CVE-2022相关仓库的总数量 :405
描述:Exploit for CVE-2021-22204.
链接:https://github.com/UNICORDev/exploit-CVE-2021-22204
——————
描述:PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
链接:https://github.com/dengyang123x/0vercl0k
——————
描述:first golang implementation ever
链接:https://github.com/qasj/CVE-2021-4034
——————
描述:A proof of concept of the CVE-2022-26809-RCE vulnerability.
链接:https://github.com/F1uk369/CVE-2022-26809
——————
描述:GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205
链接:https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-
——————
描述:None
链接:https://github.com/3SsFuck/CVE-2021-31805-POC
——————
描述:None
链接:https://github.com/w1023913214/CVE-2022-18852
——————
描述:None
链接:https://github.com/Satheesh575555/packages_apps_Nfc_AOSP10_r33_CVE-2021-0594
——————
描述:None
链接:https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705
——————
描述:None
链接:https://github.com/jkakavas/CVE-2022-0778-POC
——————
描述:None
链接:https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319
——————
描述:CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL/IP lists.
链接:https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j
——————
描述:7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.
链接:https://github.com/sentinelblue/CVE-2022-29072
——————
描述:None
链接:https://github.com/hemazoher/CVE-2022-26809-RCE
——————
描述:Powershell to mitigate CVE-2022-29072
链接:https://github.com/tiktb8/CVE-2022-29072
——————
描述:vuln scaner and exploit
链接:https://github.com/HellKnightsCrew/CVE-2022-26809
——————
描述:None
链接:https://github.com/puneetbehl/grails3-cve-2022-27772
——————
描述:None
链接:https://github.com/XmasSnow/CVE-2022-26809-RCE
——————
描述:Laravel RCE (CVE-2021-3129)
链接:https://github.com/joshuavanderpoll/CVE-2021-3129
——————
描述:Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell
链接:https://github.com/Axx8/Struts2_S2-062_CVE-2021-31805
往期推荐
免责声明 由于传播、利用本公众号所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,公众号及作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除并致歉。如需转载请注明出处,谢谢!
原文始发于微信公众号(夜组安全):2022-4-19 有新的CVE仓库送达!
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论