mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/05/31 12:18:24
This commit is contained in:
parent
fbee8509a5
commit
faff915fba
50 changed files with 370 additions and 239 deletions
|
@ -70,7 +70,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-15T10:28:03Z",
|
||||
"updated_at": "2022-05-25T10:08:18Z",
|
||||
"pushed_at": "2022-05-29T15:22:37Z",
|
||||
"pushed_at": "2022-05-31T09:28:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -1458,14 +1458,14 @@
|
|||
"pushed_at": "2021-05-20T13:28:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"heartbleed"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-30T08:23:06Z",
|
||||
"updated_at": "2022-05-31T10:27:33Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1376,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-30T08:23:06Z",
|
||||
"updated_at": "2022-05-31T10:27:33Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1376,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2022-02-17T17:25:36Z",
|
||||
"updated_at": "2022-05-31T11:50:13Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2022-02-17T17:25:36Z",
|
||||
"updated_at": "2022-05-31T11:50:13Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:44:12Z",
|
||||
"updated_at": "2022-05-22T15:20:49Z",
|
||||
"updated_at": "2022-05-31T08:38:25Z",
|
||||
"pushed_at": "2018-03-12T16:50:20Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-30T08:23:06Z",
|
||||
"updated_at": "2022-05-31T10:27:33Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1376,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -424,17 +424,17 @@
|
|||
"description": "SambaCry exploit (CVE-2017-7494) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-07T11:42:40Z",
|
||||
"updated_at": "2022-05-30T21:44:31Z",
|
||||
"updated_at": "2022-05-31T10:39:24Z",
|
||||
"pushed_at": "2022-05-08T09:02:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-26T01:13:42Z",
|
||||
"updated_at": "2022-05-31T03:46:03Z",
|
||||
"updated_at": "2022-05-31T08:56:07Z",
|
||||
"pushed_at": "2022-05-26T19:14:20Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -122,7 +122,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-27T11:56:07Z",
|
||||
"updated_at": "2022-05-27T11:56:07Z",
|
||||
"pushed_at": "2022-05-29T11:47:56Z",
|
||||
"pushed_at": "2022-05-31T08:18:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2022-02-17T17:25:36Z",
|
||||
"updated_at": "2022-05-31T11:50:13Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-30T08:23:06Z",
|
||||
"updated_at": "2022-05-31T10:27:33Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1376,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1915,5 +1915,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498303431,
|
||||
"name": "PentestLab-CVE-2018-6574-go-get-RCE",
|
||||
"full_name": "Exzh34\/PentestLab-CVE-2018-6574-go-get-RCE",
|
||||
"owner": {
|
||||
"login": "Exzh34",
|
||||
"id": 61991353,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61991353?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exzh34"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exzh34\/PentestLab-CVE-2018-6574-go-get-RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T11:17:51Z",
|
||||
"updated_at": "2022-05-31T11:18:36Z",
|
||||
"pushed_at": "2022-05-31T11:26:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,11 +40,11 @@
|
|||
"description": "CVE-2018-8120 Windows LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T02:43:15Z",
|
||||
"updated_at": "2022-05-13T04:18:35Z",
|
||||
"updated_at": "2022-05-31T09:26:27Z",
|
||||
"pushed_at": "2018-05-30T13:09:54Z",
|
||||
"stargazers_count": 476,
|
||||
"watchers_count": 476,
|
||||
"forks_count": 205,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 206,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -53,8 +53,8 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 205,
|
||||
"watchers": 476,
|
||||
"forks": 206,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2224,17 +2224,17 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2022-04-18T18:30:51Z",
|
||||
"updated_at": "2022-05-31T11:17:03Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 291,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2022-02-17T17:25:36Z",
|
||||
"updated_at": "2022-05-31T11:50:13Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-05-17T05:49:17Z",
|
||||
"updated_at": "2022-05-31T11:13:27Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1718,
|
||||
"watchers_count": 1718,
|
||||
"stargazers_count": 1719,
|
||||
"watchers_count": 1719,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 1718,
|
||||
"watchers": 1719,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2022-05-26T20:20:09Z",
|
||||
"updated_at": "2022-05-31T08:11:41Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 806,
|
||||
"watchers_count": 806,
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 172,
|
||||
"watchers": 806,
|
||||
"watchers": 807,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-30T08:23:06Z",
|
||||
"updated_at": "2022-05-31T10:27:33Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1376,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -233,12 +233,12 @@
|
|||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 64,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"forks": 65,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-5418 - File Content Disclosure on Ruby on Rails",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-16T11:58:18Z",
|
||||
"updated_at": "2022-04-15T09:14:33Z",
|
||||
"updated_at": "2022-05-31T09:50:25Z",
|
||||
"pushed_at": "2021-04-05T21:28:36Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2022-05-26T08:01:30Z",
|
||||
"updated_at": "2022-05-31T09:31:06Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -53,7 +53,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-05-30T04:59:18Z",
|
||||
"updated_at": "2022-05-31T08:41:45Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1458,
|
||||
"watchers_count": 1458,
|
||||
"stargazers_count": 1460,
|
||||
"watchers_count": 1460,
|
||||
"forks_count": 333,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"watchers": 1458,
|
||||
"watchers": 1460,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -94,17 +94,17 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2022-05-19T18:05:13Z",
|
||||
"updated_at": "2022-05-31T06:30:50Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 930,
|
||||
"watchers_count": 930,
|
||||
"stargazers_count": 931,
|
||||
"watchers_count": 931,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 930,
|
||||
"watchers": 931,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-05-30T08:23:06Z",
|
||||
"updated_at": "2022-05-31T10:27:33Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
"stargazers_count": 1379,
|
||||
"watchers_count": 1379,
|
||||
"forks_count": 296,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 296,
|
||||
"watchers": 1376,
|
||||
"watchers": 1379,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-4464 \/ CVE-2020-4450",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-17T08:44:49Z",
|
||||
"updated_at": "2022-05-31T05:31:46Z",
|
||||
"updated_at": "2022-05-31T10:09:43Z",
|
||||
"pushed_at": "2021-08-24T15:02:19Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2022-02-17T17:25:36Z",
|
||||
"updated_at": "2022-05-31T11:50:13Z",
|
||||
"pushed_at": "2020-02-29T21:27:15Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,7 +25,7 @@
|
|||
"exiftool"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"forks": 25,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1025,17 +1025,17 @@
|
|||
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T21:10:34Z",
|
||||
"updated_at": "2022-05-24T23:37:14Z",
|
||||
"updated_at": "2022-05-31T10:32:06Z",
|
||||
"pushed_at": "2021-03-31T11:57:38Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"stargazers_count": 215,
|
||||
"watchers_count": 215,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 214,
|
||||
"watchers": 215,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,17 +129,17 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-17T17:00:49Z",
|
||||
"updated_at": "2022-04-17T17:00:49Z",
|
||||
"updated_at": "2022-05-31T07:42:57Z",
|
||||
"pushed_at": "2022-04-17T17:00:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Trigger-only for CVE-2021-29627",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-12T07:51:03Z",
|
||||
"updated_at": "2021-04-21T13:57:31Z",
|
||||
"updated_at": "2022-05-31T07:51:33Z",
|
||||
"pushed_at": "2021-04-12T07:51:40Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -412,17 +412,17 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T18:57:30Z",
|
||||
"updated_at": "2022-05-31T05:44:42Z",
|
||||
"updated_at": "2022-05-31T09:38:27Z",
|
||||
"pushed_at": "2022-05-02T07:49:01Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 76,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 437242073,
|
||||
"name": "CVE-2021-38666",
|
||||
"full_name": "JaneMandy\/CVE-2021-38666",
|
||||
"owner": {
|
||||
"login": "JaneMandy",
|
||||
"id": 36792635,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
|
||||
"html_url": "https:\/\/github.com\/JaneMandy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JaneMandy\/CVE-2021-38666",
|
||||
"description": "RDP Client RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T09:42:28Z",
|
||||
"updated_at": "2021-12-11T09:42:28Z",
|
||||
"pushed_at": "2021-12-11T09:42:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Recursive MMIO VM Escape PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-13T05:33:28Z",
|
||||
"updated_at": "2022-05-27T23:12:41Z",
|
||||
"updated_at": "2022-05-31T10:35:17Z",
|
||||
"pushed_at": "2022-05-13T05:37:41Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 100,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Local Privilege Escalation in polkit's pkexec",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:11:30Z",
|
||||
"updated_at": "2022-05-19T07:42:21Z",
|
||||
"updated_at": "2022-05-31T10:42:49Z",
|
||||
"pushed_at": "2022-01-26T01:01:15Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-05-30T20:30:17Z",
|
||||
"updated_at": "2022-05-31T08:30:12Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1544,
|
||||
"watchers_count": 1544,
|
||||
"stargazers_count": 1545,
|
||||
"watchers_count": 1545,
|
||||
"forks_count": 451,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 451,
|
||||
"watchers": 1544,
|
||||
"watchers": 1545,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1820,7 +1820,7 @@
|
|||
"description": "Proof of concept for pwnkit vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T14:43:57Z",
|
||||
"updated_at": "2022-05-27T22:35:05Z",
|
||||
"updated_at": "2022-05-31T07:52:41Z",
|
||||
"pushed_at": "2022-04-19T12:33:32Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
|
@ -3947,11 +3947,11 @@
|
|||
"html_url": "https:\/\/github.com\/wudicainiao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wudicainiao\/cve-2021-4034",
|
||||
"description": "cve-2021-4034 for single commcand",
|
||||
"description": "CVE-2021-4034 for single commcand",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-21T05:42:01Z",
|
||||
"updated_at": "2022-05-23T12:25:16Z",
|
||||
"pushed_at": "2022-05-21T06:20:33Z",
|
||||
"updated_at": "2022-05-31T11:57:22Z",
|
||||
"pushed_at": "2022-05-31T11:56:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -26,6 +26,40 @@
|
|||
"watchers": 1418,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 406942491,
|
||||
"name": "CVE-2021-40444",
|
||||
"full_name": "klezVirus\/CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "klezVirus",
|
||||
"id": 8959898,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
|
||||
"html_url": "https:\/\/github.com\/klezVirus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
|
||||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2022-05-31T11:47:51Z",
|
||||
"pushed_at": "2022-05-31T08:53:53Z",
|
||||
"stargazers_count": 600,
|
||||
"watchers_count": 600,
|
||||
"forks_count": 138,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"cve-2021-40444",
|
||||
"msword",
|
||||
"office",
|
||||
"rce",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 138,
|
||||
"watchers": 600,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439810103,
|
||||
"name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Private keys generated with vulnerable keypair versions (CVE-2021-41117)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-15T06:56:53Z",
|
||||
"updated_at": "2022-05-31T00:00:19Z",
|
||||
"updated_at": "2022-05-31T10:57:21Z",
|
||||
"pushed_at": "2022-05-15T07:34:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 435800204,
|
||||
"name": "CVE-2021-43798-Grafana-File-Read",
|
||||
"full_name": "tangxiaofeng7\/CVE-2021-43798-Grafana-File-Read",
|
||||
"owner": {
|
||||
"login": "tangxiaofeng7",
|
||||
"id": 45926593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
|
||||
"html_url": "https:\/\/github.com\/tangxiaofeng7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2021-43798-Grafana-File-Read",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T08:28:56Z",
|
||||
"updated_at": "2022-03-04T03:10:30Z",
|
||||
"pushed_at": "2021-12-11T08:35:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435840491,
|
||||
"name": "CVE-2021-43798-Grafana-POC",
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-02-14T14:26:26Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,7 +27,7 @@
|
|||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -876,11 +876,11 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2022-05-30T13:20:53Z",
|
||||
"updated_at": "2022-05-31T11:50:14Z",
|
||||
"pushed_at": "2022-04-07T14:47:03Z",
|
||||
"stargazers_count": 817,
|
||||
"watchers_count": 817,
|
||||
"forks_count": 171,
|
||||
"stargazers_count": 818,
|
||||
"watchers_count": 818,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -898,8 +898,8 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 171,
|
||||
"watchers": 817,
|
||||
"forks": 172,
|
||||
"watchers": 818,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2993,17 +2993,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-05-30T15:50:42Z",
|
||||
"updated_at": "2022-05-31T08:09:50Z",
|
||||
"pushed_at": "2022-05-17T13:25:17Z",
|
||||
"stargazers_count": 2904,
|
||||
"watchers_count": 2904,
|
||||
"stargazers_count": 2905,
|
||||
"watchers_count": 2905,
|
||||
"forks_count": 712,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 712,
|
||||
"watchers": 2904,
|
||||
"watchers": 2905,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Environment with vulnerable kernel for exploitation of CVE-2021-44733",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T17:45:35Z",
|
||||
"updated_at": "2022-05-29T09:48:20Z",
|
||||
"updated_at": "2022-05-31T11:29:13Z",
|
||||
"pushed_at": "2021-12-28T07:57:13Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-46381.json
Normal file
29
2021/CVE-2021-46381.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 498296485,
|
||||
"name": "-cve-2021-46381",
|
||||
"full_name": "JCPpeiqi\/-cve-2021-46381",
|
||||
"owner": {
|
||||
"login": "JCPpeiqi",
|
||||
"id": 106591002,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106591002?v=4",
|
||||
"html_url": "https:\/\/github.com\/JCPpeiqi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JCPpeiqi\/-cve-2021-46381",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T10:54:40Z",
|
||||
"updated_at": "2022-05-31T11:01:14Z",
|
||||
"pushed_at": "2022-05-31T11:01:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-18T07:51:18Z",
|
||||
"updated_at": "2022-04-25T11:16:35Z",
|
||||
"updated_at": "2022-05-31T07:13:24Z",
|
||||
"pushed_at": "2022-04-18T07:55:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,7 +121,7 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-05-28T03:07:44Z",
|
||||
"updated_at": "2022-05-31T07:48:06Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 946,
|
||||
"watchers_count": 946,
|
||||
|
|
|
@ -1324,7 +1324,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-17T10:51:39Z",
|
||||
"updated_at": "2022-05-19T04:36:29Z",
|
||||
"pushed_at": "2022-05-30T05:40:21Z",
|
||||
"pushed_at": "2022-05-31T10:24:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 601,
|
||||
"watchers_count": 601,
|
||||
"forks_count": 121,
|
||||
"forks_count": 122,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,7 +25,7 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"forks": 122,
|
||||
"watchers": 601,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-24T20:19:55Z",
|
||||
"updated_at": "2022-05-30T16:57:37Z",
|
||||
"updated_at": "2022-05-31T06:45:38Z",
|
||||
"pushed_at": "2022-05-26T16:07:18Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 20,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 108,
|
||||
"forks": 22,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-03-29T09:55:15Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -262,14 +262,14 @@
|
|||
"pushed_at": "2022-05-25T00:57:52Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2022-26809"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
|
|
91
2022/CVE-2022-30190.json
Normal file
91
2022/CVE-2022-30190.json
Normal file
|
@ -0,0 +1,91 @@
|
|||
[
|
||||
{
|
||||
"id": 498052694,
|
||||
"name": "PoC-CVE-2022-30190",
|
||||
"full_name": "JMousqueton\/PoC-CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "JMousqueton",
|
||||
"id": 4148567,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4",
|
||||
"html_url": "https:\/\/github.com\/JMousqueton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JMousqueton\/PoC-CVE-2022-30190",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T18:17:38Z",
|
||||
"updated_at": "2022-05-31T11:11:36Z",
|
||||
"pushed_at": "2022-05-31T10:55:36Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"follina",
|
||||
"msoffice",
|
||||
"poc",
|
||||
"proof-of-concept",
|
||||
"rce",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498218229,
|
||||
"name": "CVE-2022-30190",
|
||||
"full_name": "onecloudemoji\/CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "onecloudemoji",
|
||||
"id": 46857300,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46857300?v=4",
|
||||
"html_url": "https:\/\/github.com\/onecloudemoji"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onecloudemoji\/CVE-2022-30190",
|
||||
"description": "CVE-2022-30190 Follina POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T06:45:25Z",
|
||||
"updated_at": "2022-05-31T12:02:17Z",
|
||||
"pushed_at": "2022-05-31T09:35:37Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 498322212,
|
||||
"name": "CVE-2022-30190",
|
||||
"full_name": "bytecaps\/CVE-2022-30190",
|
||||
"owner": {
|
||||
"login": "bytecaps",
|
||||
"id": 52679771,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
|
||||
"html_url": "https:\/\/github.com\/bytecaps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-30190",
|
||||
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T12:15:18Z",
|
||||
"updated_at": "2022-05-31T12:15:24Z",
|
||||
"pushed_at": "2022-05-31T12:15:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -1877,6 +1877,11 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l
|
|||
|
||||
- [Le1a/CVE-2022-30040](https://github.com/Le1a/CVE-2022-30040)
|
||||
|
||||
### CVE-2022-30190
|
||||
- [JMousqueton/PoC-CVE-2022-30190](https://github.com/JMousqueton/PoC-CVE-2022-30190)
|
||||
- [onecloudemoji/CVE-2022-30190](https://github.com/onecloudemoji/CVE-2022-30190)
|
||||
- [bytecaps/CVE-2022-30190](https://github.com/bytecaps/CVE-2022-30190)
|
||||
|
||||
### CVE-2022-30292 (2022-05-04)
|
||||
|
||||
<code>
|
||||
|
@ -4857,14 +4862,6 @@ Open Management Infrastructure Remote Code Execution Vulnerability
|
|||
|
||||
- [corelight/CVE-2021-38647](https://github.com/corelight/CVE-2021-38647)
|
||||
|
||||
### CVE-2021-38666 (2021-11-09)
|
||||
|
||||
<code>
|
||||
Remote Desktop Client Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [JaneMandy/CVE-2021-38666](https://github.com/JaneMandy/CVE-2021-38666)
|
||||
|
||||
### CVE-2021-39165 (2021-08-26)
|
||||
|
||||
<code>
|
||||
|
@ -4968,6 +4965,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
|
|||
</code>
|
||||
|
||||
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
|
||||
- [klezVirus/CVE-2021-40444](https://github.com/klezVirus/CVE-2021-40444)
|
||||
- [34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit](https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit)
|
||||
- [MRacumen/CVE-2021-40444](https://github.com/MRacumen/CVE-2021-40444)
|
||||
- [RedLeavesChilde/CVE-2021-40444](https://github.com/RedLeavesChilde/CVE-2021-40444)
|
||||
|
@ -5454,7 +5452,6 @@ PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop
|
|||
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
|
||||
</code>
|
||||
|
||||
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
|
||||
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
|
||||
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
|
||||
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
|
||||
|
@ -6307,6 +6304,14 @@ In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overf
|
|||
|
||||
- [nanopathi/external_expat_AOSP10_r33_CVE-2021-46143](https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2021-46143)
|
||||
|
||||
### CVE-2021-46381 (2022-03-04)
|
||||
|
||||
<code>
|
||||
Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
|
||||
</code>
|
||||
|
||||
- [JCPpeiqi/-cve-2021-46381](https://github.com/JCPpeiqi/-cve-2021-46381)
|
||||
|
||||
### CVE-2021-46398 (2022-02-04)
|
||||
|
||||
<code>
|
||||
|
@ -16569,6 +16574,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [ThaFWord/pentesterlab](https://github.com/ThaFWord/pentesterlab)
|
||||
- [Cypheer/exploit_CVE-2018-6574](https://github.com/Cypheer/exploit_CVE-2018-6574)
|
||||
- [jftierno/CVE-2018-6574-2](https://github.com/jftierno/CVE-2018-6574-2)
|
||||
- [Exzh34/PentestLab-CVE-2018-6574-go-get-RCE](https://github.com/Exzh34/PentestLab-CVE-2018-6574-go-get-RCE)
|
||||
|
||||
### CVE-2018-6622 (2018-08-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue