mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/08/29 18:18:36
This commit is contained in:
parent
f0fbc812b0
commit
f39fc29d30
43 changed files with 404 additions and 287 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T04:39:32Z",
|
||||
"updated_at": "2022-06-22T14:03:31Z",
|
||||
"updated_at": "2022-08-29T13:26:40Z",
|
||||
"pushed_at": "2021-11-18T11:07:54Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2022-07-27T07:08:53Z",
|
||||
"updated_at": "2022-08-29T13:11:56Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 711,
|
||||
"watchers_count": 711,
|
||||
"stargazers_count": 712,
|
||||
"watchers_count": 712,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 711,
|
||||
"watchers": 712,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -136,13 +136,13 @@
|
|||
"pushed_at": "2020-05-21T03:59:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2364,13 +2364,13 @@
|
|||
"pushed_at": "2019-08-19T02:52:11Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 59,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"forks": 60,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -118,7 +118,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-03-08T11:34:11Z",
|
||||
"updated_at": "2022-08-23T23:40:06Z",
|
||||
"pushed_at": "2022-08-29T06:19:11Z",
|
||||
"pushed_at": "2022-08-29T16:26:45Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 27,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2022-06-22T18:36:44Z",
|
||||
"updated_at": "2022-08-29T14:57:59Z",
|
||||
"pushed_at": "2021-03-19T17:23:25Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,10 +243,10 @@
|
|||
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T08:02:15Z",
|
||||
"updated_at": "2022-03-07T21:13:41Z",
|
||||
"updated_at": "2022-08-29T14:52:46Z",
|
||||
"pushed_at": "2019-10-23T08:25:48Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -254,7 +254,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2022-08-23T13:22:52Z",
|
||||
"updated_at": "2022-08-29T13:14:23Z",
|
||||
"pushed_at": "2022-01-05T04:09:42Z",
|
||||
"stargazers_count": 593,
|
||||
"watchers_count": 593,
|
||||
|
|
|
@ -1638,10 +1638,10 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2022-08-21T10:15:45Z",
|
||||
"updated_at": "2022-08-29T16:07:53Z",
|
||||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1649,7 +1649,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1867,10 +1867,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T02:35:34Z",
|
||||
"updated_at": "2020-12-25T09:08:30Z",
|
||||
"updated_at": "2022-08-29T17:16:37Z",
|
||||
"pushed_at": "2020-12-25T09:08:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1878,7 +1878,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2240,10 +2240,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-08T07:52:26Z",
|
||||
"updated_at": "2022-06-08T08:29:19Z",
|
||||
"updated_at": "2022-08-29T17:16:35Z",
|
||||
"pushed_at": "2022-06-10T13:48:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2251,7 +2251,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -233,13 +233,13 @@
|
|||
"pushed_at": "2020-07-17T13:07:29Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 51,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"forks": 52,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -285,10 +285,10 @@
|
|||
"description": "CVE-2020-1350 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T05:41:19Z",
|
||||
"updated_at": "2022-03-16T16:44:01Z",
|
||||
"updated_at": "2022-08-29T16:44:17Z",
|
||||
"pushed_at": "2020-07-27T16:20:06Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -296,7 +296,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,18 +41,18 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-08-26T21:23:19Z",
|
||||
"updated_at": "2022-08-29T16:47:07Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1492,
|
||||
"watchers_count": 1492,
|
||||
"forks_count": 341,
|
||||
"stargazers_count": 1493,
|
||||
"watchers_count": 1493,
|
||||
"forks_count": 342,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 341,
|
||||
"watchers": 1492,
|
||||
"forks": 342,
|
||||
"watchers": 1493,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -97,18 +97,18 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-08-20T15:11:40Z",
|
||||
"updated_at": "2022-08-29T16:46:57Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 947,
|
||||
"watchers_count": 947,
|
||||
"forks_count": 262,
|
||||
"stargazers_count": 948,
|
||||
"watchers_count": 948,
|
||||
"forks_count": 263,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 947,
|
||||
"forks": 263,
|
||||
"watchers": 948,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -160,10 +160,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2022-08-28T17:01:38Z",
|
||||
"updated_at": "2022-08-29T13:46:57Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"stargazers_count": 460,
|
||||
"watchers_count": 460,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -171,7 +171,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 459,
|
||||
"watchers": 460,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -188,10 +188,10 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2022-08-23T19:47:40Z",
|
||||
"updated_at": "2022-08-29T15:49:42Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1661,10 +1661,10 @@
|
|||
"description": "ZeroLogon exploitation script,One-click recovery of domain controller machine Hash",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-26T09:06:04Z",
|
||||
"updated_at": "2022-08-29T03:07:56Z",
|
||||
"updated_at": "2022-08-29T13:40:45Z",
|
||||
"pushed_at": "2022-08-27T04:33:43Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1675,7 +1675,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -313,10 +313,10 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2022-08-27T14:33:02Z",
|
||||
"updated_at": "2022-08-29T14:58:49Z",
|
||||
"pushed_at": "2022-03-29T02:08:45Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -324,7 +324,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -26,5 +26,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 530258491,
|
||||
"name": "CVE-2020-9715",
|
||||
"full_name": "WonjunChun\/CVE-2020-9715",
|
||||
"owner": {
|
||||
"login": "WonjunChun",
|
||||
"id": 40604592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40604592?v=4",
|
||||
"html_url": "https:\/\/github.com\/WonjunChun"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WonjunChun\/CVE-2020-9715",
|
||||
"description": "Adobe Acrobat Reader UAF vulnerability Exploit code",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-29T14:33:40Z",
|
||||
"updated_at": "2022-08-29T14:33:40Z",
|
||||
"pushed_at": "2022-08-29T14:33:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2022-08-24T21:07:58Z",
|
||||
"updated_at": "2022-08-29T15:28:10Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1597,
|
||||
"watchers_count": 1597,
|
||||
"stargazers_count": 1598,
|
||||
"watchers_count": 1598,
|
||||
"forks_count": 575,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 575,
|
||||
"watchers": 1597,
|
||||
"watchers": 1598,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,10 +86,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2022-08-23T11:12:37Z",
|
||||
"updated_at": "2022-08-29T15:03:49Z",
|
||||
"pushed_at": "2021-12-30T12:26:11Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"forks_count": 140,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -99,7 +99,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 140,
|
||||
"watchers": 401,
|
||||
"watchers": 402,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -144,10 +144,10 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2022-08-27T15:50:38Z",
|
||||
"updated_at": "2022-08-29T15:04:35Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -155,7 +155,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 196,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -69,10 +69,10 @@
|
|||
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-11T04:34:07Z",
|
||||
"updated_at": "2022-08-15T15:41:33Z",
|
||||
"updated_at": "2022-08-29T12:45:33Z",
|
||||
"pushed_at": "2022-01-16T15:54:14Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -87,7 +87,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 150,
|
||||
"watchers": 149,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-22555 exploit rewritten with pipe primitive",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-05T06:35:25Z",
|
||||
"updated_at": "2022-07-25T15:33:23Z",
|
||||
"updated_at": "2022-08-29T15:47:11Z",
|
||||
"pushed_at": "2022-05-18T03:10:10Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2021/CVE-2021-25801.json
Normal file
30
2021/CVE-2021-25801.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 484198736,
|
||||
"name": "VLC_CVE-2021-25801_Analysis",
|
||||
"full_name": "DShankle\/VLC_CVE-2021-25801_Analysis",
|
||||
"owner": {
|
||||
"login": "DShankle",
|
||||
"id": 44985044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
|
||||
"html_url": "https:\/\/github.com\/DShankle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DShankle\/VLC_CVE-2021-25801_Analysis",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-21T20:41:18Z",
|
||||
"updated_at": "2022-08-29T17:16:48Z",
|
||||
"pushed_at": "2022-04-21T21:09:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2021/CVE-2021-25804.json
Normal file
30
2021/CVE-2021-25804.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 495571729,
|
||||
"name": "VLC_CVE-2021-25804_Analysis",
|
||||
"full_name": "DShankle\/VLC_CVE-2021-25804_Analysis",
|
||||
"owner": {
|
||||
"login": "DShankle",
|
||||
"id": 44985044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
|
||||
"html_url": "https:\/\/github.com\/DShankle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DShankle\/VLC_CVE-2021-25804_Analysis",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-23T20:58:56Z",
|
||||
"updated_at": "2022-08-29T17:19:40Z",
|
||||
"pushed_at": "2022-08-29T17:48:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,10 @@
|
|||
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T20:20:45Z",
|
||||
"updated_at": "2022-08-29T06:55:25Z",
|
||||
"updated_at": "2022-08-29T16:46:37Z",
|
||||
"pushed_at": "2022-08-26T12:13:22Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +80,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 43,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,33 @@
|
|||
"forks": 4,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 530277219,
|
||||
"name": "Simple-CVE-2021-36260",
|
||||
"full_name": "TakenoSite\/Simple-CVE-2021-36260",
|
||||
"owner": {
|
||||
"login": "TakenoSite",
|
||||
"id": 84880497,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84880497?v=4",
|
||||
"html_url": "https:\/\/github.com\/TakenoSite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TakenoSite\/Simple-CVE-2021-36260",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-29T15:21:11Z",
|
||||
"updated_at": "2022-08-29T15:34:05Z",
|
||||
"pushed_at": "2022-08-29T16:49:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1856,10 +1856,10 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-08-28T08:43:25Z",
|
||||
"updated_at": "2022-08-29T13:58:13Z",
|
||||
"pushed_at": "2022-04-19T12:33:32Z",
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1867,7 +1867,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 307,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache forward request CVE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-03T15:24:24Z",
|
||||
"updated_at": "2022-08-05T15:05:41Z",
|
||||
"updated_at": "2022-08-29T18:18:59Z",
|
||||
"pushed_at": "2022-04-03T18:34:35Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-4154 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T05:46:27Z",
|
||||
"updated_at": "2022-08-27T06:02:03Z",
|
||||
"updated_at": "2022-08-29T12:39:01Z",
|
||||
"pushed_at": "2022-08-11T06:00:10Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2022-08-29T06:27:08Z",
|
||||
"updated_at": "2022-08-29T17:01:41Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1132,
|
||||
"watchers_count": 1132,
|
||||
"stargazers_count": 1134,
|
||||
"watchers_count": 1134,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1132,
|
||||
"watchers": 1134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "grafana CVE-2021-43798任意文件读取漏洞POC,采用多插件轮训检测的方法,允许指定单URL和从文件中读取URL",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-08T03:43:31Z",
|
||||
"updated_at": "2022-06-10T09:19:43Z",
|
||||
"updated_at": "2022-08-29T13:52:48Z",
|
||||
"pushed_at": "2022-01-27T08:35:29Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
|
|
|
@ -454,10 +454,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-08-28T16:47:43Z",
|
||||
"updated_at": "2022-08-29T13:00:39Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1459,
|
||||
"watchers_count": 1459,
|
||||
"stargazers_count": 1460,
|
||||
"watchers_count": 1460,
|
||||
"forks_count": 407,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -470,7 +470,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 407,
|
||||
"watchers": 1459,
|
||||
"watchers": 1460,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1584,34 +1584,6 @@
|
|||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437721429,
|
||||
"name": "log4j-nullroute",
|
||||
"full_name": "0xRyan\/log4j-nullroute",
|
||||
"owner": {
|
||||
"login": "0xRyan",
|
||||
"id": 87556614,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87556614?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xRyan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xRyan\/log4j-nullroute",
|
||||
"description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:15:42Z",
|
||||
"updated_at": "2022-01-27T18:05:54Z",
|
||||
"pushed_at": "2021-12-14T23:03:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437729534,
|
||||
"name": "CVE-2021-44228",
|
||||
|
@ -2009,34 +1981,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437917354,
|
||||
"name": "Fix-CVE-2021-44228",
|
||||
"full_name": "AlexandreHeroux\/Fix-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "AlexandreHeroux",
|
||||
"id": 28022186,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28022186?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlexandreHeroux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlexandreHeroux\/Fix-CVE-2021-44228",
|
||||
"description": "Apply class remove process from ear\/war\/jar\/zip archive, see https:\/\/logging.apache.org\/log4j\/2.x\/",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T15:04:31Z",
|
||||
"updated_at": "2022-01-14T22:38:29Z",
|
||||
"pushed_at": "2021-12-15T02:02:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437919806,
|
||||
"name": "log4j-CVE-2021-44228-test",
|
||||
|
@ -2927,36 +2871,6 @@
|
|||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438423480,
|
||||
"name": "CVE-2021-44228",
|
||||
"full_name": "0xThiebaut\/CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "0xThiebaut",
|
||||
"id": 46688461,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46688461?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xThiebaut"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xThiebaut\/CVE-2021-44228",
|
||||
"description": "CVE-2021-44228 Response Scripts",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:50:05Z",
|
||||
"updated_at": "2021-12-15T00:30:22Z",
|
||||
"pushed_at": "2021-12-15T00:27:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-44228"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438432868,
|
||||
"name": "CVE-2021-44228_scanner",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T10:47:04Z",
|
||||
"updated_at": "2022-08-29T11:00:02Z",
|
||||
"updated_at": "2022-08-29T15:13:30Z",
|
||||
"pushed_at": "2022-05-25T13:43:16Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1410,6 +1410,34 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470139953,
|
||||
"name": "CVE-2022-0847-DirtyPipe-Container-Breakout",
|
||||
"full_name": "jpts\/CVE-2022-0847-DirtyPipe-Container-Breakout",
|
||||
"owner": {
|
||||
"login": "jpts",
|
||||
"id": 5352661,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5352661?v=4",
|
||||
"html_url": "https:\/\/github.com\/jpts"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jpts\/CVE-2022-0847-DirtyPipe-Container-Breakout",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T12:00:17Z",
|
||||
"updated_at": "2022-08-29T12:54:21Z",
|
||||
"pushed_at": "2022-04-20T22:07:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 470957000,
|
||||
"name": "CVE-2022-0847_DirtyPipe_Exploits",
|
||||
|
|
|
@ -237,10 +237,10 @@
|
|||
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T10:34:38Z",
|
||||
"updated_at": "2022-08-29T11:40:22Z",
|
||||
"updated_at": "2022-08-29T16:57:28Z",
|
||||
"pushed_at": "2022-05-16T12:40:51Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -248,7 +248,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 67,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -321,10 +321,10 @@
|
|||
"description": "POC for CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T11:46:45Z",
|
||||
"updated_at": "2022-08-17T14:28:13Z",
|
||||
"updated_at": "2022-08-29T14:20:43Z",
|
||||
"pushed_at": "2022-05-09T20:52:07Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -332,7 +332,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T03:01:30Z",
|
||||
"updated_at": "2022-08-27T13:13:18Z",
|
||||
"updated_at": "2022-08-29T17:57:51Z",
|
||||
"pushed_at": "2022-08-26T00:48:33Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 22,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 79,
|
||||
"forks": 23,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -180,7 +180,7 @@
|
|||
"description": "CVE-2022-21907 Vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-23T14:25:12Z",
|
||||
"updated_at": "2022-08-29T06:57:02Z",
|
||||
"updated_at": "2022-08-29T13:38:12Z",
|
||||
"pushed_at": "2022-01-23T14:28:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-08-25T07:50:03Z",
|
||||
"updated_at": "2022-08-29T16:45:47Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2022/CVE-2022-22814.json
Normal file
30
2022/CVE-2022-22814.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 496813493,
|
||||
"name": "CVE-2022-22814_PoC",
|
||||
"full_name": "DShankle\/CVE-2022-22814_PoC",
|
||||
"owner": {
|
||||
"login": "DShankle",
|
||||
"id": 44985044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
|
||||
"html_url": "https:\/\/github.com\/DShankle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DShankle\/CVE-2022-22814_PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-27T00:33:39Z",
|
||||
"updated_at": "2022-08-29T17:18:20Z",
|
||||
"pushed_at": "2022-08-16T20:20:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2022-08-25T08:29:23Z",
|
||||
"updated_at": "2022-08-29T15:05:17Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1864,14 +1864,14 @@
|
|||
{
|
||||
"id": 519718211,
|
||||
"name": "CVE-2022-22965",
|
||||
"full_name": "iyamrotrix\/CVE-2022-22965",
|
||||
"full_name": "iyamroshan\/CVE-2022-22965",
|
||||
"owner": {
|
||||
"login": "iyamrotrix",
|
||||
"login": "iyamroshan",
|
||||
"id": 109761382,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109761382?v=4",
|
||||
"html_url": "https:\/\/github.com\/iyamrotrix"
|
||||
"html_url": "https:\/\/github.com\/iyamroshan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iyamrotrix\/CVE-2022-22965",
|
||||
"html_url": "https:\/\/github.com\/iyamroshan\/CVE-2022-22965",
|
||||
"description": "Exploit for SpringShell.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-31T08:21:59Z",
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 529972571,
|
||||
"name": "cve-2022-24637_open-web-analytics-info-disclosure-to-rce",
|
||||
"full_name": "watchdog2000\/cve-2022-24637_open-web-analytics-info-disclosure-to-rce",
|
||||
"owner": {
|
||||
"login": "watchdog2000",
|
||||
"id": 63520692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63520692?v=4",
|
||||
"html_url": "https:\/\/github.com\/watchdog2000"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/watchdog2000\/cve-2022-24637_open-web-analytics-info-disclosure-to-rce",
|
||||
"description": "Based on https:\/\/devel0pment.de\/?p=2494",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-28T20:30:24Z",
|
||||
"updated_at": "2022-08-29T06:44:04Z",
|
||||
"pushed_at": "2022-08-28T20:39:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-08-19T02:37:36Z",
|
||||
"updated_at": "2022-08-29T14:13:38Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 396,
|
||||
"watchers": 397,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2022-08-28T11:04:21Z",
|
||||
"updated_at": "2022-08-29T15:41:40Z",
|
||||
"pushed_at": "2022-08-11T06:04:18Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2022-08-29T08:43:28Z",
|
||||
"pushed_at": "2022-08-24T15:46:31Z",
|
||||
"updated_at": "2022-08-29T16:30:40Z",
|
||||
"pushed_at": "2022-08-29T12:54:56Z",
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"forks_count": 130,
|
||||
|
|
30
2022/CVE-2022-28381.json
Normal file
30
2022/CVE-2022-28381.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 528577166,
|
||||
"name": "CVE-2022-28381_PoC",
|
||||
"full_name": "DShankle\/CVE-2022-28381_PoC",
|
||||
"owner": {
|
||||
"login": "DShankle",
|
||||
"id": 44985044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44985044?v=4",
|
||||
"html_url": "https:\/\/github.com\/DShankle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DShankle\/CVE-2022-28381_PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-24T20:04:58Z",
|
||||
"updated_at": "2022-08-29T17:20:43Z",
|
||||
"pushed_at": "2022-08-24T20:05:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -153,10 +153,10 @@
|
|||
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T09:52:02Z",
|
||||
"updated_at": "2022-08-29T07:25:23Z",
|
||||
"updated_at": "2022-08-29T16:27:09Z",
|
||||
"pushed_at": "2022-08-13T08:14:07Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-08-18T18:41:13Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -42,7 +42,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-08-25T10:43:13Z",
|
||||
"updated_at": "2022-08-27T17:13:41Z",
|
||||
"pushed_at": "2022-08-25T10:56:45Z",
|
||||
"pushed_at": "2022-08-29T16:56:10Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 5,
|
||||
|
|
55
README.md
55
README.md
|
@ -214,6 +214,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847)
|
||||
- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker)
|
||||
- [jpts/CVE-2022-0847-DirtyPipe-Container-Breakout](https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-Breakout)
|
||||
- [logm1lo/CVE-2022-0847_DirtyPipe_Exploits](https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits)
|
||||
- [LudovicPatho/CVE-2022-0847_dirty-pipe](https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe)
|
||||
- [DanaEpp/pwncat_dirtypipe](https://github.com/DanaEpp/pwncat_dirtypipe)
|
||||
|
@ -917,6 +918,14 @@ Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is uniqu
|
|||
|
||||
- [ahmetfurkans/CVE-2022-22718](https://github.com/ahmetfurkans/CVE-2022-22718)
|
||||
|
||||
### CVE-2022-22814 (2022-03-10)
|
||||
|
||||
<code>
|
||||
The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.
|
||||
</code>
|
||||
|
||||
- [DShankle/CVE-2022-22814_PoC](https://github.com/DShankle/CVE-2022-22814_PoC)
|
||||
|
||||
### CVE-2022-22822 (2022-01-07)
|
||||
|
||||
<code>
|
||||
|
@ -1173,7 +1182,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
|
|||
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
|
||||
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
|
||||
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
|
||||
- [iyamrotrix/CVE-2022-22965](https://github.com/iyamrotrix/CVE-2022-22965)
|
||||
- [iyamroshan/CVE-2022-22965](https://github.com/iyamroshan/CVE-2022-22965)
|
||||
|
||||
### CVE-2022-22968 (2022-04-14)
|
||||
|
||||
|
@ -1550,14 +1559,6 @@ Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Sili
|
|||
|
||||
- [ITSecLab-HSEL/CVE-2022-24611](https://github.com/ITSecLab-HSEL/CVE-2022-24611)
|
||||
|
||||
### CVE-2022-24637 (2022-03-18)
|
||||
|
||||
<code>
|
||||
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
|
||||
</code>
|
||||
|
||||
- [watchdog2000/cve-2022-24637_open-web-analytics-info-disclosure-to-rce](https://github.com/watchdog2000/cve-2022-24637_open-web-analytics-info-disclosure-to-rce)
|
||||
|
||||
### CVE-2022-24644 (2022-03-07)
|
||||
|
||||
<code>
|
||||
|
@ -2302,6 +2303,14 @@ An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0
|
|||
- [ahsentekdemir/CVE-2022-28346](https://github.com/ahsentekdemir/CVE-2022-28346)
|
||||
- [pthlong9991/CVE-2022-28346](https://github.com/pthlong9991/CVE-2022-28346)
|
||||
|
||||
### CVE-2022-28381 (2022-04-03)
|
||||
|
||||
<code>
|
||||
Mediaserver.exe in ALLMediaServer 1.6 has a stack-based buffer overflow that allows remote attackers to execute arbitrary code via a long string to TCP port 888, a related issue to CVE-2017-17932.
|
||||
</code>
|
||||
|
||||
- [DShankle/CVE-2022-28381_PoC](https://github.com/DShankle/CVE-2022-28381_PoC)
|
||||
|
||||
### CVE-2022-28452 (2022-04-29)
|
||||
|
||||
<code>
|
||||
|
@ -3261,7 +3270,12 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
|
|||
### CVE-2022-36163
|
||||
- [MaherAzzouzi/CVE-2022-36163](https://github.com/MaherAzzouzi/CVE-2022-36163)
|
||||
|
||||
### CVE-2022-36200
|
||||
### CVE-2022-36200 (2022-08-29)
|
||||
|
||||
<code>
|
||||
In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in URL, which can be logged/sniffed.
|
||||
</code>
|
||||
|
||||
- [afaq1337/CVE-2022-36200](https://github.com/afaq1337/CVE-2022-36200)
|
||||
|
||||
### CVE-2022-36271
|
||||
|
@ -5217,6 +5231,22 @@ A security issue was discovered in Kubernetes where a user may be able to create
|
|||
|
||||
- [Betep0k/CVE-2021-25741](https://github.com/Betep0k/CVE-2021-25741)
|
||||
|
||||
### CVE-2021-25801 (2021-07-26)
|
||||
|
||||
<code>
|
||||
A buffer overflow vulnerability in the __Parse_indx component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file.
|
||||
</code>
|
||||
|
||||
- [DShankle/VLC_CVE-2021-25801_Analysis](https://github.com/DShankle/VLC_CVE-2021-25801_Analysis)
|
||||
|
||||
### CVE-2021-25804 (2021-07-26)
|
||||
|
||||
<code>
|
||||
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Player 3.0.11 can a denial of service (DOS) in the application.
|
||||
</code>
|
||||
|
||||
- [DShankle/VLC_CVE-2021-25804_Analysis](https://github.com/DShankle/VLC_CVE-2021-25804_Analysis)
|
||||
|
||||
### CVE-2021-25837 (2021-02-08)
|
||||
|
||||
<code>
|
||||
|
@ -6298,6 +6328,7 @@ A command injection vulnerability in the web server of some Hikvision product. D
|
|||
</code>
|
||||
|
||||
- [Cuerz/CVE-2021-36260](https://github.com/Cuerz/CVE-2021-36260)
|
||||
- [TakenoSite/Simple-CVE-2021-36260](https://github.com/TakenoSite/Simple-CVE-2021-36260)
|
||||
|
||||
### CVE-2021-36460 (2022-04-25)
|
||||
|
||||
|
@ -7298,7 +7329,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
|
||||
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
|
||||
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
|
||||
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
|
||||
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
|
||||
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
|
||||
- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
|
||||
|
@ -7313,7 +7343,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell)
|
||||
- [manuel-alvarez-alvarez/log4j-cve-2021-44228](https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228)
|
||||
- [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher)
|
||||
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
|
||||
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
|
||||
- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
|
||||
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
|
||||
|
@ -7342,7 +7371,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE)
|
||||
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
|
||||
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
|
||||
- [0xThiebaut/CVE-2021-44228](https://github.com/0xThiebaut/CVE-2021-44228)
|
||||
- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner)
|
||||
- [dbzoo/log4j_scanner](https://github.com/dbzoo/log4j_scanner)
|
||||
- [jeremyrsellars/CVE-2021-44228_scanner](https://github.com/jeremyrsellars/CVE-2021-44228_scanner)
|
||||
|
@ -10447,6 +10475,7 @@ Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 20
|
|||
</code>
|
||||
|
||||
- [lsw29475/CVE-2020-9715](https://github.com/lsw29475/CVE-2020-9715)
|
||||
- [WonjunChun/CVE-2020-9715](https://github.com/WonjunChun/CVE-2020-9715)
|
||||
|
||||
### CVE-2020-9758 (2020-03-09)
|
||||
|
||||
|
|
Loading…
Reference in a new issue