Auto Update 2023/02/22 06:28:39

This commit is contained in:
motikan2010-bot 2023-02-22 15:28:39 +09:00
parent 21fb92ca3a
commit 07129cf226
42 changed files with 189 additions and 370 deletions

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
"fork": false,
"created_at": "2016-01-24T13:49:03Z",
"updated_at": "2022-11-18T12:24:19Z",
"updated_at": "2023-02-22T05:52:39Z",
"pushed_at": "2016-01-24T22:20:44Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-20T14:32:57Z",
"updated_at": "2023-02-22T02:56:26Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1625,
"watchers_count": 1625,
"stargazers_count": 1626,
"watchers_count": 1626,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1625,
"watchers": 1626,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC exploit for CVE-2016-4622",
"fork": false,
"created_at": "2016-10-09T15:22:06Z",
"updated_at": "2022-12-20T02:47:37Z",
"updated_at": "2023-02-22T05:29:39Z",
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 95,
"watchers": 96,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2023-02-06T02:34:29Z",
"updated_at": "2023-02-22T00:52:44Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 488,
"watchers_count": 488,
"has_discussions": false,
"forks_count": 197,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 197,
"watchers": 489,
"watchers": 488,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-20T14:32:57Z",
"updated_at": "2023-02-22T02:56:26Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1625,
"watchers_count": 1625,
"stargazers_count": 1626,
"watchers_count": 1626,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1625,
"watchers": 1626,
"score": 0
},
{

View file

@ -192,10 +192,10 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2022-12-02T09:30:30Z",
"updated_at": "2023-02-22T00:59:31Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 319,
"watchers_count": 319,
"stargazers_count": 318,
"watchers_count": 318,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -204,7 +204,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 319,
"watchers": 318,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2023-02-20T02:06:19Z",
"updated_at": "2023-02-22T05:55:14Z",
"pushed_at": "2023-02-20T02:06:22Z",
"stargazers_count": 489,
"watchers_count": 489,
"stargazers_count": 490,
"watchers_count": 490,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 489,
"watchers": 490,
"score": 0
},
{

View file

@ -367,10 +367,10 @@
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
"fork": false,
"created_at": "2019-03-25T04:22:14Z",
"updated_at": "2021-10-03T22:48:04Z",
"updated_at": "2023-02-22T04:05:32Z",
"pushed_at": "2019-03-26T04:54:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -379,7 +379,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-20T14:32:57Z",
"updated_at": "2023-02-22T02:56:26Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1625,
"watchers_count": 1625,
"stargazers_count": 1626,
"watchers_count": 1626,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1625,
"watchers": 1626,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-20T14:32:57Z",
"updated_at": "2023-02-22T02:56:26Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1625,
"watchers_count": 1625,
"stargazers_count": 1626,
"watchers_count": 1626,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1625,
"watchers": 1626,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-02-20T14:32:57Z",
"updated_at": "2023-02-22T02:56:26Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1625,
"watchers_count": 1625,
"stargazers_count": 1626,
"watchers_count": 1626,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 318,
"watchers": 1625,
"watchers": 1626,
"score": 0
},
{

View file

@ -432,10 +432,10 @@
"description": "Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE",
"fork": false,
"created_at": "2022-11-14T14:48:30Z",
"updated_at": "2023-02-21T17:28:13Z",
"updated_at": "2023-02-22T02:04:05Z",
"pushed_at": "2023-02-15T09:41:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -444,7 +444,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2022-11-09T18:14:15Z",
"updated_at": "2023-02-22T03:12:14Z",
"pushed_at": "2022-03-21T13:23:03Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -778,10 +778,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-02-21T18:55:54Z",
"updated_at": "2023-02-22T01:44:57Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 841,
"watchers_count": 841,
"stargazers_count": 842,
"watchers_count": 842,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@ -797,7 +797,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 841,
"watchers": 842,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2023-02-17T04:00:49Z",
"updated_at": "2023-02-22T06:15:27Z",
"pushed_at": "2021-07-09T19:38:41Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -160,10 +160,10 @@
"description": "CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP, 移除了对djvumake & djvulibre的依赖可在win平台使用",
"fork": false,
"created_at": "2021-10-30T02:56:34Z",
"updated_at": "2022-11-17T01:18:57Z",
"updated_at": "2023-02-22T02:58:00Z",
"pushed_at": "2021-10-30T03:04:03Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -172,7 +172,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -1259,10 +1259,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-02-21T15:11:45Z",
"updated_at": "2023-02-22T02:42:20Z",
"pushed_at": "2023-02-14T05:23:45Z",
"stargazers_count": 621,
"watchers_count": 621,
"stargazers_count": 622,
"watchers_count": 622,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -1276,7 +1276,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 621,
"watchers": 622,
"score": 0
},
{
@ -3614,10 +3614,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-02-19T14:16:53Z",
"updated_at": "2023-02-22T04:30:29Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3192,
"watchers_count": 3192,
"stargazers_count": 3193,
"watchers_count": 3193,
"has_discussions": true,
"forks_count": 747,
"allow_forking": true,
@ -3626,7 +3626,7 @@
"topics": [],
"visibility": "public",
"forks": 747,
"watchers": 3192,
"watchers": 3193,
"score": 0
},
{

View file

@ -1,31 +0,0 @@
[
{
"id": 452082369,
"name": "CVE-2022-0332",
"full_name": "numanturle\/CVE-2022-0332",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-0332",
"description": null,
"fork": false,
"created_at": "2022-01-25T23:58:17Z",
"updated_at": "2023-02-05T23:06:38Z",
"pushed_at": "2022-01-26T00:18:26Z",
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 38,
"score": 0
}
]

View file

@ -397,10 +397,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-05-09T14:01:38Z",
"updated_at": "2022-12-05T17:22:08Z",
"updated_at": "2023-02-22T01:50:37Z",
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -412,7 +412,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 30,
"watchers": 33,
"score": 0
},
{

View file

@ -1,33 +1,4 @@
[
{
"id": 451918204,
"name": "CVE-2022-21371",
"full_name": "Mr-xn\/CVE-2022-21371",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-21371",
"description": "Oracle WebLogic Server 12.1.3.0.0 \/ 12.2.1.3.0 \/ 12.2.1.4.0 \/ 14.1.1.0.0 Local File Inclusion",
"fork": false,
"created_at": "2022-01-25T14:50:29Z",
"updated_at": "2022-11-22T02:30:33Z",
"pushed_at": "2022-01-25T14:52:21Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 26,
"score": 0
},
{
"id": 528880899,
"name": "Oracle-WebLogic-CVE-2022-21371",

View file

@ -1,35 +0,0 @@
[
{
"id": 450374545,
"name": "cve-2022-21658",
"full_name": "sagittarius-a\/cve-2022-21658",
"owner": {
"login": "sagittarius-a",
"id": 8809698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
"html_url": "https:\/\/github.com\/sagittarius-a"
},
"html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
"description": "POC for cve-2022-21658",
"fork": false,
"created_at": "2022-01-21T06:09:16Z",
"updated_at": "2022-01-21T06:10:05Z",
"pushed_at": "2022-01-21T06:09:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21658",
"poc",
"rust"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -171,35 +171,6 @@
"watchers": 72,
"score": 0
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2023-01-14T13:43:20Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 18,
"score": 0
},
{
"id": 477659433,
"name": "CVE-2022-21907",

View file

@ -1,31 +0,0 @@
[
{
"id": 450430110,
"name": "CVE-2022-22296",
"full_name": "vlakhani28\/CVE-2022-22296",
"owner": {
"login": "vlakhani28",
"id": 42069316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
"html_url": "https:\/\/github.com\/vlakhani28"
},
"html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
"description": "All Details about CVE-2022-22296",
"fork": false,
"created_at": "2022-01-21T09:29:21Z",
"updated_at": "2022-10-02T03:41:44Z",
"pushed_at": "2022-01-21T09:45:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0
}
]

View file

@ -1273,10 +1273,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2023-02-21T16:02:16Z",
"updated_at": "2023-02-22T02:57:53Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -1285,7 +1285,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 138,
"watchers": 139,
"score": 0
},
{

View file

@ -680,10 +680,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-02-21T18:55:54Z",
"updated_at": "2023-02-22T01:44:57Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 841,
"watchers_count": 841,
"stargazers_count": 842,
"watchers_count": 842,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@ -699,7 +699,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 841,
"watchers": 842,
"score": 0
},
{

View file

@ -226,10 +226,10 @@
"description": "Spring Cloud Function Vulnerable Application \/ CVE-2022-22963",
"fork": false,
"created_at": "2022-03-31T14:32:14Z",
"updated_at": "2022-05-06T01:29:18Z",
"updated_at": "2023-02-22T05:05:16Z",
"pushed_at": "2022-04-01T12:51:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -238,7 +238,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -774,10 +774,10 @@
"description": "Spring Framework RCE via Data Binding on JDK 9+ \/ spring4shell \/ CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T13:35:01Z",
"updated_at": "2023-01-31T13:51:52Z",
"updated_at": "2023-02-22T05:05:15Z",
"pushed_at": "2022-04-04T01:16:41Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -786,7 +786,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -1823,10 +1823,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2023-02-21T14:32:02Z",
"updated_at": "2023-02-22T03:34:03Z",
"pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1835,7 +1835,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -1,33 +1,4 @@
[
{
"id": 450827017,
"name": "CVE-2022-23046",
"full_name": "jcarabantes\/CVE-2022-23046",
"owner": {
"login": "jcarabantes",
"id": 9590425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9590425?v=4",
"html_url": "https:\/\/github.com\/jcarabantes"
},
"html_url": "https:\/\/github.com\/jcarabantes\/CVE-2022-23046",
"description": null,
"fork": false,
"created_at": "2022-01-22T13:35:40Z",
"updated_at": "2022-02-16T08:00:53Z",
"pushed_at": "2022-01-24T17:29:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 459366538,
"name": "CVE-2022-23046",

View file

@ -18,13 +18,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2023-01-04T16:28:38Z",
"updated_at": "2023-02-22T01:50:43Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 414,
"watchers_count": 414,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 412,
"watchers": 414,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-02-21T01:54:29Z",
"updated_at": "2023-02-22T06:06:48Z",
"pushed_at": "2023-01-28T12:45:19Z",
"stargazers_count": 921,
"watchers_count": 921,
"stargazers_count": 920,
"watchers_count": 920,
"has_discussions": true,
"forks_count": 162,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 162,
"watchers": 921,
"watchers": 920,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2023-02-20T10:24:39Z",
"updated_at": "2023-02-22T05:09:35Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 419,
"watchers_count": 419,
"stargazers_count": 420,
"watchers_count": 420,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 419,
"watchers": 420,
"score": 0
}
]

View file

@ -13,19 +13,48 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2023-02-22T00:04:15Z",
"updated_at": "2023-02-22T06:15:12Z",
"pushed_at": "2023-02-20T15:14:51Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 20,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 48,
"forks": 22,
"watchers": 86,
"score": 0
},
{
"id": 604936934,
"name": "CVE-2022-39952_webshell",
"full_name": "shiyeshu\/CVE-2022-39952_webshell",
"owner": {
"login": "shiyeshu",
"id": 23716358,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23716358?v=4",
"html_url": "https:\/\/github.com\/shiyeshu"
},
"html_url": "https:\/\/github.com\/shiyeshu\/CVE-2022-39952_webshell",
"description": "Write Behinder_webshell to target using CVE-2022-39952",
"fork": false,
"created_at": "2023-02-22T04:57:06Z",
"updated_at": "2023-02-22T05:13:48Z",
"pushed_at": "2023-02-22T05:01:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2023-02-20T05:30:47Z",
"updated_at": "2023-02-22T04:18:57Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 304,
"watchers_count": 304,
"stargazers_count": 305,
"watchers_count": 305,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 304,
"watchers": 305,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-02-21T09:18:21Z",
"updated_at": "2023-02-22T05:04:01Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 194,
"watchers": 195,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
"fork": false,
"created_at": "2023-02-15T18:12:04Z",
"updated_at": "2023-02-21T14:34:01Z",
"updated_at": "2023-02-22T01:50:07Z",
"pushed_at": "2023-02-15T18:18:21Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 81,
"watchers": 80,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-11-22T23:11:08Z",
"updated_at": "2023-02-13T15:36:48Z",
"updated_at": "2023-02-22T05:58:06Z",
"pushed_at": "2023-01-28T10:31:02Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 11,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-02-21T13:44:29Z",
"updated_at": "2023-02-22T05:39:15Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 321,
"watchers": 322,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-02-21T21:39:22Z",
"updated_at": "2023-02-22T06:03:03Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 737,
"watchers_count": 737,
"stargazers_count": 738,
"watchers_count": 738,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 737,
"watchers": 738,
"score": 0
},
{
@ -129,10 +129,10 @@
"description": "File Manager for CVE-2022-46689",
"fork": false,
"created_at": "2022-12-28T22:13:35Z",
"updated_at": "2023-02-19T09:24:11Z",
"updated_at": "2023-02-22T03:37:42Z",
"pushed_at": "2023-01-02T00:36:39Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 78,
"watchers": 79,
"score": 0
},
{
@ -349,10 +349,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-26T19:52:30Z",
"updated_at": "2023-02-21T06:59:05Z",
"updated_at": "2023-02-22T06:04:58Z",
"pushed_at": "2023-02-11T22:02:41Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -361,7 +361,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 116,
"watchers": 117,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T18:47:42Z",
"updated_at": "2023-02-21T18:48:01Z",
"updated_at": "2023-02-22T05:16:06Z",
"pushed_at": "2023-02-21T18:50:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T16:08:56Z",
"updated_at": "2023-02-21T23:55:58Z",
"updated_at": "2023-02-22T06:18:48Z",
"pushed_at": "2023-02-21T16:32:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 1,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 7,
"watchers": 25,
"score": 0
}
]

View file

@ -100,7 +100,7 @@
"description": "Poc for CVE-2023-23752 (joomla CMS)",
"fork": false,
"created_at": "2023-02-18T20:43:43Z",
"updated_at": "2023-02-20T21:31:02Z",
"updated_at": "2023-02-22T04:28:25Z",
"pushed_at": "2023-02-18T21:09:48Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -253,14 +253,6 @@ The WeStand WordPress theme before 2.1, footysquare WordPress theme, aidreform W
- [KTN1990/CVE-2022-0316_wordpress_multiple_themes_exploit](https://github.com/KTN1990/CVE-2022-0316_wordpress_multiple_themes_exploit)
### CVE-2022-0332 (2022-01-25)
<code>
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
</code>
- [numanturle/CVE-2022-0332](https://github.com/numanturle/CVE-2022-0332)
### CVE-2022-0337 (2023-01-02)
<code>
@ -1296,7 +1288,6 @@ A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Se
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
</code>
- [Mr-xn/CVE-2022-21371](https://github.com/Mr-xn/CVE-2022-21371)
- [Vulnmachines/Oracle-WebLogic-CVE-2022-21371](https://github.com/Vulnmachines/Oracle-WebLogic-CVE-2022-21371)
### CVE-2022-21449 (2022-04-19)
@ -1324,14 +1315,6 @@ Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracl
- [hieuminhnv/CVE-2022-21587-POC](https://github.com/hieuminhnv/CVE-2022-21587-POC)
- [Zh1z3ven/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/Zh1z3ven/Oracle-E-BS-CVE-2022-21587-Exploit)
### CVE-2022-21658 (2022-01-20)
<code>
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
</code>
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
### CVE-2022-21660 (2022-02-09)
<code>
@ -1437,7 +1420,6 @@ HTTP Protocol Stack Remote Code Execution Vulnerability.
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
@ -1503,14 +1485,6 @@ A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allo
- [pwneddr/Sonic_CVE-2022-22274_poc](https://github.com/pwneddr/Sonic_CVE-2022-22274_poc)
### CVE-2022-22296 (2022-01-24)
<code>
Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
</code>
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
### CVE-2022-22536 (2022-02-09)
<code>
@ -1915,7 +1889,6 @@ A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Qu
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the &quot;subnet&quot; parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
</code>
- [jcarabantes/CVE-2022-23046](https://github.com/jcarabantes/CVE-2022-23046)
- [dnr6419/CVE-2022-23046](https://github.com/dnr6419/CVE-2022-23046)
- [hadrian3689/phpipam_1.4.4](https://github.com/hadrian3689/phpipam_1.4.4)
- [bernauers/CVE-2022-23046](https://github.com/bernauers/CVE-2022-23046)
@ -4902,6 +4875,7 @@ A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2
</code>
- [horizon3ai/CVE-2022-39952](https://github.com/horizon3ai/CVE-2022-39952)
- [shiyeshu/CVE-2022-39952_webshell](https://github.com/shiyeshu/CVE-2022-39952_webshell)
### CVE-2022-39959 (2022-10-07)