mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/03/15 12:15:15
This commit is contained in:
parent
d8eae13263
commit
b940ea9ca2
45 changed files with 397 additions and 313 deletions
|
@ -17,14 +17,14 @@
|
|||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"forks_count": 103,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2008-0166"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"forks": 104,
|
||||
"watchers": 334,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-08T08:29:11Z",
|
||||
"updated_at": "2022-02-03T17:43:26Z",
|
||||
"updated_at": "2022-03-15T09:34:25Z",
|
||||
"pushed_at": "2016-04-14T15:53:28Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -70,17 +70,17 @@
|
|||
"description": "Exploiting CVE-2016-4657 to JailBreak the Nintendo Switch",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-02T10:54:27Z",
|
||||
"updated_at": "2021-07-18T18:36:28Z",
|
||||
"updated_at": "2022-03-15T10:27:37Z",
|
||||
"pushed_at": "2018-02-03T14:49:44Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 50,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1065,17 +1065,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-03-15T02:43:23Z",
|
||||
"updated_at": "2022-03-15T08:59:26Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 47,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 144,
|
||||
"forks": 49,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -505,17 +505,17 @@
|
|||
"description": "Auto malicious git repository creation to exploit CVE-2018-11235 a Remote Code Execution using Git Sub module.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-22T21:15:50Z",
|
||||
"updated_at": "2021-12-22T15:28:18Z",
|
||||
"updated_at": "2022-03-15T07:47:40Z",
|
||||
"pushed_at": "2021-09-22T21:28:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,17 +100,17 @@
|
|||
"description": "Exploit for CVE-2018-15961, a unrestricted file upload vulnerability in Adobe ColdFusion 2018 leading to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T08:15:18Z",
|
||||
"updated_at": "2021-06-30T08:27:24Z",
|
||||
"updated_at": "2022-03-15T11:57:09Z",
|
||||
"pushed_at": "2021-06-30T08:27:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "RTSPServer Code Execution Vulnerability CVE-2018-4013",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-24T15:49:53Z",
|
||||
"updated_at": "2020-08-06T07:17:07Z",
|
||||
"updated_at": "2022-03-15T09:32:43Z",
|
||||
"pushed_at": "2018-11-26T23:35:57Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1705,17 +1705,17 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2022-03-14T08:48:38Z",
|
||||
"updated_at": "2022-03-15T07:27:14Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1100,
|
||||
"watchers_count": 1100,
|
||||
"stargazers_count": 1101,
|
||||
"watchers_count": 1101,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 1100,
|
||||
"watchers": 1101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1786,17 +1786,17 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2022-02-01T18:00:19Z",
|
||||
"updated_at": "2022-03-15T07:18:41Z",
|
||||
"pushed_at": "2021-01-10T04:31:22Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-03-15T02:17:37Z",
|
||||
"updated_at": "2022-03-15T10:12:16Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1705,
|
||||
"watchers_count": 1705,
|
||||
"forks_count": 256,
|
||||
"stargazers_count": 1706,
|
||||
"watchers_count": 1706,
|
||||
"forks_count": 257,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 256,
|
||||
"watchers": 1705,
|
||||
"forks": 257,
|
||||
"watchers": 1706,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -202,10 +202,10 @@
|
|||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2022-02-22T03:05:47Z",
|
||||
"updated_at": "2022-03-15T08:44:21Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -221,7 +221,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-12-22T19:18:35Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3209,
|
||||
"watchers_count": 3209,
|
||||
"forks_count": 953,
|
||||
"forks_count": 954,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,7 +69,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 953,
|
||||
"forks": 954,
|
||||
"watchers": 3209,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2022-03-04T08:29:03Z",
|
||||
"updated_at": "2022-03-15T08:14:04Z",
|
||||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"stargazers_count": 571,
|
||||
"watchers_count": 571,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"watchers": 570,
|
||||
"watchers": 571,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept app for Android permanent denial-of-service vulnerability, CVE-2020-0443",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T04:54:31Z",
|
||||
"updated_at": "2022-03-15T05:18:37Z",
|
||||
"updated_at": "2022-03-15T10:07:52Z",
|
||||
"pushed_at": "2022-03-15T05:15:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3209,
|
||||
"watchers_count": 3209,
|
||||
"forks_count": 953,
|
||||
"forks_count": 954,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,7 +42,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 953,
|
||||
"forks": 954,
|
||||
"watchers": 3209,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2022-02-12T15:36:25Z",
|
||||
"updated_at": "2022-03-15T06:46:25Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 176,
|
||||
"watchers": 177,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -202,17 +202,17 @@
|
|||
"description": "在一定条件下可执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T08:42:50Z",
|
||||
"updated_at": "2021-12-15T14:38:24Z",
|
||||
"updated_at": "2022-03-15T06:33:28Z",
|
||||
"pushed_at": "2020-02-21T08:45:51Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-07-22T12:34:47Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470049863,
|
||||
"name": "ka-cve-2021-21341",
|
||||
"full_name": "Mani1325\/ka-cve-2021-21341",
|
||||
"owner": {
|
||||
"login": "Mani1325",
|
||||
"id": 96471113,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96471113?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mani1325"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mani1325\/ka-cve-2021-21341",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T07:28:52Z",
|
||||
"updated_at": "2022-03-15T07:38:51Z",
|
||||
"pushed_at": "2022-03-15T07:38:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -84,10 +84,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2022-03-14T03:20:12Z",
|
||||
"updated_at": "2022-03-15T11:41:08Z",
|
||||
"pushed_at": "2021-12-30T12:26:11Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -96,7 +96,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -234,17 +234,17 @@
|
|||
"description": "Code By:Tas9er \/ F5 BIG-IP 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T05:56:21Z",
|
||||
"updated_at": "2021-12-03T11:53:56Z",
|
||||
"updated_at": "2022-03-15T07:42:46Z",
|
||||
"pushed_at": "2021-03-29T05:58:51Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2022-03-15T03:39:24Z",
|
||||
"updated_at": "2022-03-15T06:17:14Z",
|
||||
"pushed_at": "2021-12-08T03:06:43Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-29441.json
Normal file
29
2021/CVE-2021-29441.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 470076597,
|
||||
"name": "CVE-2021-29441",
|
||||
"full_name": "bysinks\/CVE-2021-29441",
|
||||
"owner": {
|
||||
"login": "bysinks",
|
||||
"id": 50199185,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4",
|
||||
"html_url": "https:\/\/github.com\/bysinks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bysinks\/CVE-2021-29441",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T08:53:59Z",
|
||||
"updated_at": "2022-03-15T09:02:02Z",
|
||||
"pushed_at": "2022-03-15T08:56:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -206,12 +206,12 @@
|
|||
"pushed_at": "2021-01-28T02:21:30Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -973,12 +973,12 @@
|
|||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
"forks_count": 122,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 122,
|
||||
"forks": 123,
|
||||
"watchers": 458,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-14T05:52:17Z",
|
||||
"updated_at": "2022-03-13T08:51:42Z",
|
||||
"updated_at": "2022-03-15T12:14:31Z",
|
||||
"pushed_at": "2022-01-14T05:56:09Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-14T05:03:54Z",
|
||||
"updated_at": "2022-03-15T06:06:57Z",
|
||||
"updated_at": "2022-03-15T10:55:36Z",
|
||||
"pushed_at": "2022-03-14T05:07:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 421010663,
|
||||
"name": "CVE-2021-37748",
|
||||
"full_name": "SECFORCE\/CVE-2021-37748",
|
||||
"owner": {
|
||||
"login": "SECFORCE",
|
||||
"id": 8157384,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
|
||||
"html_url": "https:\/\/github.com\/SECFORCE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2021-37748",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T12:16:41Z",
|
||||
"updated_at": "2022-02-12T03:49:08Z",
|
||||
"pushed_at": "2021-10-25T12:57:55Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -106,17 +106,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-03-14T13:16:16Z",
|
||||
"updated_at": "2022-03-15T08:23:58Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1410,
|
||||
"watchers_count": 1410,
|
||||
"forks_count": 412,
|
||||
"stargazers_count": 1412,
|
||||
"watchers_count": 1412,
|
||||
"forks_count": 413,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 412,
|
||||
"watchers": 1410,
|
||||
"forks": 413,
|
||||
"watchers": 1412,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -912,14 +912,14 @@
|
|||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"forks_count": 82,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"forks": 83,
|
||||
"watchers": 459,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1261,10 +1261,10 @@
|
|||
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:01:26Z",
|
||||
"updated_at": "2022-03-11T23:19:30Z",
|
||||
"updated_at": "2022-03-15T09:38:52Z",
|
||||
"pushed_at": "2022-02-07T15:42:00Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1287,7 +1287,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -53,33 +53,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 420818304,
|
||||
"name": "CVE-2021-40444",
|
||||
"full_name": "TiagoSergio\/CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "TiagoSergio",
|
||||
"id": 24528913,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
|
||||
"html_url": "https:\/\/github.com\/TiagoSergio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-24T23:17:12Z",
|
||||
"updated_at": "2021-10-24T23:17:28Z",
|
||||
"pushed_at": "2021-10-24T23:17:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 422246280,
|
||||
"name": "CVE-2021-40444-POC",
|
||||
|
|
|
@ -612,11 +612,11 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2022-03-15T03:14:42Z",
|
||||
"updated_at": "2022-03-15T08:44:21Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -630,8 +630,8 @@
|
|||
"thehackersbrain"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 25,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-03-14T01:55:53Z",
|
||||
"updated_at": "2022-03-15T06:22:16Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 281,
|
||||
"stargazers_count": 1051,
|
||||
"watchers_count": 1051,
|
||||
"forks_count": 282,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1050,
|
||||
"forks": 282,
|
||||
"watchers": 1051,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -860,10 +860,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-03-10T11:49:02Z",
|
||||
"updated_at": "2022-03-15T07:28:37Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 708,
|
||||
"watchers_count": 708,
|
||||
"stargazers_count": 709,
|
||||
"watchers_count": 709,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -890,7 +890,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 708,
|
||||
"watchers": 709,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -911,7 +911,7 @@
|
|||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1271,
|
||||
"watchers_count": 1271,
|
||||
"forks_count": 347,
|
||||
"forks_count": 346,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -921,7 +921,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 347,
|
||||
"forks": 346,
|
||||
"watchers": 1271,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3208,17 +3208,17 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2022-03-13T15:38:15Z",
|
||||
"updated_at": "2022-03-15T07:28:20Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 321,
|
||||
"watchers": 322,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5937,12 +5937,12 @@
|
|||
"pushed_at": "2022-02-03T20:02:09Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 95,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"forks": 94,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -6766,17 +6766,17 @@
|
|||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2022-03-09T06:29:52Z",
|
||||
"updated_at": "2022-03-15T08:55:40Z",
|
||||
"pushed_at": "2022-01-23T22:37:41Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-03-15T02:43:23Z",
|
||||
"updated_at": "2022-03-15T08:59:26Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 47,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 144,
|
||||
"forks": 49,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,17 +121,17 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-03-15T02:51:19Z",
|
||||
"updated_at": "2022-03-15T12:02:50Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 820,
|
||||
"watchers_count": 820,
|
||||
"forks_count": 158,
|
||||
"stargazers_count": 826,
|
||||
"watchers_count": 826,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 158,
|
||||
"watchers": 820,
|
||||
"forks": 161,
|
||||
"watchers": 826,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -283,17 +283,17 @@
|
|||
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T09:10:51Z",
|
||||
"updated_at": "2022-03-15T03:02:00Z",
|
||||
"updated_at": "2022-03-15T08:12:21Z",
|
||||
"pushed_at": "2022-03-08T09:14:25Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -337,17 +337,17 @@
|
|||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T11:49:40Z",
|
||||
"updated_at": "2022-03-15T00:57:39Z",
|
||||
"updated_at": "2022-03-15T11:45:36Z",
|
||||
"pushed_at": "2022-03-08T11:52:22Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 12,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 21,
|
||||
"forks": 13,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -364,17 +364,17 @@
|
|||
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T12:43:43Z",
|
||||
"updated_at": "2022-03-15T01:26:18Z",
|
||||
"updated_at": "2022-03-15T09:13:50Z",
|
||||
"pushed_at": "2022-03-08T13:15:35Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 9,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -526,17 +526,17 @@
|
|||
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:13:24Z",
|
||||
"updated_at": "2022-03-14T13:16:20Z",
|
||||
"updated_at": "2022-03-15T12:06:42Z",
|
||||
"pushed_at": "2022-03-08T19:53:16Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -663,17 +663,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-09T05:22:20Z",
|
||||
"updated_at": "2022-03-10T18:50:04Z",
|
||||
"updated_at": "2022-03-15T11:48:55Z",
|
||||
"pushed_at": "2022-03-09T06:16:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1074,17 +1074,17 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-03-15T03:49:25Z",
|
||||
"updated_at": "2022-03-15T10:39:54Z",
|
||||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 14,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 82,
|
||||
"forks": 15,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1160,7 +1160,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-14T13:21:25Z",
|
||||
"updated_at": "2022-03-14T19:36:09Z",
|
||||
"pushed_at": "2022-03-14T13:29:03Z",
|
||||
"pushed_at": "2022-03-15T09:06:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
@ -1186,17 +1186,17 @@
|
|||
"description": "CVE-2022-0847 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-14T15:32:25Z",
|
||||
"updated_at": "2022-03-14T18:00:25Z",
|
||||
"updated_at": "2022-03-15T07:53:31Z",
|
||||
"pushed_at": "2022-03-14T20:34:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1231,21 +1231,75 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470027659,
|
||||
"name": "CVE-2022-0847",
|
||||
"full_name": "phuonguno98\/CVE-2022-0847",
|
||||
"id": 470069674,
|
||||
"name": "DirtyPIPE-CVE-2022-0847",
|
||||
"full_name": "githublihaha\/DirtyPIPE-CVE-2022-0847",
|
||||
"owner": {
|
||||
"login": "githublihaha",
|
||||
"id": 43808858,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43808858?v=4",
|
||||
"html_url": "https:\/\/github.com\/githublihaha"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/githublihaha\/DirtyPIPE-CVE-2022-0847",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T08:33:19Z",
|
||||
"updated_at": "2022-03-15T08:34:07Z",
|
||||
"pushed_at": "2022-03-15T08:55:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470076829,
|
||||
"name": "CVE-2022-0847-DirtyPipe-Exploits",
|
||||
"full_name": "phuonguno98\/CVE-2022-0847-DirtyPipe-Exploits",
|
||||
"owner": {
|
||||
"login": "phuonguno98",
|
||||
"id": 55579865,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55579865?v=4",
|
||||
"html_url": "https:\/\/github.com\/phuonguno98"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phuonguno98\/CVE-2022-0847",
|
||||
"html_url": "https:\/\/github.com\/phuonguno98\/CVE-2022-0847-DirtyPipe-Exploits",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T06:06:31Z",
|
||||
"updated_at": "2022-03-15T06:06:54Z",
|
||||
"pushed_at": "2022-03-15T06:06:51Z",
|
||||
"created_at": "2022-03-15T08:54:38Z",
|
||||
"updated_at": "2022-03-15T08:54:46Z",
|
||||
"pushed_at": "2022-03-15T09:11:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470128338,
|
||||
"name": "CVE-2022-0847-dirty-pipe-kernel-checker",
|
||||
"full_name": "MrP1xel\/CVE-2022-0847-dirty-pipe-kernel-checker",
|
||||
"owner": {
|
||||
"login": "MrP1xel",
|
||||
"id": 16755572,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16755572?v=4",
|
||||
"html_url": "https:\/\/github.com\/MrP1xel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MrP1xel\/CVE-2022-0847-dirty-pipe-kernel-checker",
|
||||
"description": "Python script to check if your kernel is vulnerable to Dirty pipe CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T11:25:19Z",
|
||||
"updated_at": "2022-03-15T11:27:38Z",
|
||||
"pushed_at": "2022-03-15T11:30:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T09:10:56Z",
|
||||
"updated_at": "2022-03-12T08:16:55Z",
|
||||
"updated_at": "2022-03-15T08:20:26Z",
|
||||
"pushed_at": "2022-03-12T14:31:08Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-03-14T01:58:30Z",
|
||||
"updated_at": "2022-03-15T08:17:55Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 391,
|
||||
"watchers_count": 391,
|
||||
"stargazers_count": 392,
|
||||
"watchers_count": 392,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 391,
|
||||
"watchers": 392,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-03-15T06:11:31Z",
|
||||
"updated_at": "2022-03-15T09:15:53Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 45,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,8 +29,8 @@
|
|||
"rtf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 227,
|
||||
"forks": 47,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"forks_count": 96,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,7 +25,7 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"forks": 95,
|
||||
"watchers": 495,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploits CVE-2022-22588 vulnerability on iOS 15.2 and lower. Provided for research purposes only.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-01T07:38:48Z",
|
||||
"updated_at": "2022-03-14T20:24:30Z",
|
||||
"updated_at": "2022-03-15T06:35:33Z",
|
||||
"pushed_at": "2022-03-09T18:32:20Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2022-03-13T15:49:59Z",
|
||||
"updated_at": "2022-03-15T12:06:38Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 164,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -125,12 +125,12 @@
|
|||
"pushed_at": "2022-03-03T14:31:32Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -175,17 +175,17 @@
|
|||
"description": "SpringCloudGatewayRCE - CVE-2022-22947 \/ Code By:Tas9er",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-03T19:45:18Z",
|
||||
"updated_at": "2022-03-06T12:53:34Z",
|
||||
"updated_at": "2022-03-15T07:42:04Z",
|
||||
"pushed_at": "2022-03-03T20:44:25Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -864,5 +864,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470075351,
|
||||
"name": "CVE-2022-22947",
|
||||
"full_name": "bysinks\/CVE-2022-22947",
|
||||
"owner": {
|
||||
"login": "bysinks",
|
||||
"id": 50199185,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4",
|
||||
"html_url": "https:\/\/github.com\/bysinks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bysinks\/CVE-2022-22947",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T08:50:13Z",
|
||||
"updated_at": "2022-03-15T08:50:13Z",
|
||||
"pushed_at": "2022-03-15T08:52:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "cve-2022-23131 exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T08:38:53Z",
|
||||
"updated_at": "2022-03-11T13:44:25Z",
|
||||
"updated_at": "2022-03-15T08:14:38Z",
|
||||
"pushed_at": "2022-02-21T04:27:48Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 80,
|
||||
"forks": 32,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T05:11:23Z",
|
||||
"updated_at": "2022-03-15T05:11:23Z",
|
||||
"updated_at": "2022-03-15T09:49:33Z",
|
||||
"pushed_at": "2022-03-15T05:15:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-24122 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-10T15:20:04Z",
|
||||
"updated_at": "2022-03-15T06:10:26Z",
|
||||
"pushed_at": "2022-03-14T20:29:56Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"updated_at": "2022-03-15T10:20:13Z",
|
||||
"pushed_at": "2022-03-15T11:18:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-03-15T05:29:02Z",
|
||||
"updated_at": "2022-03-15T11:32:23Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 184,
|
||||
"forks": 33,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -125,7 +125,9 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [CYB3RK1D/CVE-2022-0847-POC](https://github.com/CYB3RK1D/CVE-2022-0847-POC)
|
||||
- [breachnix/dirty-pipe-poc](https://github.com/breachnix/dirty-pipe-poc)
|
||||
- [Shotokhan/cve_2022_0847_shellcode](https://github.com/Shotokhan/cve_2022_0847_shellcode)
|
||||
- [phuonguno98/CVE-2022-0847](https://github.com/phuonguno98/CVE-2022-0847)
|
||||
- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847)
|
||||
- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker)
|
||||
|
||||
### CVE-2022-0848 (2022-03-04)
|
||||
|
||||
|
@ -366,6 +368,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
|
|||
- [michaelklaan/CVE-2022-22947-Spring-Cloud](https://github.com/michaelklaan/CVE-2022-22947-Spring-Cloud)
|
||||
- [hh-hunter/cve-2022-22947-docker](https://github.com/hh-hunter/cve-2022-22947-docker)
|
||||
- [k3rwin/spring-cloud-gateway-rce](https://github.com/k3rwin/spring-cloud-gateway-rce)
|
||||
- [bysinks/CVE-2022-22947](https://github.com/bysinks/CVE-2022-22947)
|
||||
|
||||
### CVE-2022-23046 (2022-01-19)
|
||||
|
||||
|
@ -1485,6 +1488,7 @@ XStream is a Java library to serialize objects to XML and back again. In XStream
|
|||
</code>
|
||||
|
||||
- [s-index/CVE-2021-21341](https://github.com/s-index/CVE-2021-21341)
|
||||
- [Mani1325/ka-cve-2021-21341](https://github.com/Mani1325/ka-cve-2021-21341)
|
||||
|
||||
### CVE-2021-21349 (2021-03-22)
|
||||
|
||||
|
@ -2475,6 +2479,14 @@ Grav is a file based Web-platform. Twig processing of static pages can be enable
|
|||
|
||||
- [CsEnox/CVE-2021-29440](https://github.com/CsEnox/CVE-2021-29440)
|
||||
|
||||
### CVE-2021-29441 (2021-04-27)
|
||||
|
||||
<code>
|
||||
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
|
||||
</code>
|
||||
|
||||
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
|
||||
|
||||
### CVE-2021-29447 (2021-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -3067,14 +3079,6 @@ TensorFlow is an end-to-end open source platform for machine learning. In affect
|
|||
|
||||
- [fran-CICS/ExploitTensorflowCVE-2021-37678](https://github.com/fran-CICS/ExploitTensorflowCVE-2021-37678)
|
||||
|
||||
### CVE-2021-37748 (2021-10-28)
|
||||
|
||||
<code>
|
||||
Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.
|
||||
</code>
|
||||
|
||||
- [SECFORCE/CVE-2021-37748](https://github.com/SECFORCE/CVE-2021-37748)
|
||||
|
||||
### CVE-2021-37832 (2021-08-03)
|
||||
|
||||
<code>
|
||||
|
@ -3202,7 +3206,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability
|
|||
|
||||
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
|
||||
- [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project)
|
||||
- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444)
|
||||
- [0xK4gura/CVE-2021-40444-POC](https://github.com/0xK4gura/CVE-2021-40444-POC)
|
||||
- [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml)
|
||||
- [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)
|
||||
|
|
Loading…
Reference in a new issue