mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/06/17 12:16:26
This commit is contained in:
parent
663b0bbbca
commit
e09ddc0907
45 changed files with 238 additions and 344 deletions
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-06-17T02:39:13Z",
|
||||
"updated_at": "2022-06-17T02:41:22Z",
|
||||
"pushed_at": "2022-06-17T05:49:15Z",
|
||||
"pushed_at": "2022-06-17T06:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2017-04-25T07:24:08Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 80,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"forks": 81,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -269,33 +269,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30059704,
|
||||
"name": "ghosttester",
|
||||
"full_name": "JustDenisYT\/ghosttester",
|
||||
"owner": {
|
||||
"login": "JustDenisYT",
|
||||
"id": 9379272,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
|
||||
"description": "Script to test vulnarability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-30T06:37:06Z",
|
||||
"updated_at": "2015-02-04T08:03:37Z",
|
||||
"pushed_at": "2015-02-04T08:03:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30066365,
|
||||
"name": "CVE-2015-0235",
|
||||
|
@ -404,6 +377,33 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 53305448,
|
||||
"name": "ghosttester",
|
||||
"full_name": "1and1-serversupport\/ghosttester",
|
||||
"owner": {
|
||||
"login": "1and1-serversupport",
|
||||
"id": 17684871,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17684871?v=4",
|
||||
"html_url": "https:\/\/github.com\/1and1-serversupport"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1and1-serversupport\/ghosttester",
|
||||
"description": "Script to test vulnarability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-07T07:39:03Z",
|
||||
"updated_at": "2022-06-17T08:09:33Z",
|
||||
"pushed_at": "2015-02-04T08:03:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 95877607,
|
||||
"name": "CVE-2015-0235",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "(CVE-2015-7501)JBoss JMXInvokerServlet 反序列化漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T05:23:08Z",
|
||||
"updated_at": "2022-05-24T03:18:43Z",
|
||||
"updated_at": "2022-06-17T09:42:39Z",
|
||||
"pushed_at": "2020-02-21T05:24:27Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -80,33 +80,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 51918991,
|
||||
"name": "glibc-patcher",
|
||||
"full_name": "JustDenisYT\/glibc-patcher",
|
||||
"owner": {
|
||||
"login": "JustDenisYT",
|
||||
"id": 9379272,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT\/glibc-patcher",
|
||||
"description": "Small script to patch CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-17T11:51:44Z",
|
||||
"updated_at": "2016-02-17T11:53:23Z",
|
||||
"pushed_at": "2016-02-18T08:42:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 52007143,
|
||||
"name": "rex-sec-glibc",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-01-28T20:54:38Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"forks_count": 117,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"forks": 118,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2022-05-20T10:34:20Z",
|
||||
"updated_at": "2022-06-17T10:53:59Z",
|
||||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-5693 Denial of service vulnerability in Puma 6 modems",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-25T21:25:43Z",
|
||||
"updated_at": "2022-06-09T01:28:23Z",
|
||||
"updated_at": "2022-06-17T11:12:22Z",
|
||||
"pushed_at": "2022-06-09T01:31:23Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -261,17 +261,17 @@
|
|||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2022-04-25T15:21:13Z",
|
||||
"updated_at": "2022-06-17T06:15:55Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 100,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-30T18:48:20Z",
|
||||
"updated_at": "2022-06-14T13:06:16Z",
|
||||
"updated_at": "2022-06-17T09:35:27Z",
|
||||
"pushed_at": "2018-10-30T21:51:16Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-06-15T19:57:00Z",
|
||||
"updated_at": "2022-06-17T09:38:31Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1718,
|
||||
"watchers_count": 1718,
|
||||
"stargazers_count": 1719,
|
||||
"watchers_count": 1719,
|
||||
"forks_count": 263,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 263,
|
||||
"watchers": 1718,
|
||||
"watchers": 1719,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC code for CVE-2019-14041",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-03T23:05:10Z",
|
||||
"updated_at": "2022-03-08T12:41:29Z",
|
||||
"updated_at": "2022-06-17T09:34:24Z",
|
||||
"pushed_at": "2020-04-15T14:28:47Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -642,5 +642,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 504519500,
|
||||
"name": "CVE-2019-15107_webminRCE",
|
||||
"full_name": "psw01\/CVE-2019-15107_webminRCE",
|
||||
"owner": {
|
||||
"login": "psw01",
|
||||
"id": 57420099,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57420099?v=4",
|
||||
"html_url": "https:\/\/github.com\/psw01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/psw01\/CVE-2019-15107_webminRCE",
|
||||
"description": "unauthorized RcE exploit for webnin < 1.920",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T12:04:38Z",
|
||||
"updated_at": "2022-06-17T12:04:38Z",
|
||||
"pushed_at": "2022-06-17T12:04:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-16T03:30:06Z",
|
||||
"updated_at": "2022-06-17T09:00:50Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3368,
|
||||
"watchers_count": 3368,
|
||||
"stargazers_count": 3370,
|
||||
"watchers_count": 3370,
|
||||
"forks_count": 1005,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1005,
|
||||
"watchers": 3368,
|
||||
"watchers": 3370,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 184210054,
|
||||
"name": "cve-2019-8513",
|
||||
"full_name": "genknife\/cve-2019-8513",
|
||||
"owner": {
|
||||
"login": "genknife",
|
||||
"id": 47594735,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47594735?v=4",
|
||||
"html_url": "https:\/\/github.com\/genknife"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/genknife\/cve-2019-8513",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-30T07:06:23Z",
|
||||
"updated_at": "2019-07-10T02:57:11Z",
|
||||
"pushed_at": "2019-07-10T02:57:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 184996067,
|
||||
"name": "cve-2019-8565",
|
||||
"full_name": "genknife\/cve-2019-8565",
|
||||
"owner": {
|
||||
"login": "genknife",
|
||||
"id": 47594735,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47594735?v=4",
|
||||
"html_url": "https:\/\/github.com\/genknife"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/genknife\/cve-2019-8565",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T07:34:05Z",
|
||||
"updated_at": "2019-07-10T02:58:35Z",
|
||||
"pushed_at": "2019-07-10T02:58:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploiting a patched vulnerability in JavaScriptCore",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T00:12:22Z",
|
||||
"updated_at": "2022-04-06T02:44:15Z",
|
||||
"updated_at": "2022-06-17T11:44:44Z",
|
||||
"pushed_at": "2020-01-02T00:13:22Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1051,10 +1051,10 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2022-06-11T13:05:34Z",
|
||||
"updated_at": "2022-06-17T07:14:57Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"forks_count": 89,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1066,7 +1066,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 89,
|
||||
"watchers": 240,
|
||||
"watchers": 241,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-06-16T03:30:06Z",
|
||||
"updated_at": "2022-06-17T09:00:50Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3368,
|
||||
"watchers_count": 3368,
|
||||
"stargazers_count": 3370,
|
||||
"watchers_count": 3370,
|
||||
"forks_count": 1005,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1005,
|
||||
"watchers": 3368,
|
||||
"watchers": 3370,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "4.9 Kernel Exploit for CVE-2020-27786",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T08:04:19Z",
|
||||
"updated_at": "2022-06-13T08:08:24Z",
|
||||
"updated_at": "2022-06-17T11:08:47Z",
|
||||
"pushed_at": "2022-06-13T08:08:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -333,12 +333,12 @@
|
|||
"pushed_at": "2021-02-25T10:26:53Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2022-06-14T05:22:22Z",
|
||||
"updated_at": "2022-06-17T06:26:16Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2022-06-11T00:51:32Z",
|
||||
"updated_at": "2022-06-17T09:57:43Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 26,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,8 +25,8 @@
|
|||
"exiftool"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 67,
|
||||
"forks": 27,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T10:39:42Z",
|
||||
"updated_at": "2022-05-27T08:54:08Z",
|
||||
"updated_at": "2022-06-17T07:20:54Z",
|
||||
"pushed_at": "2022-03-28T05:19:18Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 68,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-06-02T03:52:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2022-06-16T11:44:36Z",
|
||||
"updated_at": "2022-06-17T11:37:43Z",
|
||||
"pushed_at": "2022-06-01T21:10:46Z",
|
||||
"stargazers_count": 670,
|
||||
"watchers_count": 670,
|
||||
"forks_count": 152,
|
||||
"stargazers_count": 671,
|
||||
"watchers_count": 671,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -56,8 +56,8 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"watchers": 670,
|
||||
"forks": 153,
|
||||
"watchers": 671,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,10 +98,10 @@
|
|||
"description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T14:46:41Z",
|
||||
"updated_at": "2022-06-09T11:28:32Z",
|
||||
"updated_at": "2022-06-17T06:35:47Z",
|
||||
"pushed_at": "2021-12-24T07:38:39Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -114,7 +114,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-06-15T19:59:08Z",
|
||||
"updated_at": "2022-06-17T07:43:54Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1099,
|
||||
"watchers_count": 1099,
|
||||
"stargazers_count": 1100,
|
||||
"watchers_count": 1100,
|
||||
"forks_count": 288,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 288,
|
||||
"watchers": 1099,
|
||||
"watchers": 1100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -420,17 +420,17 @@
|
|||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:46:18Z",
|
||||
"updated_at": "2022-04-30T14:36:32Z",
|
||||
"updated_at": "2022-06-17T06:30:50Z",
|
||||
"pushed_at": "2021-12-13T22:27:25Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 181,
|
||||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -555,10 +555,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-06-17T01:32:06Z",
|
||||
"updated_at": "2022-06-17T07:56:39Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1396,
|
||||
"watchers_count": 1396,
|
||||
"stargazers_count": 1397,
|
||||
"watchers_count": 1397,
|
||||
"forks_count": 385,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 385,
|
||||
"watchers": 1396,
|
||||
"watchers": 1397,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -741,10 +741,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2022-06-16T14:58:07Z",
|
||||
"updated_at": "2022-06-17T07:24:45Z",
|
||||
"pushed_at": "2022-06-02T02:16:13Z",
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -756,7 +756,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 381,
|
||||
"watchers": 382,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1157,7 +1157,7 @@
|
|||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 622,
|
||||
"watchers_count": 622,
|
||||
"forks_count": 101,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1174,7 +1174,7 @@
|
|||
"vulnerability-scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 101,
|
||||
"forks": 102,
|
||||
"watchers": 622,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -7398,17 +7398,17 @@
|
|||
"description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T13:41:35Z",
|
||||
"updated_at": "2022-05-19T04:39:38Z",
|
||||
"updated_at": "2022-06-17T07:33:15Z",
|
||||
"pushed_at": "2021-12-21T06:11:58Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T19:06:33Z",
|
||||
"updated_at": "2022-06-16T13:41:50Z",
|
||||
"updated_at": "2022-06-17T06:35:48Z",
|
||||
"pushed_at": "2022-04-03T15:07:31Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 173,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1741,10 +1741,10 @@
|
|||
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T08:31:32Z",
|
||||
"updated_at": "2022-06-15T02:48:54Z",
|
||||
"updated_at": "2022-06-17T07:29:36Z",
|
||||
"pushed_at": "2022-06-16T17:14:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1759,7 +1759,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-28T10:46:48Z",
|
||||
"updated_at": "2022-06-07T08:57:15Z",
|
||||
"updated_at": "2022-06-17T06:25:45Z",
|
||||
"pushed_at": "2022-05-28T10:50:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-06-15T19:59:13Z",
|
||||
"updated_at": "2022-06-17T09:18:22Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"forks_count": 129,
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 414,
|
||||
"forks": 130,
|
||||
"watchers": 415,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-03T11:25:14Z",
|
||||
"updated_at": "2022-06-15T19:59:14Z",
|
||||
"updated_at": "2022-06-17T09:38:30Z",
|
||||
"pushed_at": "2022-02-04T02:20:47Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1286,17 +1286,17 @@
|
|||
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-07T00:08:16Z",
|
||||
"updated_at": "2022-06-14T00:23:48Z",
|
||||
"updated_at": "2022-06-17T10:58:51Z",
|
||||
"pushed_at": "2022-04-07T23:00:29Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-06-17T06:13:02Z",
|
||||
"updated_at": "2022-06-17T09:30:39Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"forks_count": 63,
|
||||
"stargazers_count": 392,
|
||||
"watchers_count": 392,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 378,
|
||||
"forks": 66,
|
||||
"watchers": 392,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-24494",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-27T09:52:52Z",
|
||||
"updated_at": "2022-06-13T21:55:56Z",
|
||||
"updated_at": "2022-06-17T09:42:45Z",
|
||||
"pushed_at": "2022-05-27T10:48:45Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-06-17T02:54:20Z",
|
||||
"updated_at": "2022-06-17T08:07:45Z",
|
||||
"pushed_at": "2022-06-14T07:01:40Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 52,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -190,10 +190,10 @@
|
|||
"description": "[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T21:07:30Z",
|
||||
"updated_at": "2022-06-17T01:22:37Z",
|
||||
"updated_at": "2022-06-17T11:32:37Z",
|
||||
"pushed_at": "2022-06-06T20:24:06Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -212,7 +212,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 213,
|
||||
"watchers": 215,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -716,17 +716,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T09:19:02Z",
|
||||
"updated_at": "2022-06-16T16:57:00Z",
|
||||
"updated_at": "2022-06-17T06:53:32Z",
|
||||
"pushed_at": "2022-06-07T10:35:18Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 188,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-28T17:10:24Z",
|
||||
"updated_at": "2022-03-29T04:36:35Z",
|
||||
"pushed_at": "2022-03-28T17:41:51Z",
|
||||
"pushed_at": "2022-06-17T08:50:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A Zeek package to detect CVE-2022-26937, a vulnerability in the Network Lock Manager (NLM) protocol in Windows MFS server.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-11T18:36:45Z",
|
||||
"updated_at": "2022-05-27T09:31:22Z",
|
||||
"updated_at": "2022-06-17T09:20:21Z",
|
||||
"pushed_at": "2022-05-17T16:53:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "Windows Network File System Crash PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T01:42:55Z",
|
||||
"updated_at": "2022-06-17T06:07:28Z",
|
||||
"updated_at": "2022-06-17T10:05:37Z",
|
||||
"pushed_at": "2022-06-17T01:50:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"forks": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T23:26:47Z",
|
||||
"updated_at": "2022-06-16T13:17:23Z",
|
||||
"updated_at": "2022-06-17T06:36:37Z",
|
||||
"pushed_at": "2022-06-16T12:42:43Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-16T21:16:53Z",
|
||||
"updated_at": "2022-06-16T21:37:59Z",
|
||||
"updated_at": "2022-06-17T07:27:14Z",
|
||||
"pushed_at": "2022-06-16T21:39:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-06-16T18:30:00Z",
|
||||
"updated_at": "2022-06-17T11:31:19Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1728,17 +1728,17 @@
|
|||
"description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-15T02:22:53Z",
|
||||
"updated_at": "2022-06-17T05:42:49Z",
|
||||
"updated_at": "2022-06-17T07:55:34Z",
|
||||
"pushed_at": "2022-06-15T02:24:00Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🍵 Gitea repository migration remote command execution exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-22T05:15:58Z",
|
||||
"updated_at": "2022-06-16T21:35:21Z",
|
||||
"updated_at": "2022-06-17T08:25:47Z",
|
||||
"pushed_at": "2022-05-26T11:32:21Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 504137765,
|
||||
"name": "piaoliangshusb",
|
||||
"full_name": "piaoliangshu\/piaoliangshusb",
|
||||
"owner": {
|
||||
"login": "piaoliangshu",
|
||||
"id": 107622201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107622201?v=4",
|
||||
"html_url": "https:\/\/github.com\/piaoliangshu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/piaoliangshu\/piaoliangshusb",
|
||||
"description": "关于漂亮鼠的那些精彩事迹(变态的油腻大叔)CVE-2022-6969、CVE-2022-0001",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-16T11:58:36Z",
|
||||
"updated_at": "2022-06-16T12:49:59Z",
|
||||
"pushed_at": "2022-06-16T12:31:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -419,9 +419,6 @@ A use-after-free vulnerability was found in the Linux kernel's Netfilter subsyst
|
|||
### CVE-2022-2333
|
||||
- [shirouQwQ/CVE-2022-2333](https://github.com/shirouQwQ/CVE-2022-2333)
|
||||
|
||||
### CVE-2022-6969
|
||||
- [piaoliangshu/piaoliangshusb](https://github.com/piaoliangshu/piaoliangshusb)
|
||||
|
||||
### CVE-2022-10086
|
||||
- [Gaphuang/CVE-2022-10086-TEST-](https://github.com/Gaphuang/CVE-2022-10086-TEST-)
|
||||
|
||||
|
@ -13540,14 +13537,6 @@ The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 a
|
|||
- [jas502n/CVE-2019-8451](https://github.com/jas502n/CVE-2019-8451)
|
||||
- [h0ffayyy/Jira-CVE-2019-8451](https://github.com/h0ffayyy/Jira-CVE-2019-8451)
|
||||
|
||||
### CVE-2019-8513 (2019-12-18)
|
||||
|
||||
<code>
|
||||
This issue was addressed with improved checks. This issue is fixed in macOS Mojave 10.14.4. A local user may be able to execute arbitrary shell commands.
|
||||
</code>
|
||||
|
||||
- [genknife/cve-2019-8513](https://github.com/genknife/cve-2019-8513)
|
||||
|
||||
### CVE-2019-8540 (2019-12-18)
|
||||
|
||||
<code>
|
||||
|
@ -13564,14 +13553,6 @@ A logic issue was addressed with improved validation. This issue is fixed in mac
|
|||
|
||||
- [0xmachos/CVE-2019-8561](https://github.com/0xmachos/CVE-2019-8561)
|
||||
|
||||
### CVE-2019-8565 (2019-12-18)
|
||||
|
||||
<code>
|
||||
A race condition was addressed with additional validation. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4. A malicious application may be able to gain root privileges.
|
||||
</code>
|
||||
|
||||
- [genknife/cve-2019-8565](https://github.com/genknife/cve-2019-8565)
|
||||
|
||||
### CVE-2019-8591 (2019-12-18)
|
||||
|
||||
<code>
|
||||
|
@ -15080,6 +15061,7 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_chan
|
|||
- [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107)
|
||||
- [trhacknon/CVE-2019-15107](https://github.com/trhacknon/CVE-2019-15107)
|
||||
- [NullBrunk/Webmin-RCE](https://github.com/NullBrunk/Webmin-RCE)
|
||||
- [psw01/CVE-2019-15107_webminRCE](https://github.com/psw01/CVE-2019-15107_webminRCE)
|
||||
|
||||
### CVE-2019-15120 (2019-08-16)
|
||||
|
||||
|
@ -23308,11 +23290,11 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2
|
|||
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
|
||||
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
|
||||
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
|
||||
- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester)
|
||||
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
|
||||
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
|
||||
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
|
||||
- [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)
|
||||
- [1and1-serversupport/ghosttester](https://github.com/1and1-serversupport/ghosttester)
|
||||
- [sUbc0ol/CVE-2015-0235](https://github.com/sUbc0ol/CVE-2015-0235)
|
||||
- [chayim/GHOSTCHECK-cve-2015-0235](https://github.com/chayim/GHOSTCHECK-cve-2015-0235)
|
||||
- [limkokholefork/GHOSTCHECK-cve-2015-0235](https://github.com/limkokholefork/GHOSTCHECK-cve-2015-0235)
|
||||
|
@ -24016,7 +23998,6 @@ Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functio
|
|||
- [fjserna/CVE-2015-7547](https://github.com/fjserna/CVE-2015-7547)
|
||||
- [cakuzo/CVE-2015-7547](https://github.com/cakuzo/CVE-2015-7547)
|
||||
- [t0r0t0r0/CVE-2015-7547](https://github.com/t0r0t0r0/CVE-2015-7547)
|
||||
- [JustDenisYT/glibc-patcher](https://github.com/JustDenisYT/glibc-patcher)
|
||||
- [rexifiles/rex-sec-glibc](https://github.com/rexifiles/rex-sec-glibc)
|
||||
- [babykillerblack/CVE-2015-7547](https://github.com/babykillerblack/CVE-2015-7547)
|
||||
- [jgajek/cve-2015-7547](https://github.com/jgajek/cve-2015-7547)
|
||||
|
|
Loading…
Reference in a new issue