mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-03 05:45:37 +02:00
Auto Update 2022/05/05 12:17:36
This commit is contained in:
parent
c43510ff58
commit
c67d228bec
38 changed files with 387 additions and 195 deletions
2002
2016
2017
2019
2020
2021
CVE-2021-1675.jsonCVE-2021-21972.jsonCVE-2021-21985.jsonCVE-2021-25837.jsonCVE-2021-26855.jsonCVE-2021-26943.jsonCVE-2021-36934.jsonCVE-2021-36981.jsonCVE-2021-4034.jsonCVE-2021-42013.jsonCVE-2021-43008.jsonCVE-2021-44228.json
2022
CVE-2022-0185.jsonCVE-2022-0543.jsonCVE-2022-0847.jsonCVE-2022-1015.jsonCVE-2022-1040.jsonCVE-2022-1388.jsonCVE-2022-1444.jsonCVE-2022-21882.jsonCVE-2022-22947.jsonCVE-2022-22954.jsonCVE-2022-22965.jsonCVE-2022-23131.jsonCVE-2022-24707.jsonCVE-2022-25262.jsonCVE-2022-26809.jsonCVE-2022-27666.jsonCVE-2022-29072.jsonCVE-2022-29464.json
README.md
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2022-04-29T15:01:55Z",
|
||||
"pushed_at": "2022-04-04T10:51:19Z",
|
||||
"pushed_at": "2022-05-05T08:38:15Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 8,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-03T16:47:32Z",
|
||||
"updated_at": "2022-04-30T18:37:48Z",
|
||||
"updated_at": "2022-05-05T09:55:42Z",
|
||||
"pushed_at": "2019-03-10T02:18:00Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1069,17 +1069,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-05-05T02:29:25Z",
|
||||
"updated_at": "2022-05-05T09:28:23Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 61,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 182,
|
||||
"forks": 62,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2017-7529_PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-20T15:16:10Z",
|
||||
"updated_at": "2022-03-13T19:38:29Z",
|
||||
"updated_at": "2022-05-05T07:53:26Z",
|
||||
"pushed_at": "2018-06-20T15:16:39Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-05-04T14:07:43Z",
|
||||
"updated_at": "2022-05-05T11:01:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3288,
|
||||
"watchers_count": 3288,
|
||||
"stargazers_count": 3289,
|
||||
"watchers_count": 3289,
|
||||
"forks_count": 982,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 982,
|
||||
"watchers": 3288,
|
||||
"watchers": 3289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -52,5 +52,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 488880736,
|
||||
"name": "gerhart01",
|
||||
"full_name": "MarcelloTinocor\/gerhart01",
|
||||
"owner": {
|
||||
"login": "MarcelloTinocor",
|
||||
"id": 104972928,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104972928?v=4",
|
||||
"html_url": "https:\/\/github.com\/MarcelloTinocor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MarcelloTinocor\/gerhart01",
|
||||
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T07:56:13Z",
|
||||
"updated_at": "2022-05-05T07:56:13Z",
|
||||
"pushed_at": "2022-05-05T07:56:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-05-04T14:07:43Z",
|
||||
"updated_at": "2022-05-05T11:01:01Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3288,
|
||||
"watchers_count": 3288,
|
||||
"stargazers_count": 3289,
|
||||
"watchers_count": 3289,
|
||||
"forks_count": 982,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 982,
|
||||
"watchers": 3288,
|
||||
"watchers": 3289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-05-04T10:24:49Z",
|
||||
"updated_at": "2022-05-05T09:52:27Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1554,
|
||||
"watchers_count": 1554,
|
||||
"stargazers_count": 1555,
|
||||
"watchers_count": 1555,
|
||||
"forks_count": 559,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 559,
|
||||
"watchers": 1554,
|
||||
"watchers": 1555,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -84,10 +84,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2022-04-24T03:05:41Z",
|
||||
"updated_at": "2022-05-05T08:21:09Z",
|
||||
"pushed_at": "2021-12-30T12:26:11Z",
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"forks_count": 136,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -96,7 +96,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 136,
|
||||
"watchers": 360,
|
||||
"watchers": 361,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,17 +155,17 @@
|
|||
"description": "cve-2021-21985 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:17:06Z",
|
||||
"updated_at": "2022-05-05T03:08:04Z",
|
||||
"updated_at": "2022-05-05T11:14:28Z",
|
||||
"pushed_at": "2022-01-10T07:01:58Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T03:12:27Z",
|
||||
"updated_at": "2022-05-05T06:01:34Z",
|
||||
"updated_at": "2022-05-05T06:19:01Z",
|
||||
"pushed_at": "2022-05-05T06:10:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -165,12 +165,12 @@
|
|||
