mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/04/30 06:19:35
This commit is contained in:
parent
7a04c0daac
commit
f57eed988f
23 changed files with 331 additions and 206 deletions
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox <v62.0.3)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-10T11:59:15Z",
|
||||
"updated_at": "2020-04-13T16:37:36Z",
|
||||
"updated_at": "2022-04-30T02:11:11Z",
|
||||
"pushed_at": "2020-04-10T12:15:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2020/CVE-2020-0418.json
Normal file
29
2020/CVE-2020-0418.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 487198514,
|
||||
"name": "packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418",
|
||||
"full_name": "Trinadh465\/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T06:16:17Z",
|
||||
"updated_at": "2022-04-30T06:16:17Z",
|
||||
"pushed_at": "2022-04-30T06:16:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T09:56:19Z",
|
||||
"updated_at": "2022-04-22T05:41:25Z",
|
||||
"updated_at": "2022-04-30T04:10:26Z",
|
||||
"pushed_at": "2020-02-28T07:08:16Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -283,17 +283,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T17:24:45Z",
|
||||
"updated_at": "2021-12-05T20:48:05Z",
|
||||
"updated_at": "2022-04-30T04:24:30Z",
|
||||
"pushed_at": "2020-02-25T08:55:09Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-0511.json
Normal file
29
2021/CVE-2021-0511.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 487194778,
|
||||
"name": "platform_art_AOSP10_r33_CVE-2021-0511",
|
||||
"full_name": "Trinadh465\/platform_art_AOSP10_r33_CVE-2021-0511",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/platform_art_AOSP10_r33_CVE-2021-0511",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T05:54:11Z",
|
||||
"updated_at": "2022-04-30T05:57:05Z",
|
||||
"pushed_at": "2022-04-30T05:58:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -98,7 +98,7 @@
|
|||
"pushed_at": "2021-11-16T17:34:11Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -118,7 +118,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
29
2021/CVE-2021-22924.json
Normal file
29
2021/CVE-2021-22924.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 487173629,
|
||||
"name": "external_curl_AOSP10_r33_CVE-2021-22924",
|
||||
"full_name": "Trinadh465\/external_curl_AOSP10_r33_CVE-2021-22924",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/external_curl_AOSP10_r33_CVE-2021-22924",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T03:40:15Z",
|
||||
"updated_at": "2022-04-30T03:42:14Z",
|
||||
"pushed_at": "2022-04-30T03:42:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -272,17 +272,17 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2022-04-20T05:49:56Z",
|
||||
"updated_at": "2022-04-30T02:12:41Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -503,17 +503,17 @@
|
|||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2022-04-11T08:30:39Z",
|
||||
"updated_at": "2022-04-30T02:05:47Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 33,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 55,
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -30,46 +30,6 @@
|
|||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436588547,
|
||||
"name": "CVE-2021-27928-POC",
|
||||
"full_name": "shamo0\/CVE-2021-27928-POC",
|
||||
"owner": {
|
||||
"login": "shamo0",
|
||||
"id": 48299520,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
|
||||
"html_url": "https:\/\/github.com\/shamo0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shamo0\/CVE-2021-27928-POC",
|
||||
"description": "CVE-2021-27928-POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T11:18:26Z",
|
||||
"updated_at": "2021-12-11T07:44:46Z",
|
||||
"pushed_at": "2021-12-09T12:05:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"2021",
|
||||
"27928",
|
||||
"cve",
|
||||
"escalation",
|
||||
"mariadb",
|
||||
"mysql",
|
||||
"privilege",
|
||||
"provider",
|
||||
"root",
|
||||
"shell",
|
||||
"sql",
|
||||
"wsrep"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 475258147,
|
||||
"name": "CVE-2021-27928",
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T12:41:03Z",
|
||||
"updated_at": "2022-04-22T17:44:52Z",
|
||||
"updated_at": "2022-04-30T03:12:47Z",
|
||||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 41,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 238,
|
||||
"forks": 42,
|
||||
"watchers": 239,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 436831581,
|
||||
"name": "Mass_CVE-2021-39316",
|
||||
"full_name": "anggoroexe\/Mass_CVE-2021-39316",
|
||||
"owner": {
|
||||
"login": "anggoroexe",
|
||||
"id": 75475767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75475767?v=4",
|
||||
"html_url": "https:\/\/github.com\/anggoroexe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/anggoroexe\/Mass_CVE-2021-39316",
|
||||
"description": "i made this with love .",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T02:56:46Z",
|
||||
"updated_at": "2021-12-23T02:16:37Z",
|
||||
"pushed_at": "2021-12-10T03:09:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-04-29T18:23:27Z",
|
||||
"updated_at": "2022-04-30T03:30:28Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1500,
|
||||
"watchers_count": 1500,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 440,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 440,
|
||||
"watchers": 1500,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -192,33 +192,6 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436571000,
|
||||
"name": "CVE-2021-43798",
|
||||
"full_name": "julesbozouklian\/CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "julesbozouklian",
|
||||
"id": 26013529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26013529?v=4",
|
||||
"html_url": "https:\/\/github.com\/julesbozouklian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julesbozouklian\/CVE-2021-43798",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T10:17:57Z",
|
||||
"updated_at": "2021-12-09T12:34:45Z",
|
||||
"pushed_at": "2021-12-09T12:34:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436590562,
|
||||
"name": "Grafana-CVE-2021-43798Exp",
|
||||
|
|
|
@ -80,33 +80,6 @@
|
|||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436848055,
|
||||
"name": "LogJackFix",
|
||||
"full_name": "UltraVanilla\/LogJackFix",
|
||||
"owner": {
|
||||
"login": "UltraVanilla",
|
||||
"id": 73727575,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73727575?v=4",
|
||||
"html_url": "https:\/\/github.com\/UltraVanilla"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/UltraVanilla\/LogJackFix",
|
||||
"description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T04:20:03Z",
|
||||
"updated_at": "2021-12-10T05:11:17Z",
|
||||
"pushed_at": "2021-12-10T04:20:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436860437,
|
||||
"name": "Log4j2-CVE-2021-44228",
|
||||
|
@ -3154,17 +3127,17 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2022-04-27T13:34:53Z",
|
||||
"updated_at": "2022-04-30T05:16:05Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 328,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3469,12 +3442,12 @@
|
|||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2842,
|
||||
"watchers_count": 2842,
|
||||
"forks_count": 693,
|
||||
"forks_count": 694,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 693,
|
||||
"forks": 694,
|
||||
"watchers": 2842,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -9581,6 +9554,33 @@
|
|||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 442533490,
|
||||
"name": "LogJackFix",
|
||||
"full_name": "PoneyClairDeLune\/LogJackFix",
|
||||
"owner": {
|
||||
"login": "PoneyClairDeLune",
|
||||
"id": 88174309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88174309?v=4",
|
||||
"html_url": "https:\/\/github.com\/PoneyClairDeLune"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PoneyClairDeLune\/LogJackFix",
|
||||
"description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T17:18:13Z",
|
||||
"updated_at": "2021-12-28T17:26:16Z",
|
||||
"pushed_at": "2021-12-28T17:26:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 442846791,
|
||||
"name": "log4j-exploit-builder",
|
||||
|
@ -10806,5 +10806,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 487163916,
|
||||
"name": "Writing-Sample-1",
|
||||
"full_name": "TPower2112\/Writing-Sample-1",
|
||||
"owner": {
|
||||
"login": "TPower2112",
|
||||
"id": 20917633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20917633?v=4",
|
||||
"html_url": "https:\/\/github.com\/TPower2112"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TPower2112\/Writing-Sample-1",
|
||||
"description": "CVE-2021-44228 Log4j Summary",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T02:35:38Z",
|
||||
"updated_at": "2022-04-30T04:58:58Z",
|
||||
"pushed_at": "2022-04-30T04:58:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1101,17 +1101,17 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-04-29T11:15:45Z",
|
||||
"updated_at": "2022-04-30T01:04:05Z",
|
||||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-04-24T07:07:52Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -148,17 +148,17 @@
|
|||
"description": "SpringCloudGatewayRCE - CVE-2022-22947 \/ Code By:Tas9er",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-03T19:45:18Z",
|
||||
"updated_at": "2022-04-27T08:51:22Z",
|
||||
"updated_at": "2022-04-30T02:01:48Z",
|
||||
"pushed_at": "2022-03-03T20:44:25Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -424,12 +424,12 @@
|
|||
"pushed_at": "2022-03-08T09:43:50Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -43,17 +43,17 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2022-04-28T22:17:32Z",
|
||||
"updated_at": "2022-04-30T06:08:31Z",
|
||||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2022/CVE-2022-28099.json
Normal file
29
2022/CVE-2022-28099.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 487158568,
|
||||
"name": "CVE-2022-28099",
|
||||
"full_name": "IbrahimEkimIsik\/CVE-2022-28099",
|
||||
"owner": {
|
||||
"login": "IbrahimEkimIsik",
|
||||
"id": 53093499,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53093499?v=4",
|
||||
"html_url": "https:\/\/github.com\/IbrahimEkimIsik"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/IbrahimEkimIsik\/CVE-2022-28099",
|
||||
"description": "SQL injection for Poultry Farm Management System 1.0",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T02:01:09Z",
|
||||
"updated_at": "2022-04-30T02:01:09Z",
|
||||
"pushed_at": "2022-04-30T02:02:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-28452",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T03:03:25Z",
|
||||
"updated_at": "2022-04-29T03:12:09Z",
|
||||
"updated_at": "2022-04-30T02:14:11Z",
|
||||
"pushed_at": "2022-04-29T03:11:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2022/CVE-2022-28508.json
Normal file
29
2022/CVE-2022-28508.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486401731,
|
||||
"name": "CVE-2022-28508",
|
||||
"full_name": "YavuzSahbaz\/CVE-2022-28508",
|
||||
"owner": {
|
||||
"login": "YavuzSahbaz",
|
||||
"id": 101733340,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101733340?v=4",
|
||||
"html_url": "https:\/\/github.com\/YavuzSahbaz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YavuzSahbaz\/CVE-2022-28508",
|
||||
"description": "CVE-2022-28508",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-28T01:10:17Z",
|
||||
"updated_at": "2022-04-30T04:10:28Z",
|
||||
"pushed_at": "2022-04-30T03:15:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-04-29T18:26:14Z",
|
||||
"updated_at": "2022-04-30T02:14:54Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 638,
|
||||
"watchers_count": 638,
|
||||
"forks_count": 103,
|
||||
"stargazers_count": 639,
|
||||
"watchers_count": 639,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 638,
|
||||
"forks": 102,
|
||||
"watchers": 639,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-04-29T17:42:58Z",
|
||||
"updated_at": "2022-04-30T05:38:17Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 256,
|
||||
"watchers": 257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -309,5 +309,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 487181556,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "UUFR\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "UUFR",
|
||||
"id": 47633517,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47633517?v=4",
|
||||
"html_url": "https:\/\/github.com\/UUFR"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/UUFR\/CVE-2022-29464",
|
||||
"description": "CVE-2022-29464",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T04:30:51Z",
|
||||
"updated_at": "2022-04-30T05:38:30Z",
|
||||
"pushed_at": "2022-04-30T05:10:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
44
README.md
44
README.md
|
@ -1262,6 +1262,9 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when
|
|||
|
||||
- [erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated)
|
||||
|
||||
### CVE-2022-28099
|
||||
- [IbrahimEkimIsik/CVE-2022-28099](https://github.com/IbrahimEkimIsik/CVE-2022-28099)
|
||||
|
||||
### CVE-2022-28113 (2022-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -1298,6 +1301,9 @@ Limbas 4.3.36.1319 is vulnerable to Cross Site Scripting (XSS).
|
|||
|
||||
- [YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-](https://github.com/YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-)
|
||||
|
||||
### CVE-2022-28508
|
||||
- [YavuzSahbaz/CVE-2022-28508](https://github.com/YavuzSahbaz/CVE-2022-28508)
|
||||
|
||||
### CVE-2022-29072 (2022-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -1325,6 +1331,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
|
|||
- [k4u5h41/CVE-2022-29464](https://github.com/k4u5h41/CVE-2022-29464)
|
||||
- [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464)
|
||||
- [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464)
|
||||
- [UUFR/CVE-2022-29464](https://github.com/UUFR/CVE-2022-29464)
|
||||
|
||||
### CVE-2022-29548 (2022-04-20)
|
||||
|
||||
|
@ -1683,6 +1690,14 @@ In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due
|
|||
|
||||
- [pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510](https://github.com/pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510)
|
||||
|
||||
### CVE-2021-0511 (2021-06-21)
|
||||
|
||||
<code>
|
||||
In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795
|
||||
</code>
|
||||
|
||||
- [Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511](https://github.com/Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511)
|
||||
|
||||
### CVE-2021-0513 (2021-06-21)
|
||||
|
||||
<code>
|
||||
|
@ -2900,6 +2915,14 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3
|
|||
|
||||
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
|
||||
|
||||
### CVE-2021-22924 (2021-08-05)
|
||||
|
||||
<code>
|
||||
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
|
||||
</code>
|
||||
|
||||
- [Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924](https://github.com/Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924)
|
||||
|
||||
### CVE-2021-22986 (2021-03-31)
|
||||
|
||||
<code>
|
||||
|
@ -3483,7 +3506,6 @@ A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.
|
|||
</code>
|
||||
|
||||
- [Al1ex/CVE-2021-27928](https://github.com/Al1ex/CVE-2021-27928)
|
||||
- [shamo0/CVE-2021-27928-POC](https://github.com/shamo0/CVE-2021-27928-POC)
|
||||
- [GatoGamer1155/CVE-2021-27928](https://github.com/GatoGamer1155/CVE-2021-27928)
|
||||
|
||||
### CVE-2021-27963 (2021-03-04)
|
||||
|
@ -4267,14 +4289,6 @@ Cachet is an open source status page. With Cachet prior to and including 2.3.18,
|
|||
|
||||
- [W0rty/CVE-2021-39165](https://github.com/W0rty/CVE-2021-39165)
|
||||
|
||||
### CVE-2021-39316 (2021-08-31)
|
||||
|
||||
<code>
|
||||
The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
|
||||
</code>
|
||||
|
||||
- [anggoroexe/Mass_CVE-2021-39316](https://github.com/anggoroexe/Mass_CVE-2021-39316)
|
||||
|
||||
### CVE-2021-39623 (2022-01-14)
|
||||
|
||||
<code>
|
||||
|
@ -4829,7 +4843,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
- [JiuBanSec/Grafana-CVE-2021-43798](https://github.com/JiuBanSec/Grafana-CVE-2021-43798)
|
||||
- [MzzdToT/Grafana_fileread](https://github.com/MzzdToT/Grafana_fileread)
|
||||
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
|
||||
- [julesbozouklian/CVE-2021-43798](https://github.com/julesbozouklian/CVE-2021-43798)
|
||||
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
|
||||
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
|
||||
- [pedrohavay/exploit-grafana-CVE-2021-43798](https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798)
|
||||
|
@ -4949,7 +4962,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce)
|
||||
- [Glease/Healer](https://github.com/Glease/Healer)
|
||||
- [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch)
|
||||
- [UltraVanilla/LogJackFix](https://github.com/UltraVanilla/LogJackFix)
|
||||
- [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228)
|
||||
- [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept)
|
||||
- [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2)
|
||||
|
@ -5281,6 +5293,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [yesspider-hacker/log4j-payload-generator](https://github.com/yesspider-hacker/log4j-payload-generator)
|
||||
- [LinkMJB/log4shell_scanner](https://github.com/LinkMJB/log4shell_scanner)
|
||||
- [NS-Sp4ce/Vm4J](https://github.com/NS-Sp4ce/Vm4J)
|
||||
- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix)
|
||||
- [a5tra/log4j-exploit-builder](https://github.com/a5tra/log4j-exploit-builder)
|
||||
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
|
||||
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
|
||||
|
@ -5325,6 +5338,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner)
|
||||
- [ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j)
|
||||
- [digital-dev/Log4j-CVE-2021-44228-Remediation](https://github.com/digital-dev/Log4j-CVE-2021-44228-Remediation)
|
||||
- [TPower2112/Writing-Sample-1](https://github.com/TPower2112/Writing-Sample-1)
|
||||
|
||||
### CVE-2021-44229
|
||||
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
|
||||
|
@ -6041,6 +6055,14 @@ In multiple settings screens, there are possible tapjacking attacks due to an in
|
|||
|
||||
- [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416)
|
||||
|
||||
### CVE-2020-0418 (2020-11-10)
|
||||
|
||||
<code>
|
||||
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813
|
||||
</code>
|
||||
|
||||
- [Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418](https://github.com/Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418)
|
||||
|
||||
### CVE-2020-0421 (2020-10-14)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue