +41,10 @@
|
||||||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-03-30T14:23:18Z",
|
"created_at": "2018-03-30T14:23:18Z",
|
||||||
"updated_at": "2022-08-07T20:53:58Z",
|
"updated_at": "2022-08-31T21:22:31Z",
|
||||||
"pushed_at": "2019-03-29T11:25:57Z",
|
"pushed_at": "2019-03-29T11:25:57Z",
|
||||||
"stargazers_count": 345,
|
"stargazers_count": 346,
|
||||||
"watchers_count": 345,
|
"watchers_count": 346,
|
||||||
"forks_count": 116,
|
"forks_count": 116,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -59,7 +59,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 116,
|
"forks": 116,
|
||||||
"watchers": 345,
|
"watchers": 346,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -494,34 +494,6 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 140643631,
|
|
||||||
"name": "CVE-2018-7600",
|
|
||||||
"full_name": "happynote3966\/CVE-2018-7600",
|
|
||||||
"owner": {
|
|
||||||
"login": "happynote3966",
|
|
||||||
"id": 19719330,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/happynote3966"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7600",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-12T01:12:44Z",
|
|
||||||
"updated_at": "2018-07-17T03:24:11Z",
|
|
||||||
"pushed_at": "2018-07-17T03:24:09Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 151199861,
|
"id": 151199861,
|
||||||
"name": "CVE-2018-7600-Drupal-RCE",
|
"name": "CVE-2018-7600-Drupal-RCE",
|
||||||
|
|
|
@ -27,34 +27,6 @@
|
||||||
"watchers": 5,
|
"watchers": 5,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 140663638,
|
|
||||||
"name": "CVE-2018-7602",
|
|
||||||
"full_name": "happynote3966\/CVE-2018-7602",
|
|
||||||
"owner": {
|
|
||||||
"login": "happynote3966",
|
|
||||||
"id": 19719330,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/happynote3966"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7602",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-12T05:08:14Z",
|
|
||||||
"updated_at": "2018-07-17T02:57:18Z",
|
|
||||||
"pushed_at": "2018-07-17T02:57:17Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 1,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 1,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 155205612,
|
"id": 155205612,
|
||||||
"name": "CVE-2018-7602",
|
"name": "CVE-2018-7602",
|
||||||
|
|
|
@ -111,34 +111,6 @@
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 140478620,
|
|
||||||
"name": "cve-2018-8174_analysis",
|
|
||||||
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
|
|
||||||
"owner": {
|
|
||||||
"login": "piotrflorczyk",
|
|
||||||
"id": 7830144,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/piotrflorczyk"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
|
|
||||||
"description": "Analysis of VBS exploit CVE-2018-8174",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-07-10T19:31:25Z",
|
|
||||||
"updated_at": "2022-07-23T07:53:09Z",
|
|
||||||
"pushed_at": "2018-07-12T08:35:13Z",
|
|
||||||
"stargazers_count": 19,
|
|
||||||
"watchers_count": 19,
|
|
||||||
"forks_count": 17,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 17,
|
|
||||||
"watchers": 19,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 147615569,
|
"id": 147615569,
|
||||||
"name": "CVE-2018-8174-msf",
|
"name": "CVE-2018-8174-msf",
|
||||||
|
|
|
@ -1,30 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 144541015,
|
|
||||||
"name": "CVE-2018-8208",
|
|
||||||
"full_name": "kaisaryousuf\/CVE-2018-8208",
|
|
||||||
"owner": {
|
|
||||||
"login": "kaisaryousuf",
|
|
||||||
"id": 27071719,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27071719?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/kaisaryousuf"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/kaisaryousuf\/CVE-2018-8208",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2018-08-13T06:56:11Z",
|
|
||||||
"updated_at": "2018-11-12T16:22:38Z",
|
|
||||||
"pushed_at": "2018-06-21T15:06:07Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 2,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 2,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -246,10 +246,10 @@
|
||||||
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-12-07T17:09:24Z",
|
"created_at": "2019-12-07T17:09:24Z",
|
||||||
"updated_at": "2021-12-05T21:57:04Z",
|
"updated_at": "2022-09-01T00:06:29Z",
|
||||||
"pushed_at": "2020-04-25T05:06:45Z",
|
"pushed_at": "2020-04-25T05:06:45Z",
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 7,
|
"watchers_count": 8,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -264,7 +264,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 7,
|
"watchers": 8,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -41,10 +41,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-08-31T04:10:01Z",
|
"updated_at": "2022-08-31T18:33:35Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3514,
|
"stargazers_count": 3513,
|
||||||
"watchers_count": 3514,
|
"watchers_count": 3513,
|
||||||
"forks_count": 1033,
|
"forks_count": 1033,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -72,7 +72,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1033,
|
"forks": 1033,
|
||||||
"watchers": 3514,
|
"watchers": 3513,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -419,10 +419,10 @@
|
||||||
"description": "Automated script for Citrix ADC scanner (CVE-2019-19781) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
"description": "Automated script for Citrix ADC scanner (CVE-2019-19781) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-13T07:42:27Z",
|
"created_at": "2020-01-13T07:42:27Z",
|
||||||
"updated_at": "2022-08-19T14:37:27Z",
|
"updated_at": "2022-09-01T00:06:07Z",
|
||||||
"pushed_at": "2020-01-14T15:53:14Z",
|
"pushed_at": "2020-01-14T15:53:14Z",
|
||||||
"stargazers_count": 9,
|
"stargazers_count": 10,
|
||||||
"watchers_count": 9,
|
"watchers_count": 10,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -437,7 +437,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 9,
|
"watchers": 10,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1692,10 +1692,10 @@
|
||||||
"description": "CVE-2020-1472 C++",
|
"description": "CVE-2020-1472 C++",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-08-31T06:01:02Z",
|
"created_at": "2022-08-31T06:01:02Z",
|
||||||
"updated_at": "2022-08-31T16:01:32Z",
|
"updated_at": "2022-08-31T22:45:05Z",
|
||||||
"pushed_at": "2022-08-31T13:40:11Z",
|
"pushed_at": "2022-08-31T13:40:11Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 34,
|
||||||
"watchers_count": 31,
|
"watchers_count": 34,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -1703,7 +1703,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 31,
|
"watchers": 34,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-08-31T04:10:01Z",
|
"updated_at": "2022-08-31T18:33:35Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3514,
|
"stargazers_count": 3513,
|
||||||
"watchers_count": 3514,
|
"watchers_count": 3513,
|
||||||
"forks_count": 1033,
|
"forks_count": 1033,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1033,
|
"forks": 1033,
|
||||||
"watchers": 3514,
|
"watchers": 3513,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -69,10 +69,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-01-25T08:42:28Z",
|
"created_at": "2021-01-25T08:42:28Z",
|
||||||
"updated_at": "2022-08-22T19:21:35Z",
|
"updated_at": "2022-08-31T20:47:05Z",
|
||||||
"pushed_at": "2021-01-25T08:49:59Z",
|
"pushed_at": "2021-01-25T08:49:59Z",
|
||||||
"stargazers_count": 45,
|
"stargazers_count": 46,
|
||||||
"watchers_count": 45,
|
"watchers_count": 46,
|
||||||
"forks_count": 28,
|
"forks_count": 28,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -80,7 +80,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 28,
|
"forks": 28,
|
||||||
"watchers": 45,
|
"watchers": 46,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1209,34 +1209,6 @@
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 469573760,
|
|
||||||
"name": "dpipe",
|
|
||||||
"full_name": "notl0cal\/dpipe",
|
|
||||||
"owner": {
|
|
||||||
"login": "notl0cal",
|
|
||||||
"id": 24575356,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24575356?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/notl0cal"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/notl0cal\/dpipe",
|
|
||||||
"description": "CVE-2022-0847 SUID Shell Backdoor",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2022-03-14T03:58:21Z",
|
|
||||||
"updated_at": "2022-07-12T06:01:01Z",
|
|
||||||
"pushed_at": "2022-07-15T14:59:19Z",
|
|
||||||
"stargazers_count": 2,
|
|
||||||
"watchers_count": 2,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 2,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 469743112,
|
"id": 469743112,
|
||||||
"name": "CVE-2022-0847-POC",
|
"name": "CVE-2022-0847-POC",
|
||||||
|
@ -2077,5 +2049,33 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 531290655,
|
||||||
|
"name": "dpipe",
|
||||||
|
"full_name": "notl0cal\/dpipe",
|
||||||
|
"owner": {
|
||||||
|
"login": "notl0cal",
|
||||||
|
"id": 24575356,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24575356?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/notl0cal"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/notl0cal\/dpipe",
|
||||||
|
"description": "Proof-of-concept exploit for the Dirty Pipe vulnerability (CVE-2022-0847)",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-08-31T23:19:28Z",
|
||||||
|
"updated_at": "2022-08-31T23:24:51Z",
|
||||||
|
"pushed_at": "2022-08-31T23:25:58Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -237,10 +237,10 @@
|
||||||
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
|
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-05-09T10:34:38Z",
|
"created_at": "2022-05-09T10:34:38Z",
|
||||||
"updated_at": "2022-08-31T10:19:22Z",
|
"updated_at": "2022-08-31T20:03:16Z",
|
||||||
"pushed_at": "2022-05-16T12:40:51Z",
|
"pushed_at": "2022-05-16T12:40:51Z",
|
||||||
"stargazers_count": 73,
|
"stargazers_count": 74,
|
||||||
"watchers_count": 73,
|
"watchers_count": 74,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -248,7 +248,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 73,
|
"watchers": 74,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -42,7 +42,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-08-25T14:12:33Z",
|
"created_at": "2022-08-25T14:12:33Z",
|
||||||
"updated_at": "2022-08-27T18:41:18Z",
|
"updated_at": "2022-08-27T18:41:18Z",
|
||||||
"pushed_at": "2022-08-30T11:58:02Z",
|
"pushed_at": "2022-08-31T19:59:45Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 6,
|
"watchers_count": 6,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
|
|
|
@ -75,7 +75,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-08-31T16:23:16Z",
|
"created_at": "2022-08-31T16:23:16Z",
|
||||||
"updated_at": "2022-08-31T17:36:05Z",
|
"updated_at": "2022-08-31T17:36:05Z",
|
||||||
"pushed_at": "2022-08-31T17:26:39Z",
|
"pushed_at": "2022-08-31T22:32:09Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -14,16 +14,16 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-08-30T16:38:01Z",
|
"created_at": "2022-08-30T16:38:01Z",
|
||||||
"updated_at": "2022-08-31T09:20:50Z",
|
"updated_at": "2022-08-31T09:20:50Z",
|
||||||
"pushed_at": "2022-08-31T18:22:30Z",
|
"pushed_at": "2022-08-31T19:41:13Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 5,
|
"watchers_count": 5,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 5,
|
"watchers": 5,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "CVE-2022-25943",
|
"description": "CVE-2022-25943",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-07-09T23:34:57Z",
|
"created_at": "2021-07-09T23:34:57Z",
|
||||||
"updated_at": "2022-08-10T07:13:31Z",
|
"updated_at": "2022-08-31T18:22:55Z",
|
||||||
"pushed_at": "2022-03-09T08:26:45Z",
|
"pushed_at": "2022-03-09T08:26:45Z",
|
||||||
"stargazers_count": 48,
|
"stargazers_count": 49,
|
||||||
"watchers_count": 48,
|
"watchers_count": 49,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -24,7 +24,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 48,
|
"watchers": 49,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -182,10 +182,10 @@
|
||||||
"description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection",
|
"description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-06-03T19:24:30Z",
|
"created_at": "2022-06-03T19:24:30Z",
|
||||||
"updated_at": "2022-06-29T16:13:13Z",
|
"updated_at": "2022-08-31T18:28:54Z",
|
||||||
"pushed_at": "2022-06-03T19:59:01Z",
|
"pushed_at": "2022-06-03T19:59:01Z",
|
||||||
"stargazers_count": 22,
|
"stargazers_count": 23,
|
||||||
"watchers_count": 22,
|
"watchers_count": 23,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -193,7 +193,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 22,
|
"watchers": 23,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-06-07T23:26:47Z",
|
"created_at": "2022-06-07T23:26:47Z",
|
||||||
"updated_at": "2022-08-31T02:45:48Z",
|
"updated_at": "2022-08-31T20:23:35Z",
|
||||||
"pushed_at": "2022-06-16T12:42:43Z",
|
"pushed_at": "2022-06-16T12:42:43Z",
|
||||||
"stargazers_count": 168,
|
"stargazers_count": 167,
|
||||||
"watchers_count": 168,
|
"watchers_count": 167,
|
||||||
"forks_count": 39,
|
"forks_count": 39,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -24,7 +24,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 39,
|
"forks": 39,
|
||||||
"watchers": 168,
|
"watchers": 167,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
35
README.md
35
README.md
|
@ -207,7 +207,6 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
||||||
- [AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits)
|
- [AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits)
|
||||||
- [sa-infinity8888/Dirty-Pipe-CVE-2022-0847](https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847)
|
- [sa-infinity8888/Dirty-Pipe-CVE-2022-0847](https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847)
|
||||||
- [realbatuhan/dirtypipetester](https://github.com/realbatuhan/dirtypipetester)
|
- [realbatuhan/dirtypipetester](https://github.com/realbatuhan/dirtypipetester)
|
||||||
- [notl0cal/dpipe](https://github.com/notl0cal/dpipe)
|
|
||||||
- [CYB3RK1D/CVE-2022-0847-POC](https://github.com/CYB3RK1D/CVE-2022-0847-POC)
|
- [CYB3RK1D/CVE-2022-0847-POC](https://github.com/CYB3RK1D/CVE-2022-0847-POC)
|
||||||
- [breachnix/dirty-pipe-poc](https://github.com/breachnix/dirty-pipe-poc)
|
- [breachnix/dirty-pipe-poc](https://github.com/breachnix/dirty-pipe-poc)
|
||||||
- [Shotokhan/cve_2022_0847_shellcode](https://github.com/Shotokhan/cve_2022_0847_shellcode)
|
- [Shotokhan/cve_2022_0847_shellcode](https://github.com/Shotokhan/cve_2022_0847_shellcode)
|
||||||
|
@ -237,6 +236,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
||||||
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
|
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
|
||||||
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
|
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
|
||||||
- [irwx777/CVE-2022-0847](https://github.com/irwx777/CVE-2022-0847)
|
- [irwx777/CVE-2022-0847](https://github.com/irwx777/CVE-2022-0847)
|
||||||
|
- [notl0cal/dpipe](https://github.com/notl0cal/dpipe)
|
||||||
|
|
||||||
### CVE-2022-0848 (2022-03-04)
|
### CVE-2022-0848 (2022-03-04)
|
||||||
|
|
||||||
|
@ -17783,7 +17783,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
||||||
- [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628)
|
- [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628)
|
||||||
- [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628)
|
- [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628)
|
||||||
- [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628)
|
- [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628)
|
||||||
- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628)
|
|
||||||
- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit)
|
- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit)
|
||||||
- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628)
|
- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628)
|
||||||
- [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628)
|
- [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628)
|
||||||
|
@ -17825,8 +17824,6 @@ Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware
|
||||||
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [sry309/CVE-2018-2893](https://github.com/sry309/CVE-2018-2893)
|
|
||||||
- [ryanInf/CVE-2018-2893](https://github.com/ryanInf/CVE-2018-2893)
|
|
||||||
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
|
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
|
||||||
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
|
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
|
||||||
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
|
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
|
||||||
|
@ -17839,8 +17836,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
||||||
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [111ddea/cve-2018-2894](https://github.com/111ddea/cve-2018-2894)
|
|
||||||
- [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894)
|
|
||||||
- [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894)
|
- [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894)
|
||||||
- [k8gege/PyLadon](https://github.com/k8gege/PyLadon)
|
- [k8gege/PyLadon](https://github.com/k8gege/PyLadon)
|
||||||
|
|
||||||
|
@ -18000,7 +17995,6 @@ An issue was discovered in certain Apple products. iOS before 11.3 is affected.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [FSecureLABS/CVE-2018-4121](https://github.com/FSecureLABS/CVE-2018-4121)
|
- [FSecureLABS/CVE-2018-4121](https://github.com/FSecureLABS/CVE-2018-4121)
|
||||||
- [likescam/CVE-2018-4121](https://github.com/likescam/CVE-2018-4121)
|
|
||||||
- [jezzus/CVE-2018-4121](https://github.com/jezzus/CVE-2018-4121)
|
- [jezzus/CVE-2018-4121](https://github.com/jezzus/CVE-2018-4121)