"pushed_at": "2021-03-09T22:07:46Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2022-04-24T08:15:45Z",
|
||||
"updated_at": "2022-05-05T09:10:05Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2022-04-14T21:09:43Z",
|
||||
"updated_at": "2022-05-05T08:57:33Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-36981.json
Normal file
29
2021/CVE-2021-36981.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 483644661,
|
||||
"name": "CVE-2021-36981",
|
||||
"full_name": "0xBrAinsTorM\/CVE-2021-36981",
|
||||
"owner": {
|
||||
"login": "0xBrAinsTorM",
|
||||
"id": 26419565,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26419565?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xBrAinsTorM"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xBrAinsTorM\/CVE-2021-36981",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T12:26:24Z",
|
||||
"updated_at": "2022-05-05T09:18:01Z",
|
||||
"pushed_at": "2022-04-20T12:31:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -158,7 +158,7 @@
|
|||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 848,
|
||||
"watchers_count": 848,
|
||||
"forks_count": 274,
|
||||
"forks_count": 275,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -167,7 +167,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 274,
|
||||
"forks": 275,
|
||||
"watchers": 848,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1815,17 +1815,17 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-05-04T02:05:06Z",
|
||||
"updated_at": "2022-05-05T11:10:32Z",
|
||||
"pushed_at": "2022-04-19T12:33:32Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 261,
|
||||
"watchers": 262,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T14:46:41Z",
|
||||
"updated_at": "2022-03-08T16:14:48Z",
|
||||
"updated_at": "2022-05-05T06:36:35Z",
|
||||
"pushed_at": "2021-12-24T07:38:39Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -87,7 +87,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:26:49Z",
|
||||
"updated_at": "2022-04-03T20:44:17Z",
|
||||
"updated_at": "2022-05-05T11:55:59Z",
|
||||
"pushed_at": "2022-05-03T10:40:20Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 9,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -34,8 +34,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 40,
|
||||
"forks": 10,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -156,11 +156,11 @@
|
|||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:42:37Z",
|
||||
"updated_at": "2022-04-12T06:15:05Z",
|
||||
"updated_at": "2022-05-05T09:01:57Z",
|
||||
"pushed_at": "2021-12-11T02:49:41Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 17,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -178,8 +178,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 105,
|
||||
"forks": 18,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -500,40 +500,6 @@
|
|||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437091396,
|
||||
"name": "mc-log4j-patcher",
|
||||
"full_name": "OopsieWoopsie\/mc-log4j-patcher",
|
||||
"owner": {
|
||||
"login": "OopsieWoopsie",
|
||||
"id": 15069175,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15069175?v=4",
|
||||
"html_url": "https:\/\/github.com\/OopsieWoopsie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/OopsieWoopsie\/mc-log4j-patcher",
|
||||
"description": "CVE-2021-44228 server-side fix for minecraft servers.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T19:25:31Z",
|
||||
"updated_at": "2022-03-30T10:17:28Z",
|
||||
"pushed_at": "2021-12-10T19:47:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"fix",
|
||||
"log4j2",
|
||||
"minecraft",
|
||||
"paper",
|
||||
"spigot"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437097787,
|
||||
"name": "CVE-2021-44228-kusto",
|
||||
|
@ -764,10 +730,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-05-01T21:33:39Z",
|
||||
"updated_at": "2022-05-05T10:57:43Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1340,
|
||||
"watchers_count": 1340,
|
||||
"stargazers_count": 1341,
|
||||
"watchers_count": 1341,
|
||||
"forks_count": 368,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -779,7 +745,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 368,
|
||||
"watchers": 1340,
|
||||
"watchers": 1341,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2979,7 +2945,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-12T21:45:33Z",
|
||||
"updated_at": "2022-04-29T05:07:50Z",
|
||||
"pushed_at": "2022-01-18T08:18:21Z",
|
||||
"pushed_at": "2022-05-05T08:50:49Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 22,
|
||||
|
@ -3353,12 +3319,12 @@
|
|||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2846,
|
||||
"watchers_count": 2846,
|
||||
"forks_count": 699,
|
||||
"forks_count": 700,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 699,
|
||||
"forks": 700,
|
||||
"watchers": 2846,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3904,12 +3870,12 @@
|
|||
"pushed_at": "2021-12-13T13:26:11Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2022-03-08T14:24:45Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-04-29T06:38:27Z",
|
||||
"updated_at": "2022-05-05T06:53:43Z",
|
||||
"pushed_at": "2022-03-16T06:48:01Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2022-05-05T02:29:25Z",
|
||||
"updated_at": "2022-05-05T09:28:23Z",
|
||||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 61,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 182,
|
||||
"forks": 62,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -125,12 +125,12 @@
|
|||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 938,
|
||||
"watchers_count": 938,
|
||||
"forks_count": 194,
|
||||
"forks_count": 195,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 194,
|
||||
"forks": 195,
|
||||
"watchers": 938,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:27:11Z",
|
||||
"updated_at": "2022-05-02T18:52:59Z",
|
||||
"updated_at": "2022-05-05T08:13:50Z",
|
||||
"pushed_at": "2022-04-03T01:36:45Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 148,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2022/CVE-2022-1040.json
Normal file
29
2022/CVE-2022-1040.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 488923685,
|
||||
"name": "CVE-2022-1040-sophos-rce",
|
||||
"full_name": "cve-hunter\/CVE-2022-1040-sophos-rce",
|
||||
"owner": {
|
||||
"login": "cve-hunter",
|
||||
"id": 104981226,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104981226?v=4",
|
||||
"html_url": "https:\/\/github.com\/cve-hunter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cve-hunter\/CVE-2022-1040-sophos-rce",
|
||||
"description": "cve-2022-1040 is an auth bypass and remote code execution in webmin portal of sophos firewall",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T10:15:38Z",
|
||||
"updated_at": "2022-05-05T11:15:10Z",
|
||||
"pushed_at": "2022-05-05T10:48:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-1388.json
Normal file
29
2022/CVE-2022-1388.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 488929451,
|
||||
"name": "CVE-2022-1388",
|
||||
"full_name": "numanturle\/CVE-2022-1388",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388",
|
||||
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T10:35:35Z",
|
||||
"updated_at": "2022-05-05T10:35:35Z",
|
||||
"pushed_at": "2022-05-05T10:44:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-1444.json
Normal file
29
2022/CVE-2022-1444.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 488900675,
|
||||
"name": "POC-CVE-2022-1444",
|
||||
"full_name": "KrungSalad\/POC-CVE-2022-1444",
|
||||
"owner": {
|
||||
"login": "KrungSalad",
|
||||
"id": 49265126,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49265126?v=4",
|
||||
"html_url": "https:\/\/github.com\/KrungSalad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KrungSalad\/POC-CVE-2022-1444",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T09:03:29Z",
|
||||
"updated_at": "2022-05-05T09:03:29Z",
|
||||
"pushed_at": "2022-05-05T09:03:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-03T11:25:14Z",
|
||||
"updated_at": "2022-04-26T15:38:12Z",
|
||||
"updated_at": "2022-05-05T08:44:17Z",
|
||||
"pushed_at": "2022-02-04T02:20:47Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -98,7 +98,7 @@
|
|||
"pushed_at": "2022-02-07T03:49:37Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -107,7 +107,7 @@
|
|||
"windows-exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -663,17 +663,17 @@
|
|||
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T09:32:36Z",
|
||||
"updated_at": "2022-04-16T03:47:51Z",
|
||||
"updated_at": "2022-05-05T06:53:56Z",
|
||||
"pushed_at": "2022-03-08T09:36:31Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1214,17 +1214,17 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2022-05-05T03:17:22Z",
|
||||
"updated_at": "2022-05-05T08:09:43Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,17 +43,17 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2022-05-04T20:18:20Z",
|
||||
"updated_at": "2022-05-05T11:18:48Z",
|
||||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -124,17 +124,17 @@
|
|||
"description": "提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T04:14:36Z",
|
||||
"updated_at": "2022-04-28T09:03:53Z",
|
||||
"updated_at": "2022-05-05T07:33:29Z",
|
||||
"pushed_at": "2022-04-15T11:35:35Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -433,5 +433,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 488921076,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "nguyenv1nK\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "nguyenv1nK",
|
||||
"id": 40865570,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40865570?v=4",
|
||||
"html_url": "https:\/\/github.com\/nguyenv1nK"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nguyenv1nK\/CVE-2022-22954",
|
||||
"description": "CVE-2022-22954 analyst",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T10:06:44Z",
|
||||
"updated_at": "2022-05-05T10:15:15Z",
|
||||
"pushed_at": "2022-05-05T10:43:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -119,17 +119,17 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2022-04-28T13:02:32Z",
|
||||
"updated_at": "2022-05-05T10:36:18Z",
|
||||
"pushed_at": "2022-04-05T16:02:33Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 214,
|
||||
"watchers": 215,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1011,10 +1011,10 @@
|
|||
"description": "Spring4Shell - CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T16:43:03Z",
|
||||
"updated_at": "2022-04-04T16:57:03Z",
|
||||
"updated_at": "2022-05-05T10:53:21Z",
|
||||
"pushed_at": "2022-04-04T16:54:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1026,7 +1026,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1340,17 +1340,17 @@
|
|||
"description": "CVE-2022-22965写入冰蝎webshell脚本",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T03:50:14Z",
|
||||
"updated_at": "2022-05-04T05:16:47Z",
|
||||
"updated_at": "2022-05-05T08:31:14Z",
|
||||
"pushed_at": "2022-04-11T01:53:19Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -321,17 +321,17 @@
|
|||
"description": "CVE-2022-23131漏洞利用工具开箱即用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T18:16:56Z",
|
||||
"updated_at": "2022-05-04T05:55:04Z",
|
||||
"updated_at": "2022-05-05T08:32:21Z",
|
||||
"pushed_at": "2022-04-02T19:00:40Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC of CVE-2022-24707",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-03T01:11:56Z",
|
||||
"updated_at": "2022-05-04T02:35:57Z",
|
||||
"updated_at": "2022-05-05T07:01:32Z",
|
||||
"pushed_at": "2022-05-03T01:12:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "PoC + vulnerability details for CVE-2022-25262 \/ JetBrains Hub single-click SAML response takeover",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-03T21:38:58Z",
|
||||
"updated_at": "2022-05-04T20:43:48Z",
|
||||
"updated_at": "2022-05-05T07:03:06Z",
|
||||
"pushed_at": "2022-05-03T21:48:57Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,8 +29,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -291,17 +291,17 @@
|
|||
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T15:49:28Z",
|
||||
"updated_at": "2022-04-30T15:58:17Z",
|
||||
"updated_at": "2022-05-05T07:19:22Z",
|
||||
"pushed_at": "2022-04-30T16:01:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -330,5 +330,32 @@
|
|||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 488862486,
|
||||
"name": "CVE-2022-26809",
|
||||
"full_name": "crypt0r00t\/CVE-2022-26809",
|
||||
"owner": {
|
||||
"login": "crypt0r00t",
|
||||
"id": 104968786,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104968786?v=4",
|
||||
"html_url": "https:\/\/github.com\/crypt0r00t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/crypt0r00t\/CVE-2022-26809",
|
||||
"description": "final exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T06:51:05Z",
|
||||
"updated_at": "2022-05-05T07:23:56Z",
|
||||
"pushed_at": "2022-05-05T07:16:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit for CVE-2022-27666",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T22:54:28Z",
|
||||
"updated_at": "2022-05-02T18:37:38Z",
|
||||
"updated_at": "2022-05-05T09:46:29Z",
|
||||
"pushed_at": "2022-03-28T18:21:00Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-05-05T01:35:48Z",
|
||||
"updated_at": "2022-05-05T08:30:12Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"forks_count": 103,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 645,
|
||||
"forks": 104,
|
||||
"watchers": 646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-05-04T21:20:11Z",
|
||||
"updated_at": "2022-05-05T07:15:45Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 55,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2022-29464"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 263,
|
||||
"forks": 56,
|
||||
"watchers": 264,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
README.md
31
README.md
|
@ -224,6 +224,14 @@ A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of t
|
|||
- [pqlx/CVE-2022-1015](https://github.com/pqlx/CVE-2022-1015)
|
||||
- [zanezhub/CVE-2022-1015-1016](https://github.com/zanezhub/CVE-2022-1015-1016)
|
||||
|
||||
### CVE-2022-1040 (2022-03-25)
|
||||
|
||||
<code>
|
||||
An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.
