mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2023/03/23 06:29:29
This commit is contained in:
parent
5123b3b792
commit
c7fedb760e
76 changed files with 1141 additions and 254 deletions
2016
2017
2018
2019
2020
CVE-2020-0218.jsonCVE-2020-0242.jsonCVE-2020-0245.jsonCVE-2020-0796.jsonCVE-2020-1472.jsonCVE-2020-14882.jsonCVE-2020-17527.jsonCVE-2020-2551.json
2021
CVE-2021-0509.jsonCVE-2021-0520.jsonCVE-2021-0928.jsonCVE-2021-21220.jsonCVE-2021-22205.jsonCVE-2021-3156.jsonCVE-2021-4034.jsonCVE-2021-41773.jsonCVE-2021-42278.jsonCVE-2021-44228.jsonCVE-2021-44852.json
2022
CVE-2022-0847.jsonCVE-2022-1040.jsonCVE-2022-1388.jsonCVE-2022-20124.jsonCVE-2022-20130.jsonCVE-2022-20135.jsonCVE-2022-20142.jsonCVE-2022-20413.jsonCVE-2022-20452.jsonCVE-2022-21449.jsonCVE-2022-22954.jsonCVE-2022-22965.jsonCVE-2022-24342.jsonCVE-2022-24637.jsonCVE-2022-24706.jsonCVE-2022-26134.jsonCVE-2022-26763.jsonCVE-2022-26766.jsonCVE-2022-28219.jsonCVE-2022-29464.jsonCVE-2022-29885.jsonCVE-2022-30190.jsonCVE-2022-30333.jsonCVE-2022-30594.jsonCVE-2022-30887.jsonCVE-2022-30929.jsonCVE-2022-33679.jsonCVE-2022-34718.jsonCVE-2022-34918.jsonCVE-2022-39197.jsonCVE-2022-39952.jsonCVE-2022-41040.jsonCVE-2022-41218.jsonCVE-2022-42475.jsonCVE-2022-44268.jsonCVE-2022-44877.jsonCVE-2022-45025.jsonCVE-2022-46463.jsonCVE-2022-46689.json
2023
CVE-2023-21036.jsonCVE-2023-21716.jsonCVE-2023-21768.jsonCVE-2023-21839.jsonCVE-2023-23397.jsonCVE-2023-23638.jsonCVE-2023-25136.jsonCVE-2023-27326.json
README.md
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-20T12:19:54Z",
|
||||
"updated_at": "2023-03-23T04:00:33Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1645,
|
||||
"watchers_count": 1645,
|
||||
"stargazers_count": 1646,
|
||||
"watchers_count": 1646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1645,
|
||||
"watchers": 1646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-20T12:19:54Z",
|
||||
"updated_at": "2023-03-23T04:00:33Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1645,
|
||||
"watchers_count": 1645,
|
||||
"stargazers_count": 1646,
|
||||
"watchers_count": 1646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1645,
|
||||
"watchers": 1646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -52,10 +52,10 @@
|
|||
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T23:51:12Z",
|
||||
"updated_at": "2023-02-27T21:04:33Z",
|
||||
"updated_at": "2023-03-23T02:55:39Z",
|
||||
"pushed_at": "2018-02-27T05:22:38Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 546,
|
||||
"watchers": 545,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-20T12:19:54Z",
|
||||
"updated_at": "2023-03-23T04:00:33Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1645,
|
||||
"watchers_count": 1645,
|
||||
"stargazers_count": 1646,
|
||||
"watchers_count": 1646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1645,
|
||||
"watchers": 1646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2023-03-15T08:40:26Z",
|
||||
"updated_at": "2023-03-23T04:39:48Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1760,
|
||||
"watchers_count": 1760,
|
||||
"stargazers_count": 1761,
|
||||
"watchers_count": 1761,
|
||||
"has_discussions": false,
|
||||
"forks_count": 264,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 264,
|
||||
"watchers": 1760,
|
||||
"watchers": 1761,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-03-22T11:57:18Z",
|
||||
"updated_at": "2023-03-23T06:09:07Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3698,
|
||||
"watchers_count": 3698,
|
||||
"stargazers_count": 3700,
|
||||
"watchers_count": 3700,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1067,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1067,
|
||||
"watchers": 3698,
|
||||
"watchers": 3700,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2023-03-21T10:46:48Z",
|
||||
"updated_at": "2023-03-23T05:39:37Z",
|
||||
"pushed_at": "2021-09-12T02:55:24Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 162,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-20T12:19:54Z",
|
||||
"updated_at": "2023-03-23T04:00:33Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1645,
|
||||
"watchers_count": 1645,
|
||||
"stargazers_count": 1646,
|
||||
"watchers_count": 1646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1645,
|
||||
"watchers": 1646,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2023-03-22T09:56:48Z",
|
||||
"updated_at": "2023-03-23T05:40:33Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 202,
|
||||
"watchers": 204,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-22T06:32:40Z",
|
||||
"updated_at": "2022-04-22T06:35:39Z",
|
||||
"updated_at": "2023-03-23T01:18:23Z",
|
||||
"pushed_at": "2022-04-22T06:36:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-23T11:48:10Z",
|
||||
"updated_at": "2022-02-23T11:55:34Z",
|
||||
"updated_at": "2023-03-23T01:13:15Z",
|
||||
"pushed_at": "2022-02-23T11:56:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -42,7 +42,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T09:35:35Z",
|
||||
"updated_at": "2022-03-30T09:44:25Z",
|
||||
"updated_at": "2023-03-23T01:18:29Z",
|
||||
"pushed_at": "2022-03-30T09:46:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-01T11:04:45Z",
|
||||
"updated_at": "2023-01-31T19:42:24Z",
|
||||
"updated_at": "2023-03-23T01:15:44Z",
|
||||
"pushed_at": "2022-04-01T11:09:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -1032,10 +1032,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2023-03-18T21:12:43Z",
|
||||
"updated_at": "2023-03-23T04:40:08Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1240,
|
||||
"watchers_count": 1240,
|
||||
"stargazers_count": 1241,
|
||||
"watchers_count": 1241,
|
||||
"has_discussions": false,
|
||||
"forks_count": 370,
|
||||
"allow_forking": true,
|
||||
|
@ -1050,7 +1050,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 370,
|
||||
"watchers": 1240,
|
||||
"watchers": 1241,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2023-03-22T02:02:30Z",
|
||||
"updated_at": "2023-03-23T04:39:27Z",
|
||||
"pushed_at": "2023-02-16T02:07:09Z",
|
||||
"stargazers_count": 1562,
|
||||
"watchers_count": 1562,
|
||||
"stargazers_count": 1563,
|
||||
"watchers_count": 1563,
|
||||
"has_discussions": false,
|
||||
"forks_count": 353,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 353,
|
||||
"watchers": 1562,
|
||||
"watchers": 1563,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-03-22T11:57:18Z",
|
||||
"updated_at": "2023-03-23T06:09:07Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3698,
|
||||
"watchers_count": 3698,
|
||||
"stargazers_count": 3700,
|
||||
"watchers_count": 3700,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1067,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1067,
|
||||
"watchers": 3698,
|
||||
"watchers": 3700,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-05T00:18:45Z",
|
||||
"updated_at": "2022-03-03T22:44:22Z",
|
||||
"updated_at": "2023-03-23T01:16:32Z",
|
||||
"pushed_at": "2021-02-09T03:15:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-03-20T12:19:54Z",
|
||||
"updated_at": "2023-03-23T04:00:33Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1645,
|
||||
"watchers_count": 1645,
|
||||
"stargazers_count": 1646,
|
||||
"watchers_count": 1646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 323,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 323,
|
||||
"watchers": 1645,
|
||||
"watchers": 1646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-21T06:23:26Z",
|
||||
"updated_at": "2022-04-21T06:33:37Z",
|
||||
"updated_at": "2023-03-23T01:17:11Z",
|
||||
"pushed_at": "2022-04-21T06:35:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -71,7 +71,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-25T11:57:50Z",
|
||||
"updated_at": "2023-01-31T20:06:46Z",
|
||||
"updated_at": "2023-03-23T01:16:15Z",
|
||||
"pushed_at": "2022-07-25T12:38:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2023-03-15T15:41:50Z",
|
||||
"updated_at": "2023-03-23T00:47:38Z",
|
||||
"pushed_at": "2022-11-16T08:14:33Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"has_discussions": false,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
|
@ -143,7 +143,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"watchers": 222,
|
||||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -455,10 +455,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-03-21T12:13:38Z",
|
||||
"updated_at": "2023-03-23T04:40:59Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 863,
|
||||
"watchers_count": 863,
|
||||
"stargazers_count": 864,
|
||||
"watchers_count": 864,
|
||||
"has_discussions": false,
|
||||
"forks_count": 238,
|
||||
"allow_forking": true,
|
||||
|
@ -467,7 +467,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 238,
|
||||
"watchers": 863,
|
||||
"watchers": 864,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -164,10 +164,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2023-03-10T12:09:21Z",
|
||||
"updated_at": "2023-03-23T04:40:32Z",
|
||||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 957,
|
||||
"watchers_count": 957,
|
||||
"stargazers_count": 958,
|
||||
"watchers_count": 958,
|
||||
"has_discussions": false,
|
||||
"forks_count": 310,
|
||||
"allow_forking": true,
|
||||
|
@ -180,7 +180,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 310,
|
||||
"watchers": 957,
|
||||
"watchers": 958,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -461,10 +461,10 @@
|
|||
"description": "Path Traversal vulnerability in Apache 2.4.49",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T10:04:22Z",
|
||||
"updated_at": "2021-10-10T18:52:52Z",
|
||||
"updated_at": "2023-03-23T02:24:39Z",
|
||||
"pushed_at": "2021-10-07T19:39:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -473,7 +473,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2374,10 +2374,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2023-03-09T22:35:46Z",
|
||||
"updated_at": "2023-03-23T00:59:39Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -2395,7 +2395,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-03-22T02:18:39Z",
|
||||
"updated_at": "2023-03-23T01:18:57Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"has_discussions": false,
|
||||
"forks_count": 97,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 97,
|
||||
"watchers": 545,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -909,10 +909,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-03-21T09:14:18Z",
|
||||
"updated_at": "2023-03-23T02:34:07Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1551,
|
||||
"watchers_count": 1551,
|
||||
"stargazers_count": 1552,
|
||||
"watchers_count": 1552,
|
||||
"has_discussions": false,
|
||||
"forks_count": 450,
|
||||
"allow_forking": true,
|
||||
|
@ -926,7 +926,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 450,
|
||||
"watchers": 1551,
|
||||
"watchers": 1552,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1259,10 +1259,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-03-22T06:03:49Z",
|
||||
"updated_at": "2023-03-23T02:02:57Z",
|
||||
"pushed_at": "2023-03-21T03:01:52Z",
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -1276,7 +1276,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 645,
|
||||
"watchers": 646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-22T04:11:03Z",
|
||||
"updated_at": "2023-03-22T14:09:02Z",
|
||||
"pushed_at": "2023-03-22T20:17:23Z",
|
||||
"pushed_at": "2023-03-23T01:51:28Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1865,6 +1865,64 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510629189,
|
||||
"name": "dirtypipe-ebpf_detection",
|
||||
"full_name": "airbus-cert\/dirtypipe-ebpf_detection",
|
||||
"owner": {
|
||||
"login": "airbus-cert",
|
||||
"id": 26453405,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
|
||||
"html_url": "https:\/\/github.com\/airbus-cert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection",
|
||||
"description": "An eBPF detection program for CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:20:59Z",
|
||||
"updated_at": "2023-01-16T18:05:15Z",
|
||||
"pushed_at": "2022-07-05T14:25:46Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510867863,
|
||||
"name": "Dirty-Pipe",
|
||||
"full_name": "edr1412\/Dirty-Pipe",
|
||||
"owner": {
|
||||
"login": "edr1412",
|
||||
"id": 40953911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
|
||||
"html_url": "https:\/\/github.com\/edr1412"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
|
||||
"description": "exp of CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:22:50Z",
|
||||
"updated_at": "2023-01-31T12:51:32Z",
|
||||
"pushed_at": "2022-07-05T19:23:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 520138171,
|
||||
"name": "CVE-2022-0847-DirtyPipe-Exploits",
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-10T10:38:59Z",
|
||||
"updated_at": "2023-03-01T11:47:12Z",
|
||||
"updated_at": "2023-03-23T04:28:30Z",
|
||||
"pushed_at": "2022-10-21T07:55:22Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1592,6 +1592,68 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509548569,
|
||||
"name": "CVE-2022-1388_refresh",
|
||||
"full_name": "Luchoane\/CVE-2022-1388_refresh",
|
||||
"owner": {
|
||||
"login": "Luchoane",
|
||||
"id": 40374879,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
|
||||
"html_url": "https:\/\/github.com\/Luchoane"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
|
||||
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T18:08:50Z",
|
||||
"updated_at": "2022-07-07T19:22:09Z",
|
||||
"pushed_at": "2022-07-01T20:04:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510239425,
|
||||
"name": "CVE-2022-1388",
|
||||
"full_name": "jbharucha05\/CVE-2022-1388",
|
||||
"owner": {
|
||||
"login": "jbharucha05",
|
||||
"id": 13020621,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
|
||||
"html_url": "https:\/\/github.com\/jbharucha05"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
|
||||
"description": "CVE-2022-1388, bypassing iControl REST authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T06:31:56Z",
|
||||
"updated_at": "2022-07-04T07:08:22Z",
|
||||
"pushed_at": "2022-07-04T10:37:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-1388",
|
||||
"f5-big-ip-icontrol-rest-rce",
|
||||
"f5-bigip"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 557286411,
|
||||
"name": "CVE-2022-1388",
|
||||
|
|
31
2022/CVE-2022-20124.json
Normal file
31
2022/CVE-2022-20124.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 510660359,
|
||||
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T08:59:44Z",
|
||||
"updated_at": "2022-07-05T09:52:45Z",
|
||||
"pushed_at": "2022-07-05T09:52:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-20130.json
Normal file
31
2022/CVE-2022-20130.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 509461641,
|
||||
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T13:16:14Z",
|
||||
"updated_at": "2022-07-01T13:25:04Z",
|
||||
"pushed_at": "2022-07-01T13:25:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-20135.json
Normal file
31
2022/CVE-2022-20135.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 510684846,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T10:15:49Z",
|
||||
"updated_at": "2022-07-05T10:42:21Z",
|
||||
"pushed_at": "2022-07-05T10:41:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 510346412,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T12:16:05Z",
|
||||
"updated_at": "2022-07-04T13:19:53Z",
|
||||
"pushed_at": "2022-07-04T12:21:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 529215266,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T10:33:22Z",
|
||||
"updated_at": "2023-01-17T11:20:34Z",
|
||||
"updated_at": "2023-03-23T01:13:28Z",
|
||||
"pushed_at": "2023-01-17T11:20:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2023-03-19T20:06:21Z",
|
||||
"updated_at": "2023-03-23T02:11:18Z",
|
||||