|
||||||
|
|
||||||
### CVE-2018-4124 (2018-04-03)
|
### CVE-2018-4124 (2018-04-03)
|
||||||
|
@ -18644,7 +18638,6 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
|
||||||
- [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner)
|
- [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner)
|
||||||
- [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2)
|
- [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2)
|
||||||
- [jyo-zi/CVE-2018-7600](https://github.com/jyo-zi/CVE-2018-7600)
|
- [jyo-zi/CVE-2018-7600](https://github.com/jyo-zi/CVE-2018-7600)
|
||||||
- [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600)
|
|
||||||
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
|
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
|
||||||
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
|
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
|
||||||
- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600)
|
- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600)
|
||||||
|
@ -18669,7 +18662,6 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
|
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
|
||||||
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
|
|
||||||
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
|
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
|
||||||
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
|
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
|
||||||
|
|
||||||
|
@ -18848,7 +18840,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
|
||||||
- [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP)
|
- [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP)
|
||||||
- [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174)
|
- [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174)
|
||||||
- [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174)
|
- [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174)
|
||||||
- [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis)
|
|
||||||
- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf)
|
- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf)
|
||||||
- [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit)
|
- [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit)
|
||||||
- [ericisnotrealname/CVE-2018-8174_EXP](https://github.com/ericisnotrealname/CVE-2018-8174_EXP)
|
- [ericisnotrealname/CVE-2018-8174_EXP](https://github.com/ericisnotrealname/CVE-2018-8174_EXP)
|
||||||
|
@ -18860,14 +18851,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
|
||||||
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
|
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
|
||||||
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
|
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
|
||||||
|
|
||||||
### CVE-2018-8208 (2018-06-14)
|
|
||||||
|
|
||||||
<code>
|
|
||||||
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [kaisaryousuf/CVE-2018-8208](https://github.com/kaisaryousuf/CVE-2018-8208)
|
|
||||||
|
|
||||||
### CVE-2018-8214 (2018-06-14)
|
### CVE-2018-8214 (2018-06-14)
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
@ -19567,14 +19550,6 @@ LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a us
|
||||||
|
|
||||||
- [reversebrain/CVE-2018-12421](https://github.com/reversebrain/CVE-2018-12421)
|
- [reversebrain/CVE-2018-12421](https://github.com/reversebrain/CVE-2018-12421)
|
||||||
|
|
||||||
### CVE-2018-12463 (2018-07-12)
|
|
||||||
|
|
||||||
<code>
|
|
||||||
An XML external entity (XXE) vulnerability in Fortify Software Security Center (SSC), version 17.1, 17.2, 18.1 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463)
|
|
||||||
|
|
||||||
### CVE-2018-12533 (2018-06-18)
|
### CVE-2018-12533 (2018-06-18)
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
@ -19699,14 +19674,6 @@ An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.
|
||||||
|
|
||||||
- [shinecome/zip](https://github.com/shinecome/zip)
|
- [shinecome/zip](https://github.com/shinecome/zip)
|
||||||
|
|
||||||
### CVE-2018-13784 (2018-07-09)
|
|
||||||
|
|
||||||
<code>
|
|
||||||
PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php.
|
|
||||||
</code>
|
|
||||||
|
|
||||||
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
|
|
||||||
|
|
||||||
### CVE-2018-13797 (2018-07-10)
|
### CVE-2018-13797 (2018-07-10)
|
||||||
|
|
||||||
<code>
|
<code>
|
||||||
|
|
Loading…
Add table
Reference in a new issue