|
||||
</code>
|
||||
|
||||
- [cve-hunter/CVE-2022-1040-sophos-rce](https://github.com/cve-hunter/CVE-2022-1040-sophos-rce)
|
||||
|
||||
### CVE-2022-1077 (2022-03-29)
|
||||
|
||||
<code>
|
||||
|
@ -261,6 +269,17 @@ The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized
|
|||
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329)
|
||||
- [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE)
|
||||
|
||||
### CVE-2022-1388
|
||||
- [numanturle/CVE-2022-1388](https://github.com/numanturle/CVE-2022-1388)
|
||||
|
||||
### CVE-2022-1444 (2022-04-23)
|
||||
|
||||
<code>
|
||||
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
|
||||
</code>
|
||||
|
||||
- [KrungSalad/POC-CVE-2022-1444](https://github.com/KrungSalad/POC-CVE-2022-1444)
|
||||
|
||||
### CVE-2022-2333
|
||||
- [shirouQwQ/CVE-2022-2333](https://github.com/shirouQwQ/CVE-2022-2333)
|
||||
|
||||
|
@ -606,6 +625,7 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
|
|||
- [tyleraharrison/VMware-CVE-2022-22954-Command-Injector](https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector)
|
||||
- [3SsFuck/CVE-2022-22954-POC](https://github.com/3SsFuck/CVE-2022-22954-POC)
|
||||
- [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954)
|
||||
- [nguyenv1nK/CVE-2022-22954](https://github.com/nguyenv1nK/CVE-2022-22954)
|
||||
|
||||
### CVE-2022-22963 (2022-04-01)
|
||||
|
||||
|
@ -1252,6 +1272,7 @@ Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID i
|
|||
- [XmasSnowREAL/CVE-2022-26809-RCE](https://github.com/XmasSnowREAL/CVE-2022-26809-RCE)
|
||||
- [ZyxelTeam/CVE-2022-26809-RCE](https://github.com/ZyxelTeam/CVE-2022-26809-RCE)
|
||||
- [yuanLink/CVE-2022-26809](https://github.com/yuanLink/CVE-2022-26809)
|
||||
- [crypt0r00t/CVE-2022-26809](https://github.com/crypt0r00t/CVE-2022-26809)
|
||||
|
||||
### CVE-2022-27226 (2022-03-18)
|
||||
|
||||
|
@ -4298,6 +4319,14 @@ Windows Elevation of Privilege Vulnerability
|
|||
- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal)
|
||||
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
|
||||
|
||||
### CVE-2021-36981 (2021-08-30)
|
||||
|
||||
<code>
|
||||
In the server in SerNet verinice before 1.22.2, insecure Java deserialization allows remote authenticated attackers to execute arbitrary code.
|
||||
</code>
|
||||
|
||||
- [0xBrAinsTorM/CVE-2021-36981](https://github.com/0xBrAinsTorM/CVE-2021-36981)
|
||||
|
||||
### CVE-2021-37740 (2022-04-20)
|
||||
|
||||
<code>
|
||||
|
@ -5041,7 +5070,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [KosmX/CVE-2021-44228-example](https://github.com/KosmX/CVE-2021-44228-example)
|
||||
- [greymd/CVE-2021-44228](https://github.com/greymd/CVE-2021-44228)
|
||||
- [mubix/CVE-2021-44228-Log4Shell-Hashes](https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes)
|
||||
- [OopsieWoopsie/mc-log4j-patcher](https://github.com/OopsieWoopsie/mc-log4j-patcher)
|
||||
- [wheez-y/CVE-2021-44228-kusto](https://github.com/wheez-y/CVE-2021-44228-kusto)
|
||||
- [izzyacademy/log4shell-mitigation](https://github.com/izzyacademy/log4shell-mitigation)
|
||||
- [standb/CVE-2021-44228-poc](https://github.com/standb/CVE-2021-44228-poc)
|
||||
|
@ -6553,6 +6581,7 @@ A denial of service vulnerability exists when Microsoft Hyper-V on a host server
|
|||
|
||||
- [gerhart01/hyperv_local_dos_poc](https://github.com/gerhart01/hyperv_local_dos_poc)
|
||||
- [skasanagottu57gmailv/gerhart01](https://github.com/skasanagottu57gmailv/gerhart01)
|
||||
- [MarcelloTinocor/gerhart01](https://github.com/MarcelloTinocor/gerhart01)
|
||||
|
||||
### CVE-2020-0905 (2020-03-12)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue