mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/12/04 06:17:56
This commit is contained in:
parent
f57522d58c
commit
dd953911d9
27 changed files with 206 additions and 107 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2022-12-02T11:04:17Z",
|
||||
"updated_at": "2022-12-04T05:10:51Z",
|
||||
"pushed_at": "2022-10-28T13:26:02Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -319,5 +319,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 574004315,
|
||||
"name": "cve-2016-0728",
|
||||
"full_name": "sidrk01\/cve-2016-0728",
|
||||
"owner": {
|
||||
"login": "sidrk01",
|
||||
"id": 81598654,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81598654?v=4",
|
||||
"html_url": "https:\/\/github.com\/sidrk01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sidrk01\/cve-2016-0728",
|
||||
"description": "Exploit from perception point ",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-04T05:26:12Z",
|
||||
"updated_at": "2022-12-04T05:26:52Z",
|
||||
"pushed_at": "2022-12-04T05:39:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2022-11-25T15:31:52Z",
|
||||
"updated_at": "2022-12-04T04:31:51Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 586,
|
||||
"watchers_count": 586,
|
||||
"stargazers_count": 587,
|
||||
"watchers_count": 587,
|
||||
"has_discussions": false,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 128,
|
||||
"watchers": 586,
|
||||
"watchers": 587,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -83,7 +83,7 @@
|
|||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -99,7 +99,7 @@
|
|||
"sa-core-2018-002"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"forks": 174,
|
||||
"watchers": 538,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-12-03T16:57:14Z",
|
||||
"updated_at": "2022-12-04T04:06:52Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3625,
|
||||
"watchers_count": 3625,
|
||||
"stargazers_count": 3627,
|
||||
"watchers_count": 3627,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1044,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1044,
|
||||
"watchers": 3625,
|
||||
"watchers": 3627,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2022-11-09T18:03:26Z",
|
||||
"updated_at": "2022-12-04T03:35:03Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"has_discussions": false,
|
||||
"forks_count": 163,
|
||||
"allow_forking": true,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 163,
|
||||
"watchers": 424,
|
||||
"watchers": 425,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2022-11-14T04:21:08Z",
|
||||
"updated_at": "2022-12-04T05:19:10Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -257,10 +257,10 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2022-12-01T07:15:24Z",
|
||||
"updated_at": "2022-12-04T04:04:38Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"has_discussions": false,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
|
@ -269,7 +269,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 330,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T07:35:29Z",
|
||||
"updated_at": "2022-11-09T18:08:18Z",
|
||||
"updated_at": "2022-12-04T04:11:54Z",
|
||||
"pushed_at": "2020-06-25T07:49:34Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T08:01:20Z",
|
||||
"updated_at": "2022-11-09T18:08:40Z",
|
||||
"updated_at": "2022-12-04T03:50:15Z",
|
||||
"pushed_at": "2020-07-21T10:28:42Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-12-02T09:07:36Z",
|
||||
"updated_at": "2022-12-04T04:50:58Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"stargazers_count": 977,
|
||||
"watchers_count": 977,
|
||||
"has_discussions": false,
|
||||
"forks_count": 268,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"watchers": 976,
|
||||
"watchers": 977,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -687,10 +687,10 @@
|
|||
"description": " CVE-2020-1472复现时使用的py文件整理打包",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T00:02:26Z",
|
||||
"updated_at": "2022-12-03T01:53:14Z",
|
||||
"updated_at": "2022-12-04T02:15:53Z",
|
||||
"pushed_at": "2022-12-03T01:53:07Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -699,7 +699,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-12-03T16:57:14Z",
|
||||
"updated_at": "2022-12-04T04:06:52Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3625,
|
||||
"watchers_count": 3625,
|
||||
"stargazers_count": 3627,
|
||||
"watchers_count": 3627,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1044,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1044,
|
||||
"watchers": 3625,
|
||||
"watchers": 3627,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Citrix ADC从权限绕过到RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-12T13:05:40Z",
|
||||
"updated_at": "2022-11-09T18:08:31Z",
|
||||
"updated_at": "2022-12-04T04:03:09Z",
|
||||
"pushed_at": "2020-07-12T13:10:50Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -77,10 +77,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-12-03T18:46:07Z",
|
||||
"updated_at": "2022-12-04T06:12:43Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1711,
|
||||
"watchers_count": 1711,
|
||||
"stargazers_count": 1712,
|
||||
"watchers_count": 1712,
|
||||
"has_discussions": false,
|
||||
"forks_count": 493,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 493,
|
||||
"watchers": 1711,
|
||||
"watchers": 1712,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -991,10 +991,10 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2022-12-03T01:03:37Z",
|
||||
"updated_at": "2022-12-04T03:18:48Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 337,
|
||||
"watchers_count": 337,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -1003,7 +1003,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 336,
|
||||
"watchers": 337,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2413,10 +2413,10 @@
|
|||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2022-11-09T18:14:47Z",
|
||||
"updated_at": "2022-12-04T04:18:52Z",
|
||||
"pushed_at": "2022-04-26T14:30:54Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": true,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -2425,7 +2425,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T10:47:04Z",
|
||||
"updated_at": "2022-11-25T11:48:12Z",
|
||||
"updated_at": "2022-12-04T03:04:36Z",
|
||||
"pushed_at": "2022-05-25T13:43:16Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-12-02T08:08:21Z",
|
||||
"updated_at": "2022-12-04T05:09:43Z",
|
||||
"pushed_at": "2022-07-23T23:14:02Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "Redis RCE through Lua Sandbox Escape vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T16:44:56Z",
|
||||
"updated_at": "2022-12-03T10:15:10Z",
|
||||
"updated_at": "2022-12-04T01:17:56Z",
|
||||
"pushed_at": "2022-09-02T22:46:08Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -129,10 +129,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-11-30T10:13:10Z",
|
||||
"updated_at": "2022-12-04T03:03:47Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 996,
|
||||
"watchers_count": 996,
|
||||
"stargazers_count": 997,
|
||||
"watchers_count": 997,
|
||||
"has_discussions": false,
|
||||
"forks_count": 216,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 216,
|
||||
"watchers": 996,
|
||||
"watchers": 997,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-12-02T21:21:29Z",
|
||||
"updated_at": "2022-12-04T03:04:02Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 356,
|
||||
"watchers": 358,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -339,10 +339,10 @@
|
|||
"description": "Exploit and Check Script for CVE 2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T11:30:09Z",
|
||||
"updated_at": "2022-10-29T19:44:02Z",
|
||||
"updated_at": "2022-12-04T00:32:25Z",
|
||||
"pushed_at": "2022-05-26T23:51:01Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -351,7 +351,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "WordPress WP_Query SQL Injection POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-28T13:12:51Z",
|
||||
"updated_at": "2022-12-03T22:18:16Z",
|
||||
"updated_at": "2022-12-04T04:27:09Z",
|
||||
"pushed_at": "2022-07-30T08:20:53Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -398,13 +398,13 @@
|
|||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -206,5 +206,34 @@
|
|||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 573818685,
|
||||
"name": "CVE-2022-24112_POC",
|
||||
"full_name": "Acczdy\/CVE-2022-24112_POC",
|
||||
"owner": {
|
||||
"login": "Acczdy",
|
||||
"id": 107027804,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107027804?v=4",
|
||||
"html_url": "https:\/\/github.com\/Acczdy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Acczdy\/CVE-2022-24112_POC",
|
||||
"description": "CVE-2022-24112_POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-03T14:31:28Z",
|
||||
"updated_at": "2022-12-04T03:07:42Z",
|
||||
"pushed_at": "2022-12-04T03:12:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-12-02T03:39:16Z",
|
||||
"updated_at": "2022-12-04T04:29:27Z",
|
||||
"pushed_at": "2022-11-06T09:44:23Z",
|
||||
"stargazers_count": 871,
|
||||
"watchers_count": 871,
|
||||
"stargazers_count": 872,
|
||||
"watchers_count": 872,
|
||||
"has_discussions": true,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"watchers": 871,
|
||||
"watchers": 872,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -110,10 +110,10 @@
|
|||
"description": "CVE-2022-30190 Follina POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T06:45:25Z",
|
||||
"updated_at": "2022-11-21T07:33:34Z",
|
||||
"updated_at": "2022-12-04T00:31:42Z",
|
||||
"pushed_at": "2022-05-31T09:35:37Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -864,13 +864,13 @@
|
|||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"forks": 50,
|
||||
"watchers": 345,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T11:53:14Z",
|
||||
"updated_at": "2022-11-26T15:09:47Z",
|
||||
"updated_at": "2022-12-04T03:17:00Z",
|
||||
"pushed_at": "2022-10-01T12:19:53Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-43097.json
Normal file
31
2022/CVE-2022-43097.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 573969775,
|
||||
"name": "CVE-2022-43097",
|
||||
"full_name": "nibin-m\/CVE-2022-43097",
|
||||
"owner": {
|
||||
"login": "nibin-m",
|
||||
"id": 22180125,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22180125?v=4",
|
||||
"html_url": "https:\/\/github.com\/nibin-m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nibin-m\/CVE-2022-43097",
|
||||
"description": "All details about CVE-2022-43097",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-04T01:59:51Z",
|
||||
"updated_at": "2022-12-04T01:59:51Z",
|
||||
"pushed_at": "2022-12-04T02:07:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
12
README.md
12
README.md
|
@ -1730,6 +1730,7 @@ An attacker can abuse the batch-requests plugin to send requests to bypass the I
|
|||
- [M4xSec/Apache-APISIX-CVE-2022-24112](https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112)
|
||||
- [kavishkagihan/CVE-2022-24112-POC](https://github.com/kavishkagihan/CVE-2022-24112-POC)
|
||||
- [twseptian/cve-2022-24112](https://github.com/twseptian/cve-2022-24112)
|
||||
- [Acczdy/CVE-2022-24112_POC](https://github.com/Acczdy/CVE-2022-24112_POC)
|
||||
|
||||
### CVE-2022-24122 (2022-01-29)
|
||||
|
||||
|
@ -4541,6 +4542,9 @@ Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via
|
|||
|
||||
- [ProxyStaffy/Mediatrix-CVE-2022-43096](https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096)
|
||||
|
||||
### CVE-2022-43097
|
||||
- [nibin-m/CVE-2022-43097](https://github.com/nibin-m/CVE-2022-43097)
|
||||
|
||||
### CVE-2022-43117 (2022-11-21)
|
||||
|
||||
<code>
|
||||
|
@ -4579,7 +4583,12 @@ In libexpat through 2.4.9, there is a use-after free caused by overeager destruc
|
|||
### CVE-2022-43959
|
||||
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
|
||||
|
||||
### CVE-2022-44721
|
||||
### CVE-2022-44721 (2022-12-03)
|
||||
|
||||
<code>
|
||||
CrowdStrike Falcon 6.44.15806 allows an administrative attacker to uninstall Falcon Sensor, bypassing the intended protection mechanism in which uninstallation requires possessing a one-time token. (The sensor is managed at the kernel level.)
|
||||
</code>
|
||||
|
||||
- [purplededa/CVE-2022-44721-CsFalconUninstaller](https://github.com/purplededa/CVE-2022-44721-CsFalconUninstaller)
|
||||
|
||||
### CVE-2022-44789 (2022-11-23)
|
||||
|
@ -24905,6 +24914,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
|
|||
- [sugarvillela/CVE](https://github.com/sugarvillela/CVE)
|
||||
- [th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit](https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit)
|
||||
- [tndud042713/cve](https://github.com/tndud042713/cve)
|
||||
- [sidrk01/cve-2016-0728](https://github.com/sidrk01/cve-2016-0728)
|
||||
|
||||
### CVE-2016-0752 (2016-02-15)
|
||||
|
||||
|
|
Loading…
Reference in a new issue