"pushed_at": "2023-01-10T16:25:49Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 180,
|
||||
"forks": 33,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -202,6 +202,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510875629,
|
||||
"name": "CVE-2022-21449-I2P-TLS-POC",
|
||||
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
|
||||
"owner": {
|
||||
"login": "PyterSmithDarkGhost",
|
||||
"id": 106814901,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
|
||||
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:51:39Z",
|
||||
"updated_at": "2022-09-01T23:29:48Z",
|
||||
"pushed_at": "2022-07-05T19:52:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 519281774,
|
||||
"name": "CVE-2022-21449-showcase",
|
||||
|
|
|
@ -637,6 +637,64 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524471767,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "amit-pathak009\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:00:04Z",
|
||||
"updated_at": "2022-06-02T01:44:19Z",
|
||||
"pushed_at": "2022-06-02T01:44:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524471940,
|
||||
"name": "CVE-2022-22954-PoC",
|
||||
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:00:39Z",
|
||||
"updated_at": "2022-06-01T22:41:09Z",
|
||||
"pushed_at": "2022-06-01T22:41:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 545257457,
|
||||
"name": "VcenterKiller",
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2023-03-20T14:06:59Z",
|
||||
"updated_at": "2023-03-23T05:59:57Z",
|
||||
"pushed_at": "2022-08-04T18:26:18Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"has_discussions": false,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
|
@ -137,7 +137,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 220,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1896,6 +1896,35 @@
|
|||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510562121,
|
||||
"name": "CVE-2022-22965",
|
||||
"full_name": "trhacknon\/CVE-2022-22965",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:30:29Z",
|
||||
"updated_at": "2022-09-27T23:19:26Z",
|
||||
"pushed_at": "2022-07-05T02:32:04Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510569312,
|
||||
"name": "Spring4Shell-CVE-2022-22965",
|
||||
|
@ -2055,10 +2084,10 @@
|
|||
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-28T04:50:16Z",
|
||||
"updated_at": "2023-03-22T08:28:32Z",
|
||||
"updated_at": "2023-03-23T03:52:50Z",
|
||||
"pushed_at": "2022-12-29T03:32:45Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -2067,7 +2096,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 61,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
39
2022/CVE-2022-24342.json
Normal file
39
2022/CVE-2022-24342.json
Normal file
|
@ -0,0 +1,39 @@
|
|||
[
|
||||
{
|
||||
"id": 509870464,
|
||||
"name": "CVE-2022-24342",
|
||||
"full_name": "yuriisanin\/CVE-2022-24342",
|
||||
"owner": {
|
||||
"login": "yuriisanin",
|
||||
"id": 11749007,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
|
||||
"html_url": "https:\/\/github.com\/yuriisanin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342",
|
||||
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T22:04:29Z",
|
||||
"updated_at": "2023-02-12T21:01:11Z",
|
||||
"pushed_at": "2022-07-05T17:31:35Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"csrf",
|
||||
"cve",
|
||||
"cve-2022-24342",
|
||||
"exploit",
|
||||
"jetbrains",
|
||||
"teamcity",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -100,10 +100,10 @@
|
|||
"description": "Open Web Analytics (OWA) - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-08T21:12:35Z",
|
||||
"updated_at": "2023-03-22T21:44:56Z",
|
||||
"updated_at": "2023-03-23T01:10:51Z",
|
||||
"pushed_at": "2022-10-12T17:14:54Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -116,7 +116,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -57,6 +57,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510182546,
|
||||
"name": "CVE-2022-24706",
|
||||
"full_name": "superzerosec\/CVE-2022-24706",
|
||||
"owner": {
|
||||
"login": "superzerosec",
|
||||
"id": 57648217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||||
"html_url": "https:\/\/github.com\/superzerosec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706",
|
||||
"description": "CVE-2022-24706 POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T02:06:27Z",
|
||||
"updated_at": "2022-07-04T02:06:27Z",
|
||||
"pushed_at": "2022-07-04T02:06:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 533101052,
|
||||
"name": "CVE-2022-24706-CouchDB-Exploit",
|
||||
|
|
|
@ -1280,6 +1280,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510402169,
|
||||
"name": "TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "r1skkam",
|
||||
"id": 58542375,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
|
||||
"html_url": "https:\/\/github.com\/r1skkam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
|
||||
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T15:00:21Z",
|
||||
"updated_at": "2022-07-19T02:30:51Z",
|
||||
"pushed_at": "2022-07-04T16:49:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510586350,
|
||||
"name": "CVE-2022-26134",
|
||||
|
@ -1314,6 +1343,44 @@
|
|||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510624422,
|
||||
"name": "CVE-2022-26134",
|
||||
"full_name": "Debajyoti0-0\/CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "Debajyoti0-0",
|
||||
"id": 79437050,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
|
||||
"html_url": "https:\/\/github.com\/Debajyoti0-0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
|
||||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:04:50Z",
|
||||
"updated_at": "2022-07-10T08:52:10Z",
|
||||
"pushed_at": "2022-07-05T09:40:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"atlassian-confluence",
|
||||
"cve-2022-26134",
|
||||
"infosec",
|
||||
"ognl-injection-vulnerability",
|
||||
"payload",
|
||||
"python",
|
||||
"rce",
|
||||
"unauthenticated"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510946912,
|
||||
"name": "cve-2022-26134",
|
||||
|
|
31
2022/CVE-2022-26763.json
Normal file
31
2022/CVE-2022-26763.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 509675215,
|
||||
"name": "PCICrash",
|
||||
"full_name": "zhuowei\/PCICrash",
|
||||
"owner": {
|
||||
"login": "zhuowei",
|
||||
"id": 704768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhuowei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhuowei\/PCICrash",
|
||||
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:15:29Z",
|
||||
"updated_at": "2022-09-15T17:20:03Z",
|
||||
"pushed_at": "2022-07-02T06:15:40Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-26766.json
Normal file
31
2022/CVE-2022-26766.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 509675427,
|
||||
"name": "CoreTrustDemo",
|
||||
"full_name": "zhuowei\/CoreTrustDemo",
|
||||
"owner": {
|
||||
"login": "zhuowei",
|
||||
"id": 704768,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhuowei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo",
|
||||
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:16:33Z",
|
||||
"updated_at": "2023-02-26T02:08:22Z",
|
||||
"pushed_at": "2022-07-02T17:14:41Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -28,6 +28,35 @@
|
|||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509605278,
|
||||
"name": "manageengine-auditad-cve-2022-28219",
|
||||
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
|
||||
"owner": {
|
||||
"login": "rbowes-r7",
|
||||
"id": 104588115,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
|
||||
"html_url": "https:\/\/github.com\/rbowes-r7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T22:40:46Z",
|
||||
"updated_at": "2022-07-19T13:50:08Z",
|
||||
"pushed_at": "2022-07-05T22:13:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 518384320,
|
||||
"name": "CVE-2022-28219-Like",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2023-03-09T07:34:27Z",
|
||||
"updated_at": "2023-03-23T03:39:44Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 89,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 89,
|
||||
"watchers": 345,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -554,6 +554,64 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524474931,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "amit-pathak009\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:14:43Z",
|
||||
"updated_at": "2022-05-19T21:24:13Z",
|
||||
"pushed_at": "2022-05-19T21:24:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 524475053,
|
||||
"name": "CVE-2022-29464-mass",
|
||||
"full_name": "amit-pathak009\/CVE-2022-29464-mass",
|
||||
"owner": {
|
||||
"login": "amit-pathak009",
|
||||
"id": 72250138,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-13T18:15:18Z",
|
||||
"updated_at": "2023-01-11T06:21:01Z",
|
||||
"pushed_at": "2022-05-29T19:16:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 540011346,
|
||||
"name": "CVE-2022-29464",
|
||||
|
|
|
@ -27,5 +27,34 @@
|
|||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509388193,
|
||||
"name": "CVE-2022-29885",
|
||||
"full_name": "iveresk\/CVE-2022-29885",
|
||||
"owner": {
|
||||
"login": "iveresk",
|
||||
"id": 28754633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
|
||||
"html_url": "https:\/\/github.com\/iveresk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885",
|
||||
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T09:02:10Z",
|
||||
"updated_at": "2023-01-24T17:20:21Z",
|
||||
"pushed_at": "2022-07-05T06:23:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2044,20 +2044,20 @@
|
|||
},
|
||||
{
|
||||
"id": 508614565,
|
||||
"name": "CVE-2022-30190_PowerPoint",
|
||||
"full_name": "Gra3s\/CVE-2022-30190_PowerPoint",
|
||||
"name": "CVE-2022-30190_EXP_PowerPoint",
|
||||
"full_name": "Gra3s\/CVE-2022-30190_EXP_PowerPoint",
|
||||
"owner": {
|
||||
"login": "Gra3s",
|
||||
"id": 76804515,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76804515?v=4",
|
||||
"html_url": "https:\/\/github.com\/Gra3s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_PowerPoint",
|
||||
"description": "CVE-2022-30190 exp on PowerPoint",
|
||||
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_EXP_PowerPoint",
|
||||
"description": "This is exploit of CVE-2022-30190 on PowerPoint.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-29T08:48:12Z",
|
||||
"updated_at": "2023-02-27T09:18:22Z",
|
||||
"pushed_at": "2022-06-30T01:27:36Z",
|
||||
"updated_at": "2023-03-23T03:19:30Z",
|
||||
"pushed_at": "2023-03-23T03:18:46Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 510563141,
|
||||
"name": "CVE-2022-30333-PoC",
|
||||
"full_name": "TheL1ghtVn\/CVE-2022-30333-PoC",
|
||||
"owner": {
|
||||
"login": "TheL1ghtVn",
|
||||
"id": 89027345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheL1ghtVn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T02:35:12Z",
|
||||
"updated_at": "2022-11-19T19:17:38Z",
|
||||
"pushed_at": "2022-07-05T02:58:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 514420724,
|
||||
"name": "unrar-cve-2022-30333-poc",
|
||||
|
|
31
2022/CVE-2022-30594.json
Normal file
31
2022/CVE-2022-30594.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 510304709,
|
||||
"name": "linux-4.19.72_CVE-2022-30594",
|
||||
"full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594",
|
||||
"owner": {
|
||||
"login": "nidhi7598",
|
||||
"id": 106973537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
|
||||
"html_url": "https:\/\/github.com\/nidhi7598"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T10:01:05Z",
|
||||
"updated_at": "2023-03-08T01:26:26Z",
|
||||
"pushed_at": "2022-07-04T10:18:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-30887.json
Normal file
31
2022/CVE-2022-30887.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 510479826,
|
||||
"name": "CVE-2022-30887",
|
||||
"full_name": "MuallimNaci\/CVE-2022-30887",
|
||||
"owner": {
|
||||
"login": "MuallimNaci",
|
||||
"id": 87265009,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4",
|
||||
"html_url": "https:\/\/github.com\/MuallimNaci"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-04T19:24:56Z",
|
||||
"updated_at": "2022-12-08T03:15:35Z",
|
||||
"pushed_at": "2022-07-04T19:30:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2022/CVE-2022-30929.json
Normal file
31
2022/CVE-2022-30929.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 511398695,
|
||||
"name": "CVE-2022-30929",
|
||||
"full_name": "nanaao\/CVE-2022-30929",
|
||||
"owner": {
|
||||
"login": "nanaao",
|
||||
"id": 77666853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
|
||||
"html_url": "https:\/\/github.com\/nanaao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929",
|
||||
"description": "CVE-2022-30929 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-07T05:44:56Z",
|
||||
"updated_at": "2023-01-31T12:52:11Z",
|
||||
"pushed_at": "2022-07-04T06:19:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2023-03-19T16:45:01Z",
|
||||
"updated_at": "2023-03-23T03:07:58Z",
|
||||
"pushed_at": "2022-12-13T15:26:57Z",
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 368,
|
||||
"watchers": 369,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-03T11:39:25Z",
|
||||
"updated_at": "2023-03-16T16:47:02Z",
|
||||
"updated_at": "2023-03-23T05:31:28Z",
|
||||
"pushed_at": "2022-10-10T08:57:29Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -158,10 +158,10 @@
|
|||
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T09:52:02Z",
|
||||
"updated_at": "2023-03-21T15:29:04Z",
|
||||
"updated_at": "2023-03-23T01:26:56Z",
|
||||
"pushed_at": "2022-09-15T03:19:28Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -170,7 +170,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,10 +220,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2023-03-22T01:49:51Z",
|
||||
"updated_at": "2023-03-23T03:27:19Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -236,7 +236,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 235,
|
||||
"watchers": 236,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -253,10 +253,10 @@
|
|||
"description": "CVE-2022-39197 bug fix patch",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-09T04:06:23Z",
|
||||
"updated_at": "2022-10-17T06:58:26Z",
|
||||
"updated_at": "2023-03-23T03:34:03Z",
|
||||
"pushed_at": "2022-10-09T05:50:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-03-17T15:46:52Z",
|
||||
"updated_at": "2023-03-23T02:11:24Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 249,
|
||||
"forks": 50,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-41040 nuclei template",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-02T11:26:57Z",
|
||||
"updated_at": "2023-01-14T21:54:26Z",
|
||||
"updated_at": "2023-03-23T04:19:54Z",
|
||||
"pushed_at": "2022-10-02T11:55:35Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -199,10 +199,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T17:01:17Z",
|
||||
"updated_at": "2022-11-01T16:13:17Z",
|
||||
"updated_at": "2023-03-23T04:20:35Z",
|
||||
"pushed_at": "2022-10-15T09:10:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -211,7 +211,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Vulnerability Details for CVE-2022-41218",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T07:12:23Z",
|
||||
"updated_at": "2023-03-22T21:55:50Z",
|
||||
"updated_at": "2023-03-23T04:55:28Z",
|
||||
"pushed_at": "2022-10-09T05:26:03Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"forks": 7,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,10 +46,10 @@
|
|||
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-23T10:04:58Z",
|
||||
"updated_at": "2023-03-22T13:01:41Z",
|
||||
"updated_at": "2023-03-23T04:32:01Z",
|
||||
"pushed_at": "2023-03-14T08:41:51Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-03-22T02:38:48Z",
|
||||
"updated_at": "2023-03-23T02:28:07Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 217,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -281,10 +281,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T02:00:51Z",
|
||||
"updated_at": "2023-03-22T13:41:58Z",
|
||||
"updated_at": "2023-03-23T01:15:57Z",
|
||||
"pushed_at": "2023-03-22T11:33:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -306,7 +306,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -352,10 +352,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T21:26:20Z",
|
||||
"updated_at": "2023-03-22T21:26:20Z",
|
||||
"updated_at": "2023-03-23T05:43:33Z",
|
||||
"pushed_at": "2023-03-22T21:26:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -364,7 +364,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T17:29:10Z",
|
||||
"updated_at": "2023-03-09T07:29:56Z",
|
||||
"updated_at": "2023-03-23T04:19:43Z",
|
||||
"pushed_at": "2023-01-05T17:40:18Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T22:48:38Z",
|
||||
"updated_at": "2023-02-23T12:25:38Z",
|
||||
"updated_at": "2023-03-23T02:55:51Z",
|
||||
"pushed_at": "2022-12-11T13:37:22Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 88,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2022-46463(Harbor 未授权)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T14:58:14Z",
|
||||
"updated_at": "2023-03-10T06:55:23Z",
|
||||
"updated_at": "2023-03-23T01:47:52Z",
|
||||
"pushed_at": "2023-01-19T12:47:21Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-03-22T14:40:25Z",
|
||||
"updated_at": "2023-03-23T06:01:04Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 777,
|
||||
"watchers": 778,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -39,13 +39,13 @@
|
|||
"html_url": "https:\/\/github.com\/infobyte"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/infobyte\/CVE-2023-21036",
|
||||
"description": "Detection an sanitization for Acropalypse Now - CVE-2023-21036",
|
||||
"description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T14:59:42Z",
|
||||
"updated_at": "2023-03-23T00:27:58Z",
|
||||
"updated_at": "2023-03-23T04:28:15Z",
|
||||
"pushed_at": "2023-03-22T19:19:26Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-08T06:20:45Z",
|
||||
"updated_at": "2023-03-21T12:38:03Z",
|
||||
"updated_at": "2023-03-23T04:35:27Z",
|
||||
"pushed_at": "2023-03-08T06:21:58Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-03-22T12:55:45Z",
|
||||
"updated_at": "2023-03-23T01:27:35Z",
|
||||
"pushed_at": "2023-03-10T08:58:44Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-10T19:08:28Z",
|
||||
"updated_at": "2023-03-21T16:18:45Z",
|
||||
"updated_at": "2023-03-23T02:31:50Z",
|
||||
"pushed_at": "2023-03-10T20:16:53Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -166,10 +166,10 @@
|
|||
"description": "CVE-2023-21768 Windows 11 22H2 系统本地提权 POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T07:24:36Z",
|
||||
"updated_at": "2023-03-22T16:12:37Z",
|
||||
"updated_at": "2023-03-23T02:42:13Z",
|
||||
"pushed_at": "2023-03-22T07:34:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -178,7 +178,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-03-20T14:32:11Z",
|
||||
"updated_at": "2023-03-23T03:55:00Z",
|
||||
"pushed_at": "2023-03-03T03:30:04Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 473,
|
||||
"watchers": 474,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "Simple PoC in PowerShell for CVE-2023-23397",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:10:37Z",
|
||||
"updated_at": "2023-03-22T12:02:43Z",
|
||||
"updated_at": "2023-03-23T03:17:42Z",
|
||||
"pushed_at": "2023-03-16T19:29:49Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -151,7 +151,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -173,13 +173,13 @@
|
|||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 36,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -371,12 +371,12 @@
|
|||
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T16:31:54Z",
|
||||
"updated_at": "2023-03-22T23:36:32Z",
|
||||
"updated_at": "2023-03-23T05:40:30Z",
|
||||
"pushed_at": "2023-03-20T16:55:25Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -384,8 +384,8 @@
|
|||
"cve-2023-23397"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 23,
|
||||
"forks": 5,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T11:23:44Z",
|
||||
"updated_at": "2023-03-22T11:41:06Z",
|
||||
"updated_at": "2023-03-23T02:18:12Z",
|
||||
"pushed_at": "2023-03-22T11:41:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-22T19:44:08Z",
|
||||
"updated_at": "2023-03-21T10:57:03Z",
|
||||
"updated_at": "2023-03-23T01:54:37Z",
|
||||
"pushed_at": "2023-03-07T10:43:36Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T11:47:54Z",
|
||||
"updated_at": "2023-03-22T21:59:29Z",
|
||||
"updated_at": "2023-03-23T05:55:32Z",
|
||||
"pushed_at": "2023-03-20T12:51:29Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 116,
|
||||
"forks": 14,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
}
|
||||
]
|
98
README.md
98
README.md
|
@ -242,7 +242,12 @@ A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticate
|
|||
### CVE-2023-23138
|
||||
- [OmarAtallahh/CVE-2023-23138](https://github.com/OmarAtallahh/CVE-2023-23138)
|
||||
|
||||
### CVE-2023-23192
|
||||
### CVE-2023-23192 (2023-03-22)
|
||||
|
||||
<code>
|
||||
IS Decisions UserLock MFA 11.01 is vulnerable to authentication bypass using scheduled task.
|
||||
</code>
|
||||
|
||||
- [pinarsadioglu/CVE-2023-23192](https://github.com/pinarsadioglu/CVE-2023-23192)
|
||||
- [Penkyzduyi/CVE-2023-23192](https://github.com/Penkyzduyi/CVE-2023-23192)
|
||||
|
||||
|
@ -732,6 +737,8 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
|
||||
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
|
||||
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
|
||||
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
|
||||
- [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
|
||||
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
|
||||
|
@ -984,6 +991,8 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
|
|||
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
|
||||
- [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388)
|
||||
- [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388)
|
||||
- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh)
|
||||
- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388)
|
||||
- [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388)
|
||||
- [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388)
|
||||
- [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388)
|
||||
|
@ -1374,6 +1383,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
|
|||
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007)
|
||||
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007)
|
||||
|
||||
### CVE-2022-20124 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036
|
||||
</code>
|
||||
|
||||
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
|
||||
|
||||
### CVE-2022-20126 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1385,6 +1402,14 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo
|
|||
### CVE-2022-20128
|
||||
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
|
||||
|
||||
### CVE-2022-20130 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
|
||||
|
||||
### CVE-2022-20133 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1393,6 +1418,14 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of
|
|||
|
||||
- [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133)
|
||||
|
||||
### CVE-2022-20135 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
|
||||
</code>
|
||||
|
||||
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
|
||||
|
||||
### CVE-2022-20138 (2022-06-15)
|
||||
|
||||
<code>
|
||||
|
@ -1409,6 +1442,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there
|
|||
In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
|
||||
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142)
|
||||
|
||||
### CVE-2022-20186 (2022-06-15)
|
||||
|
@ -1599,6 +1633,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
|
|||
- [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449)
|
||||
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
|
||||
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
|
||||
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
|
||||
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
|
||||
- [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449)
|
||||
|
||||
|
@ -2048,6 +2083,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
|
|||
- [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954)
|
||||
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
|
||||
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
|
||||
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
|
||||
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
|
||||
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
|
||||
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
|
||||
|
@ -2149,6 +2186,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
|
||||
- [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell)
|
||||
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
|
||||
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
|
||||
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
|
||||
- [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965)
|
||||
- [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC)
|
||||
|
@ -2534,6 +2572,14 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System
|
|||
|
||||
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
|
||||
|
||||
### CVE-2022-24342 (2022-02-25)
|
||||
|
||||
<code>
|
||||
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
|
||||
</code>
|
||||
|
||||
- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342)
|
||||
|
||||
### CVE-2022-24348 (2022-02-04)
|
||||
|
||||
<code>
|
||||
|
@ -2652,6 +2698,7 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
|
|||
|
||||
- [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit)
|
||||
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
|
||||
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
|
||||
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
|
||||
|
||||
### CVE-2022-24707 (2022-02-23)
|
||||
|
@ -3057,7 +3104,9 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
|
||||
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
|
||||
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
|
||||
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
|
||||
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
|
||||
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
|
||||
- [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134)
|
||||
- [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134)
|
||||
- [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit)
|
||||
|
@ -3183,6 +3232,22 @@ A use after free issue was addressed with improved memory management. This issue
|
|||
|
||||
- [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert)
|
||||
|
||||
### CVE-2022-26763 (2022-05-26)
|
||||
|
||||
<code>
|
||||
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.
|
||||
</code>
|
||||
|
||||
- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash)
|
||||
|
||||
### CVE-2022-26766 (2022-05-26)
|
||||
|
||||
<code>
|
||||
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
|
||||
</code>
|
||||
|
||||
- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo)
|
||||
|
||||
### CVE-2022-26809 (2022-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -3431,6 +3496,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
|
|||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
|
||||
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
|
||||
- [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like)
|
||||
|
||||
### CVE-2022-28281 (2022-12-22)
|
||||
|
@ -3705,6 +3771,8 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
|
||||
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
|
||||
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
|
||||
- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464)
|
||||
- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass)
|
||||
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
|
||||
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
|
||||
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
|
||||
|
@ -3811,6 +3879,7 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20
|
|||
</code>
|
||||
|
||||
- [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885)
|
||||
- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885)
|
||||
|
||||
### CVE-2022-29932 (2022-05-11)
|
||||
|
||||
|
@ -3947,7 +4016,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
|
|||
- [Cerebrovinny/follina-CVE-2022-30190](https://github.com/Cerebrovinny/follina-CVE-2022-30190)
|
||||
- [ethicalblue/Follina-CVE-2022-30190-Sample](https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample)
|
||||
- [Lucaskrell/go_follina](https://github.com/Lucaskrell/go_follina)
|
||||
- [Gra3s/CVE-2022-30190_PowerPoint](https://github.com/Gra3s/CVE-2022-30190_PowerPoint)
|
||||
- [Gra3s/CVE-2022-30190_EXP_PowerPoint](https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint)
|
||||
- [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-)
|
||||
- [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s)
|
||||
- [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190)
|
||||
|
@ -3990,6 +4059,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer
|
|||
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
|
||||
</code>
|
||||
|
||||
- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC)
|
||||
- [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc)
|
||||
- [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333)
|
||||
- [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333)
|
||||
|
@ -4100,6 +4170,14 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl
|
|||
|
||||
- [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks)
|
||||
|
||||
### CVE-2022-30594 (2022-05-12)
|
||||
|
||||
<code>
|
||||
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
|
||||
</code>
|
||||
|
||||
- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594)
|
||||
|
||||
### CVE-2022-30600 (2022-05-18)
|
||||
|
||||
<code>
|
||||
|
@ -4127,6 +4205,22 @@ Gitea before 1.16.7 does not escape git fetch remote.
|
|||
|
||||
- [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781)
|
||||
|
||||
### CVE-2022-30887 (2022-05-20)
|
||||
|
||||
<code>
|
||||
Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
|
||||
</code>
|
||||
|
||||
- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887)
|
||||
|
||||
### CVE-2022-30929 (2022-07-06)
|
||||
|
||||
<code>
|
||||
Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
|
||||
</code>
|
||||
|
||||
- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929)
|
||||
|
||||
### CVE-2022-31007 (2022-05-31)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue