CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
cve
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera | cve | |
---|---|---|
7 | 13 | |
321 | 6,083 | |
- | 1.3% | |
0.0 | 9.7 | |
over 1 year ago | about 14 hours ago | |
HTML | HTML | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
- CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- π© π€π» [P1-Reward:$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
cve
-
Strange subdomain found during nmap scan
Did you try using https://trickest.com?
- A folosit cineva pΓ’nΔ acum Trickest?
- CVE POCs
- windows exploit dev ctfs
- Asking for Advice - How can we find Linux N-days to develop exploits for?
-
[Help] I'm looking for a downloadable list of all CVEs including vulnerability
Anyhow, these project might help: - https://cve-search.github.io/cve-search/ - https://github.com/trickest/cve/ - https://github.com/ChrisIvie/offline-cve - https://avleonov.com/2017/10/03/downloading-and-analyzing-nvd-cve-feed/ - opencve.io
- Awesome Hacker Search Engines
-
PoC available for CVE's
https://github.com/trickest/cve this repo might have what you want
- A constantly updated collection of almost every publicly available CVE PoC
What are some alternatives?
black-hat-rust - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
CVE-2021-4034 - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkitβs pkexec (CVE-2021-4034)
cervantes - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
A-Red-Teamer-diaries - RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
awesome-list-of-secrets-in-environment-variables - π¦π Awesome list of secrets in environment variables π₯οΈ
unikernels - State of the art for unikernels
CVE-2021-44228-PoC-log4j-bypass-words - π±βπ» βοΈ π€¬ CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
fleet - A flexible control server for osquery fleets