mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/02/04 12:30:23
This commit is contained in:
parent
9c19254d87
commit
ce6c282c5a
27 changed files with 202 additions and 181 deletions
31
2014/CVE-2014-6598.json
Normal file
31
2014/CVE-2014-6598.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 30013698,
|
||||
"name": "DRA_writeup",
|
||||
"full_name": "KPN-CISO\/DRA_writeup",
|
||||
"owner": {
|
||||
"login": "KPN-CISO",
|
||||
"id": 6069290,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6069290?v=4",
|
||||
"html_url": "https:\/\/github.com\/KPN-CISO"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KPN-CISO\/DRA_writeup",
|
||||
"description": "Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-29T09:43:23Z",
|
||||
"updated_at": "2022-06-20T17:15:49Z",
|
||||
"pushed_at": "2015-01-29T10:02:00Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-02-03T06:24:51Z",
|
||||
"updated_at": "2023-02-04T07:27:23Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1603,
|
||||
"watchers_count": 1603,
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1603,
|
||||
"watchers": 1604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2023-01-19T11:38:19Z",
|
||||
"updated_at": "2023-02-04T08:01:15Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 916,
|
||||
"watchers_count": 916,
|
||||
"stargazers_count": 917,
|
||||
"watchers_count": 917,
|
||||
"has_discussions": false,
|
||||
"forks_count": 408,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 408,
|
||||
"watchers": 916,
|
||||
"watchers": 917,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -288,10 +288,10 @@
|
|||
"description": "Universal Android root tool based on CVE-2016-5195. Watch this space.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-24T12:35:55Z",
|
||||
"updated_at": "2023-01-28T13:46:09Z",
|
||||
"updated_at": "2023-02-04T08:14:51Z",
|
||||
"pushed_at": "2016-10-29T13:42:39Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -300,7 +300,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-02-03T06:24:51Z",
|
||||
"updated_at": "2023-02-04T07:27:23Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1603,
|
||||
"watchers_count": 1603,
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1603,
|
||||
"watchers": 1604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -193,17 +193,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2023-01-23T07:22:38Z",
|
||||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"pushed_at": "2023-02-04T09:09:35Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"forks": 56,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-02-03T06:24:51Z",
|
||||
"updated_at": "2023-02-04T07:27:23Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1603,
|
||||
"watchers_count": 1603,
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1603,
|
||||
"watchers": 1604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-02-02T07:58:56Z",
|
||||
"updated_at": "2023-02-04T09:42:33Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3665,
|
||||
"watchers_count": 3665,
|
||||
"stargazers_count": 3666,
|
||||
"watchers_count": 3666,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1053,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1053,
|
||||
"watchers": 3665,
|
||||
"watchers": 3666,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-02-03T06:24:51Z",
|
||||
"updated_at": "2023-02-04T07:27:23Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1603,
|
||||
"watchers_count": 1603,
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1603,
|
||||
"watchers": 1604,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2023-01-06T16:49:58Z",
|
||||
"updated_at": "2023-02-04T08:17:51Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"has_discussions": false,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 199,
|
||||
"watchers": 200,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,7 +105,7 @@
|
|||
"stargazers_count": 630,
|
||||
"watchers_count": 630,
|
||||
"has_discussions": false,
|
||||
"forks_count": 206,
|
||||
"forks_count": 207,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -113,7 +113,7 @@
|
|||
"cve-2020-0796"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 206,
|
||||
"forks": 207,
|
||||
"watchers": 630,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-02-02T07:58:56Z",
|
||||
"updated_at": "2023-02-04T09:42:33Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3665,
|
||||
"watchers_count": 3665,
|
||||
"stargazers_count": 3666,
|
||||
"watchers_count": 3666,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1053,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1053,
|
||||
"watchers": 3665,
|
||||
"watchers": 3666,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-02-03T06:24:51Z",
|
||||
"updated_at": "2023-02-04T07:27:23Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1603,
|
||||
"watchers_count": 1603,
|
||||
"stargazers_count": 1604,
|
||||
"watchers_count": 1604,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1603,
|
||||
"watchers": 1604,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2022-10-19T14:34:52Z",
|
||||
"updated_at": "2023-02-04T08:46:10Z",
|
||||
"pushed_at": "2021-10-13T07:53:46Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 371,
|
||||
"watchers": 372,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1161,12 +1161,12 @@
|
|||
"description": "F5 BIG-IP RCE CVE-2020-5902 automatic check tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-10T15:33:00Z",
|
||||
"updated_at": "2022-11-09T18:08:29Z",
|
||||
"updated_at": "2023-02-04T08:45:11Z",
|
||||
"pushed_at": "2020-07-12T10:36:20Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1178,8 +1178,8 @@
|
|||
"tmui"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 60,
|
||||
"forks": 17,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -76,13 +76,13 @@
|
|||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 37,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2023-02-04T02:34:47Z",
|
||||
"updated_at": "2023-02-04T09:24:55Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 587390406,
|
||||
"name": "CVE-2022-21839-",
|
||||
"full_name": "lolin19\/CVE-2022-21839-",
|
||||
"owner": {
|
||||
"login": "lolin19",
|
||||
"id": 104766804,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104766804?v=4",
|
||||
"html_url": "https:\/\/github.com\/lolin19"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lolin19\/CVE-2022-21839-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:34:02Z",
|
||||
"updated_at": "2023-01-10T16:34:02Z",
|
||||
"pushed_at": "2023-01-10T16:42:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,17 +43,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-01-16T02:35:54Z",
|
||||
"updated_at": "2023-01-30T23:00:33Z",
|
||||
"pushed_at": "2023-01-16T02:49:05Z",
|
||||
"pushed_at": "2023-02-04T10:16:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Unquoted Service Path privilege escalation vulnerability in Sherpa Connector Service. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-06T16:18:32Z",
|
||||
"updated_at": "2022-07-21T13:57:05Z",
|
||||
"updated_at": "2023-02-04T11:19:38Z",
|
||||
"pushed_at": "2022-04-06T16:34:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -1934,5 +1934,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 597319077,
|
||||
"name": "CVE-2022-26134_Behinder_MemShell",
|
||||
"full_name": "MaskCyberSecurityTeam\/CVE-2022-26134_Behinder_MemShell",
|
||||
"owner": {
|
||||
"login": "MaskCyberSecurityTeam",
|
||||
"id": 107802263,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107802263?v=4",
|
||||
"html_url": "https:\/\/github.com\/MaskCyberSecurityTeam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MaskCyberSecurityTeam\/CVE-2022-26134_Behinder_MemShell",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-04T06:51:47Z",
|
||||
"updated_at": "2023-02-04T07:17:43Z",
|
||||
"pushed_at": "2023-02-04T07:18:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-02-04T06:23:14Z",
|
||||
"updated_at": "2023-02-04T12:08:30Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 118,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -42,10 +42,10 @@
|
|||
"description": "The vulnerable recurrence docker environment for CVE-2022-44268",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-03T08:02:28Z",
|
||||
"updated_at": "2023-02-03T16:51:12Z",
|
||||
"updated_at": "2023-02-04T11:15:10Z",
|
||||
"pushed_at": "2023-02-03T08:03:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -146,5 +146,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 597372793,
|
||||
"name": "CVE-2022-44268-PoC",
|
||||
"full_name": "Baikuya\/CVE-2022-44268-PoC",
|
||||
"owner": {
|
||||
"login": "Baikuya",
|
||||
"id": 52155445,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52155445?v=4",
|
||||
"html_url": "https:\/\/github.com\/Baikuya"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Baikuya\/CVE-2022-44268-PoC",
|
||||
"description": "CVE-2022-44268 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-04T10:50:20Z",
|
||||
"updated_at": "2023-02-04T10:50:20Z",
|
||||
"pushed_at": "2023-02-04T11:01:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 585004232,
|
||||
"name": "CVE-2022-46164-poc",
|
||||
"full_name": "stephenbradshaw\/CVE-2022-46164-poc",
|
||||
"owner": {
|
||||
"login": "stephenbradshaw",
|
||||
"id": 7692557,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7692557?v=4",
|
||||
"html_url": "https:\/\/github.com\/stephenbradshaw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stephenbradshaw\/CVE-2022-46164-poc",
|
||||
"description": "Basic POC exploit for CVE-2022-46164",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T04:17:30Z",
|
||||
"updated_at": "2023-02-02T10:16:21Z",
|
||||
"pushed_at": "2023-01-11T07:16:34Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-02-04T00:48:55Z",
|
||||
"updated_at": "2023-02-04T08:17:19Z",
|
||||
"pushed_at": "2023-01-30T10:51:18Z",
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 676,
|
||||
"watchers": 678,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -320,10 +320,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-26T19:52:30Z",
|
||||
"updated_at": "2023-02-04T03:20:16Z",
|
||||
"updated_at": "2023-02-04T08:16:04Z",
|
||||
"pushed_at": "2023-02-01T20:26:41Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -332,7 +332,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 60,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-03T21:51:04Z",
|
||||
"updated_at": "2023-02-04T05:22:40Z",
|
||||
"updated_at": "2023-02-04T12:18:09Z",
|
||||
"pushed_at": "2023-02-03T22:22:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T01:02:01Z",
|
||||
"updated_at": "2023-02-04T03:26:45Z",
|
||||
"updated_at": "2023-02-04T11:12:13Z",
|
||||
"pushed_at": "2023-02-03T01:40:35Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 70,
|
||||
"forks": 14,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2023-02-04T05:48:44Z",
|
||||
"updated_at": "2023-02-04T11:36:02Z",
|
||||
"pushed_at": "2023-02-03T03:07:59Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,8 +34,8 @@
|
|||
"use-after-free"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 72,
|
||||
"forks": 17,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T03:21:42Z",
|
||||
"updated_at": "2023-02-04T02:51:44Z",
|
||||
"updated_at": "2023-02-04T10:23:59Z",
|
||||
"pushed_at": "2023-01-25T06:29:15Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 193,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
26
README.md
26
README.md
|
@ -1222,14 +1222,6 @@ In audio ipi, there is a possible memory corruption due to a race condition. Thi
|
|||
|
||||
- [docfate111/CVE-2022-21789](https://github.com/docfate111/CVE-2022-21789)
|
||||
|
||||
### CVE-2022-21839 (2022-01-11)
|
||||
|
||||
<code>
|
||||
Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability.
|
||||
</code>
|
||||
|
||||
- [lolin19/CVE-2022-21839-](https://github.com/lolin19/CVE-2022-21839-)
|
||||
|
||||
### CVE-2022-21877 (2022-01-11)
|
||||
|
||||
<code>
|
||||
|
@ -2553,6 +2545,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [badboy-sft/CVE-2022-26134](https://github.com/badboy-sft/CVE-2022-26134)
|
||||
- [wjlin0/CVE-2022-26134](https://github.com/wjlin0/CVE-2022-26134)
|
||||
- [cbk914/CVE-2022-26134_check](https://github.com/cbk914/CVE-2022-26134_check)
|
||||
- [MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell](https://github.com/MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell)
|
||||
|
||||
### CVE-2022-26135 (2022-06-30)
|
||||
|
||||
|
@ -5223,6 +5216,7 @@ Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWif
|
|||
- [agathanon/cve-2022-44268](https://github.com/agathanon/cve-2022-44268)
|
||||
- [jnschaeffer/cve-2022-44268-detector](https://github.com/jnschaeffer/cve-2022-44268-detector)
|
||||
- [Ashifcoder/CVE-2022-44268-automated-poc](https://github.com/Ashifcoder/CVE-2022-44268-automated-poc)
|
||||
- [Baikuya/CVE-2022-44268-PoC](https://github.com/Baikuya/CVE-2022-44268-PoC)
|
||||
|
||||
### CVE-2022-44311 (2022-11-08)
|
||||
|
||||
|
@ -5376,14 +5370,6 @@ An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in
|
|||
### CVE-2022-46104
|
||||
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
|
||||
|
||||
### CVE-2022-46164 (2022-12-05)
|
||||
|
||||
<code>
|
||||
NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit.
|
||||
</code>
|
||||
|
||||
- [stephenbradshaw/CVE-2022-46164-poc](https://github.com/stephenbradshaw/CVE-2022-46164-poc)
|
||||
|
||||
### CVE-2022-46169 (2022-12-05)
|
||||
|
||||
<code>
|
||||
|
@ -29877,6 +29863,14 @@ Unspecified vulnerability in the XML Developer's Kit for C component in Oracle D
|
|||
|
||||
- [SecurityArtWork/oracle-xxe-sqli](https://github.com/SecurityArtWork/oracle-xxe-sqli)
|
||||
|
||||
### CVE-2014-6598 (2015-01-21)
|
||||
|
||||
<code>
|
||||
Unspecified vulnerability in the Oracle Communications Diameter Signaling Router component in Oracle Communications Applications 3.x, 4.x, and 5.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Signaling - DPI.
|
||||
</code>
|
||||
|
||||
- [KPN-CISO/DRA_writeup](https://github.com/KPN-CISO/DRA_writeup)
|
||||
|
||||
### CVE-2014-7169 (2014-09-24)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue