mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/09/15 18:17:21
This commit is contained in:
parent
8e7f7096ef
commit
f7e7f43910
44 changed files with 360 additions and 244 deletions
|
@ -114,19 +114,19 @@
|
|||
{
|
||||
"id": 440387641,
|
||||
"name": "CVE-2006-3392",
|
||||
"full_name": "windsormoreira\/CVE-2006-3392",
|
||||
"full_name": "kernel-cyber\/CVE-2006-3392",
|
||||
"owner": {
|
||||
"login": "windsormoreira",
|
||||
"login": "kernel-cyber",
|
||||
"id": 21226709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
|
||||
"html_url": "https:\/\/github.com\/windsormoreira"
|
||||
"html_url": "https:\/\/github.com\/kernel-cyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2006-3392",
|
||||
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392",
|
||||
"description": "Webmin Local File Include (unauthenticated)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T04:18:21Z",
|
||||
"updated_at": "2021-12-21T04:43:07Z",
|
||||
"pushed_at": "2021-12-21T04:43:04Z",
|
||||
"pushed_at": "2022-09-15T15:49:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -28,5 +28,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 537094385,
|
||||
"name": "CVE-2009-4623",
|
||||
"full_name": "kernel-cyber\/CVE-2009-4623",
|
||||
"owner": {
|
||||
"login": "kernel-cyber",
|
||||
"id": 21226709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
|
||||
"html_url": "https:\/\/github.com\/kernel-cyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2009-4623",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T15:38:30Z",
|
||||
"updated_at": "2022-09-15T15:41:58Z",
|
||||
"pushed_at": "2022-09-15T15:50:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-01-28T20:54:38Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"forks_count": 118,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"forks": 117,
|
||||
"watchers": 291,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 47,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"forks": 48,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2022-08-28T21:27:42Z",
|
||||
"updated_at": "2022-09-15T17:43:47Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"forks_count": 192,
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"forks_count": 193,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,8 +28,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 192,
|
||||
"watchers": 446,
|
||||
"forks": 193,
|
||||
"watchers": 447,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T23:09:40Z",
|
||||
"updated_at": "2022-09-14T11:27:05Z",
|
||||
"updated_at": "2022-09-15T17:48:17Z",
|
||||
"pushed_at": "2022-09-12T01:43:19Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -143,7 +143,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:44:12Z",
|
||||
"updated_at": "2022-07-23T23:37:22Z",
|
||||
"updated_at": "2022-09-15T14:39:30Z",
|
||||
"pushed_at": "2018-03-12T16:50:20Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 78,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"pushed_at": "2017-09-10T05:28:03Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"pushed_at": "2019-05-14T21:51:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 70,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"forks": 71,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-09-15T09:00:33Z",
|
||||
"updated_at": "2022-09-15T14:48:34Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3539,
|
||||
"watchers_count": 3539,
|
||||
"stargazers_count": 3540,
|
||||
"watchers_count": 3540,
|
||||
"forks_count": 1038,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -72,7 +72,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1038,
|
||||
"watchers": 3539,
|
||||
"watchers": 3540,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2022-07-05T12:48:09Z",
|
||||
"updated_at": "2022-09-15T18:06:09Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-09-15T09:00:33Z",
|
||||
"updated_at": "2022-09-15T14:48:34Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3539,
|
||||
"watchers_count": 3539,
|
||||
"stargazers_count": 3540,
|
||||
"watchers_count": 3540,
|
||||
"forks_count": 1038,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1038,
|
||||
"watchers": 3539,
|
||||
"watchers": 3540,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2022-09-15T12:07:14Z",
|
||||
"updated_at": "2022-09-15T13:48:19Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 51,
|
||||
"forks": 6,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE 2021-21315 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T18:52:41Z",
|
||||
"updated_at": "2022-08-14T18:56:52Z",
|
||||
"updated_at": "2022-09-15T14:59:05Z",
|
||||
"pushed_at": "2021-06-09T13:27:20Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2021-05-20T20:33:09Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"forks": 43,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 438682864,
|
||||
"name": "CVE-2021-23758-POC",
|
||||
"full_name": "numanturle\/CVE-2021-23758-POC",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-23758-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T15:40:45Z",
|
||||
"updated_at": "2022-08-29T04:01:32Z",
|
||||
"pushed_at": "2021-12-15T16:37:09Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 438692076,
|
||||
"name": "CVE-2021-2394",
|
||||
"full_name": "fasanhlieu\/CVE-2021-2394",
|
||||
"owner": {
|
||||
"login": "fasanhlieu",
|
||||
"id": 54527046,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54527046?v=4",
|
||||
"html_url": "https:\/\/github.com\/fasanhlieu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fasanhlieu\/CVE-2021-2394",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T16:09:54Z",
|
||||
"updated_at": "2021-12-15T16:09:54Z",
|
||||
"pushed_at": "2021-12-15T16:09:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2022-08-26T07:45:05Z",
|
||||
"updated_at": "2022-09-15T14:43:38Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
|
|
|
@ -926,5 +926,89 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 537018809,
|
||||
"name": "CVE-2021-41773.git1",
|
||||
"full_name": "mightysai1997\/CVE-2021-41773.git1",
|
||||
"owner": {
|
||||
"login": "mightysai1997",
|
||||
"id": 110396758,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
||||
"html_url": "https:\/\/github.com\/mightysai1997"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T12:35:06Z",
|
||||
"updated_at": "2022-09-15T12:35:18Z",
|
||||
"pushed_at": "2022-09-15T12:35:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 537019898,
|
||||
"name": "CVE-2021-41773m",
|
||||
"full_name": "mightysai1997\/CVE-2021-41773m",
|
||||
"owner": {
|
||||
"login": "mightysai1997",
|
||||
"id": 110396758,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
||||
"html_url": "https:\/\/github.com\/mightysai1997"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T12:37:59Z",
|
||||
"updated_at": "2022-09-15T12:38:13Z",
|
||||
"pushed_at": "2022-09-15T12:38:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 537060189,
|
||||
"name": "CVE-2021-41773S",
|
||||
"full_name": "mightysai1997\/CVE-2021-41773S",
|
||||
"owner": {
|
||||
"login": "mightysai1997",
|
||||
"id": 110396758,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
|
||||
"html_url": "https:\/\/github.com\/mightysai1997"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T14:17:45Z",
|
||||
"updated_at": "2022-09-15T14:17:45Z",
|
||||
"pushed_at": "2022-09-15T14:17:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -46,10 +46,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-09-14T12:02:08Z",
|
||||
"updated_at": "2022-09-15T15:25:22Z",
|
||||
"pushed_at": "2022-09-01T21:30:25Z",
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 430,
|
||||
"watchers": 432,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 440389065,
|
||||
"name": "CVE-2021-42913",
|
||||
"full_name": "windsormoreira\/CVE-2021-42913",
|
||||
"full_name": "kernel-cyber\/CVE-2021-42913",
|
||||
"owner": {
|
||||
"login": "windsormoreira",
|
||||
"login": "kernel-cyber",
|
||||
"id": 21226709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
|
||||
"html_url": "https:\/\/github.com\/windsormoreira"
|
||||
"html_url": "https:\/\/github.com\/kernel-cyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2021-42913",
|
||||
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2021-42913",
|
||||
"description": "Samsung Printer SCX-6X55X Improper Access Control",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T04:26:11Z",
|
||||
|
|
|
@ -2840,34 +2840,6 @@
|
|||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438595299,
|
||||
"name": "log4j-CVE-2021-44228",
|
||||
"full_name": "kubearmor\/log4j-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "kubearmor",
|
||||
"id": 86793284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86793284?v=4",
|
||||
"html_url": "https:\/\/github.com\/kubearmor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kubearmor\/log4j-CVE-2021-44228",
|
||||
"description": "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T10:55:35Z",
|
||||
"updated_at": "2022-08-08T14:05:52Z",
|
||||
"pushed_at": "2021-12-15T16:29:14Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 438605924,
|
||||
"name": "log4j-resources",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-08-27T01:29:39Z",
|
||||
"updated_at": "2022-09-15T15:18:15Z",
|
||||
"pushed_at": "2022-07-23T23:14:02Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1135,10 +1135,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-09-10T18:13:33Z",
|
||||
"updated_at": "2022-09-15T17:33:53Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1146,7 +1146,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 315,
|
||||
"watchers": 316,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T03:01:30Z",
|
||||
"updated_at": "2022-09-09T07:56:59Z",
|
||||
"updated_at": "2022-09-15T12:33:24Z",
|
||||
"pushed_at": "2022-09-11T10:21:10Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 116,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22629 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T17:21:27Z",
|
||||
"updated_at": "2022-09-14T13:00:19Z",
|
||||
"updated_at": "2022-09-15T16:38:26Z",
|
||||
"pushed_at": "2022-09-09T21:23:08Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-03T13:13:02Z",
|
||||
"updated_at": "2022-08-12T16:03:21Z",
|
||||
"updated_at": "2022-09-15T12:30:09Z",
|
||||
"pushed_at": "2022-03-03T14:31:32Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -269,16 +269,16 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-12T18:08:58Z",
|
||||
"updated_at": "2022-07-24T22:06:28Z",
|
||||
"pushed_at": "2022-05-23T16:15:14Z",
|
||||
"pushed_at": "2022-09-15T15:50:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -154,7 +154,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-08-28T02:48:05Z",
|
||||
"updated_at": "2022-08-28T02:48:05Z",
|
||||
"pushed_at": "2022-08-28T02:57:23Z",
|
||||
"pushed_at": "2022-09-15T13:06:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-13T17:12:59Z",
|
||||
"updated_at": "2022-05-17T10:39:38Z",
|
||||
"pushed_at": "2022-04-22T16:47:20Z",
|
||||
"pushed_at": "2022-09-15T16:16:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:07:51Z",
|
||||
"updated_at": "2022-08-26T09:46:45Z",
|
||||
"updated_at": "2022-09-15T17:52:12Z",
|
||||
"pushed_at": "2022-05-11T02:02:59Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -719,10 +719,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T09:19:02Z",
|
||||
"updated_at": "2022-09-08T07:41:27Z",
|
||||
"updated_at": "2022-09-15T14:22:09Z",
|
||||
"pushed_at": "2022-06-07T10:35:18Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -730,7 +730,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 217,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-02T06:15:29Z",
|
||||
"updated_at": "2022-09-12T10:49:54Z",
|
||||
"updated_at": "2022-09-15T17:20:03Z",
|
||||
"pushed_at": "2022-07-02T06:15:40Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"forks_count": 107,
|
||||
"forks_count": 106,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"forks": 106,
|
||||
"watchers": 666,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-19T19:38:25Z",
|
||||
"updated_at": "2022-09-02T09:24:47Z",
|
||||
"updated_at": "2022-09-15T14:48:22Z",
|
||||
"pushed_at": "2022-08-09T22:48:37Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-09-06T15:29:24Z",
|
||||
"updated_at": "2022-09-15T17:51:07Z",
|
||||
"pushed_at": "2022-06-05T21:06:13Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -682,10 +682,10 @@
|
|||
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T06:45:19Z",
|
||||
"updated_at": "2022-09-14T05:24:06Z",
|
||||
"updated_at": "2022-09-15T16:04:31Z",
|
||||
"pushed_at": "2022-09-13T10:05:02Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -700,7 +700,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -773,10 +773,10 @@
|
|||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T12:33:18Z",
|
||||
"updated_at": "2022-09-14T03:36:50Z",
|
||||
"updated_at": "2022-09-15T14:21:09Z",
|
||||
"pushed_at": "2022-06-06T07:19:53Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -784,7 +784,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 331,
|
||||
"watchers": 332,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1935,5 +1935,33 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 537107690,
|
||||
"name": "CVE-2022-30190",
|
||||
"full_name": "winstxnhdw\/CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "winstxnhdw",
|
||||
"id": 56998716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56998716?v=4",
|
||||
"html_url": "https:\/\/github.com\/winstxnhdw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
|
||||
"description": "Proof of concept for CVE-2022-30190 (Follina).",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T16:12:57Z",
|
||||
"updated_at": "2022-09-15T16:14:19Z",
|
||||
"pushed_at": "2022-09-15T16:43:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "PoC for CVE-2022–30507",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-16T15:55:28Z",
|
||||
"updated_at": "2022-07-25T15:14:41Z",
|
||||
"updated_at": "2022-09-15T18:00:28Z",
|
||||
"pushed_at": "2022-07-23T22:36:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-24T06:00:47Z",
|
||||
"updated_at": "2022-09-12T19:12:24Z",
|
||||
"updated_at": "2022-09-15T12:39:33Z",
|
||||
"pushed_at": "2022-08-25T03:02:26Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "cve-2022-33891-poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T16:16:51Z",
|
||||
"updated_at": "2022-09-05T13:42:52Z",
|
||||
"updated_at": "2022-09-15T14:53:58Z",
|
||||
"pushed_at": "2022-07-20T08:00:18Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2022/CVE-2022-3506.json
Normal file
30
2022/CVE-2022-3506.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 535111523,
|
||||
"name": "Sekhmet-HackTheBox-Writeup",
|
||||
"full_name": "hackthebox-writeups\/Sekhmet-HackTheBox-Writeup",
|
||||
"owner": {
|
||||
"login": "hackthebox-writeups",
|
||||
"id": 113263298,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113263298?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackthebox-writeups"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackthebox-writeups\/Sekhmet-HackTheBox-Writeup",
|
||||
"description": "Write-up for Sekhmet HackTheBox, CVE-2022-3506, Active Directory Exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-10T20:27:55Z",
|
||||
"updated_at": "2022-09-15T17:26:13Z",
|
||||
"pushed_at": "2022-09-15T17:40:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T20:52:01Z",
|
||||
"updated_at": "2022-09-15T01:41:43Z",
|
||||
"updated_at": "2022-09-15T14:58:36Z",
|
||||
"pushed_at": "2022-09-06T18:26:36Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2022-09-15T12:14:30Z",
|
||||
"updated_at": "2022-09-15T17:59:49Z",
|
||||
"pushed_at": "2022-09-14T07:45:40Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 7,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 74,
|
||||
"forks": 8,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2022/CVE-2022-39841.json
Normal file
30
2022/CVE-2022-39841.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 532900425,
|
||||
"name": "CVE-2022-39841",
|
||||
"full_name": "stealthcopter\/CVE-2022-39841",
|
||||
"owner": {
|
||||
"login": "stealthcopter",
|
||||
"id": 1211162,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1211162?v=4",
|
||||
"html_url": "https:\/\/github.com\/stealthcopter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stealthcopter\/CVE-2022-39841",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T12:54:26Z",
|
||||
"updated_at": "2022-09-15T14:51:04Z",
|
||||
"pushed_at": "2022-09-15T14:50:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
README.md
48
README.md
|
@ -561,6 +561,9 @@ An integer coercion error was found in the openvswitch kernel module. Given a su
|
|||
### CVE-2022-3452
|
||||
- [kenyon-wong/cve-2022-3452](https://github.com/kenyon-wong/cve-2022-3452)
|
||||
|
||||
### CVE-2022-3506
|
||||
- [hackthebox-writeups/Sekhmet-HackTheBox-Writeup](https://github.com/hackthebox-writeups/Sekhmet-HackTheBox-Writeup)
|
||||
|
||||
### CVE-2022-5555
|
||||
- [huihuo123/CVE-2022-5555](https://github.com/huihuo123/CVE-2022-5555)
|
||||
|
||||
|
@ -2814,6 +2817,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
|
|||
- [Gra3s/CVE-2022-30190-Follina-PowerPoint-Version](https://github.com/Gra3s/CVE-2022-30190-Follina-PowerPoint-Version)
|
||||
- [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-)
|
||||
- [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s)
|
||||
- [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190)
|
||||
|
||||
### CVE-2022-30206 (2022-07-12)
|
||||
|
||||
|
@ -3505,7 +3509,12 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
|
|||
|
||||
- [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177)
|
||||
|
||||
### CVE-2022-37201
|
||||
### CVE-2022-37201 (2022-09-15)
|
||||
|
||||
<code>
|
||||
JFinal CMS 5.1.0 is vulnerable to SQL Injection.
|
||||
</code>
|
||||
|
||||
- [AgainstTheLight/CVE-2022-37201](https://github.com/AgainstTheLight/CVE-2022-37201)
|
||||
|
||||
### CVE-2022-37202
|
||||
|
@ -3523,7 +3532,12 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
|
|||
### CVE-2022-37206
|
||||
- [AgainstTheLight/CVE-2022-37206](https://github.com/AgainstTheLight/CVE-2022-37206)
|
||||
|
||||
### CVE-2022-37207
|
||||
### CVE-2022-37207 (2022-09-15)
|
||||
|
||||
<code>
|
||||
JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection
|
||||
</code>
|
||||
|
||||
- [AgainstTheLight/CVE-2022-37207](https://github.com/AgainstTheLight/CVE-2022-37207)
|
||||
|
||||
### CVE-2022-37208
|
||||
|
@ -3551,7 +3565,7 @@ In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUI
|
|||
### CVE-2022-38766
|
||||
- [AUTOCRYPT-IVS-VnV/CVE-2022-38766](https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766)
|
||||
|
||||
### CVE-2022-38789 (-)
|
||||
### CVE-2022-38789 (2022-09-15)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
|
||||
|
@ -3567,6 +3581,9 @@ Blackboard Learn 1.10.1 allows remote authenticated users to read unintended fil
|
|||
|
||||
- [DayiliWaseem/CVE-2022-39196-](https://github.com/DayiliWaseem/CVE-2022-39196-)
|
||||
|
||||
### CVE-2022-39841
|
||||
- [stealthcopter/CVE-2022-39841](https://github.com/stealthcopter/CVE-2022-39841)
|
||||
|
||||
### CVE-2022-40297 (2022-09-08)
|
||||
|
||||
<code>
|
||||
|
@ -4251,14 +4268,6 @@ Vulnerability in the Database Vault component of Oracle Database Server. Support
|
|||
|
||||
- [emad-almousa/CVE-2021-2175](https://github.com/emad-almousa/CVE-2021-2175)
|
||||
|
||||
### CVE-2021-2394 (2021-07-20)
|
||||
|
||||
<code>
|
||||
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [fasanhlieu/CVE-2021-2394](https://github.com/fasanhlieu/CVE-2021-2394)
|
||||
|
||||
### CVE-2021-2456 (2021-07-20)
|
||||
|
||||
<code>
|
||||
|
@ -5292,14 +5301,6 @@ The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when s
|
|||
|
||||
- [dn9uy3n/Check-CVE-2021-23383](https://github.com/dn9uy3n/Check-CVE-2021-23383)
|
||||
|
||||
### CVE-2021-23758 (2021-12-03)
|
||||
|
||||
<code>
|
||||
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
|
||||
</code>
|
||||
|
||||
- [numanturle/CVE-2021-23758-POC](https://github.com/numanturle/CVE-2021-23758-POC)
|
||||
|
||||
### CVE-2021-23841 (2021-02-16)
|
||||
|
||||
<code>
|
||||
|
@ -7083,6 +7084,9 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [mightysai1997/CVE-2021-41773-i-](https://github.com/mightysai1997/CVE-2021-41773-i-)
|
||||
- [mightysai1997/CVE-2021-41773-L-](https://github.com/mightysai1997/CVE-2021-41773-L-)
|
||||
- [mightysai1997/CVE-2021-41773-PoC](https://github.com/mightysai1997/CVE-2021-41773-PoC)
|
||||
- [mightysai1997/CVE-2021-41773.git1](https://github.com/mightysai1997/CVE-2021-41773.git1)
|
||||
- [mightysai1997/CVE-2021-41773m](https://github.com/mightysai1997/CVE-2021-41773m)
|
||||
- [mightysai1997/CVE-2021-41773S](https://github.com/mightysai1997/CVE-2021-41773S)
|
||||
|
||||
### CVE-2021-41946 (2022-05-18)
|
||||
|
||||
|
@ -7336,7 +7340,7 @@ An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An a
|
|||
The SyncThru Web Service on Samsung SCX-6x55X printers allows an attacker to gain access to a list of SMB users and cleartext passwords by reading the HTML source code. Authentication is not required.
|
||||
</code>
|
||||
|
||||
- [windsormoreira/CVE-2021-42913](https://github.com/windsormoreira/CVE-2021-42913)
|
||||
- [kernel-cyber/CVE-2021-42913](https://github.com/kernel-cyber/CVE-2021-42913)
|
||||
|
||||
### CVE-2021-42948
|
||||
- [dhammon/HotelDruid-CVE-2021-42948](https://github.com/dhammon/HotelDruid-CVE-2021-42948)
|
||||
|
@ -7687,7 +7691,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
|
||||
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
|
||||
- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
|
||||
- [kubearmor/log4j-CVE-2021-44228](https://github.com/kubearmor/log4j-CVE-2021-44228)
|
||||
- [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
|
||||
- [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt)
|
||||
- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
|
||||
|
@ -27971,6 +27974,7 @@ Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.
|
|||
</code>
|
||||
|
||||
- [hupe1980/CVE-2009-4623](https://github.com/hupe1980/CVE-2009-4623)
|
||||
- [kernel-cyber/CVE-2009-4623](https://github.com/kernel-cyber/CVE-2009-4623)
|
||||
|
||||
### CVE-2009-4660 (2010-03-03)
|
||||
|
||||
|
@ -28257,7 +28261,7 @@ Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function be
|
|||
- [IvanGlinkin/CVE-2006-3392](https://github.com/IvanGlinkin/CVE-2006-3392)
|
||||
- [Adel-kaka-dz/CVE-2006-3392](https://github.com/Adel-kaka-dz/CVE-2006-3392)
|
||||
- [gb21oc/ExploitWebmin](https://github.com/gb21oc/ExploitWebmin)
|
||||
- [windsormoreira/CVE-2006-3392](https://github.com/windsormoreira/CVE-2006-3392)
|
||||
- [kernel-cyber/CVE-2006-3392](https://github.com/kernel-cyber/CVE-2006-3392)
|
||||
|
||||
### CVE-2006-3592 (2006-07-14)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue