mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/02/10 18:14:15
This commit is contained in:
parent
3741ddce91
commit
e6d0fbbe7a
33 changed files with 247 additions and 210 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2022-02-08T10:30:35Z",
|
||||
"updated_at": "2022-02-10T16:01:00Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 334,
|
||||
"watchers_count": 334,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 333,
|
||||
"watchers": 334,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-02-10T00:55:25Z",
|
||||
"updated_at": "2022-02-10T13:15:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1282,
|
||||
"watchers_count": 1282,
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1282,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2015-04-22T12:54:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-02-10T00:55:25Z",
|
||||
"updated_at": "2022-02-10T13:15:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1282,
|
||||
"watchers_count": 1282,
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1282,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -269,33 +269,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437085,
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "bells17\/CVE-2017-1000117",
|
||||
"owner": {
|
||||
"login": "bells17",
|
||||
"id": 2158863,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2158863?v=4",
|
||||
"html_url": "https:\/\/github.com\/bells17"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117",
|
||||
"description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-16T02:04:02Z",
|
||||
"updated_at": "2017-10-13T17:48:19Z",
|
||||
"pushed_at": "2017-08-16T09:35:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 100437171,
|
||||
"name": "CVE-2017-1000117",
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-02-10T00:55:25Z",
|
||||
"updated_at": "2022-02-10T13:15:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1282,
|
||||
"watchers_count": 1282,
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1282,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -207,17 +207,17 @@
|
|||
"description": "iis6 exploit 2017 CVE-2017-7269",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-05T23:21:12Z",
|
||||
"updated_at": "2022-02-09T11:41:19Z",
|
||||
"updated_at": "2022-02-10T17:43:29Z",
|
||||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 50,
|
||||
"forks": 51,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,11 +67,11 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2022-01-25T13:18:49Z",
|
||||
"updated_at": "2022-02-10T12:59:33Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"forks_count": 99,
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -82,8 +82,8 @@
|
|||
"sambacry"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 298,
|
||||
"forks": 100,
|
||||
"watchers": 299,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -445,17 +445,17 @@
|
|||
"description": "Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-10T13:09:50Z",
|
||||
"updated_at": "2021-12-29T12:20:55Z",
|
||||
"updated_at": "2022-02-10T13:13:45Z",
|
||||
"pushed_at": "2020-07-30T21:35:38Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-02-10T00:55:25Z",
|
||||
"updated_at": "2022-02-10T13:15:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1282,
|
||||
"watchers_count": 1282,
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1282,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2022-01-28T19:25:17Z",
|
||||
"updated_at": "2022-02-10T15:08:14Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 471,
|
||||
"watchers_count": 471,
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"forks_count": 205,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -54,7 +54,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 205,
|
||||
"watchers": 471,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-02-10T05:40:35Z",
|
||||
"updated_at": "2022-02-10T14:53:23Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3155,
|
||||
"watchers_count": 3155,
|
||||
"stargazers_count": 3156,
|
||||
"watchers_count": 3156,
|
||||
"forks_count": 938,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 938,
|
||||
"watchers": 3155,
|
||||
"watchers": 3156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit code for CVE-2019-17662",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T19:30:09Z",
|
||||
"updated_at": "2021-12-09T11:55:45Z",
|
||||
"updated_at": "2022-02-10T17:45:30Z",
|
||||
"pushed_at": "2021-09-12T14:43:25Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-02-10T00:55:25Z",
|
||||
"updated_at": "2022-02-10T13:15:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1282,
|
||||
"watchers_count": 1282,
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1282,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-02-10T05:40:35Z",
|
||||
"updated_at": "2022-02-10T14:53:23Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3155,
|
||||
"watchers_count": 3155,
|
||||
"stargazers_count": 3156,
|
||||
"watchers_count": 3156,
|
||||
"forks_count": 938,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 938,
|
||||
"watchers": 3155,
|
||||
"watchers": 3156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:03:16Z",
|
||||
"updated_at": "2022-01-07T13:00:44Z",
|
||||
"updated_at": "2022-02-10T13:34:04Z",
|
||||
"pushed_at": "2021-08-15T16:41:05Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-02-10T00:55:25Z",
|
||||
"updated_at": "2022-02-10T13:15:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1282,
|
||||
"watchers_count": 1282,
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 281,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 281,
|
||||
"watchers": 1282,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T21:35:19Z",
|
||||
"updated_at": "2022-02-10T11:52:51Z",
|
||||
"updated_at": "2022-02-10T18:08:13Z",
|
||||
"pushed_at": "2022-01-26T07:00:31Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -84,10 +84,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2022-02-06T15:27:17Z",
|
||||
"updated_at": "2022-02-10T17:29:49Z",
|
||||
"pushed_at": "2021-12-30T12:26:11Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -96,7 +96,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 132,
|
||||
"watchers": 341,
|
||||
"watchers": 342,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Windows MDM LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-27T00:37:07Z",
|
||||
"updated_at": "2021-12-14T03:53:35Z",
|
||||
"updated_at": "2022-02-10T13:34:38Z",
|
||||
"pushed_at": "2021-11-27T00:38:33Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-25741 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T14:05:20Z",
|
||||
"updated_at": "2022-01-28T15:21:29Z",
|
||||
"updated_at": "2022-02-10T16:09:08Z",
|
||||
"pushed_at": "2022-01-19T19:15:36Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1131,17 +1131,17 @@
|
|||
"description": "Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-04T22:38:30Z",
|
||||
"updated_at": "2021-12-05T20:05:20Z",
|
||||
"pushed_at": "2022-02-10T07:51:54Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"updated_at": "2022-02-10T15:36:56Z",
|
||||
"pushed_at": "2022-02-10T15:20:42Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1108,12 +1108,12 @@
|
|||
"pushed_at": "2022-01-03T15:07:26Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -130,17 +130,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2022-02-10T09:23:03Z",
|
||||
"updated_at": "2022-02-10T16:11:32Z",
|
||||
"pushed_at": "2021-08-31T16:59:09Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-02-10T11:56:40Z",
|
||||
"updated_at": "2022-02-10T13:00:12Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1221,
|
||||
"watchers_count": 1221,
|
||||
"stargazers_count": 1222,
|
||||
"watchers_count": 1222,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 1221,
|
||||
"watchers": 1222,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -154,10 +154,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-02-10T11:30:46Z",
|
||||
"updated_at": "2022-02-10T17:07:21Z",
|
||||
"pushed_at": "2022-01-29T06:22:16Z",
|
||||
"stargazers_count": 729,
|
||||
"watchers_count": 729,
|
||||
"stargazers_count": 731,
|
||||
"watchers_count": 731,
|
||||
"forks_count": 232,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -168,7 +168,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 232,
|
||||
"watchers": 729,
|
||||
"watchers": 731,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -354,17 +354,17 @@
|
|||
"description": "Exploit for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T03:33:47Z",
|
||||
"updated_at": "2022-02-04T01:08:01Z",
|
||||
"updated_at": "2022-02-10T15:50:25Z",
|
||||
"pushed_at": "2022-01-27T11:57:05Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -902,10 +902,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-02-10T07:33:49Z",
|
||||
"updated_at": "2022-02-10T14:57:02Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"stargazers_count": 409,
|
||||
"watchers_count": 409,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -914,7 +914,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 408,
|
||||
"watchers": 409,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1228,17 +1228,17 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2022-02-09T06:16:10Z",
|
||||
"updated_at": "2022-02-10T18:13:22Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 40,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1722,7 +1722,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-27T10:26:46Z",
|
||||
"updated_at": "2022-01-27T13:44:20Z",
|
||||
"pushed_at": "2022-02-10T10:55:04Z",
|
||||
"pushed_at": "2022-02-10T18:13:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -3434,17 +3434,17 @@
|
|||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2022-02-10T06:56:39Z",
|
||||
"updated_at": "2022-02-10T12:17:46Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3542,17 +3542,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-02-10T08:50:38Z",
|
||||
"updated_at": "2022-02-10T14:51:13Z",
|
||||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2709,
|
||||
"watchers_count": 2709,
|
||||
"stargazers_count": 2710,
|
||||
"watchers_count": 2710,
|
||||
"forks_count": 654,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 654,
|
||||
"watchers": 2709,
|
||||
"watchers": 2710,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4726,7 +4726,7 @@
|
|||
"pushed_at": "2021-12-17T17:23:57Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -4738,7 +4738,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -5965,12 +5965,12 @@
|
|||
"pushed_at": "2022-02-03T20:02:09Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 93,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"forks": 94,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -9462,12 +9462,12 @@
|
|||
"pushed_at": "2021-12-25T11:26:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0185",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-19T06:19:38Z",
|
||||
"updated_at": "2022-02-10T10:04:27Z",
|
||||
"updated_at": "2022-02-10T12:40:27Z",
|
||||
"pushed_at": "2022-01-25T17:00:16Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 259,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,44 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2022-02-10T12:09:39Z",
|
||||
"updated_at": "2022-02-10T17:35:24Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 16,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 63,
|
||||
"forks": 19,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 457817909,
|
||||
"name": "CVE-2022-20699",
|
||||
"full_name": "puckiestyle\/CVE-2022-20699",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-20699",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-10T14:40:25Z",
|
||||
"updated_at": "2022-02-10T14:40:40Z",
|
||||
"pushed_at": "2022-02-10T14:40:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-02-10T09:24:02Z",
|
||||
"updated_at": "2022-02-10T12:41:53Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 352,
|
||||
"watchers": 353,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-02-10T12:15:24Z",
|
||||
"updated_at": "2022-02-10T17:23:52Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 52,
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,8 +25,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 304,
|
||||
"forks": 54,
|
||||
"watchers": 314,
|
||||
"score": 0
|
||||
}
|
||||
]
|
47
2022/CVE-2022-23808.json
Normal file
47
2022/CVE-2022-23808.json
Normal file
|
@ -0,0 +1,47 @@
|
|||
[
|
||||
{
|
||||
"id": 454474679,
|
||||
"name": "CVE-2022-23808",
|
||||
"full_name": "dipakpanchal456\/CVE-2022-23808",
|
||||
"owner": {
|
||||
"login": "dipakpanchal456",
|
||||
"id": 31427462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31427462?v=4",
|
||||
"html_url": "https:\/\/github.com\/dipakpanchal456"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dipakpanchal456\/CVE-2022-23808",
|
||||
"description": "phpMyAdmin XSS ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T17:02:03Z",
|
||||
"updated_at": "2022-02-10T18:03:12Z",
|
||||
"pushed_at": "2022-02-03T16:21:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"bugbounty",
|
||||
"cross-site-scripting",
|
||||
"database",
|
||||
"exploit",
|
||||
"exploitation",
|
||||
"hacking",
|
||||
"infosec",
|
||||
"owasp",
|
||||
"owasp-top-10",
|
||||
"pentesting",
|
||||
"phpmyadmin",
|
||||
"poc",
|
||||
"redteam",
|
||||
"redteaming",
|
||||
"vulnerability",
|
||||
"xss",
|
||||
"zeroday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -25,32 +25,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 457721752,
|
||||
"name": "helm-sample",
|
||||
"full_name": "mochizuki875\/helm-sample",
|
||||
"owner": {
|
||||
"login": "mochizuki875",
|
||||
"id": 37737691,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37737691?v=4",
|
||||
"html_url": "https:\/\/github.com\/mochizuki875"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mochizuki875\/helm-sample",
|
||||
"description": "CVE-2022-24348 Test",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-10T09:55:41Z",
|
||||
"updated_at": "2022-02-10T09:58:20Z",
|
||||
"pushed_at": "2022-02-10T10:54:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
README.md
25
README.md
|
@ -31,8 +31,14 @@ A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was
|
|||
|
||||
- [numanturle/CVE-2022-0332](https://github.com/numanturle/CVE-2022-0332)
|
||||
|
||||
### CVE-2022-20699
|
||||
### CVE-2022-20699 (-)
|
||||
|
||||
<code>
|
||||
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
|
||||
</code>
|
||||
|
||||
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
|
||||
- [puckiestyle/CVE-2022-20699](https://github.com/puckiestyle/CVE-2022-20699)
|
||||
|
||||
### CVE-2022-21241 (2022-02-08)
|
||||
|
||||
|
@ -187,6 +193,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta
|
|||
|
||||
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
|
||||
|
||||
### CVE-2022-23808 (2022-01-21)
|
||||
|
||||
<code>
|
||||
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
|
||||
</code>
|
||||
|
||||
- [dipakpanchal456/CVE-2022-23808](https://github.com/dipakpanchal456/CVE-2022-23808)
|
||||
|
||||
### CVE-2022-23967 (2022-01-26)
|
||||
|
||||
<code>
|
||||
|
@ -210,7 +224,6 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
|
|||
</code>
|
||||
|
||||
- [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2)
|
||||
- [mochizuki875/helm-sample](https://github.com/mochizuki875/helm-sample)
|
||||
|
||||
### CVE-2022-24693
|
||||
- [lukejenkins/CVE-2022-24693](https://github.com/lukejenkins/CVE-2022-24693)
|
||||
|
@ -3976,7 +3989,12 @@ SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution.
|
|||
|
||||
- [manuelz120/CVE-2021-45897](https://github.com/manuelz120/CVE-2021-45897)
|
||||
|
||||
### CVE-2021-45901
|
||||
### CVE-2021-45901 (2022-02-10)
|
||||
|
||||
<code>
|
||||
The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.
|
||||
</code>
|
||||
|
||||
- [9lyph/CVE-2021-45901](https://github.com/9lyph/CVE-2021-45901)
|
||||
|
||||
### CVE-2021-46005 (2022-01-18)
|
||||
|
@ -18324,7 +18342,6 @@ A malicious third-party can give a crafted "ssh://..." URL to an unsus
|
|||
- [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117)
|
||||
- [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa)
|
||||
- [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test)
|
||||
- [bells17/CVE-2017-1000117](https://github.com/bells17/CVE-2017-1000117)
|
||||
- [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117)
|
||||
- [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117)
|
||||
- [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl)
|
||||
|
|
Loading…
Reference in a new issue