mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/07/06 00:15:59
This commit is contained in:
parent
3d50fac18e
commit
ec4ca51d05
22 changed files with 205 additions and 75 deletions
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"forks_count": 105,
|
||||
"forks_count": 106,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"cve-2008-0166"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"forks": 106,
|
||||
"watchers": 341,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2018-02-26T12:07:11Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2022-06-14T16:57:17Z",
|
||||
"updated_at": "2022-07-05T21:45:40Z",
|
||||
"pushed_at": "2022-01-28T20:54:38Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 293,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -73,13 +73,13 @@
|
|||
"pushed_at": "2019-06-10T15:10:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -85,10 +85,10 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2022-07-02T08:31:22Z",
|
||||
"updated_at": "2022-07-05T21:45:41Z",
|
||||
"pushed_at": "2021-11-08T02:19:03Z",
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"forks_count": 184,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -96,7 +96,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 184,
|
||||
"watchers": 494,
|
||||
"watchers": 493,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1766,10 +1766,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2022-06-29T11:54:49Z",
|
||||
"updated_at": "2022-07-05T21:45:41Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1112,
|
||||
"watchers_count": 1112,
|
||||
"stargazers_count": 1111,
|
||||
"watchers_count": 1111,
|
||||
"forks_count": 356,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1777,7 +1777,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 356,
|
||||
"watchers": 1112,
|
||||
"watchers": 1111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1850,10 +1850,10 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2022-06-10T10:41:02Z",
|
||||
"updated_at": "2022-07-05T21:45:41Z",
|
||||
"pushed_at": "2021-01-10T04:31:22Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1861,7 +1861,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 128,
|
||||
"watchers": 347,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2022-06-17T21:42:07Z",
|
||||
"updated_at": "2022-07-05T21:45:41Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 618,
|
||||
"watchers_count": 618,
|
||||
"stargazers_count": 617,
|
||||
"watchers_count": 617,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"watchers": 618,
|
||||
"watchers": 617,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2022-06-12T01:20:18Z",
|
||||
"updated_at": "2022-07-05T20:41:12Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1228,10 +1228,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T18:00:03Z",
|
||||
"updated_at": "2021-12-15T14:42:25Z",
|
||||
"updated_at": "2022-07-05T22:37:27Z",
|
||||
"pushed_at": "2021-06-30T18:00:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1239,7 +1239,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -303,10 +303,10 @@
|
|||
"description": "CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T02:21:08Z",
|
||||
"updated_at": "2022-06-13T09:12:52Z",
|
||||
"updated_at": "2022-07-05T21:34:56Z",
|
||||
"pushed_at": "2022-01-26T02:30:05Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -314,7 +314,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -906,10 +906,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-07-04T17:26:42Z",
|
||||
"updated_at": "2022-07-05T20:55:44Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -919,7 +919,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 545,
|
||||
"watchers": 547,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -741,7 +741,7 @@
|
|||
"pushed_at": "2022-06-02T02:16:13Z",
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"forks_count": 86,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -752,7 +752,7 @@
|
|||
"log4jshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"forks": 87,
|
||||
"watchers": 402,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1868,10 +1868,10 @@
|
|||
"description": "An eBPF detection program for CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:20:59Z",
|
||||
"updated_at": "2022-07-05T17:16:19Z",
|
||||
"updated_at": "2022-07-05T21:19:14Z",
|
||||
"pushed_at": "2022-07-05T14:25:46Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1879,7 +1879,35 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510867863,
|
||||
"name": "Dirty-Pipe",
|
||||
"full_name": "edr1412\/Dirty-Pipe",
|
||||
"owner": {
|
||||
"login": "edr1412",
|
||||
"id": 40953911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
|
||||
"html_url": "https:\/\/github.com\/edr1412"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
|
||||
"description": "exp of CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:22:50Z",
|
||||
"updated_at": "2022-07-05T19:24:40Z",
|
||||
"pushed_at": "2022-07-05T19:23:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -964,7 +964,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-11T19:33:37Z",
|
||||
"updated_at": "2022-07-04T19:06:44Z",
|
||||
"pushed_at": "2022-05-11T19:39:01Z",
|
||||
"pushed_at": "2022-07-05T23:52:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -166,5 +166,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 510875629,
|
||||
"name": "CVE-2022-21449-I2P-TLS-POC",
|
||||
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
|
||||
"owner": {
|
||||
"login": "PyterSmithDarkGhost",
|
||||
"id": 106814901,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
|
||||
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T19:51:39Z",
|
||||
"updated_at": "2022-07-05T19:55:22Z",
|
||||
"pushed_at": "2022-07-05T19:52:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-07-04T09:46:15Z",
|
||||
"updated_at": "2022-07-05T23:51:37Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 416,
|
||||
"watchers_count": 416,
|
||||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 132,
|
||||
"watchers": 416,
|
||||
"watchers": 417,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -137,10 +137,10 @@
|
|||
"description": "CVE-2022-26134 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T13:59:19Z",
|
||||
"updated_at": "2022-07-05T07:32:28Z",
|
||||
"updated_at": "2022-07-05T19:57:18Z",
|
||||
"pushed_at": "2022-06-06T16:38:49Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -152,7 +152,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,10 +197,10 @@
|
|||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T21:07:30Z",
|
||||
"updated_at": "2022-07-05T07:10:35Z",
|
||||
"updated_at": "2022-07-05T19:28:37Z",
|
||||
"pushed_at": "2022-06-06T20:24:06Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 240,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
35
2022/CVE-2022-26135.json
Normal file
35
2022/CVE-2022-26135.json
Normal file
|
@ -0,0 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 506925900,
|
||||
"name": "jira-mobile-ssrf-exploit",
|
||||
"full_name": "assetnote\/jira-mobile-ssrf-exploit",
|
||||
"owner": {
|
||||
"login": "assetnote",
|
||||
"id": 35264812,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35264812?v=4",
|
||||
"html_url": "https:\/\/github.com\/assetnote"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/assetnote\/jira-mobile-ssrf-exploit",
|
||||
"description": "Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-24T07:55:52Z",
|
||||
"updated_at": "2022-07-06T00:04:55Z",
|
||||
"pushed_at": "2022-07-05T21:13:44Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-26135",
|
||||
"exploit",
|
||||
"jira",
|
||||
"ssrf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:15:29Z",
|
||||
"updated_at": "2022-07-05T12:26:08Z",
|
||||
"updated_at": "2022-07-05T19:33:59Z",
|
||||
"pushed_at": "2022-07-02T06:15:40Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:16:33Z",
|
||||
"updated_at": "2022-07-05T15:23:58Z",
|
||||
"updated_at": "2022-07-05T19:48:53Z",
|
||||
"pushed_at": "2022-07-02T17:14:41Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 41,
|
||||
"forks": 3,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,5 +26,33 @@
|
|||
"forks": 8,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 509605278,
|
||||
"name": "manageengine-auditad-cve-2022-28219",
|
||||
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
|
||||
"owner": {
|
||||
"login": "rbowes-r7",
|
||||
"id": 104588115,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
|
||||
"html_url": "https:\/\/github.com\/rbowes-r7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T22:40:46Z",
|
||||
"updated_at": "2022-07-05T22:09:09Z",
|
||||
"pushed_at": "2022-07-05T22:13:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -522,10 +522,10 @@
|
|||
"description": "CVE-2022-29464 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T08:27:04Z",
|
||||
"updated_at": "2022-07-05T17:45:17Z",
|
||||
"updated_at": "2022-07-05T21:21:15Z",
|
||||
"pushed_at": "2022-07-05T08:58:58Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -533,7 +533,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -220,6 +220,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
|
||||
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
|
||||
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
|
||||
|
||||
### CVE-2022-0848 (2022-03-04)
|
||||
|
||||
|
@ -544,6 +545,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
|
|||
- [marschall/psychic-signatures](https://github.com/marschall/psychic-signatures)
|
||||
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
|
||||
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
|
||||
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
|
||||
|
||||
### CVE-2022-21658 (2022-01-20)
|
||||
|
||||
|
@ -1688,6 +1690,14 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
|
||||
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
|
||||
|
||||
### CVE-2022-26135 (2022-06-30)
|
||||
|
||||
<code>
|
||||
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
|
||||
</code>
|
||||
|
||||
- [assetnote/jira-mobile-ssrf-exploit](https://github.com/assetnote/jira-mobile-ssrf-exploit)
|
||||
|
||||
### CVE-2022-26155 (2022-02-28)
|
||||
|
||||
<code>
|
||||
|
@ -1977,6 +1987,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
|
|||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
|
||||
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
|
||||
|
||||
### CVE-2022-28281
|
||||
- [0vercl0k/CVE-2022-28281](https://github.com/0vercl0k/CVE-2022-28281)
|
||||
|
|
Loading…
Reference in a new issue