mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/04/29 12:16:01
This commit is contained in:
parent
446bbe542b
commit
d0560b6200
45 changed files with 409 additions and 256 deletions
|
@ -1136,12 +1136,12 @@
|
|||
"pushed_at": "2017-04-30T20:00:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Proof-of-Concept exploits for CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-20T16:35:30Z",
|
||||
"updated_at": "2022-04-27T19:26:17Z",
|
||||
"updated_at": "2022-04-29T06:50:25Z",
|
||||
"pushed_at": "2017-11-29T16:13:23Z",
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"forks_count": 197,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 197,
|
||||
"watchers": 496,
|
||||
"watchers": 495,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,10 +67,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2022-04-16T02:38:59Z",
|
||||
"updated_at": "2022-04-29T06:48:59Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -83,7 +83,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 104,
|
||||
"watchers": 308,
|
||||
"watchers": 307,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -154,17 +154,17 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2022-04-19T16:49:23Z",
|
||||
"updated_at": "2022-04-29T06:48:49Z",
|
||||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 251,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -83,17 +83,17 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2022-04-27T14:00:50Z",
|
||||
"updated_at": "2022-04-29T07:57:08Z",
|
||||
"pushed_at": "2021-11-08T02:19:03Z",
|
||||
"stargazers_count": 487,
|
||||
"watchers_count": 487,
|
||||
"stargazers_count": 488,
|
||||
"watchers_count": 488,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 487,
|
||||
"watchers": 488,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"forks_count": 56,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,7 +26,7 @@
|
|||
"webkit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 55,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -129,17 +129,17 @@
|
|||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-10T02:39:57Z",
|
||||
"updated_at": "2022-04-28T09:26:20Z",
|
||||
"updated_at": "2022-04-29T11:25:44Z",
|
||||
"pushed_at": "2021-04-02T09:12:32Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1484,17 +1484,17 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2022-04-27T14:52:21Z",
|
||||
"updated_at": "2022-04-29T10:27:49Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"stargazers_count": 855,
|
||||
"watchers_count": 855,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 854,
|
||||
"watchers": 855,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2022-04-24T09:10:30Z",
|
||||
"updated_at": "2022-04-29T06:48:09Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 280,
|
||||
"watchers": 281,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T19:03:53Z",
|
||||
"updated_at": "2022-04-27T15:53:03Z",
|
||||
"updated_at": "2022-04-29T10:40:38Z",
|
||||
"pushed_at": "2021-12-19T18:18:36Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-04-28T04:54:11Z",
|
||||
"updated_at": "2022-04-29T07:11:47Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3278,
|
||||
"watchers_count": 3278,
|
||||
"stargazers_count": 3279,
|
||||
"watchers_count": 3279,
|
||||
"forks_count": 977,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 977,
|
||||
"watchers": 3278,
|
||||
"watchers": 3279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -213,7 +213,7 @@
|
|||
"pushed_at": "2022-03-17T15:49:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -223,7 +223,7 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
29
2020/CVE-2020-0155.json
Normal file
29
2020/CVE-2020-0155.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486863266,
|
||||
"name": "hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155",
|
||||
"full_name": "Trinadh465\/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T06:33:54Z",
|
||||
"updated_at": "2022-04-29T06:37:39Z",
|
||||
"pushed_at": "2022-04-29T06:38:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-04-29T06:11:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
29
2020/CVE-2020-0240.json
Normal file
29
2020/CVE-2020-0240.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486929889,
|
||||
"name": "external_v8_AOSP10_r33_CVE-2020-0240",
|
||||
"full_name": "ShaikUsaf\/external_v8_AOSP10_r33_CVE-2020-0240",
|
||||
"owner": {
|
||||
"login": "ShaikUsaf",
|
||||
"id": 100413972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf\/external_v8_AOSP10_r33_CVE-2020-0240",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T10:25:19Z",
|
||||
"updated_at": "2022-04-29T10:32:03Z",
|
||||
"pushed_at": "2022-04-29T10:32:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1337,7 +1337,7 @@
|
|||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"forks_count": 151,
|
||||
"forks_count": 152,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1348,7 +1348,7 @@
|
|||
"smbghost"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 151,
|
||||
"forks": 152,
|
||||
"watchers": 459,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-11T13:09:52Z",
|
||||
"updated_at": "2021-05-09T12:11:55Z",
|
||||
"pushed_at": "2022-03-02T08:38:06Z",
|
||||
"pushed_at": "2022-04-29T10:21:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-04-28T14:10:43Z",
|
||||
"updated_at": "2022-04-29T10:50:50Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1445,
|
||||
"watchers_count": 1445,
|
||||
"stargazers_count": 1446,
|
||||
"watchers_count": 1446,
|
||||
"forks_count": 329,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 329,
|
||||
"watchers": 1445,
|
||||
"watchers": 1446,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-04-28T04:54:11Z",
|
||||
"updated_at": "2022-04-29T07:11:47Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3278,
|
||||
"watchers_count": 3278,
|
||||
"stargazers_count": 3279,
|
||||
"watchers_count": 3279,
|
||||
"forks_count": 977,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 977,
|
||||
"watchers": 3278,
|
||||
"watchers": 3279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-0313.json
Normal file
29
2021/CVE-2021-0313.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486862367,
|
||||
"name": "frameworks_minikin_AOSP10_r33_CVE-2021-0313",
|
||||
"full_name": "Satheesh575555\/frameworks_minikin_AOSP10_r33_CVE-2021-0313",
|
||||
"owner": {
|
||||
"login": "Satheesh575555",
|
||||
"id": 102573923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_minikin_AOSP10_r33_CVE-2021-0313",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T06:30:27Z",
|
||||
"updated_at": "2022-04-29T06:32:35Z",
|
||||
"pushed_at": "2022-04-29T06:32:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -106,5 +106,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 486940425,
|
||||
"name": "external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
|
||||
"full_name": "ShaikUsaf\/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
|
||||
"owner": {
|
||||
"login": "ShaikUsaf",
|
||||
"id": 100413972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ShaikUsaf\/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T11:05:51Z",
|
||||
"updated_at": "2022-04-29T11:10:13Z",
|
||||
"pushed_at": "2022-04-29T11:10:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-0393.json
Normal file
29
2021/CVE-2021-0393.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486872701,
|
||||
"name": "external_v8_AOSP10_r33_CVE-2021-0393",
|
||||
"full_name": "Trinadh465\/external_v8_AOSP10_r33_CVE-2021-0393",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/external_v8_AOSP10_r33_CVE-2021-0393",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T07:09:27Z",
|
||||
"updated_at": "2022-04-29T07:11:51Z",
|
||||
"pushed_at": "2022-04-29T07:12:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T14:18:13Z",
|
||||
"updated_at": "2022-04-02T02:45:45Z",
|
||||
"updated_at": "2022-04-29T09:27:12Z",
|
||||
"pushed_at": "2021-02-27T09:57:00Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-22555 exploit rewritten with pipe primitive",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-05T06:35:25Z",
|
||||
"updated_at": "2022-04-28T02:03:45Z",
|
||||
"updated_at": "2022-04-29T11:29:15Z",
|
||||
"pushed_at": "2022-04-05T08:56:18Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-23841.json
Normal file
29
2021/CVE-2021-23841.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486927382,
|
||||
"name": "external_boringssl_openssl_1.1.0g_CVE-2021-23841",
|
||||
"full_name": "Trinadh465\/external_boringssl_openssl_1.1.0g_CVE-2021-23841",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/external_boringssl_openssl_1.1.0g_CVE-2021-23841",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T10:16:14Z",
|
||||
"updated_at": "2022-04-29T11:20:57Z",
|
||||
"pushed_at": "2022-04-29T11:21:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T03:12:27Z",
|
||||
"updated_at": "2022-04-29T03:12:27Z",
|
||||
"updated_at": "2022-04-29T08:44:44Z",
|
||||
"pushed_at": "2022-04-29T03:12:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1052,17 +1052,17 @@
|
|||
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T11:12:30Z",
|
||||
"updated_at": "2022-04-14T21:09:41Z",
|
||||
"updated_at": "2022-04-29T09:28:13Z",
|
||||
"pushed_at": "2021-11-16T04:00:14Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 128,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-06-09T06:58:20Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 53,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"forks": 52,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -77,12 +77,12 @@
|
|||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 439,
|
||||
"forks_count": 440,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 439,
|
||||
"forks": 440,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3156,12 +3156,12 @@
|
|||
"pushed_at": "2022-02-15T02:39:28Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -158,17 +158,17 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-04-10T16:24:07Z",
|
||||
"updated_at": "2022-04-29T09:25:50Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-12T21:04:44Z",
|
||||
"updated_at": "2022-04-20T03:29:36Z",
|
||||
"pushed_at": "2022-04-28T02:24:22Z",
|
||||
"pushed_at": "2022-04-29T06:20:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435810052,
|
||||
"name": "Grafana-CVE-2021-43798",
|
||||
"full_name": "jas502n\/Grafana-CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
|
||||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T09:02:16Z",
|
||||
"updated_at": "2022-04-16T04:07:08Z",
|
||||
"pushed_at": "2021-12-09T03:16:21Z",
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435840491,
|
||||
"name": "CVE-2021-43798-Grafana-POC",
|
||||
|
@ -111,37 +84,6 @@
|
|||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435926848,
|
||||
"name": "grafanaExp",
|
||||
"full_name": "A-D-Team\/grafanaExp",
|
||||
"owner": {
|
||||
"login": "A-D-Team",
|
||||
"id": 94842031,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
|
||||
"html_url": "https:\/\/github.com\/A-D-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
|
||||
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T15:11:34Z",
|
||||
"updated_at": "2022-04-28T04:43:25Z",
|
||||
"pushed_at": "2021-12-09T07:22:26Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-43798",
|
||||
"exploit",
|
||||
"grafana"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436106864,
|
||||
"name": "CVE-2021-43798-grafana_fileread",
|
||||
|
@ -196,33 +138,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436150384,
|
||||
"name": "CVE-2021-43798-Grafana-File-Read",
|
||||
"full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
|
||||
"owner": {
|
||||
"login": "lfz97",
|
||||
"id": 75104414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
|
||||
"html_url": "https:\/\/github.com\/lfz97"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
|
||||
"description": "CVE-2021-43798-Grafana任意文件读取漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-08T07:08:37Z",
|
||||
"updated_at": "2021-12-09T02:13:12Z",
|
||||
"pushed_at": "2021-12-09T02:13:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436213273,
|
||||
"name": "Grafana_fileread",
|
||||
|
@ -304,33 +219,6 @@
|
|||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436563698,
|
||||
"name": "Grafana_POC-CVE-2021-43798",
|
||||
"full_name": "culprits\/Grafana_POC-CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "culprits",
|
||||
"id": 62552076,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4",
|
||||
"html_url": "https:\/\/github.com\/culprits"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/culprits\/Grafana_POC-CVE-2021-43798",
|
||||
"description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T09:53:25Z",
|
||||
"updated_at": "2022-03-30T14:52:19Z",
|
||||
"pushed_at": "2021-12-09T09:56:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436571000,
|
||||
"name": "CVE-2021-43798",
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-12-17T12:53:51Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -28,7 +28,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2022-04-26T04:22:01Z",
|
||||
"updated_at": "2022-04-29T06:35:51Z",
|
||||
"pushed_at": "2022-01-18T12:01:52Z",
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"stargazers_count": 366,
|
||||
"watchers_count": 366,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 365,
|
||||
"watchers": 366,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -833,10 +833,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-04-28T14:44:13Z",
|
||||
"updated_at": "2022-04-29T06:42:18Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 750,
|
||||
"watchers_count": 750,
|
||||
"stargazers_count": 751,
|
||||
"watchers_count": 751,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -863,7 +863,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 750,
|
||||
"watchers": 751,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3469,12 +3469,12 @@
|
|||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2843,
|
||||
"watchers_count": 2843,
|
||||
"forks_count": 692,
|
||||
"forks_count": 693,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 692,
|
||||
"forks": 693,
|
||||
"watchers": 2843,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -10458,7 +10458,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-12T11:19:41Z",
|
||||
"updated_at": "2022-03-07T10:11:58Z",
|
||||
"pushed_at": "2022-04-22T07:05:21Z",
|
||||
"pushed_at": "2022-04-29T08:46:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
@ -10491,7 +10491,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-16T01:13:08Z",
|
||||
"updated_at": "2022-02-16T01:21:29Z",
|
||||
"pushed_at": "2022-03-28T16:12:17Z",
|
||||
"pushed_at": "2022-04-29T10:37:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -10771,12 +10771,12 @@
|
|||
"pushed_at": "2022-04-24T01:29:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -10794,17 +10794,17 @@
|
|||
"description": "Loops through all Log4j files and remediates CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-28T23:56:01Z",
|
||||
"updated_at": "2022-04-29T00:10:50Z",
|
||||
"updated_at": "2022-04-29T10:02:33Z",
|
||||
"pushed_at": "2022-04-29T00:30:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-04-28T17:47:58Z",
|
||||
"updated_at": "2022-04-29T06:38:27Z",
|
||||
"pushed_at": "2022-03-16T06:48:01Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1101,17 +1101,17 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-04-28T23:00:14Z",
|
||||
"updated_at": "2022-04-29T11:15:45Z",
|
||||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 247,
|
||||
"watchers": 248,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2022-04-28T18:23:19Z",
|
||||
"updated_at": "2022-04-29T11:27:00Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-04-24T01:04:48Z",
|
||||
"updated_at": "2022-04-29T08:35:48Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 579,
|
||||
"watchers_count": 579,
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 579,
|
||||
"watchers": 580,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-15T09:22:19Z",
|
||||
"updated_at": "2022-04-20T10:14:52Z",
|
||||
"updated_at": "2022-04-29T07:34:06Z",
|
||||
"pushed_at": "2022-02-21T08:58:22Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,17 +312,17 @@
|
|||
"description": "CVE-2021-42013批量",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T06:38:26Z",
|
||||
"updated_at": "2022-04-10T16:24:07Z",
|
||||
"updated_at": "2022-04-29T09:25:50Z",
|
||||
"pushed_at": "2022-03-04T10:49:00Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1214,17 +1214,17 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2022-04-28T16:44:25Z",
|
||||
"updated_at": "2022-04-29T07:46:55Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 49,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,17 +97,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T23:21:50Z",
|
||||
"updated_at": "2022-04-12T08:07:15Z",
|
||||
"updated_at": "2022-04-29T07:57:29Z",
|
||||
"pushed_at": "2022-04-12T08:06:37Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1286,7 +1286,7 @@
|
|||
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T00:08:16Z",
|
||||
"updated_at": "2022-04-29T01:03:55Z",
|
||||
"updated_at": "2022-04-29T08:46:56Z",
|
||||
"pushed_at": "2022-04-07T23:00:29Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
|
@ -1656,5 +1656,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 486922280,
|
||||
"name": "spring-RCE-CVE-2022-22965",
|
||||
"full_name": "Enokiy\/spring-RCE-CVE-2022-22965",
|
||||
"owner": {
|
||||
"login": "Enokiy",
|
||||
"id": 33446650,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33446650?v=4",
|
||||
"html_url": "https:\/\/github.com\/Enokiy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Enokiy\/spring-RCE-CVE-2022-22965",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T09:58:05Z",
|
||||
"updated_at": "2022-04-29T10:03:38Z",
|
||||
"pushed_at": "2022-04-29T10:03:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -258,10 +258,10 @@
|
|||
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-25T18:40:24Z",
|
||||
"updated_at": "2022-04-27T09:30:06Z",
|
||||
"updated_at": "2022-04-29T11:54:47Z",
|
||||
"pushed_at": "2022-04-25T18:41:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -274,7 +274,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Django QuerySet.annotate(), aggregate(), extra() SQL 注入",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T14:47:56Z",
|
||||
"updated_at": "2022-04-26T14:50:52Z",
|
||||
"updated_at": "2022-04-29T06:57:46Z",
|
||||
"pushed_at": "2022-04-26T14:50:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -282,5 +282,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 486893955,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "superzerosec\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "superzerosec",
|
||||
"id": 57648217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||||
"html_url": "https:\/\/github.com\/superzerosec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-29464",
|
||||
"description": "CVE-2022-29464 POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T08:24:17Z",
|
||||
"updated_at": "2022-04-29T08:24:17Z",
|
||||
"pushed_at": "2022-04-29T08:24:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
47
README.md
47
README.md
|
@ -680,6 +680,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [c4mx/CVE-2022-22965_PoC](https://github.com/c4mx/CVE-2022-22965_PoC)
|
||||
- [mariomamo/CVE-2022-22965](https://github.com/mariomamo/CVE-2022-22965)
|
||||
- [khidottrivi/CVE-2022-22965](https://github.com/khidottrivi/CVE-2022-22965)
|
||||
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
|
||||
|
||||
### CVE-2022-23046 (2022-01-19)
|
||||
|
||||
|
@ -1313,6 +1314,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
- [oppsec/WSOB](https://github.com/oppsec/WSOB)
|
||||
- [k4u5h41/CVE-2022-29464](https://github.com/k4u5h41/CVE-2022-29464)
|
||||
- [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464)
|
||||
- [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464)
|
||||
|
||||
### CVE-2022-29548 (2022-04-20)
|
||||
|
||||
|
@ -1341,6 +1343,14 @@ In addAllPermissions of PermissionManagerService.java, there is a possible permi
|
|||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317)
|
||||
|
||||
### CVE-2021-0313 (2021-01-11)
|
||||
|
||||
<code>
|
||||
In isWordBreakAfter of LayoutUtils.cpp, there is a possible way to slow or crash a TextView due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170968514.
|
||||
</code>
|
||||
|
||||
- [Satheesh575555/frameworks_minikin_AOSP10_r33_CVE-2021-0313](https://github.com/Satheesh575555/frameworks_minikin_AOSP10_r33_CVE-2021-0313)
|
||||
|
||||
### CVE-2021-0314 (2021-02-10)
|
||||
|
||||
<code>
|
||||
|
@ -1401,6 +1411,7 @@ In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to
|
|||
- [nanopathi/wpa_supplicant_8_CVE-2021-0326.](https://github.com/nanopathi/wpa_supplicant_8_CVE-2021-0326.)
|
||||
- [Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326](https://github.com/Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326)
|
||||
- [nanopathi/Packages_wpa_supplicant8_CVE-2021-0326](https://github.com/nanopathi/Packages_wpa_supplicant8_CVE-2021-0326)
|
||||
- [ShaikUsaf/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326](https://github.com/ShaikUsaf/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326)
|
||||
|
||||
### CVE-2021-0327 (2021-02-10)
|
||||
|
||||
|
@ -1507,6 +1518,14 @@ In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to l
|
|||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0391](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0391)
|
||||
|
||||
### CVE-2021-0393 (2021-03-10)
|
||||
|
||||
<code>
|
||||
In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375
|
||||
</code>
|
||||
|
||||
- [Trinadh465/external_v8_AOSP10_r33_CVE-2021-0393](https://github.com/Trinadh465/external_v8_AOSP10_r33_CVE-2021-0393)
|
||||
|
||||
### CVE-2021-0394 (2021-03-10)
|
||||
|
||||
<code>
|
||||
|
@ -2913,6 +2932,14 @@ All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted
|
|||
|
||||
- [numanturle/CVE-2021-23758-POC](https://github.com/numanturle/CVE-2021-23758-POC)
|
||||
|
||||
### CVE-2021-23841 (2021-02-16)
|
||||
|
||||
<code>
|
||||
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
|
||||
</code>
|
||||
|
||||
- [Trinadh465/external_boringssl_openssl_1.1.0g_CVE-2021-23841](https://github.com/Trinadh465/external_boringssl_openssl_1.1.0g_CVE-2021-23841)
|
||||
|
||||
### CVE-2021-24027 (2021-04-06)
|
||||
|
||||
<code>
|
||||
|
@ -4778,17 +4805,13 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
</code>
|
||||
|
||||
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
|
||||
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
|
||||
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
|
||||
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
|
||||
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
|
||||
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
|
||||
- [JiuBanSec/Grafana-CVE-2021-43798](https://github.com/JiuBanSec/Grafana-CVE-2021-43798)
|
||||
- [lfz97/CVE-2021-43798-Grafana-File-Read](https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read)
|
||||
- [MzzdToT/Grafana_fileread](https://github.com/MzzdToT/Grafana_fileread)
|
||||
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
|
||||
- [z3n70/CVE-2021-43798](https://github.com/z3n70/CVE-2021-43798)
|
||||
- [culprits/Grafana_POC-CVE-2021-43798](https://github.com/culprits/Grafana_POC-CVE-2021-43798)
|
||||
- [julesbozouklian/CVE-2021-43798](https://github.com/julesbozouklian/CVE-2021-43798)
|
||||
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
|
||||
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
|
||||
|
@ -5786,6 +5809,14 @@ In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write d
|
|||
|
||||
- [Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138](https://github.com/Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138)
|
||||
|
||||
### CVE-2020-0155 (2020-06-11)
|
||||
|
||||
<code>
|
||||
In phNxpNciHal_send_ese_hal_cmd of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139736386
|
||||
</code>
|
||||
|
||||
- [Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155](https://github.com/Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155)
|
||||
|
||||
### CVE-2020-0160 (2020-06-11)
|
||||
|
||||
<code>
|
||||
|
@ -5885,6 +5916,14 @@ In onCommand of CompanionDeviceManagerService.java, there is a possible permissi
|
|||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0227](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0227)
|
||||
|
||||
### CVE-2020-0240 (2020-08-11)
|
||||
|
||||
<code>
|
||||
In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594
|
||||
</code>
|
||||
|
||||
- [ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240](https://github.com/ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240)
|
||||
|
||||
### CVE-2020-0241 (2020-08-11)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue