mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-12 02:05:40 +02:00
Auto Update 2022/06/22 06:17:54
This commit is contained in:
parent
af7fc50198
commit
cb816f534e
41 changed files with 234 additions and 209 deletions
2002
2014
2015
2016
2017
2018
2019
2020
2021
2022
CVE-2022-0492.jsonCVE-2022-0847.jsonCVE-2022-111111.jsonCVE-2022-1972.jsonCVE-2022-22947.jsonCVE-2022-22963.jsonCVE-2022-22965.jsonCVE-2022-22980.jsonCVE-2022-23131.jsonCVE-2022-23222.jsonCVE-2022-26134.jsonCVE-2022-26809.jsonCVE-2022-29072.jsonCVE-2022-30075.jsonCVE-2022-30190.json
README.md
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2022-06-16T09:03:26Z",
|
||||
"updated_at": "2022-06-22T01:44:09Z",
|
||||
"pushed_at": "2022-05-27T13:00:42Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 326957651,
|
||||
"name": "CVE-2014-4688",
|
||||
"full_name": "AndyFeiLi\/CVE-2014-4688",
|
||||
"full_name": "andyfeili\/CVE-2014-4688",
|
||||
"owner": {
|
||||
"login": "AndyFeiLi",
|
||||
"login": "andyfeili",
|
||||
"id": 59521017,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59521017?v=4",
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi"
|
||||
"html_url": "https:\/\/github.com\/andyfeili"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi\/CVE-2014-4688",
|
||||
"html_url": "https:\/\/github.com\/andyfeili\/CVE-2014-4688",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T10:02:37Z",
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 506108089,
|
||||
"name": "CVE-2015-2291",
|
||||
"full_name": "Exploitables\/CVE-2015-2291",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2015-2291",
|
||||
"description": "(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-22T05:22:57Z",
|
||||
"updated_at": "2022-06-22T05:23:02Z",
|
||||
"pushed_at": "2022-06-22T05:30:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T22:38:51Z",
|
||||
"updated_at": "2021-09-30T13:43:29Z",
|
||||
"updated_at": "2022-06-22T01:33:52Z",
|
||||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-18T22:38:51Z",
|
||||
"updated_at": "2021-09-30T13:43:29Z",
|
||||
"updated_at": "2022-06-22T01:33:52Z",
|
||||
"pushed_at": "2017-07-22T19:22:55Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2022-06-21T18:02:54Z",
|
||||
"updated_at": "2022-06-22T03:28:32Z",
|
||||
"pushed_at": "2022-06-20T13:23:23Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1046,12 +1046,12 @@
|
|||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 65,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"forks": 66,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Jboss Java Deserialization RCE (CVE-2017-12149)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-22T21:06:09Z",
|
||||
"updated_at": "2022-05-12T15:53:05Z",
|
||||
"updated_at": "2022-06-22T05:16:45Z",
|
||||
"pushed_at": "2019-08-22T21:08:14Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2017-04-25T21:25:43Z",
|
||||
"updated_at": "2022-06-17T13:05:43Z",
|
||||
"pushed_at": "2022-06-20T05:19:36Z",
|
||||
"pushed_at": "2022-06-22T04:42:25Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 3,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A code demonstrating CVE-2018-0886",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-02T12:52:07Z",
|
||||
"updated_at": "2022-06-14T13:06:08Z",
|
||||
"updated_at": "2022-06-22T01:18:44Z",
|
||||
"pushed_at": "2020-08-14T16:33:44Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2018-02-09T22:35:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -29,7 +29,7 @@
|
|||
"works"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"forks_count": 458,
|
||||
"forks_count": 459,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 458,
|
||||
"forks": 459,
|
||||
"watchers": 467,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -29,14 +29,14 @@
|
|||
{
|
||||
"id": 326146315,
|
||||
"name": "CVE-2018-9276",
|
||||
"full_name": "AndyFeiLi\/CVE-2018-9276",
|
||||
"full_name": "andyfeili\/CVE-2018-9276",
|
||||
"owner": {
|
||||
"login": "AndyFeiLi",
|
||||
"login": "andyfeili",
|
||||
"id": 59521017,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59521017?v=4",
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi"
|
||||
"html_url": "https:\/\/github.com\/andyfeili"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi\/CVE-2018-9276",
|
||||
"html_url": "https:\/\/github.com\/andyfeili\/CVE-2018-9276",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-02T09:08:42Z",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "(Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-12T08:20:16Z",
|
||||
"updated_at": "2022-06-18T18:50:44Z",
|
||||
"updated_at": "2022-06-22T02:37:24Z",
|
||||
"pushed_at": "2019-05-17T10:41:43Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-11-10T18:27:02Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-21T03:31:47Z",
|
||||
"updated_at": "2022-06-22T05:05:11Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3376,
|
||||
"watchers_count": 3376,
|
||||
"forks_count": 1008,
|
||||
"stargazers_count": 3378,
|
||||
"watchers_count": 3378,
|
||||
"forks_count": 1009,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1008,
|
||||
"watchers": 3376,
|
||||
"forks": 1009,
|
||||
"watchers": 3378,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -287,12 +287,12 @@
|
|||
"pushed_at": "2019-06-15T12:53:21Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"forks": 43,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -29,14 +29,14 @@
|
|||
{
|
||||
"id": 343438462,
|
||||
"name": "-CVE-2019-7214",
|
||||
"full_name": "AndyFeiLi\/-CVE-2019-7214",
|
||||
"full_name": "andyfeili\/-CVE-2019-7214",
|
||||
"owner": {
|
||||
"login": "AndyFeiLi",
|
||||
"login": "andyfeili",
|
||||
"id": 59521017,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59521017?v=4",
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi"
|
||||
"html_url": "https:\/\/github.com\/andyfeili"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi\/-CVE-2019-7214",
|
||||
"html_url": "https:\/\/github.com\/andyfeili\/-CVE-2019-7214",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T14:09:02Z",
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-21T03:31:47Z",
|
||||
"updated_at": "2022-06-22T05:05:11Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3376,
|
||||
"watchers_count": 3376,
|
||||
"forks_count": 1008,
|
||||
"stargazers_count": 3378,
|
||||
"watchers_count": 3378,
|
||||
"forks_count": 1009,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1008,
|
||||
"watchers": 3376,
|
||||
"forks": 1009,
|
||||
"watchers": 3378,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -326,5 +326,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 506089723,
|
||||
"name": "CVE-2020-17519",
|
||||
"full_name": "trhacknon\/CVE-2020-17519",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2020-17519",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-22T03:53:52Z",
|
||||
"updated_at": "2022-06-22T03:54:03Z",
|
||||
"pushed_at": "2022-06-22T04:19:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -115,17 +115,17 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2022-06-18T10:10:37Z",
|
||||
"updated_at": "2022-06-22T03:39:45Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 293,
|
||||
"watchers": 294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-1056, related to GPU Container Security",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-08T11:29:48Z",
|
||||
"updated_at": "2021-11-24T16:31:24Z",
|
||||
"updated_at": "2022-06-22T02:08:32Z",
|
||||
"pushed_at": "2021-01-12T09:21:02Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -77,12 +77,12 @@
|
|||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1572,
|
||||
"watchers_count": 1572,
|
||||
"forks_count": 456,
|
||||
"forks_count": 455,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 456,
|
||||
"forks": 455,
|
||||
"watchers": 1572,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2909,17 +2909,17 @@
|
|||
"description": "A golang based exp for CVE-2021-4034 dubbed pwnkit (more features added......)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T02:57:12Z",
|
||||
"updated_at": "2022-03-30T11:40:49Z",
|
||||
"updated_at": "2022-06-22T02:42:00Z",
|
||||
"pushed_at": "2022-02-08T03:24:51Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3233,17 +3233,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-25T01:30:09Z",
|
||||
"updated_at": "2022-02-25T01:30:57Z",
|
||||
"updated_at": "2022-06-22T02:55:05Z",
|
||||
"pushed_at": "2022-02-25T01:30:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -267,14 +267,14 @@
|
|||
{
|
||||
"id": 479265759,
|
||||
"name": "CVE-2021-42013",
|
||||
"full_name": "Adash7\/CVE-2021-42013",
|
||||
"full_name": "Adashz\/CVE-2021-42013",
|
||||
"owner": {
|
||||
"login": "Adash7",
|
||||
"login": "Adashz",
|
||||
"id": 70690472,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70690472?v=4",
|
||||
"html_url": "https:\/\/github.com\/Adash7"
|
||||
"html_url": "https:\/\/github.com\/Adashz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Adash7\/CVE-2021-42013",
|
||||
"html_url": "https:\/\/github.com\/Adashz\/CVE-2021-42013",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-08T06:07:37Z",
|
||||
|
|
|
@ -555,10 +555,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-06-21T13:50:28Z",
|
||||
"updated_at": "2022-06-22T05:29:51Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1403,
|
||||
"watchers_count": 1403,
|
||||
"stargazers_count": 1405,
|
||||
"watchers_count": 1405,
|
||||
"forks_count": 387,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 387,
|
||||
"watchers": 1403,
|
||||
"watchers": 1405,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3934,10 +3934,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-06-20T00:13:45Z",
|
||||
"updated_at": "2022-06-22T04:13:38Z",
|
||||
"pushed_at": "2022-04-24T08:56:47Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3950,7 +3950,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 320,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4653,17 +4653,17 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2022-06-16T06:16:27Z",
|
||||
"updated_at": "2022-06-22T04:13:41Z",
|
||||
"pushed_at": "2022-03-23T18:12:51Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 340,
|
||||
"watchers": 339,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T10:03:17Z",
|
||||
"updated_at": "2022-06-21T15:36:13Z",
|
||||
"updated_at": "2022-06-22T01:52:10Z",
|
||||
"pushed_at": "2022-03-07T10:03:26Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2022-03-09T08:40:29Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 65,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"forks": 66,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 505858192,
|
||||
"name": "CVE-2022-111111",
|
||||
"full_name": "thelostworldFree\/CVE-2022-111111",
|
||||
"owner": {
|
||||
"login": "thelostworldFree",
|
||||
"id": 24971604,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24971604?v=4",
|
||||
"html_url": "https:\/\/github.com\/thelostworldFree"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thelostworldFree\/CVE-2022-111111",
|
||||
"description": "CVE-2022-111111测试",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-21T13:35:55Z",
|
||||
"updated_at": "2022-06-21T13:35:55Z",
|
||||
"pushed_at": "2022-06-21T13:59:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-10T13:15:20Z",
|
||||
"updated_at": "2022-06-14T07:35:58Z",
|
||||
"updated_at": "2022-06-22T02:19:33Z",
|
||||
"pushed_at": "2022-06-13T17:00:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2022-06-18T04:00:45Z",
|
||||
"updated_at": "2022-06-22T05:16:43Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 178,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T01:40:04Z",
|
||||
"updated_at": "2022-06-16T09:38:56Z",
|
||||
"updated_at": "2022-06-22T03:20:00Z",
|
||||
"pushed_at": "2022-04-15T16:31:43Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 329,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-06-16T21:43:39Z",
|
||||
"updated_at": "2022-06-22T04:41:15Z",
|
||||
"pushed_at": "2022-05-18T18:27:36Z",
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"forks_count": 90,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"watchers": 280,
|
||||
"watchers": 281,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1764,17 +1764,17 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2022-06-21T18:02:54Z",
|
||||
"updated_at": "2022-06-22T06:17:57Z",
|
||||
"pushed_at": "2022-06-20T13:23:23Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Poc of CVE-2022-22980",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-21T11:39:13Z",
|
||||
"updated_at": "2022-06-21T23:52:13Z",
|
||||
"updated_at": "2022-06-22T03:35:15Z",
|
||||
"pushed_at": "2022-06-21T12:01:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2022-22980环境",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-21T12:02:00Z",
|
||||
"updated_at": "2022-06-21T16:27:24Z",
|
||||
"pushed_at": "2022-06-21T12:12:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"updated_at": "2022-06-22T04:05:32Z",
|
||||
"pushed_at": "2022-06-22T03:02:34Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "cve-2022-23131 exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T08:38:53Z",
|
||||
"updated_at": "2022-06-19T18:25:42Z",
|
||||
"updated_at": "2022-06-22T00:49:00Z",
|
||||
"pushed_at": "2022-02-21T04:27:48Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-06-21T16:14:38Z",
|
||||
"updated_at": "2022-06-22T05:56:06Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"forks_count": 71,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 427,
|
||||
"forks": 72,
|
||||
"watchers": 430,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,23 +13,24 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-06-21T16:34:05Z",
|
||||
"pushed_at": "2022-06-21T07:39:24Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 13,
|
||||
"updated_at": "2022-06-22T06:06:26Z",
|
||||
"pushed_at": "2022-06-22T01:27:39Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"batch",
|
||||
"cve-2022-22980",
|
||||
"cve-2022-26134",
|
||||
"gui",
|
||||
"nday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 72,
|
||||
"forks": 15,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -194,7 +195,7 @@
|
|||
"pushed_at": "2022-06-06T20:24:06Z",
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"forks_count": 57,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -211,7 +212,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"forks": 58,
|
||||
"watchers": 221,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -436,17 +436,17 @@
|
|||
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T11:08:33Z",
|
||||
"updated_at": "2022-06-21T17:28:35Z",
|
||||
"updated_at": "2022-06-22T05:28:32Z",
|
||||
"pushed_at": "2022-06-18T13:53:53Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 66,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 670,
|
||||
"watchers_count": 670,
|
||||
"forks_count": 108,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"forks": 107,
|
||||
"watchers": 670,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-06-16T12:42:43Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -385,10 +385,10 @@
|
|||
"description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T09:02:00Z",
|
||||
"updated_at": "2022-06-11T16:59:27Z",
|
||||
"updated_at": "2022-06-22T01:03:25Z",
|
||||
"pushed_at": "2022-06-01T09:31:58Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -401,7 +401,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -780,17 +780,17 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2022-06-21T03:55:53Z",
|
||||
"updated_at": "2022-06-22T01:57:39Z",
|
||||
"pushed_at": "2022-06-06T07:19:53Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 35,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 277,
|
||||
"forks": 36,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
13
README.md
13
README.md
|
@ -2421,9 +2421,6 @@ Complete Online Job Search System v1.0 is vulnerable to SQL Injection via eris/a
|
|||
|
||||
- [heavenswill/CVE-2022-32013](https://github.com/heavenswill/CVE-2022-32013)
|
||||
|
||||
### CVE-2022-111111
|
||||
- [thelostworldFree/CVE-2022-111111](https://github.com/thelostworldFree/CVE-2022-111111)
|
||||
|
||||
|
||||
## 2021
|
||||
### CVE-2021-0302 (2021-02-10)
|
||||
|
@ -5734,7 +5731,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
|
|||
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
|
||||
- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013)
|
||||
- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
|
||||
- [Adash7/CVE-2021-42013](https://github.com/Adash7/CVE-2021-42013)
|
||||
- [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013)
|
||||
- [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013)
|
||||
|
||||
### CVE-2021-42056
|
||||
|
@ -10900,6 +10897,7 @@ A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as
|
|||
- [MrCl0wnLab/SimplesApachePathTraversal](https://github.com/MrCl0wnLab/SimplesApachePathTraversal)
|
||||
- [thebatmanfuture/apacheflink----POC](https://github.com/thebatmanfuture/apacheflink----POC)
|
||||
- [zhangweijie11/CVE-2020-17519](https://github.com/zhangweijie11/CVE-2020-17519)
|
||||
- [trhacknon/CVE-2020-17519](https://github.com/trhacknon/CVE-2020-17519)
|
||||
|
||||
### CVE-2020-17523 (2021-02-03)
|
||||
|
||||
|
@ -13416,7 +13414,7 @@ SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrus
|
|||
</code>
|
||||
|
||||
- [devzspy/CVE-2019-7214](https://github.com/devzspy/CVE-2019-7214)
|
||||
- [AndyFeiLi/-CVE-2019-7214](https://github.com/AndyFeiLi/-CVE-2019-7214)
|
||||
- [andyfeili/-CVE-2019-7214](https://github.com/andyfeili/-CVE-2019-7214)
|
||||
|
||||
### CVE-2019-7216 (2019-01-31)
|
||||
|
||||
|
@ -17832,7 +17830,7 @@ An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who
|
|||
</code>
|
||||
|
||||
- [wildkindcc/CVE-2018-9276](https://github.com/wildkindcc/CVE-2018-9276)
|
||||
- [AndyFeiLi/CVE-2018-9276](https://github.com/AndyFeiLi/CVE-2018-9276)
|
||||
- [andyfeili/CVE-2018-9276](https://github.com/andyfeili/CVE-2018-9276)
|
||||
- [A1vinSmith/CVE-2018-9276](https://github.com/A1vinSmith/CVE-2018-9276)
|
||||
|
||||
### CVE-2018-9375
|
||||
|
@ -23627,6 +23625,7 @@ The saveObject function in moadmin.php in phpMoAdmin 1.1.2 allows remote attacke
|
|||
</code>
|
||||
|
||||
- [Tare05/Intel-CVE-2015-2291](https://github.com/Tare05/Intel-CVE-2015-2291)
|
||||
- [Exploitables/CVE-2015-2291](https://github.com/Exploitables/CVE-2015-2291)
|
||||
|
||||
### CVE-2015-2315 (2015-03-17)
|
||||
|
||||
|
@ -24716,7 +24715,7 @@ Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and O
|
|||
pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php.
|
||||
</code>
|
||||
|
||||
- [AndyFeiLi/CVE-2014-4688](https://github.com/AndyFeiLi/CVE-2014-4688)
|
||||
- [andyfeili/CVE-2014-4688](https://github.com/andyfeili/CVE-2014-4688)
|
||||
|
||||
### CVE-2014-4699 (2014-07-09)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue