mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/09/16 06:18:14
This commit is contained in:
parent
1f05c18657
commit
fc89532071
36 changed files with 179 additions and 141 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-03T22:26:09Z",
|
||||
"updated_at": "2022-04-13T11:44:12Z",
|
||||
"updated_at": "2022-09-16T00:54:01Z",
|
||||
"pushed_at": "2019-07-18T20:27:09Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T15:38:30Z",
|
||||
"updated_at": "2022-09-15T15:41:58Z",
|
||||
"updated_at": "2022-09-16T01:01:12Z",
|
||||
"pushed_at": "2022-09-15T15:50:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,10 +125,10 @@
|
|||
"description": "Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T23:09:40Z",
|
||||
"updated_at": "2022-09-15T17:48:17Z",
|
||||
"updated_at": "2022-09-16T01:46:12Z",
|
||||
"pushed_at": "2022-09-12T01:43:19Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -143,7 +143,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:44:12Z",
|
||||
"updated_at": "2022-09-15T14:39:30Z",
|
||||
"updated_at": "2022-09-16T01:56:03Z",
|
||||
"pushed_at": "2018-03-12T16:50:20Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 80,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -69,10 +69,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2022-09-03T05:28:59Z",
|
||||
"updated_at": "2022-09-16T03:33:37Z",
|
||||
"pushed_at": "2022-07-18T16:24:55Z",
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 316,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T15:16:03Z",
|
||||
"updated_at": "2022-07-27T19:27:50Z",
|
||||
"updated_at": "2022-09-16T03:32:57Z",
|
||||
"pushed_at": "2018-02-06T15:36:29Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "ApacheSolrRCE(CVE-2019-0193)一键写shell,原理是通过代码执行的java文件流写的马。",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-13T08:02:20Z",
|
||||
"updated_at": "2022-09-14T15:20:48Z",
|
||||
"updated_at": "2022-09-16T02:12:30Z",
|
||||
"pushed_at": "2022-09-13T17:15:00Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-12T20:43:46Z",
|
||||
"updated_at": "2021-12-05T22:09:26Z",
|
||||
"updated_at": "2022-09-16T01:48:46Z",
|
||||
"pushed_at": "2019-11-28T20:16:35Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-09-15T14:48:34Z",
|
||||
"updated_at": "2022-09-16T04:06:19Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3540,
|
||||
"watchers_count": 3540,
|
||||
"stargazers_count": 3541,
|
||||
"watchers_count": 3541,
|
||||
"forks_count": 1038,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -72,7 +72,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1038,
|
||||
"watchers": 3540,
|
||||
"watchers": 3541,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -101,13 +101,13 @@
|
|||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 836,
|
||||
"watchers_count": 836,
|
||||
"forks_count": 173,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"forks": 174,
|
||||
"watchers": 836,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "CVE-2019-5475-EXP 【Nexus Repository Manager 2.x远程命令执行漏洞】",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-12T15:49:36Z",
|
||||
"updated_at": "2021-12-15T14:38:55Z",
|
||||
"updated_at": "2022-09-16T04:02:06Z",
|
||||
"pushed_at": "2020-04-12T15:59:16Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -125,10 +125,10 @@
|
|||
"description": "CVE-2019-9053 Exploit for Python 3",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T16:30:12Z",
|
||||
"updated_at": "2022-09-03T21:14:08Z",
|
||||
"updated_at": "2022-09-16T02:12:10Z",
|
||||
"pushed_at": "2021-12-28T17:02:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1642,13 +1642,13 @@
|
|||
"pushed_at": "2022-03-30T14:02:04Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2022-09-15T18:06:09Z",
|
||||
"updated_at": "2022-09-16T03:45:29Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -136,10 +136,10 @@
|
|||
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:52:28Z",
|
||||
"updated_at": "2022-07-31T09:18:50Z",
|
||||
"updated_at": "2022-09-16T00:24:42Z",
|
||||
"pushed_at": "2020-07-10T09:30:47Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -147,7 +147,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,7 +129,7 @@
|
|||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 56,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -142,7 +142,7 @@
|
|||
"zerologon"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 57,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-09-15T14:48:34Z",
|
||||
"updated_at": "2022-09-16T04:06:19Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3540,
|
||||
"watchers_count": 3540,
|
||||
"stargazers_count": 3541,
|
||||
"watchers_count": 3541,
|
||||
"forks_count": 1038,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1038,
|
||||
"watchers": 3540,
|
||||
"watchers": 3541,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "QNAP N-Day (Probably not CVE-2020-2509)",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T19:58:40Z",
|
||||
"updated_at": "2022-09-02T09:35:30Z",
|
||||
"updated_at": "2022-09-16T03:50:06Z",
|
||||
"pushed_at": "2022-07-27T20:53:38Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2022-09-07T09:07:26Z",
|
||||
"updated_at": "2022-09-16T03:36:47Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2022-09-15T21:13:05Z",
|
||||
"updated_at": "2022-09-16T02:16:21Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -58,7 +58,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2022-08-07T12:56:09Z",
|
||||
"updated_at": "2022-09-16T02:54:30Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:39:11Z",
|
||||
"updated_at": "2022-08-10T16:01:47Z",
|
||||
"updated_at": "2022-09-16T03:54:06Z",
|
||||
"pushed_at": "2021-06-07T13:46:21Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"pushed_at": "2022-02-11T15:22:20Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 37,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-09-15T07:17:37Z",
|
||||
"updated_at": "2022-09-16T05:24:16Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1643,
|
||||
"watchers_count": 1643,
|
||||
"stargazers_count": 1644,
|
||||
"watchers_count": 1644,
|
||||
"forks_count": 477,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 477,
|
||||
"watchers": 1643,
|
||||
"watchers": 1644,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -969,10 +969,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T12:37:59Z",
|
||||
"updated_at": "2022-09-15T12:38:13Z",
|
||||
"updated_at": "2022-09-16T01:01:18Z",
|
||||
"pushed_at": "2022-09-15T12:38:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -980,7 +980,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -997,10 +997,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T14:17:45Z",
|
||||
"updated_at": "2022-09-15T14:17:45Z",
|
||||
"updated_at": "2022-09-16T01:01:16Z",
|
||||
"pushed_at": "2022-09-15T14:17:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1008,7 +1008,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -378,10 +378,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-09-07T06:48:18Z",
|
||||
"updated_at": "2022-09-16T04:34:00Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"stargazers_count": 845,
|
||||
"watchers_count": 845,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -409,7 +409,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 844,
|
||||
"watchers": 845,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -426,10 +426,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-09-15T06:22:34Z",
|
||||
"updated_at": "2022-09-16T03:31:09Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1471,
|
||||
"watchers_count": 1471,
|
||||
"stargazers_count": 1472,
|
||||
"watchers_count": 1472,
|
||||
"forks_count": 407,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -442,7 +442,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 407,
|
||||
"watchers": 1471,
|
||||
"watchers": 1472,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1507,10 +1507,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-09-15T09:00:17Z",
|
||||
"updated_at": "2022-09-16T03:41:23Z",
|
||||
"pushed_at": "2022-09-11T03:55:38Z",
|
||||
"stargazers_count": 3048,
|
||||
"watchers_count": 3048,
|
||||
"stargazers_count": 3047,
|
||||
"watchers_count": 3047,
|
||||
"forks_count": 727,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1518,7 +1518,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 727,
|
||||
"watchers": 3048,
|
||||
"watchers": 3047,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-06T00:03:31Z",
|
||||
"updated_at": "2022-08-23T01:33:39Z",
|
||||
"updated_at": "2022-09-16T03:32:07Z",
|
||||
"pushed_at": "2022-03-06T07:01:15Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -69,10 +69,10 @@
|
|||
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-10T10:38:59Z",
|
||||
"updated_at": "2022-09-08T12:08:27Z",
|
||||
"updated_at": "2022-09-16T06:16:49Z",
|
||||
"pushed_at": "2022-08-10T11:11:30Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -89,7 +89,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1258,18 +1258,18 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2022-09-07T07:08:24Z",
|
||||
"updated_at": "2022-09-16T05:30:41Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 16,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 103,
|
||||
"forks": 17,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Zeek detector for CVE-2022-24497.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T17:12:59Z",
|
||||
"updated_at": "2022-05-17T10:39:38Z",
|
||||
"updated_at": "2022-09-16T01:31:24Z",
|
||||
"pushed_at": "2022-09-15T16:16:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -58,10 +58,10 @@
|
|||
"description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-01T04:36:50Z",
|
||||
"updated_at": "2022-09-15T02:26:53Z",
|
||||
"updated_at": "2022-09-16T06:20:58Z",
|
||||
"pushed_at": "2022-09-02T11:00:28Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -69,7 +69,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 51,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -353,10 +353,10 @@
|
|||
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-20T14:26:38Z",
|
||||
"updated_at": "2022-09-05T15:18:12Z",
|
||||
"updated_at": "2022-09-16T04:40:37Z",
|
||||
"pushed_at": "2022-09-09T07:25:12Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -371,7 +371,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 31,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1950,10 +1950,10 @@
|
|||
"description": "Proof of concept for CVE-2022-30190 (Follina).",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-15T16:12:57Z",
|
||||
"updated_at": "2022-09-15T16:14:19Z",
|
||||
"updated_at": "2022-09-16T01:01:09Z",
|
||||
"pushed_at": "2022-09-15T16:43:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1961,7 +1961,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2022/CVE-2022-34729.json
Normal file
30
2022/CVE-2022-34729.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 537327152,
|
||||
"name": "CVE-2022-34729",
|
||||
"full_name": "Pwnrin\/CVE-2022-34729",
|
||||
"owner": {
|
||||
"login": "Pwnrin",
|
||||
"id": 98268685,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98268685?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pwnrin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pwnrin\/CVE-2022-34729",
|
||||
"description": "PoC for CVE-2022-34729",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-16T06:07:04Z",
|
||||
"updated_at": "2022-09-16T06:07:04Z",
|
||||
"pushed_at": "2022-09-16T06:07:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2022-09-16T00:03:41Z",
|
||||
"updated_at": "2022-09-16T06:02:10Z",
|
||||
"pushed_at": "2022-09-14T07:45:40Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 10,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 100,
|
||||
"forks": 11,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3333,6 +3333,14 @@ Windows Network File System Remote Code Execution Vulnerability.
|
|||
|
||||
- [Starssgo/CVE-2022-34715-POC](https://github.com/Starssgo/CVE-2022-34715-POC)
|
||||
|
||||
### CVE-2022-34729 (2022-09-13)
|
||||
|
||||
<code>
|
||||
Windows GDI Elevation of Privilege Vulnerability.
|
||||
</code>
|
||||
|
||||
- [Pwnrin/CVE-2022-34729](https://github.com/Pwnrin/CVE-2022-34729)
|
||||
|
||||
### CVE-2022-34918 (2022-07-04)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue