mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/06/30 18:19:29
This commit is contained in:
parent
6571ed43d7
commit
c279a321a9
36 changed files with 216 additions and 425 deletions
|
@ -41,10 +41,10 @@
|
|||
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-23T10:41:00Z",
|
||||
"updated_at": "2022-04-25T02:34:31Z",
|
||||
"updated_at": "2022-06-30T14:08:26Z",
|
||||
"pushed_at": "2016-03-23T12:05:38Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "CVE-2017-13089",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-15T08:22:58Z",
|
||||
"updated_at": "2021-08-11T23:40:17Z",
|
||||
"updated_at": "2022-06-30T12:41:00Z",
|
||||
"pushed_at": "2017-11-15T08:36:12Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 56,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 140411928,
|
||||
"name": "CVE-2018-12463",
|
||||
"full_name": "alt3kx\/CVE-2018-12463",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
|
||||
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-10T09:51:40Z",
|
||||
"updated_at": "2021-10-08T04:36:54Z",
|
||||
"pushed_at": "2022-04-07T19:09:31Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -189,8 +189,8 @@
|
|||
"description": "CVE-2018-16763 but without errors",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-22T07:02:52Z",
|
||||
"updated_at": "2022-03-05T20:57:30Z",
|
||||
"pushed_at": "2021-09-26T11:22:53Z",
|
||||
"updated_at": "2022-06-30T16:46:54Z",
|
||||
"pushed_at": "2022-06-30T16:46:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -423,34 +423,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 139417715,
|
||||
"name": "CVE-2018-2628",
|
||||
"full_name": "likescam\/CVE-2018-2628",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-2628",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-02T09:00:34Z",
|
||||
"updated_at": "2019-05-26T06:58:12Z",
|
||||
"pushed_at": "2018-07-02T09:00:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 147341225,
|
||||
"name": "WebLogic-RCE-exploit",
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2022-06-20T02:32:42Z",
|
||||
"updated_at": "2022-06-30T13:41:27Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 525,
|
||||
"watchers_count": 525,
|
||||
"stargazers_count": 526,
|
||||
"watchers_count": 526,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -97,7 +97,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 525,
|
||||
"watchers": 526,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -494,34 +494,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 140643631,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "happynote3966\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "happynote3966",
|
||||
"id": 19719330,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
|
||||
"html_url": "https:\/\/github.com\/happynote3966"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7600",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-12T01:12:44Z",
|
||||
"updated_at": "2018-07-17T03:24:11Z",
|
||||
"pushed_at": "2018-07-17T03:24:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 151199861,
|
||||
"name": "CVE-2018-7600-Drupal-RCE",
|
||||
|
|
|
@ -27,34 +27,6 @@
|
|||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 140663638,
|
||||
"name": "CVE-2018-7602",
|
||||
"full_name": "happynote3966\/CVE-2018-7602",
|
||||
"owner": {
|
||||
"login": "happynote3966",
|
||||
"id": 19719330,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
|
||||
"html_url": "https:\/\/github.com\/happynote3966"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7602",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-12T05:08:14Z",
|
||||
"updated_at": "2018-07-17T02:57:18Z",
|
||||
"pushed_at": "2018-07-17T02:57:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155205612,
|
||||
"name": "CVE-2018-7602",
|
||||
|
|
|
@ -111,34 +111,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 140478620,
|
||||
"name": "cve-2018-8174_analysis",
|
||||
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
|
||||
"owner": {
|
||||
"login": "piotrflorczyk",
|
||||
"id": 7830144,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
|
||||
"html_url": "https:\/\/github.com\/piotrflorczyk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
|
||||
"description": "Analysis of VBS exploit CVE-2018-8174",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-10T19:31:25Z",
|
||||
"updated_at": "2021-12-15T14:34:28Z",
|
||||
"pushed_at": "2018-07-12T08:35:13Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 147615569,
|
||||
"name": "CVE-2018-8174-msf",
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 144541015,
|
||||
"name": "CVE-2018-8208",
|
||||
"full_name": "kaisaryousuf\/CVE-2018-8208",
|
||||
"owner": {
|
||||
"login": "kaisaryousuf",
|
||||
"id": 27071719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27071719?v=4",
|
||||
"html_url": "https:\/\/github.com\/kaisaryousuf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kaisaryousuf\/CVE-2018-8208",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-13T06:56:11Z",
|
||||
"updated_at": "2018-11-12T16:22:38Z",
|
||||
"pushed_at": "2018-06-21T15:06:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3216,10 +3216,10 @@
|
|||
"description": "this is a local scanner for cve-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-25T07:05:38Z",
|
||||
"updated_at": "2021-09-26T14:22:50Z",
|
||||
"updated_at": "2022-06-30T13:50:49Z",
|
||||
"pushed_at": "2021-03-25T07:12:21Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3235,7 +3235,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2022-06-15T19:57:27Z",
|
||||
"updated_at": "2022-06-30T17:29:38Z",
|
||||
"pushed_at": "2022-01-17T19:45:41Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -632,20 +632,20 @@
|
|||
},
|
||||
{
|
||||
"id": 502654937,
|
||||
"name": "Webmin-RCE",
|
||||
"full_name": "NullBrunk\/Webmin-RCE",
|
||||
"name": "CVE-2019-15107",
|
||||
"full_name": "NullBrunk\/CVE-2019-15107",
|
||||
"owner": {
|
||||
"login": "NullBrunk",
|
||||
"id": 106782577,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106782577?v=4",
|
||||
"html_url": "https:\/\/github.com\/NullBrunk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NullBrunk\/Webmin-RCE",
|
||||
"html_url": "https:\/\/github.com\/NullBrunk\/CVE-2019-15107",
|
||||
"description": "Python3 code to exploit CVE-2019-15107 and CVE-2019-15231 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-12T15:31:38Z",
|
||||
"updated_at": "2022-06-12T16:49:43Z",
|
||||
"pushed_at": "2022-06-12T16:41:15Z",
|
||||
"updated_at": "2022-06-30T13:38:44Z",
|
||||
"pushed_at": "2022-06-30T13:30:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -657,8 +657,6 @@
|
|||
"cve-2019-15231",
|
||||
"exploit",
|
||||
"rce",
|
||||
"root",
|
||||
"web-pentest",
|
||||
"webmin"
|
||||
],
|
||||
"visibility": "public",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-10T15:57:36Z",
|
||||
"updated_at": "2022-06-22T13:04:06Z",
|
||||
"updated_at": "2022-06-30T17:44:26Z",
|
||||
"pushed_at": "2019-09-13T20:05:43Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 156,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-29T02:36:08Z",
|
||||
"updated_at": "2022-06-30T15:06:20Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3393,
|
||||
"watchers_count": 3393,
|
||||
"stargazers_count": 3394,
|
||||
"watchers_count": 3394,
|
||||
"forks_count": 1012,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -72,7 +72,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1012,
|
||||
"watchers": 3393,
|
||||
"watchers": 3394,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -101,7 +101,7 @@
|
|||
"pushed_at": "2020-10-01T08:40:07Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"forks_count": 74,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"ssti"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"forks": 75,
|
||||
"watchers": 170,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-29T02:36:08Z",
|
||||
"updated_at": "2022-06-30T15:06:20Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3393,
|
||||
"watchers_count": 3393,
|
||||
"stargazers_count": 3394,
|
||||
"watchers_count": 3394,
|
||||
"forks_count": 1012,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1012,
|
||||
"watchers": 3393,
|
||||
"watchers": 3394,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -201,10 +201,10 @@
|
|||
"description": "CVE-2020-14882 EXP 回显",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T15:44:23Z",
|
||||
"updated_at": "2022-01-18T23:43:08Z",
|
||||
"updated_at": "2022-06-30T14:50:48Z",
|
||||
"pushed_at": "2020-11-09T09:55:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T11:59:47Z",
|
||||
"updated_at": "2020-11-17T18:02:04Z",
|
||||
"updated_at": "2022-06-30T18:12:56Z",
|
||||
"pushed_at": "2020-11-16T10:31:51Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -101,10 +101,10 @@
|
|||
"description": "CVE-2020-8597 in RM2100",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-24T15:28:00Z",
|
||||
"updated_at": "2022-03-24T14:13:01Z",
|
||||
"updated_at": "2022-06-30T14:10:59Z",
|
||||
"pushed_at": "2021-01-24T15:46:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -115,7 +115,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-06-29T14:12:02Z",
|
||||
"updated_at": "2022-06-30T12:27:46Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1572,
|
||||
"watchers_count": 1572,
|
||||
"stargazers_count": 1573,
|
||||
"watchers_count": 1573,
|
||||
"forks_count": 566,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 566,
|
||||
"watchers": 1572,
|
||||
"watchers": 1573,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2022-06-29T19:03:41Z",
|
||||
"updated_at": "2022-06-30T17:52:46Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 217,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-06-30T09:08:11Z",
|
||||
"updated_at": "2022-06-30T12:27:38Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1586,
|
||||
"watchers_count": 1586,
|
||||
"stargazers_count": 1587,
|
||||
"watchers_count": 1587,
|
||||
"forks_count": 457,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 457,
|
||||
"watchers": 1586,
|
||||
"watchers": 1587,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T17:55:52Z",
|
||||
"updated_at": "2022-06-01T22:04:06Z",
|
||||
"updated_at": "2022-06-30T17:43:18Z",
|
||||
"pushed_at": "2022-03-05T18:34:25Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 43,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-24T06:43:56Z",
|
||||
"updated_at": "2022-06-30T07:40:51Z",
|
||||
"updated_at": "2022-06-30T13:58:15Z",
|
||||
"pushed_at": "2022-03-19T06:32:50Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -250,10 +250,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2022-06-23T03:25:13Z",
|
||||
"updated_at": "2022-06-30T14:58:58Z",
|
||||
"pushed_at": "2022-06-28T17:00:53Z",
|
||||
"stargazers_count": 991,
|
||||
"watchers_count": 991,
|
||||
"stargazers_count": 992,
|
||||
"watchers_count": 992,
|
||||
"forks_count": 438,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -263,7 +263,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 438,
|
||||
"watchers": 991,
|
||||
"watchers": 992,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,13 +129,13 @@
|
|||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 953,
|
||||
"watchers_count": 953,
|
||||
"forks_count": 206,
|
||||
"forks_count": 205,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 206,
|
||||
"forks": 205,
|
||||
"watchers": 953,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1135,10 +1135,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-06-26T12:14:41Z",
|
||||
"updated_at": "2022-06-30T13:44:36Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1146,7 +1146,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1853,5 +1853,33 @@
|
|||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509084736,
|
||||
"name": "CBDS_CVE-2022-0847_POC",
|
||||
"full_name": "Asbatel\/CBDS_CVE-2022-0847_POC",
|
||||
"owner": {
|
||||
"login": "Asbatel",
|
||||
"id": 34680708,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34680708?v=4",
|
||||
"html_url": "https:\/\/github.com\/Asbatel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Asbatel\/CBDS_CVE-2022-0847_POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-30T13:07:55Z",
|
||||
"updated_at": "2022-06-30T13:41:25Z",
|
||||
"pushed_at": "2022-06-30T15:05:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -122,10 +122,10 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2022-06-22T07:53:42Z",
|
||||
"updated_at": "2022-06-30T15:20:43Z",
|
||||
"pushed_at": "2022-06-10T17:34:08Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 203,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 203,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1583,10 +1583,10 @@
|
|||
"description": "spring4shell | CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T14:59:42Z",
|
||||
"updated_at": "2022-06-30T11:17:16Z",
|
||||
"updated_at": "2022-06-30T16:30:25Z",
|
||||
"pushed_at": "2022-06-30T10:55:54Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1601,7 +1601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-06-30T10:14:56Z",
|
||||
"updated_at": "2022-06-30T16:02:55Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 457,
|
||||
"watchers_count": 457,
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 457,
|
||||
"watchers": 460,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 502432714,
|
||||
"name": "RCE-CVE-2022-24806",
|
||||
"full_name": "oturu\/RCE-CVE-2022-24806",
|
||||
"owner": {
|
||||
"login": "oturu",
|
||||
"id": 106835379,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
|
||||
"html_url": "https:\/\/github.com\/oturu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oturu\/RCE-CVE-2022-24806",
|
||||
"description": "CVE-2022-24806 and CVE-2022-24807 are an unauthenticated RCE vulnerability in magento and adobe commerce",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-11T18:59:00Z",
|
||||
"updated_at": "2022-06-25T07:24:51Z",
|
||||
"pushed_at": "2022-06-12T12:40:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-06-30T08:47:35Z",
|
||||
"pushed_at": "2022-06-30T07:31:26Z",
|
||||
"pushed_at": "2022-06-30T14:47:30Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 30,
|
||||
|
|
|
@ -131,13 +131,13 @@
|
|||
"pushed_at": "2022-05-17T15:17:22Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -416,10 +416,10 @@
|
|||
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T11:08:33Z",
|
||||
"updated_at": "2022-06-29T23:47:58Z",
|
||||
"updated_at": "2022-06-30T16:06:40Z",
|
||||
"pushed_at": "2022-06-18T13:53:53Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -427,7 +427,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2022/CVE-2022-28117.json
Normal file
30
2022/CVE-2022-28117.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 478572145,
|
||||
"name": "CVE-2022-28117",
|
||||
"full_name": "cheshireca7\/CVE-2022-28117",
|
||||
"owner": {
|
||||
"login": "cheshireca7",
|
||||
"id": 34421496,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34421496?v=4",
|
||||
"html_url": "https:\/\/github.com\/cheshireca7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cheshireca7\/CVE-2022-28117",
|
||||
"description": "Navigate CMS <= 2.9.4 - Server-Side Request Forgery (Authenticated)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-06T13:27:48Z",
|
||||
"updated_at": "2022-06-30T12:57:29Z",
|
||||
"pushed_at": "2022-06-30T12:56:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-06-26T09:03:47Z",
|
||||
"updated_at": "2022-06-30T16:48:30Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 283,
|
||||
"watchers": 284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2022/CVE-2022-29885.json
Normal file
30
2022/CVE-2022-29885.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 487163023,
|
||||
"name": "CVE-2022-29885",
|
||||
"full_name": "4ra1n\/CVE-2022-29885",
|
||||
"owner": {
|
||||
"login": "4ra1n",
|
||||
"id": 34726933,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34726933?v=4",
|
||||
"html_url": "https:\/\/github.com\/4ra1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/4ra1n\/CVE-2022-29885",
|
||||
"description": "Apache Tomcat CVE-2022-29885",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T02:30:00Z",
|
||||
"updated_at": "2022-06-30T16:30:00Z",
|
||||
"pushed_at": "2022-06-30T13:46:47Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 504308544,
|
||||
"name": "Cve-2022-30136-RCE-POC",
|
||||
"full_name": "oturu\/Cve-2022-30136-RCE-POC",
|
||||
"owner": {
|
||||
"login": "oturu",
|
||||
"id": 106835379,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
|
||||
"html_url": "https:\/\/github.com\/oturu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oturu\/Cve-2022-30136-RCE-POC",
|
||||
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-16T21:16:53Z",
|
||||
"updated_at": "2022-06-25T07:26:32Z",
|
||||
"pushed_at": "2022-06-16T21:39:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 505100047,
|
||||
"name": "CVE-2022-30136-MASS-RCE",
|
||||
|
@ -54,61 +26,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 507244386,
|
||||
"name": "Cve-2022-30136-RCE",
|
||||
"full_name": "oturu\/Cve-2022-30136-RCE",
|
||||
"owner": {
|
||||
"login": "oturu",
|
||||
"id": 106835379,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
|
||||
"html_url": "https:\/\/github.com\/oturu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oturu\/Cve-2022-30136-RCE",
|
||||
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System ",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-25T07:28:34Z",
|
||||
"updated_at": "2022-06-26T06:42:27Z",
|
||||
"pushed_at": "2022-06-25T07:28:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 507682394,
|
||||
"name": "CVE-2022-30136-POC",
|
||||
"full_name": "oturu\/CVE-2022-30136-POC",
|
||||
"owner": {
|
||||
"login": "oturu",
|
||||
"id": 106835379,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
|
||||
"html_url": "https:\/\/github.com\/oturu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oturu\/CVE-2022-30136-POC",
|
||||
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System ",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-26T20:54:02Z",
|
||||
"updated_at": "2022-06-27T10:23:00Z",
|
||||
"pushed_at": "2022-06-26T21:01:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Shiro CVE-2022-32532",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-28T22:38:30Z",
|
||||
"updated_at": "2022-06-30T12:00:48Z",
|
||||
"updated_at": "2022-06-30T18:09:38Z",
|
||||
"pushed_at": "2022-06-29T16:21:58Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 115,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
}
|
||||
]
|
45
README.md
45
README.md
|
@ -219,6 +219,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
|
||||
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
|
||||
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [Asbatel/CBDS_CVE-2022-0847_POC](https://github.com/Asbatel/CBDS_CVE-2022-0847_POC)
|
||||
|
||||
### CVE-2022-0848 (2022-03-04)
|
||||
|
||||
|
@ -1360,9 +1361,6 @@ Parse Server is an open source http web server backend. In versions prior to 4.1
|
|||
|
||||
- [tuo4n8/CVE-2022-24760](https://github.com/tuo4n8/CVE-2022-24760)
|
||||
|
||||
### CVE-2022-24806
|
||||
- [oturu/RCE-CVE-2022-24806](https://github.com/oturu/RCE-CVE-2022-24806)
|
||||
|
||||
### CVE-2022-24853 (2022-04-14)
|
||||
|
||||
<code>
|
||||
|
@ -1873,6 +1871,14 @@ An issue in upload.csp of FANTEC GmbH MWiD25-DS Firmware v2.000.030 allows attac
|
|||
|
||||
- [code-byter/CVE-2022-28113](https://github.com/code-byter/CVE-2022-28113)
|
||||
|
||||
### CVE-2022-28117 (2022-04-28)
|
||||
|
||||
<code>
|
||||
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter.
|
||||
</code>
|
||||
|
||||
- [cheshireca7/CVE-2022-28117](https://github.com/cheshireca7/CVE-2022-28117)
|
||||
|
||||
### CVE-2022-28118 (2022-05-02)
|
||||
|
||||
<code>
|
||||
|
@ -2134,6 +2140,14 @@ An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to
|
|||
|
||||
- [keymandll/CVE-2022-29622](https://github.com/keymandll/CVE-2022-29622)
|
||||
|
||||
### CVE-2022-29885 (2022-05-12)
|
||||
|
||||
<code>
|
||||
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
|
||||
</code>
|
||||
|
||||
- [4ra1n/CVE-2022-29885](https://github.com/4ra1n/CVE-2022-29885)
|
||||
|
||||
### CVE-2022-29932 (2022-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -2177,10 +2191,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f
|
|||
Windows Network File System Remote Code Execution Vulnerability.
|
||||
</code>
|
||||
|
||||
- [oturu/Cve-2022-30136-RCE-POC](https://github.com/oturu/Cve-2022-30136-RCE-POC)
|
||||
- [zir0x00/CVE-2022-30136-MASS-RCE](https://github.com/zir0x00/CVE-2022-30136-MASS-RCE)
|
||||
- [oturu/Cve-2022-30136-RCE](https://github.com/oturu/Cve-2022-30136-RCE)
|
||||
- [oturu/CVE-2022-30136-POC](https://github.com/oturu/CVE-2022-30136-POC)
|
||||
|
||||
### CVE-2022-30190 (2022-06-01)
|
||||
|
||||
|
@ -15225,7 +15236,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_chan
|
|||
- [Tuz-Wwsd/CVE-2019-15107_detection](https://github.com/Tuz-Wwsd/CVE-2019-15107_detection)
|
||||
- [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107)
|
||||
- [trhacknon/CVE-2019-15107](https://github.com/trhacknon/CVE-2019-15107)
|
||||
- [NullBrunk/Webmin-RCE](https://github.com/NullBrunk/Webmin-RCE)
|
||||
- [NullBrunk/CVE-2019-15107](https://github.com/NullBrunk/CVE-2019-15107)
|
||||
- [psw01/CVE-2019-15107_webminRCE](https://github.com/psw01/CVE-2019-15107_webminRCE)
|
||||
|
||||
### CVE-2019-15120 (2019-08-16)
|
||||
|
@ -16641,7 +16652,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
- [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628)
|
||||
- [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628)
|
||||
- [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628)
|
||||
- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628)
|
||||
- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit)
|
||||
- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628)
|
||||
- [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628)
|
||||
|
@ -17501,7 +17511,6 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
|
|||
- [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner)
|
||||
- [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2)
|
||||
- [jyo-zi/CVE-2018-7600](https://github.com/jyo-zi/CVE-2018-7600)
|
||||
- [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600)
|
||||
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
|
||||
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
|
||||
- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600)
|
||||
|
@ -17526,7 +17535,6 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
|
|||
</code>
|
||||
|
||||
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
|
||||
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
|
||||
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
|
||||
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
|
||||
|
||||
|
@ -17705,7 +17713,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
|
|||
- [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP)
|
||||
- [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174)
|
||||
- [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174)
|
||||
- [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis)
|
||||
- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf)
|
||||
- [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit)
|
||||
- [ericisnotrealname/CVE-2018-8174_EXP](https://github.com/ericisnotrealname/CVE-2018-8174_EXP)
|
||||
|
@ -17717,14 +17724,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
|
|||
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
|
||||
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
|
||||
|
||||
### CVE-2018-8208 (2018-06-14)
|
||||
|
||||
<code>
|
||||
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214.
|
||||
</code>
|
||||
|
||||
- [kaisaryousuf/CVE-2018-8208](https://github.com/kaisaryousuf/CVE-2018-8208)
|
||||
|
||||
### CVE-2018-8214 (2018-06-14)
|
||||
|
||||
<code>
|
||||
|
@ -18415,14 +18414,6 @@ LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a us
|
|||
|
||||
- [reversebrain/CVE-2018-12421](https://github.com/reversebrain/CVE-2018-12421)
|
||||
|
||||
### CVE-2018-12463 (2018-07-12)
|
||||
|
||||
<code>
|
||||
An XML external entity (XXE) vulnerability in Fortify Software Security Center (SSC), version 17.1, 17.2, 18.1 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463)
|
||||
|
||||
### CVE-2018-12533 (2018-06-18)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue