├── CNVD-2021-49104 泛微e-office任意文件上传漏洞.txt ├── CVE-2020-27986_SonarQube_api_未授权访问.py ├── CVE-2021-36749.py ├── CVE-2021-4034.py ├── CVE-2021-43778_GLPI路径遍历漏洞.py ├── CVE-2021-43798_grafana任意文件读取.py ├── CVE-2022-0543.py ├── CVE-2022-0847 ├── READEME.md ├── dirtypipez ├── dirtypipez.c ├── exploit └── exploit.c ├── CVE-2022-22616: Simple way to bypass GateKeeper ├── CVE-2022-26134 Atlassian Confluence远程命令执行 ├── CVE-2022-26134.py └── READEME.md ├── CVE-2022-26134.py ├── CVE-2022-30525 Zyxel USG FLEX handler 远程命令注入漏洞.py ├── CVE-2022-31793.py ├── CVE-2023-27524 Apache Superset Auth Bypass ├── CVE-2023-27524.py ├── CVE-2023-27524.yaml ├── README.md ├── requirements.txt └── secretkey.txt ├── JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar ├── README.md ├── cve_2022_22947.py ├── dirtypipez └── log4j2_jndi_rce.txt /CNVD-2021-49104 泛微e-office任意文件上传漏洞.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CNVD-2021-49104 泛微e-office任意文件上传漏洞.txt -------------------------------------------------------------------------------- /CVE-2020-27986_SonarQube_api_未授权访问.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2020-27986_SonarQube_api_未授权访问.py -------------------------------------------------------------------------------- /CVE-2021-36749.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2021-36749.py -------------------------------------------------------------------------------- /CVE-2021-4034.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2021-4034.py -------------------------------------------------------------------------------- /CVE-2021-43778_GLPI路径遍历漏洞.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2021-43778_GLPI路径遍历漏洞.py -------------------------------------------------------------------------------- /CVE-2021-43798_grafana任意文件读取.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2021-43798_grafana任意文件读取.py -------------------------------------------------------------------------------- /CVE-2022-0543.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-0543.py -------------------------------------------------------------------------------- /CVE-2022-0847/READEME.md: -------------------------------------------------------------------------------- 1 | CVE-2022-0847 2 | -------------------------------------------------------------------------------- /CVE-2022-0847/dirtypipez: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-0847/dirtypipez -------------------------------------------------------------------------------- /CVE-2022-0847/dirtypipez.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-0847/dirtypipez.c -------------------------------------------------------------------------------- /CVE-2022-0847/exploit: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-0847/exploit -------------------------------------------------------------------------------- /CVE-2022-0847/exploit.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-0847/exploit.c -------------------------------------------------------------------------------- /CVE-2022-22616: Simple way to bypass GateKeeper: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-22616: Simple way to bypass GateKeeper -------------------------------------------------------------------------------- /CVE-2022-26134 Atlassian Confluence远程命令执行/CVE-2022-26134.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-26134 Atlassian Confluence远程命令执行/CVE-2022-26134.py -------------------------------------------------------------------------------- /CVE-2022-26134 Atlassian Confluence远程命令执行/READEME.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-26134 Atlassian Confluence远程命令执行/READEME.md -------------------------------------------------------------------------------- /CVE-2022-26134.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-26134.py -------------------------------------------------------------------------------- /CVE-2022-30525 Zyxel USG FLEX handler 远程命令注入漏洞.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-30525 Zyxel USG FLEX handler 远程命令注入漏洞.py -------------------------------------------------------------------------------- /CVE-2022-31793.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2022-31793.py -------------------------------------------------------------------------------- /CVE-2023-27524 Apache Superset Auth Bypass/CVE-2023-27524.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2023-27524 Apache Superset Auth Bypass/CVE-2023-27524.py -------------------------------------------------------------------------------- /CVE-2023-27524 Apache Superset Auth Bypass/CVE-2023-27524.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2023-27524 Apache Superset Auth Bypass/CVE-2023-27524.yaml -------------------------------------------------------------------------------- /CVE-2023-27524 Apache Superset Auth Bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2023-27524 Apache Superset Auth Bypass/README.md -------------------------------------------------------------------------------- /CVE-2023-27524 Apache Superset Auth Bypass/requirements.txt: -------------------------------------------------------------------------------- 1 | flask-unsign==1.2.0 2 | requests==2.26.0 3 | -------------------------------------------------------------------------------- /CVE-2023-27524 Apache Superset Auth Bypass/secretkey.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/CVE-2023-27524 Apache Superset Auth Bypass/secretkey.txt -------------------------------------------------------------------------------- /JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/README.md -------------------------------------------------------------------------------- /cve_2022_22947.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/cve_2022_22947.py -------------------------------------------------------------------------------- /dirtypipez: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/dirtypipez -------------------------------------------------------------------------------- /log4j2_jndi_rce.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/d-rn/vulBox/HEAD/log4j2_jndi_rce.txt --------------------------------------------------------------------------------