Update recent feed data
This commit is contained in:
parent
d25e367c28
commit
ea9751ba5a
6 changed files with 309 additions and 0 deletions
209
exploits/2022/CVE-2022-44268.json
Normal file
209
exploits/2022/CVE-2022-44268.json
Normal file
|
@ -0,0 +1,209 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
||||
"full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
||||
"html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
||||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"stargazers_count": 271,
|
||||
"forks_count": 40,
|
||||
"created_at": "2023-02-02T15:34:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268",
|
||||
"full_name": "voidz0r/CVE-2022-44268",
|
||||
"html_url": "https://github.com/voidz0r/CVE-2022-44268",
|
||||
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
|
||||
"stargazers_count": 216,
|
||||
"forks_count": 25,
|
||||
"created_at": "2023-02-05T18:42:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268",
|
||||
"full_name": "kljunowsky/CVE-2022-44268",
|
||||
"html_url": "https://github.com/kljunowsky/CVE-2022-44268",
|
||||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
|
||||
"stargazers_count": 23,
|
||||
"forks_count": 7,
|
||||
"created_at": "2023-02-13T02:00:51Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
|
||||
"full_name": "y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
|
||||
"html_url": "https://github.com/y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
|
||||
"description": "The vulnerable recurrence docker environment for CVE-2022-44268",
|
||||
"stargazers_count": 8,
|
||||
"forks_count": 2,
|
||||
"created_at": "2023-02-03T08:02:28Z"
|
||||
},
|
||||
{
|
||||
"name": "imagemagick-CVE-2022-44268",
|
||||
"full_name": "Vulnmachines/imagemagick-CVE-2022-44268",
|
||||
"html_url": "https://github.com/Vulnmachines/imagemagick-CVE-2022-44268",
|
||||
"description": "Imagemagick CVE-2022-44268",
|
||||
"stargazers_count": 8,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-02-06T10:45:42Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268",
|
||||
"full_name": "entr0pie/CVE-2022-44268",
|
||||
"html_url": "https://github.com/entr0pie/CVE-2022-44268",
|
||||
"description": "PoC of Imagemagick's Arbitrary File Read",
|
||||
"stargazers_count": 6,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-03T18:13:44Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2022-44268-detector",
|
||||
"full_name": "jnschaeffer/cve-2022-44268-detector",
|
||||
"html_url": "https://github.com/jnschaeffer/cve-2022-44268-detector",
|
||||
"description": "Detect images that likely exploit CVE-2022-44268",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-02-04T01:35:08Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2022-44268",
|
||||
"full_name": "agathanon/cve-2022-44268",
|
||||
"html_url": "https://github.com/agathanon/cve-2022-44268",
|
||||
"description": "Payload generator and extractor for CVE-2022-44268 written in Python.",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-02-03T19:02:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-automated",
|
||||
"full_name": "PanAdamski/CVE-2022-44268-automated",
|
||||
"html_url": "https://github.com/PanAdamski/CVE-2022-44268-automated",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-08-28T11:28:34Z"
|
||||
},
|
||||
{
|
||||
"name": "auto-cve-2022-44268.sh",
|
||||
"full_name": "narekkay/auto-cve-2022-44268.sh",
|
||||
"html_url": "https://github.com/narekkay/auto-cve-2022-44268.sh",
|
||||
"description": "Automating Exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-17T22:21:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-PoC",
|
||||
"full_name": "Baikuya/CVE-2022-44268-PoC",
|
||||
"html_url": "https://github.com/Baikuya/CVE-2022-44268-PoC",
|
||||
"description": "CVE-2022-44268 PoC",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-02-04T10:50:20Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-MagiLeak",
|
||||
"full_name": "adhikara13/CVE-2022-44268-MagiLeak",
|
||||
"html_url": "https://github.com/adhikara13/CVE-2022-44268-MagiLeak",
|
||||
"description": "Tools for working with ImageMagick to handle arbitrary file read vulnerabilities. Generate, read, and apply profile information to PNG files using a command-line interface.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-06-25T20:52:57Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268_By_Kyokito",
|
||||
"full_name": "chairat095/CVE-2022-44268_By_Kyokito",
|
||||
"html_url": "https://github.com/chairat095/CVE-2022-44268_By_Kyokito",
|
||||
"description": "CVE-2022-44268_By_Kyokito",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-08-13T04:43:12Z"
|
||||
},
|
||||
{
|
||||
"name": "POC-CVE-2022-44268",
|
||||
"full_name": "betillogalvanfbc/POC-CVE-2022-44268",
|
||||
"html_url": "https://github.com/betillogalvanfbc/POC-CVE-2022-44268",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-03-22T21:26:20Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-Exploit",
|
||||
"full_name": "bhavikmalhotra/CVE-2022-44268-Exploit",
|
||||
"html_url": "https://github.com/bhavikmalhotra/CVE-2022-44268-Exploit",
|
||||
"description": "Expoit for CVE-2022-44268",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-02T17:24:00Z"
|
||||
},
|
||||
{
|
||||
"name": "Exploit-for-ImageMagick-CVE-2022-44268",
|
||||
"full_name": "atici/Exploit-for-ImageMagick-CVE-2022-44268",
|
||||
"html_url": "https://github.com/atici/Exploit-for-ImageMagick-CVE-2022-44268",
|
||||
"description": "A bash script for easyly exploiting ImageMagick Arbitrary File Read Vulnerability CVE-2022-44268",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-09-05T17:16:06Z"
|
||||
},
|
||||
{
|
||||
"name": "-CVE-2022-44268",
|
||||
"full_name": "NataliSemi/-CVE-2022-44268",
|
||||
"html_url": "https://github.com/NataliSemi/-CVE-2022-44268",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-14T21:54:17Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2022-44268",
|
||||
"full_name": "Pog-Frog/cve-2022-44268",
|
||||
"html_url": "https://github.com/Pog-Frog/cve-2022-44268",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-14T17:46:15Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268",
|
||||
"full_name": "FlojBoj/CVE-2022-44268",
|
||||
"html_url": "https://github.com/FlojBoj/CVE-2022-44268",
|
||||
"description": "ImageMagick 7.1.0-49 vulnerable to Information Disclosure",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-09-02T09:11:45Z"
|
||||
},
|
||||
{
|
||||
"name": "heroku-CVE-2022-44268-reproduction",
|
||||
"full_name": "nfm/heroku-CVE-2022-44268-reproduction",
|
||||
"html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-02-21T01:15:07Z"
|
||||
},
|
||||
{
|
||||
"name": "IMAGE-MAGICK-CVE-2022-44268",
|
||||
"full_name": "Vagebondcur/IMAGE-MAGICK-CVE-2022-44268",
|
||||
"html_url": "https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-10-13T15:43:49Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-automated-poc",
|
||||
"full_name": "Ashifcoder/CVE-2022-44268-automated-poc",
|
||||
"html_url": "https://github.com/Ashifcoder/CVE-2022-44268-automated-poc",
|
||||
"description": "An information disclosure vulnerability that could be exploited to read arbitrary files from a server when parsing an image in Image Magic.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-02-04T03:50:07Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-fixed-PoC",
|
||||
"full_name": "CygnusX-26/CVE-2022-44268-fixed-PoC",
|
||||
"html_url": "https://github.com/CygnusX-26/CVE-2022-44268-fixed-PoC",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-12-04T08:48:28Z"
|
||||
}
|
||||
]
|
29
exploits/2023/CVE-2023-25194.json
Normal file
29
exploits/2023/CVE-2023-25194.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2023-25194",
|
||||
"full_name": "ohnonoyesyes/CVE-2023-25194",
|
||||
"html_url": "https://github.com/ohnonoyesyes/CVE-2023-25194",
|
||||
"description": null,
|
||||
"stargazers_count": 92,
|
||||
"forks_count": 29,
|
||||
"created_at": "2023-02-09T10:49:46Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2023-25194",
|
||||
"full_name": "vulncheck-oss/cve-2023-25194",
|
||||
"html_url": "https://github.com/vulncheck-oss/cve-2023-25194",
|
||||
"description": "A go-exploit for Apache Druid CVE-2023-25194",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-04-17T13:36:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-25194",
|
||||
"full_name": "YongYe-Security/CVE-2023-25194",
|
||||
"html_url": "https://github.com/YongYe-Security/CVE-2023-25194",
|
||||
"description": "CVE-2023-25194 Scan",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-12-28T04:24:02Z"
|
||||
}
|
||||
]
|
11
exploits/2023/CVE-2023-25610.json
Normal file
11
exploits/2023/CVE-2023-25610.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2023-25610",
|
||||
"full_name": "qi4L/CVE-2023-25610",
|
||||
"html_url": "https://github.com/qi4L/CVE-2023-25610",
|
||||
"description": "FortiOS 管理界面中的堆内存下溢导致远程代码执行",
|
||||
"stargazers_count": 23,
|
||||
"forks_count": 8,
|
||||
"created_at": "2023-06-17T06:57:28Z"
|
||||
}
|
||||
]
|
11
exploits/2023/CVE-2023-25725.json
Normal file
11
exploits/2023/CVE-2023-25725.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "LAB-CVE-2023-25725",
|
||||
"full_name": "sgwgsw/LAB-CVE-2023-25725",
|
||||
"html_url": "https://github.com/sgwgsw/LAB-CVE-2023-25725",
|
||||
"description": "Lab environment to test CVE-2023-25725",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-08-23T04:32:54Z"
|
||||
}
|
||||
]
|
38
exploits/2023/CVE-2023-26256.json
Normal file
38
exploits/2023/CVE-2023-26256.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2023-26256",
|
||||
"full_name": "0x7eTeam/CVE-2023-26256",
|
||||
"html_url": "https://github.com/0x7eTeam/CVE-2023-26256",
|
||||
"description": "CVE-2023-26255_POC,CVE-2023-26256_POC",
|
||||
"stargazers_count": 31,
|
||||
"forks_count": 10,
|
||||
"created_at": "2023-08-24T01:57:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-26256",
|
||||
"full_name": "jcad123/CVE-2023-26256",
|
||||
"html_url": "https://github.com/jcad123/CVE-2023-26256",
|
||||
"description": "CVE-2023-26255_POC,CVE-2023-26256_POC",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-09-01T00:10:36Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-26256",
|
||||
"full_name": "qs119/CVE-2023-26256",
|
||||
"html_url": "https://github.com/qs119/CVE-2023-26256",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-08-30T15:21:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-26256",
|
||||
"full_name": "xhs-d/CVE-2023-26256",
|
||||
"html_url": "https://github.com/xhs-d/CVE-2023-26256",
|
||||
"description": "CVE-2023-26256_POC",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-08-28T08:00:16Z"
|
||||
}
|
||||
]
|
11
exploits/2023/CVE-2023-31346.json
Normal file
11
exploits/2023/CVE-2023-31346.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2023-31346-poc",
|
||||
"full_name": "Freax13/cve-2023-31346-poc",
|
||||
"html_url": "https://github.com/Freax13/cve-2023-31346-poc",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-09-03T13:54:51Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue