mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/09/26 18:31:50
This commit is contained in:
parent
d3aa8c530c
commit
af6090ce93
40 changed files with 383 additions and 133 deletions
|
@ -87,6 +87,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 55105611,
|
||||
"name": "certPinningVulnerableOkHttp",
|
||||
"full_name": "ikoz\/certPinningVulnerableOkHttp",
|
||||
"owner": {
|
||||
"login": "ikoz",
|
||||
"id": 9115937,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9115937?v=4",
|
||||
"html_url": "https:\/\/github.com\/ikoz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ikoz\/certPinningVulnerableOkHttp",
|
||||
"description": "OkHttp sample app vulnerable to CVE-2016-2402",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-30T23:45:06Z",
|
||||
"updated_at": "2018-11-30T02:52:33Z",
|
||||
"pushed_at": "2016-03-31T00:15:36Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2023-09-23T13:06:59Z",
|
||||
"updated_at": "2023-09-26T14:13:37Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 764,
|
||||
"watchers_count": 764,
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"has_discussions": false,
|
||||
"forks_count": 436,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 436,
|
||||
"watchers": 764,
|
||||
"watchers": 765,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -811,10 +811,10 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2023-09-08T07:05:08Z",
|
||||
"updated_at": "2023-09-26T14:11:13Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -823,7 +823,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -29,6 +29,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 80717942,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "JackBro\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "JackBro",
|
||||
"id": 21210712,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackBro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-02T11:16:38Z",
|
||||
"updated_at": "2017-10-14T08:34:32Z",
|
||||
"pushed_at": "2017-01-27T17:44:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 81874110,
|
||||
"name": "extra_recipe-iOS-10.2",
|
||||
"full_name": "Rootkitsmm-zz\/extra_recipe-iOS-10.2",
|
||||
"owner": {
|
||||
"login": "Rootkitsmm-zz",
|
||||
"id": 5567904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm-zz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rootkitsmm-zz\/extra_recipe-iOS-10.2",
|
||||
"description": "CVE-2017-2370",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-13T21:32:40Z",
|
||||
"updated_at": "2019-01-03T05:45:15Z",
|
||||
"pushed_at": "2017-02-01T11:36:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 142854846,
|
||||
"name": "CVE-2017-2370",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 84158718,
|
||||
"name": "S2-045",
|
||||
"full_name": "PolarisLab\/S2-045",
|
||||
"owner": {
|
||||
"login": "PolarisLab",
|
||||
"id": 25890110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
|
||||
"html_url": "https:\/\/github.com\/PolarisLab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
|
||||
"description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-07T05:30:30Z",
|
||||
"updated_at": "2022-03-22T17:04:53Z",
|
||||
"pushed_at": "2017-03-07T05:37:55Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 84186490,
|
||||
"name": "Struts2-045-Exp",
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T05:14:55Z",
|
||||
"updated_at": "2023-04-27T13:48:37Z",
|
||||
"updated_at": "2023-09-26T13:54:53Z",
|
||||
"pushed_at": "2022-07-18T05:36:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1841,10 +1841,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2023-09-19T01:29:40Z",
|
||||
"updated_at": "2023-09-26T15:05:50Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1148,
|
||||
"watchers_count": 1148,
|
||||
"stargazers_count": 1149,
|
||||
"watchers_count": 1149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
|
@ -1853,7 +1853,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 1148,
|
||||
"watchers": 1149,
|
||||
"score": 0,
|
||||
"subscribers_count": 69
|
||||
},
|
||||
|
@ -3107,10 +3107,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T19:33:53Z",
|
||||
"updated_at": "2023-09-21T17:52:36Z",
|
||||
"updated_at": "2023-09-26T15:09:19Z",
|
||||
"pushed_at": "2022-03-28T04:10:20Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -3119,7 +3119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2023-09-16T21:19:19Z",
|
||||
"updated_at": "2023-09-26T16:14:55Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 204,
|
||||
"watchers": 205,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2020-15778(OpenSSH vul)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T01:04:24Z",
|
||||
"updated_at": "2023-09-01T02:29:21Z",
|
||||
"updated_at": "2023-09-26T14:09:23Z",
|
||||
"pushed_at": "2022-02-18T08:04:46Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -166,10 +166,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-30T17:23:20Z",
|
||||
"updated_at": "2023-09-16T21:40:50Z",
|
||||
"updated_at": "2023-09-26T14:49:24Z",
|
||||
"pushed_at": "2020-12-30T17:24:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -178,7 +178,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -306,13 +306,13 @@
|
|||
"stargazers_count": 935,
|
||||
"watchers_count": 935,
|
||||
"has_discussions": false,
|
||||
"forks_count": 229,
|
||||
"forks_count": 230,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 229,
|
||||
"forks": 230,
|
||||
"watchers": 935,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "XMLRPC - RCE in MovableTypePoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-30T09:15:56Z",
|
||||
"updated_at": "2023-09-16T21:48:39Z",
|
||||
"updated_at": "2023-09-26T14:01:33Z",
|
||||
"pushed_at": "2022-03-21T13:23:03Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 22,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"has_discussions": false,
|
||||
"forks_count": 100,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -146,7 +146,7 @@
|
|||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"forks": 99,
|
||||
"watchers": 241,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T04:23:44Z",
|
||||
"updated_at": "2023-09-16T21:52:54Z",
|
||||
"updated_at": "2023-09-26T15:08:13Z",
|
||||
"pushed_at": "2022-04-15T08:52:11Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "S2-061\/S2-062 Struts2 远程命令执行漏洞 POC&EXP",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-10T14:48:52Z",
|
||||
"updated_at": "2023-08-04T05:23:28Z",
|
||||
"updated_at": "2023-09-26T15:25:53Z",
|
||||
"pushed_at": "2022-07-23T15:31:30Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2023-09-23T04:47:34Z",
|
||||
"updated_at": "2023-09-26T18:20:04Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-09-25T03:52:39Z",
|
||||
"updated_at": "2023-09-26T18:18:47Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 641,
|
||||
"watchers_count": 641,
|
||||
"stargazers_count": 642,
|
||||
"watchers_count": 642,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 641,
|
||||
"watchers": 642,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-09-22T09:36:33Z",
|
||||
"updated_at": "2023-09-26T12:53:56Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 730,
|
||||
"watchers_count": 730,
|
||||
"stargazers_count": 731,
|
||||
"watchers_count": 731,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 730,
|
||||
"watchers": 731,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-09-16T21:51:05Z",
|
||||
"updated_at": "2023-09-26T18:27:42Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 722,
|
||||
"watchers": 723,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "phpMyAdmin XSS ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T17:02:03Z",
|
||||
"updated_at": "2023-09-16T21:50:54Z",
|
||||
"updated_at": "2023-09-26T16:43:26Z",
|
||||
"pushed_at": "2022-02-03T16:21:01Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-2602",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T18:53:27Z",
|
||||
"updated_at": "2023-09-19T12:10:36Z",
|
||||
"updated_at": "2023-09-26T12:51:34Z",
|
||||
"pushed_at": "2022-12-22T11:21:11Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -232,10 +232,10 @@
|
|||
"description": "😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T18:25:26Z",
|
||||
"updated_at": "2023-09-16T21:53:09Z",
|
||||
"updated_at": "2023-09-26T13:48:33Z",
|
||||
"pushed_at": "2023-05-23T03:42:31Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -249,7 +249,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-09-26T07:16:58Z",
|
||||
"updated_at": "2023-09-26T14:41:12Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 840,
|
||||
"watchers_count": 840,
|
||||
"stargazers_count": 839,
|
||||
"watchers_count": 839,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 840,
|
||||
"watchers": 839,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-09-26T07:14:38Z",
|
||||
"updated_at": "2023-09-26T18:04:54Z",
|
||||
"pushed_at": "2023-07-10T16:35:49Z",
|
||||
"stargazers_count": 444,
|
||||
"watchers_count": 444,
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 444,
|
||||
"watchers": 445,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-21T16:08:56Z",
|
||||
"updated_at": "2023-09-20T18:52:48Z",
|
||||
"updated_at": "2023-09-26T13:34:31Z",
|
||||
"pushed_at": "2023-02-26T06:43:18Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 200,
|
||||
"watchers": 199,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "BlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-28T16:37:33Z",
|
||||
"updated_at": "2023-05-02T16:58:03Z",
|
||||
"updated_at": "2023-09-26T15:52:21Z",
|
||||
"pushed_at": "2023-04-12T16:13:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
32
2023/CVE-2023-29357.json
Normal file
32
2023/CVE-2023-29357.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 696891493,
|
||||
"name": "CVE-2023-29357",
|
||||
"full_name": "Chocapikk\/CVE-2023-29357",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-29357",
|
||||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T16:18:41Z",
|
||||
"updated_at": "2023-09-26T16:18:56Z",
|
||||
"pushed_at": "2023-09-26T18:07:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2023-09-26T12:29:57Z",
|
||||
"updated_at": "2023-09-26T16:36:25Z",
|
||||
"pushed_at": "2023-09-26T09:49:37Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Explore CVE 2023-30845 automatically across multiple subdomains",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-22T01:14:20Z",
|
||||
"updated_at": "2023-09-26T12:13:35Z",
|
||||
"updated_at": "2023-09-26T15:02:25Z",
|
||||
"pushed_at": "2023-09-22T01:48:19Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2023/CVE-2023-32364.json
Normal file
32
2023/CVE-2023-32364.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 696847089,
|
||||
"name": "CVE-2023-32364-macos-app-sandbox-escape",
|
||||
"full_name": "gergelykalman\/CVE-2023-32364-macos-app-sandbox-escape",
|
||||
"owner": {
|
||||
"login": "gergelykalman",
|
||||
"id": 1591209,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1591209?v=4",
|
||||
"html_url": "https:\/\/github.com\/gergelykalman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gergelykalman\/CVE-2023-32364-macos-app-sandbox-escape",
|
||||
"description": "Exploit for CVE-2023-32364",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T14:42:00Z",
|
||||
"updated_at": "2023-09-26T17:27:28Z",
|
||||
"pushed_at": "2023-09-26T14:44:09Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-09-22T18:44:00Z",
|
||||
"updated_at": "2023-09-26T18:02:50Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 418,
|
||||
"watchers_count": 418,
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 418,
|
||||
"watchers": 419,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T07:41:23Z",
|
||||
"updated_at": "2023-09-26T10:23:22Z",
|
||||
"updated_at": "2023-09-26T16:00:18Z",
|
||||
"pushed_at": "2023-09-01T07:48:43Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 101,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -172,10 +172,10 @@
|
|||
"description": "RCE exploit for CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T20:17:43Z",
|
||||
"updated_at": "2023-09-18T20:44:04Z",
|
||||
"updated_at": "2023-09-26T15:29:46Z",
|
||||
"pushed_at": "2023-08-23T16:27:28Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -184,7 +184,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-26T11:39:05Z",
|
||||
"updated_at": "2023-09-26T11:39:05Z",
|
||||
"pushed_at": "2023-09-26T12:32:25Z",
|
||||
"pushed_at": "2023-09-26T17:24:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-16T09:11:21Z",
|
||||
"updated_at": "2023-09-26T03:01:27Z",
|
||||
"updated_at": "2023-09-26T14:00:16Z",
|
||||
"pushed_at": "2023-09-17T09:14:32Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -27,8 +27,55 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 696932971,
|
||||
"name": "CVE-2023-36845",
|
||||
"full_name": "kljunowsky\/CVE-2023-36845",
|
||||
"owner": {
|
||||
"login": "kljunowsky",
|
||||
"id": 104329412,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4",
|
||||
"html_url": "https:\/\/github.com\/kljunowsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kljunowsky\/CVE-2023-36845",
|
||||
"description": "Python script to check if Juniper Firewalls are vulnerable to CVE-2023-36845 - RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T17:56:55Z",
|
||||
"updated_at": "2023-09-26T18:00:29Z",
|
||||
"pushed_at": "2023-09-26T18:00:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bug-bounty-hunting",
|
||||
"bugbounty",
|
||||
"bugbountytips",
|
||||
"bugbountytricks",
|
||||
"cve-2023-36845",
|
||||
"cybersecurity",
|
||||
"hacking",
|
||||
"jupiter",
|
||||
"jupiter-firewall",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"rce",
|
||||
"remote-code-execution",
|
||||
"remote-command-execution",
|
||||
"security",
|
||||
"web-application-security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-09-26T03:27:30Z",
|
||||
"updated_at": "2023-09-26T13:49:25Z",
|
||||
"pushed_at": "2023-09-17T02:17:52Z",
|
||||
"stargazers_count": 651,
|
||||
"watchers_count": 651,
|
||||
"stargazers_count": 652,
|
||||
"watchers_count": 652,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 651,
|
||||
"watchers": 652,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-16T01:28:58Z",
|
||||
"updated_at": "2023-09-26T02:27:47Z",
|
||||
"pushed_at": "2023-09-26T05:42:40Z",
|
||||
"pushed_at": "2023-09-26T15:32:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-16T01:05:16Z",
|
||||
"updated_at": "2023-09-22T15:02:18Z",
|
||||
"pushed_at": "2023-09-22T15:04:03Z",
|
||||
"pushed_at": "2023-09-26T15:31:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/ahrixia"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-43326",
|
||||
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on admin dashboard login function.",
|
||||
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on Multiple URLs.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-19T03:38:25Z",
|
||||
"updated_at": "2023-09-22T15:20:26Z",
|
||||
"pushed_at": "2023-09-22T15:20:11Z",
|
||||
"updated_at": "2023-09-26T16:13:12Z",
|
||||
"pushed_at": "2023-09-26T16:14:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-09-26T12:12:43Z",
|
||||
"updated_at": "2023-09-26T17:13:21Z",
|
||||
"pushed_at": "2023-09-22T04:31:47Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 136,
|
||||
"watchers": 138,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
19
README.md
19
README.md
|
@ -1838,6 +1838,13 @@
|
|||
|
||||
- [Wh04m1001/CVE-2023-29343](https://github.com/Wh04m1001/CVE-2023-29343)
|
||||
|
||||
### CVE-2023-29357 (2023-06-13)
|
||||
|
||||
<code>Microsoft SharePoint Server Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2023-29357](https://github.com/Chocapikk/CVE-2023-29357)
|
||||
|
||||
### CVE-2023-29360 (2023-06-13)
|
||||
|
||||
<code>Microsoft Streaming Service Elevation of Privilege Vulnerability
|
||||
|
@ -2361,6 +2368,13 @@
|
|||
|
||||
- [86x/CVE-2023-32353-PoC](https://github.com/86x/CVE-2023-32353-PoC)
|
||||
|
||||
### CVE-2023-32364 (2023-07-26)
|
||||
|
||||
<code>A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.5. A sandboxed process may be able to circumvent sandbox restrictions.
|
||||
</code>
|
||||
|
||||
- [gergelykalman/CVE-2023-32364-macos-app-sandbox-escape](https://github.com/gergelykalman/CVE-2023-32364-macos-app-sandbox-escape)
|
||||
|
||||
### CVE-2023-32560 (2023-08-10)
|
||||
|
||||
<code>An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution.\n\nThanks to a Researcher at Tenable for finding and reporting.\n\nFixed in version 6.4.1.
|
||||
|
@ -3044,6 +3058,7 @@
|
|||
</code>
|
||||
|
||||
- [vulncheck-oss/cve-2023-36845-scanner](https://github.com/vulncheck-oss/cve-2023-36845-scanner)
|
||||
- [kljunowsky/CVE-2023-36845](https://github.com/kljunowsky/CVE-2023-36845)
|
||||
|
||||
### CVE-2023-36846 (2023-08-17)
|
||||
|
||||
|
@ -28536,6 +28551,8 @@
|
|||
</code>
|
||||
|
||||
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
|
||||
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
|
||||
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
|
||||
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
|
||||
|
||||
### CVE-2017-2388 (2017-04-01)
|
||||
|
@ -28768,6 +28785,7 @@
|
|||
<code>The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
||||
</code>
|
||||
|
||||
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
|
||||
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
|
||||
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
|
||||
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
|
||||
|
@ -30871,6 +30889,7 @@
|
|||
</code>
|
||||
|
||||
- [ikoz/cert-pinning-flaw-poc](https://github.com/ikoz/cert-pinning-flaw-poc)
|
||||
- [ikoz/certPinningVulnerableOkHttp](https://github.com/ikoz/certPinningVulnerableOkHttp)
|
||||
|
||||
### CVE-2016-2431 (2016-05-09)
|
||||
|
||||
|
|
Loading…
Reference in a new issue