mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/05/25 18:20:00
This commit is contained in:
parent
146d4a9463
commit
c3b8edbc20
28 changed files with 353 additions and 82 deletions
|
@ -364,17 +364,17 @@
|
|||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T15:59:14Z",
|
||||
"updated_at": "2022-04-16T09:09:27Z",
|
||||
"updated_at": "2022-05-25T17:46:28Z",
|
||||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 82,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 145,
|
||||
"forks": 83,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-03T16:47:32Z",
|
||||
"updated_at": "2022-05-25T05:49:14Z",
|
||||
"updated_at": "2022-05-25T17:46:36Z",
|
||||
"pushed_at": "2019-03-10T02:18:00Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 59,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 180,
|
||||
"forks": 60,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2022-05-24T15:56:42Z",
|
||||
"updated_at": "2022-05-25T16:24:21Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2022-05-02T00:18:55Z",
|
||||
"updated_at": "2022-05-25T17:45:20Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"forks_count": 136,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"watchers": 370,
|
||||
"forks": 137,
|
||||
"watchers": 371,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-09T14:10:20Z",
|
||||
"updated_at": "2021-08-05T03:48:22Z",
|
||||
"updated_at": "2022-05-25T15:42:05Z",
|
||||
"pushed_at": "2018-11-09T14:42:23Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2861,17 +2861,17 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2022-05-25T11:57:52Z",
|
||||
"updated_at": "2022-05-25T14:06:49Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 69,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 282,
|
||||
"forks": 71,
|
||||
"watchers": 284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2022-05-24T15:56:42Z",
|
||||
"updated_at": "2022-05-25T16:24:21Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC of CVE-2021-30731",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T06:13:24Z",
|
||||
"updated_at": "2022-04-14T18:10:08Z",
|
||||
"updated_at": "2022-05-25T16:09:08Z",
|
||||
"pushed_at": "2022-04-13T18:57:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2022-05-20T17:47:53Z",
|
||||
"updated_at": "2022-05-25T14:27:10Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -188,12 +188,12 @@
|
|||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 45,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 46,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2022-05-25T06:16:09Z",
|
||||
"updated_at": "2022-05-25T16:04:42Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-05-24T04:46:24Z",
|
||||
"updated_at": "2022-05-25T15:02:13Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1535,
|
||||
"watchers_count": 1535,
|
||||
"forks_count": 451,
|
||||
"stargazers_count": 1536,
|
||||
"watchers_count": 1536,
|
||||
"forks_count": 452,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 451,
|
||||
"watchers": 1535,
|
||||
"forks": 452,
|
||||
"watchers": 1536,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,17 +266,17 @@
|
|||
"description": "PoC for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T02:02:25Z",
|
||||
"updated_at": "2022-05-24T13:03:53Z",
|
||||
"updated_at": "2022-05-25T15:15:01Z",
|
||||
"pushed_at": "2022-01-26T02:27:53Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 39,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 48,
|
||||
"forks": 40,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -799,11 +799,11 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-05-25T03:44:32Z",
|
||||
"updated_at": "2022-05-25T17:45:16Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1366,
|
||||
"watchers_count": 1366,
|
||||
"forks_count": 375,
|
||||
"stargazers_count": 1367,
|
||||
"watchers_count": 1367,
|
||||
"forks_count": 376,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -813,8 +813,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 375,
|
||||
"watchers": 1366,
|
||||
"forks": 376,
|
||||
"watchers": 1367,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-25T10:47:04Z",
|
||||
"updated_at": "2022-05-25T10:50:30Z",
|
||||
"pushed_at": "2022-05-25T11:43:08Z",
|
||||
"pushed_at": "2022-05-25T13:43:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -314,12 +314,12 @@
|
|||
"pushed_at": "2022-05-09T20:52:07Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-05-18T18:27:36Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 86,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -31,7 +31,7 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"forks": 87,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -724,17 +724,17 @@
|
|||
"description": "Spring Framework RCE via Data Binding on JDK 9+ \/ spring4shell \/ CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T13:35:01Z",
|
||||
"updated_at": "2022-04-06T08:35:57Z",
|
||||
"updated_at": "2022-05-25T16:18:06Z",
|
||||
"pushed_at": "2022-04-04T01:16:41Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2022/CVE-2022-23270.json
Normal file
29
2022/CVE-2022-23270.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 490686432,
|
||||
"name": "CVE-2022-23270-PPTP",
|
||||
"full_name": "corelight\/CVE-2022-23270-PPTP",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2022-23270-PPTP",
|
||||
"description": "A Zeek package to detect CVE-2022-23270, a PPTP vulnerability in Windows.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-10T12:27:26Z",
|
||||
"updated_at": "2022-05-25T17:17:27Z",
|
||||
"pushed_at": "2022-05-11T18:45:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-19T01:16:01Z",
|
||||
"updated_at": "2022-05-23T14:46:38Z",
|
||||
"updated_at": "2022-05-25T16:07:12Z",
|
||||
"pushed_at": "2022-05-19T01:17:07Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2022/CVE-2022-26937.json
Normal file
29
2022/CVE-2022-26937.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 491231577,
|
||||
"name": "CVE-2022-26937",
|
||||
"full_name": "corelight\/CVE-2022-26937",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2022-26937",
|
||||
"description": "A Zeek package to detect CVE-2022-26937, a vulnerability in the Network Lock Manager (NLM) protocol in Windows MFS server.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-11T18:36:45Z",
|
||||
"updated_at": "2022-05-25T17:18:29Z",
|
||||
"pushed_at": "2022-05-17T16:53:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-29337.json
Normal file
29
2022/CVE-2022-29337.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 496233349,
|
||||
"name": "CVE-2022-29337",
|
||||
"full_name": "exploitwritter\/CVE-2022-29337",
|
||||
"owner": {
|
||||
"login": "exploitwritter",
|
||||
"id": 47488127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47488127?v=4",
|
||||
"html_url": "https:\/\/github.com\/exploitwritter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exploitwritter\/CVE-2022-29337",
|
||||
"description": "C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary commands via a crafted HTTP request.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T13:02:34Z",
|
||||
"updated_at": "2022-05-25T17:30:40Z",
|
||||
"pushed_at": "2022-05-25T13:05:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-29359 - School Application System Stored Cross-Site Scripting",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T17:30:18Z",
|
||||
"updated_at": "2022-05-25T10:26:33Z",
|
||||
"updated_at": "2022-05-25T12:58:51Z",
|
||||
"pushed_at": "2022-04-12T17:51:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
29
2022/CVE-2022-30510.json
Normal file
29
2022/CVE-2022-30510.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 496310557,
|
||||
"name": "CVE-2022-30510",
|
||||
"full_name": "bigzooooz\/CVE-2022-30510",
|
||||
"owner": {
|
||||
"login": "bigzooooz",
|
||||
"id": 7108710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigzooooz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30510",
|
||||
"description": "School Dormitory Management System 1.0 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T16:32:18Z",
|
||||
"updated_at": "2022-05-25T16:32:18Z",
|
||||
"pushed_at": "2022-05-25T16:32:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-30511.json
Normal file
29
2022/CVE-2022-30511.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 496311392,
|
||||
"name": "CVE-2022-30511",
|
||||
"full_name": "bigzooooz\/CVE-2022-30511",
|
||||
"owner": {
|
||||
"login": "bigzooooz",
|
||||
"id": 7108710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigzooooz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30511",
|
||||
"description": "School Dormitory Management System 1.0 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T16:35:06Z",
|
||||
"updated_at": "2022-05-25T16:35:06Z",
|
||||
"pushed_at": "2022-05-25T16:35:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-30512.json
Normal file
29
2022/CVE-2022-30512.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 496307836,
|
||||
"name": "CVE-2022-30512",
|
||||
"full_name": "bigzooooz\/CVE-2022-30512",
|
||||
"owner": {
|
||||
"login": "bigzooooz",
|
||||
"id": 7108710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigzooooz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30512",
|
||||
"description": "School Dormitory Management System 1.0 - Unauthenticated SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T16:23:53Z",
|
||||
"updated_at": "2022-05-25T16:23:53Z",
|
||||
"pushed_at": "2022-05-25T16:27:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-30513.json
Normal file
29
2022/CVE-2022-30513.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 496314993,
|
||||
"name": "CVE-2022-30513",
|
||||
"full_name": "bigzooooz\/CVE-2022-30513",
|
||||
"owner": {
|
||||
"login": "bigzooooz",
|
||||
"id": 7108710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigzooooz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30513",
|
||||
"description": "School Dormitory Management System 1.0 - Reflected XSS",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T16:46:09Z",
|
||||
"updated_at": "2022-05-25T16:46:09Z",
|
||||
"pushed_at": "2022-05-25T16:47:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-30514.json
Normal file
29
2022/CVE-2022-30514.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 496313723,
|
||||
"name": "CVE-2022-30514",
|
||||
"full_name": "bigzooooz\/CVE-2022-30514",
|
||||
"owner": {
|
||||
"login": "bigzooooz",
|
||||
"id": 7108710,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigzooooz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30514",
|
||||
"description": "School Dormitory Management System 1.0 - Reflected XSS",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T16:42:25Z",
|
||||
"updated_at": "2022-05-25T16:42:25Z",
|
||||
"pushed_at": "2022-05-25T16:43:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🍵 Gitea repository migration remote command execution exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-22T05:15:58Z",
|
||||
"updated_at": "2022-05-25T06:39:35Z",
|
||||
"updated_at": "2022-05-25T13:57:30Z",
|
||||
"pushed_at": "2022-05-22T05:26:29Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
39
README.md
39
README.md
|
@ -861,6 +861,14 @@ Point-to-Point Tunneling Protocol Denial of Service Vulnerability.
|
|||
|
||||
- [nettitude/CVE-2022-23253-PoC](https://github.com/nettitude/CVE-2022-23253-PoC)
|
||||
|
||||
### CVE-2022-23270 (2022-05-10)
|
||||
|
||||
<code>
|
||||
Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21972.
|
||||
</code>
|
||||
|
||||
- [corelight/CVE-2022-23270-PPTP](https://github.com/corelight/CVE-2022-23270-PPTP)
|
||||
|
||||
### CVE-2022-23305 (2022-01-18)
|
||||
|
||||
<code>
|
||||
|
@ -1472,6 +1480,14 @@ Windows Graphics Component Remote Code Execution Vulnerability.
|
|||
|
||||
- [Exploitables/CVE-2022-26927](https://github.com/Exploitables/CVE-2022-26927)
|
||||
|
||||
### CVE-2022-26937 (2022-05-10)
|
||||
|
||||
<code>
|
||||
Windows Network File System Remote Code Execution Vulnerability.
|
||||
</code>
|
||||
|
||||
- [corelight/CVE-2022-26937](https://github.com/corelight/CVE-2022-26937)
|
||||
|
||||
### CVE-2022-27134 (2022-05-12)
|
||||
|
||||
<code>
|
||||
|
@ -1710,6 +1726,14 @@ Smarty is a template engine for PHP, facilitating the separation of presentation
|
|||
|
||||
- [sbani/CVE-2022-29221-PoC](https://github.com/sbani/CVE-2022-29221-PoC)
|
||||
|
||||
### CVE-2022-29337 (2022-05-24)
|
||||
|
||||
<code>
|
||||
C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary commands via a crafted HTTP request.
|
||||
</code>
|
||||
|
||||
- [exploitwritter/CVE-2022-29337](https://github.com/exploitwritter/CVE-2022-29337)
|
||||
|
||||
### CVE-2022-29359 (2022-05-24)
|
||||
|
||||
<code>
|
||||
|
@ -1809,6 +1833,21 @@ WAVLINK WN535 G3 was discovered to contain a cross-site scripting (XSS) vulnerab
|
|||
- [badboycxcc/XSS-CVE-2022-30489](https://github.com/badboycxcc/XSS-CVE-2022-30489)
|
||||
- [trhacknon/XSS-CVE-2022-30489](https://github.com/trhacknon/XSS-CVE-2022-30489)
|
||||
|
||||
### CVE-2022-30510
|
||||
- [bigzooooz/CVE-2022-30510](https://github.com/bigzooooz/CVE-2022-30510)
|
||||
|
||||
### CVE-2022-30511
|
||||
- [bigzooooz/CVE-2022-30511](https://github.com/bigzooooz/CVE-2022-30511)
|
||||
|
||||
### CVE-2022-30512
|
||||
- [bigzooooz/CVE-2022-30512](https://github.com/bigzooooz/CVE-2022-30512)
|
||||
|
||||
### CVE-2022-30513
|
||||
- [bigzooooz/CVE-2022-30513](https://github.com/bigzooooz/CVE-2022-30513)
|
||||
|
||||
### CVE-2022-30514
|
||||
- [bigzooooz/CVE-2022-30514](https://github.com/bigzooooz/CVE-2022-30514)
|
||||
|
||||
### CVE-2022-30525 (2022-05-12)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue