Auto Update 2023/03/21 00:28:14

This commit is contained in:
motikan2010-bot 2023-03-21 09:28:14 +09:00
parent da62f940e5
commit 0f00ec6fac
43 changed files with 147 additions and 960 deletions

View file

@ -129,10 +129,10 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2023-02-21T12:06:17Z",
"updated_at": "2023-03-20T20:36:01Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@ -146,7 +146,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 307,
"watchers": 308,
"score": 0
},
{

View file

@ -250,7 +250,7 @@
"description": "cve-2018-10933 libssh authentication bypass",
"fork": false,
"created_at": "2018-10-18T19:13:45Z",
"updated_at": "2022-09-07T06:58:04Z",
"updated_at": "2023-03-20T19:49:55Z",
"pushed_at": "2018-10-21T21:24:29Z",
"stargazers_count": 101,
"watchers_count": 101,

View file

@ -104,10 +104,10 @@
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
"fork": false,
"created_at": "2018-06-07T08:30:07Z",
"updated_at": "2023-02-26T14:56:04Z",
"updated_at": "2023-03-20T20:34:45Z",
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"has_discussions": false,
"forks_count": 126,
"allow_forking": true,
@ -116,7 +116,7 @@
"topics": [],
"visibility": "public",
"forks": 126,
"watchers": 292,
"watchers": 293,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 156,
"score": 0
},

View file

@ -1532,10 +1532,10 @@
"description": "CVE-2021-3156 POC and Docker and Analysis write up",
"fork": false,
"created_at": "2022-01-27T02:31:43Z",
"updated_at": "2023-01-31T18:43:03Z",
"updated_at": "2023-03-20T21:20:34Z",
"pushed_at": "2022-05-23T01:51:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1544,7 +1544,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -1,20 +1,20 @@
[
{
"id": 510479826,
"name": "CVE-2022-30887",
"full_name": "MuallimNaci\/CVE-2022-30887",
"id": 562227251,
"name": "CVE-2021-3656-Demo",
"full_name": "rami08448\/CVE-2021-3656-Demo",
"owner": {
"login": "MuallimNaci",
"id": 87265009,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4",
"html_url": "https:\/\/github.com\/MuallimNaci"
"login": "rami08448",
"id": 77466752,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77466752?v=4",
"html_url": "https:\/\/github.com\/rami08448"
},
"html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887",
"html_url": "https:\/\/github.com\/rami08448\/CVE-2021-3656-Demo",
"description": null,
"fork": false,
"created_at": "2022-07-04T19:24:56Z",
"updated_at": "2022-12-08T03:15:35Z",
"pushed_at": "2022-07-04T19:30:52Z",
"created_at": "2022-11-05T17:32:47Z",
"updated_at": "2023-03-20T20:09:22Z",
"pushed_at": "2022-11-22T03:03:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -1508,14 +1508,14 @@
{
"id": 452478414,
"name": "CVE-2021-4034",
"full_name": "T3cnokarita\/CVE-2021-4034",
"full_name": "ch4rum\/CVE-2021-4034",
"owner": {
"login": "T3cnokarita",
"login": "ch4rum",
"id": 98498025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98498025?v=4",
"html_url": "https:\/\/github.com\/T3cnokarita"
"html_url": "https:\/\/github.com\/ch4rum"
},
"html_url": "https:\/\/github.com\/T3cnokarita\/CVE-2021-4034",
"html_url": "https:\/\/github.com\/ch4rum\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-01-26T23:46:28Z",

View file

@ -73,10 +73,10 @@
"description": "LPE exploit for a UAF in Windows (CVE-2021-40449).",
"fork": false,
"created_at": "2021-10-25T04:58:49Z",
"updated_at": "2023-01-31T18:52:30Z",
"updated_at": "2023-03-20T19:39:52Z",
"pushed_at": "2021-11-05T06:54:10Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -87,7 +87,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -923,14 +923,14 @@
{
"id": 414574168,
"name": "POC-CVE-2021-41773",
"full_name": "Hattan-515\/POC-CVE-2021-41773",
"full_name": "Hattan515\/POC-CVE-2021-41773",
"owner": {
"login": "Hattan-515",
"login": "Hattan515",
"id": 92092916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92092916?v=4",
"html_url": "https:\/\/github.com\/Hattan-515"
"html_url": "https:\/\/github.com\/Hattan515"
},
"html_url": "https:\/\/github.com\/Hattan-515\/POC-CVE-2021-41773",
"html_url": "https:\/\/github.com\/Hattan515\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-07T11:31:03Z",

View file

@ -909,10 +909,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-03-20T10:39:55Z",
"updated_at": "2023-03-21T00:18:22Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1549,
"watchers_count": 1549,
"stargazers_count": 1550,
"watchers_count": 1550,
"has_discussions": false,
"forks_count": 449,
"allow_forking": true,
@ -926,7 +926,7 @@
],
"visibility": "public",
"forks": 449,
"watchers": 1549,
"watchers": 1550,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 46,
"score": 0
},

View file

@ -1865,64 +1865,6 @@
"watchers": 4,
"score": 0
},
{
"id": 510629189,
"name": "dirtypipe-ebpf_detection",
"full_name": "airbus-cert\/dirtypipe-ebpf_detection",
"owner": {
"login": "airbus-cert",
"id": 26453405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
"html_url": "https:\/\/github.com\/airbus-cert"
},
"html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection",
"description": "An eBPF detection program for CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T07:20:59Z",
"updated_at": "2023-01-16T18:05:15Z",
"pushed_at": "2022-07-05T14:25:46Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 21,
"score": 0
},
{
"id": 510867863,
"name": "Dirty-Pipe",
"full_name": "edr1412\/Dirty-Pipe",
"owner": {
"login": "edr1412",
"id": 40953911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
"html_url": "https:\/\/github.com\/edr1412"
},
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
"description": "exp of CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T19:22:50Z",
"updated_at": "2023-01-31T12:51:32Z",
"pushed_at": "2022-07-05T19:23:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 520138171,
"name": "CVE-2022-0847-DirtyPipe-Exploits",

View file

@ -1592,68 +1592,6 @@
"watchers": 3,
"score": 0
},
{
"id": 509548569,
"name": "CVE-2022-1388_refresh",
"full_name": "Luchoane\/CVE-2022-1388_refresh",
"owner": {
"login": "Luchoane",
"id": 40374879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
"html_url": "https:\/\/github.com\/Luchoane"
},
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
"fork": false,
"created_at": "2022-07-01T18:08:50Z",
"updated_at": "2022-07-07T19:22:09Z",
"pushed_at": "2022-07-01T20:04:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510239425,
"name": "CVE-2022-1388",
"full_name": "jbharucha05\/CVE-2022-1388",
"owner": {
"login": "jbharucha05",
"id": 13020621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
"html_url": "https:\/\/github.com\/jbharucha05"
},
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
"description": "CVE-2022-1388, bypassing iControl REST authentication",
"fork": false,
"created_at": "2022-07-04T06:31:56Z",
"updated_at": "2022-07-04T07:08:22Z",
"pushed_at": "2022-07-04T10:37:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"f5-big-ip-icontrol-rest-rce",
"f5-bigip"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 557286411,
"name": "CVE-2022-1388",

View file

@ -1,31 +0,0 @@
[
{
"id": 510660359,
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"description": null,
"fork": false,
"created_at": "2022-07-05T08:59:44Z",
"updated_at": "2022-07-05T09:52:45Z",
"pushed_at": "2022-07-05T09:52:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 509461641,
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"description": null,
"fork": false,
"created_at": "2022-07-01T13:16:14Z",
"updated_at": "2022-07-01T13:25:04Z",
"pushed_at": "2022-07-01T13:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 510684846,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"description": null,
"fork": false,
"created_at": "2022-07-05T10:15:49Z",
"updated_at": "2022-07-05T10:42:21Z",
"pushed_at": "2022-07-05T10:41:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 510346412,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"description": null,
"fork": false,
"created_at": "2022-07-04T12:16:05Z",
"updated_at": "2022-07-04T13:19:53Z",
"pushed_at": "2022-07-04T12:21:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 529215266,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",

View file

@ -202,35 +202,6 @@
"watchers": 0,
"score": 0
},
{
"id": 510875629,
"name": "CVE-2022-21449-I2P-TLS-POC",
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"owner": {
"login": "PyterSmithDarkGhost",
"id": 106814901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
},
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"description": null,
"fork": false,
"created_at": "2022-07-05T19:51:39Z",
"updated_at": "2022-09-01T23:29:48Z",
"pushed_at": "2022-07-05T19:52:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 519281774,
"name": "CVE-2022-21449-showcase",

View file

@ -637,64 +637,6 @@
"watchers": 0,
"score": 0
},
{
"id": 524471767,
"name": "CVE-2022-22954",
"full_name": "amit-pathak009\/CVE-2022-22954",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:04Z",
"updated_at": "2022-06-02T01:44:19Z",
"pushed_at": "2022-06-02T01:44:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 524471940,
"name": "CVE-2022-22954-PoC",
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:39Z",
"updated_at": "2022-06-01T22:41:09Z",
"pushed_at": "2022-06-01T22:41:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 545257457,
"name": "VcenterKiller",

View file

@ -18,7 +18,7 @@
"stargazers_count": 318,
"watchers_count": 318,
"has_discussions": false,
"forks_count": 103,
"forks_count": 104,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"tomcat"
],
"visibility": "public",
"forks": 103,
"forks": 104,
"watchers": 318,
"score": 0
},
@ -1896,35 +1896,6 @@
"watchers": 71,
"score": 0
},
{
"id": 510562121,
"name": "CVE-2022-22965",
"full_name": "trhacknon\/CVE-2022-22965",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-07-05T02:30:29Z",
"updated_at": "2022-09-27T23:19:26Z",
"pushed_at": "2022-07-05T02:32:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 510569312,
"name": "Spring4Shell-CVE-2022-22965",

View file

@ -1,39 +0,0 @@
[
{
"id": 509870464,
"name": "CVE-2022-24342",
"full_name": "yuriisanin\/CVE-2022-24342",
"owner": {
"login": "yuriisanin",
"id": 11749007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
"html_url": "https:\/\/github.com\/yuriisanin"
},
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342",
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
"fork": false,
"created_at": "2022-07-02T22:04:29Z",
"updated_at": "2023-02-12T21:01:11Z",
"pushed_at": "2022-07-05T17:31:35Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"csrf",
"cve",
"cve-2022-24342",
"exploit",
"jetbrains",
"teamcity",
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 34,
"score": 0
}
]

View file

@ -57,35 +57,6 @@
"watchers": 0,
"score": 0
},
{
"id": 510182546,
"name": "CVE-2022-24706",
"full_name": "superzerosec\/CVE-2022-24706",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706",
"description": "CVE-2022-24706 POC exploit",
"fork": false,
"created_at": "2022-07-04T02:06:27Z",
"updated_at": "2022-07-04T02:06:27Z",
"pushed_at": "2022-07-04T02:06:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 533101052,
"name": "CVE-2022-24706-CouchDB-Exploit",

View file

@ -13,10 +13,10 @@
"description": " Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
"fork": false,
"created_at": "2023-03-20T04:31:32Z",
"updated_at": "2023-03-20T17:20:55Z",
"updated_at": "2023-03-20T19:53:26Z",
"pushed_at": "2023-03-20T18:07:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
"fork": false,
"created_at": "2023-03-19T20:41:46Z",
"updated_at": "2023-03-20T17:03:44Z",
"updated_at": "2023-03-20T23:34:15Z",
"pushed_at": "2023-03-20T05:02:21Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "CVE-2022-24716 | Arbitrary File Disclosure Icingaweb2",
"fork": false,
"created_at": "2023-03-20T02:25:55Z",
"updated_at": "2023-03-20T17:33:14Z",
"pushed_at": "2023-03-20T02:32:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"updated_at": "2023-03-20T23:30:28Z",
"pushed_at": "2023-03-20T23:26:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -1280,35 +1280,6 @@
"watchers": 0,
"score": 0
},
{
"id": 510402169,
"name": "TryHackMe-Atlassian-CVE-2022-26134",
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"owner": {
"login": "r1skkam",
"id": 58542375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
"html_url": "https:\/\/github.com\/r1skkam"
},
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
"fork": false,
"created_at": "2022-07-04T15:00:21Z",
"updated_at": "2022-07-19T02:30:51Z",
"pushed_at": "2022-07-04T16:49:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510586350,
"name": "CVE-2022-26134",
@ -1343,44 +1314,6 @@
"watchers": 10,
"score": 0
},
{
"id": 510624422,
"name": "CVE-2022-26134",
"full_name": "Debajyoti0-0\/CVE-2022-26134",
"owner": {
"login": "Debajyoti0-0",
"id": 79437050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
"html_url": "https:\/\/github.com\/Debajyoti0-0"
},
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-07-05T07:04:50Z",
"updated_at": "2022-07-10T08:52:10Z",
"pushed_at": "2022-07-05T09:40:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"atlassian-confluence",
"cve-2022-26134",
"infosec",
"ognl-injection-vulnerability",
"payload",
"python",
"rce",
"unauthenticated"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 510946912,
"name": "cve-2022-26134",

View file

@ -1,31 +0,0 @@
[
{
"id": 509675215,
"name": "PCICrash",
"full_name": "zhuowei\/PCICrash",
"owner": {
"login": "zhuowei",
"id": 704768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
"html_url": "https:\/\/github.com\/zhuowei"
},
"html_url": "https:\/\/github.com\/zhuowei\/PCICrash",
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-09-15T17:20:03Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 36,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 509675427,
"name": "CoreTrustDemo",
"full_name": "zhuowei\/CoreTrustDemo",
"owner": {
"login": "zhuowei",
"id": 704768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
"html_url": "https:\/\/github.com\/zhuowei"
},
"html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo",
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
"fork": false,
"created_at": "2022-07-02T06:16:33Z",
"updated_at": "2023-02-26T02:08:22Z",
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 74,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
"fork": false,
"created_at": "2022-05-14T09:27:06Z",
"updated_at": "2023-03-19T05:40:30Z",
"updated_at": "2023-03-20T18:33:42Z",
"pushed_at": "2022-05-14T20:56:39Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 29,
"watchers": 30,
"score": 0
},
{

View file

@ -28,35 +28,6 @@
"watchers": 38,
"score": 0
},
{
"id": 509605278,
"name": "manageengine-auditad-cve-2022-28219",
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
"owner": {
"login": "rbowes-r7",
"id": 104588115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
"html_url": "https:\/\/github.com\/rbowes-r7"
},
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
"description": null,
"fork": false,
"created_at": "2022-07-01T22:40:46Z",
"updated_at": "2022-07-19T13:50:08Z",
"pushed_at": "2022-07-05T22:13:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 518384320,
"name": "CVE-2022-28219-Like",

View file

@ -554,64 +554,6 @@
"watchers": 4,
"score": 0
},
{
"id": 524474931,
"name": "CVE-2022-29464",
"full_name": "amit-pathak009\/CVE-2022-29464",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:14:43Z",
"updated_at": "2022-05-19T21:24:13Z",
"pushed_at": "2022-05-19T21:24:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 524475053,
"name": "CVE-2022-29464-mass",
"full_name": "amit-pathak009\/CVE-2022-29464-mass",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:15:18Z",
"updated_at": "2023-01-11T06:21:01Z",
"pushed_at": "2022-05-29T19:16:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 540011346,
"name": "CVE-2022-29464",

View file

@ -27,34 +27,5 @@
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 509388193,
"name": "CVE-2022-29885",
"full_name": "iveresk\/CVE-2022-29885",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885",
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
"fork": false,
"created_at": "2022-07-01T09:02:10Z",
"updated_at": "2023-01-24T17:20:21Z",
"pushed_at": "2022-07-05T06:23:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 510563141,
"name": "CVE-2022-30333-PoC",
"full_name": "TheL1ghtVn\/CVE-2022-30333-PoC",
"owner": {
"login": "TheL1ghtVn",
"id": 89027345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4",
"html_url": "https:\/\/github.com\/TheL1ghtVn"
},
"html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC",
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
"updated_at": "2022-11-19T19:17:38Z",
"pushed_at": "2022-07-05T02:58:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 514420724,
"name": "unrar-cve-2022-30333-poc",

View file

@ -1,31 +0,0 @@
[
{
"id": 510304709,
"name": "linux-4.19.72_CVE-2022-30594",
"full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594",
"description": null,
"fork": false,
"created_at": "2022-07-04T10:01:05Z",
"updated_at": "2023-03-08T01:26:26Z",
"pushed_at": "2022-07-04T10:18:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 511398695,
"name": "CVE-2022-30929",
"full_name": "nanaao\/CVE-2022-30929",
"owner": {
"login": "nanaao",
"id": 77666853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
"html_url": "https:\/\/github.com\/nanaao"
},
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929",
"description": "CVE-2022-30929 POC",
"fork": false,
"created_at": "2022-07-07T05:44:56Z",
"updated_at": "2023-01-31T12:52:11Z",
"pushed_at": "2022-07-04T06:19:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -129,10 +129,10 @@
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
"fork": false,
"created_at": "2022-12-22T09:35:26Z",
"updated_at": "2023-03-19T18:12:30Z",
"updated_at": "2023-03-20T22:43:45Z",
"pushed_at": "2023-01-10T08:09:36Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -271,5 +271,34 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 616701865,
"name": "CVE-2022-46169",
"full_name": "doosec101\/CVE-2022-46169",
"owner": {
"login": "doosec101",
"id": 128431701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128431701?v=4",
"html_url": "https:\/\/github.com\/doosec101"
},
"html_url": "https:\/\/github.com\/doosec101\/CVE-2022-46169",
"description": "Repo for CVE-2022-46169",
"fork": false,
"created_at": "2023-03-20T22:54:18Z",
"updated_at": "2023-03-20T23:57:27Z",
"pushed_at": "2023-03-20T23:31:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-03-20T15:46:03Z",
"updated_at": "2023-03-20T20:14:54Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.",
"fork": false,
"created_at": "2023-02-10T13:02:55Z",
"updated_at": "2023-03-19T04:28:18Z",
"updated_at": "2023-03-20T20:08:49Z",
"pushed_at": "2023-02-13T07:15:28Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 77,
"watchers": 78,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-20T11:20:57Z",
"updated_at": "2023-03-20T22:51:34Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 313,
"watchers_count": 313,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 116,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 313,
"forks": 117,
"watchers": 315,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-20T14:12:09Z",
"updated_at": "2023-03-21T00:18:35Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 34,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 122,
"forks": 35,
"watchers": 123,
"score": 0
},
{
@ -168,19 +168,19 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-03-20T15:55:28Z",
"updated_at": "2023-03-21T00:18:00Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 212,
"watchers_count": 212,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 209,
"forks": 32,
"watchers": 212,
"score": 0
},
{
@ -371,10 +371,10 @@
"description": "Simple CVE-2023-23397 poc with sending of the payload by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-03-20T16:47:16Z",
"updated_at": "2023-03-21T00:22:14Z",
"pushed_at": "2023-03-20T16:55:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -383,7 +383,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2023-03-20T18:21:05Z",
"updated_at": "2023-03-20T23:40:35Z",
"pushed_at": "2023-03-20T12:51:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 11,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "The simple PoC of CVE-2023-27587",
"fork": false,
"created_at": "2023-03-15T15:52:20Z",
"updated_at": "2023-03-17T17:06:31Z",
"updated_at": "2023-03-20T22:48:05Z",
"pushed_at": "2023-03-15T16:31:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

102
README.md
View file

@ -697,8 +697,6 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
- [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits)
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
@ -949,8 +947,6 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
- [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388)
- [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388)
- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh)
- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388)
- [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388)
- [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388)
- [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388)
@ -1341,14 +1337,6 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007)
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007)
### CVE-2022-20124 (2022-06-15)
<code>
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036
</code>
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
### CVE-2022-20126 (2022-06-15)
<code>
@ -1360,14 +1348,6 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo
### CVE-2022-20128
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
### CVE-2022-20130 (2022-06-15)
<code>
In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979
</code>
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
### CVE-2022-20133 (2022-06-15)
<code>
@ -1376,14 +1356,6 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of
- [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133)
### CVE-2022-20135 (2022-06-15)
<code>
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
</code>
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
### CVE-2022-20138 (2022-06-15)
<code>
@ -1400,7 +1372,6 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there
In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962
</code>
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142)
### CVE-2022-20186 (2022-06-15)
@ -1591,7 +1562,6 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
- [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449)
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
- [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449)
@ -2042,8 +2012,6 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954)
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
@ -2144,7 +2112,6 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
- [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell)
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
- [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965)
- [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC)
@ -2530,14 +2497,6 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
### CVE-2022-24342 (2022-02-25)
<code>
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
</code>
- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342)
### CVE-2022-24348 (2022-02-04)
<code>
@ -2656,7 +2615,6 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
- [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit)
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
### CVE-2022-24707 (2022-02-23)
@ -3062,9 +3020,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
- [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134)
- [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134)
- [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit)
@ -3190,22 +3146,6 @@ A use after free issue was addressed with improved memory management. This issue
- [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert)
### CVE-2022-26763 (2022-05-26)
<code>
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.
</code>
- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash)
### CVE-2022-26766 (2022-05-26)
<code>
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
</code>
- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo)
### CVE-2022-26809 (2022-04-15)
<code>
@ -3454,7 +3394,6 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
</code>
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
- [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like)
### CVE-2022-28281 (2022-12-22)
@ -3729,8 +3668,6 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464)
- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass)
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
@ -3837,7 +3774,6 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20
</code>
- [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885)
- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885)
### CVE-2022-29932 (2022-05-11)
@ -4017,7 +3953,6 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
</code>
- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC)
- [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc)
- [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333)
- [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333)
@ -4128,14 +4063,6 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl
- [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks)
### CVE-2022-30594 (2022-05-12)
<code>
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
</code>
- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594)
### CVE-2022-30600 (2022-05-18)
<code>
@ -4163,22 +4090,6 @@ Gitea before 1.16.7 does not escape git fetch remote.
- [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781)
### CVE-2022-30887 (2022-05-20)
<code>
Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
</code>
- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887)
### CVE-2022-30929 (2022-07-06)
<code>
Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
</code>
- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929)
### CVE-2022-31007 (2022-05-31)
<code>
@ -6293,6 +6204,7 @@ Cacti is an open source platform which provides a robust and extensible operatio
- [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC)
- [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169)
- [ariyaadinatha/cacti-cve-2022-46169-exploit](https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit)
- [doosec101/CVE-2022-46169](https://github.com/doosec101/CVE-2022-46169)
### CVE-2022-46175 (2022-12-23)
@ -7598,6 +7510,14 @@ Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions &gt;= v2.5.0 contain H
- [szymonh/zephyr_cve-2021-3625](https://github.com/szymonh/zephyr_cve-2021-3625)
### CVE-2021-3656 (2022-03-04)
<code>
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the &quot;virt_ext&quot; field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
</code>
- [rami08448/CVE-2021-3656-Demo](https://github.com/rami08448/CVE-2021-3656-Demo)
### CVE-2021-3707 (2021-08-16)
<code>
@ -7697,7 +7617,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [vilasboasph/CVE-2021-4034](https://github.com/vilasboasph/CVE-2021-4034)
- [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034)
- [callrbx/pkexec-lpe-poc](https://github.com/callrbx/pkexec-lpe-poc)
- [T3cnokarita/CVE-2021-4034](https://github.com/T3cnokarita/CVE-2021-4034)
- [ch4rum/CVE-2021-4034](https://github.com/ch4rum/CVE-2021-4034)
- [cd80-ctf/CVE-2021-4034](https://github.com/cd80-ctf/CVE-2021-4034)
- [Al1ex/CVE-2021-4034](https://github.com/Al1ex/CVE-2021-4034)
- [puckiestyle/CVE-2021-4034](https://github.com/puckiestyle/CVE-2021-4034)
@ -11451,7 +11371,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2)
- [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit)
- [sixpacksecurity/CVE-2021-41773](https://github.com/sixpacksecurity/CVE-2021-41773)
- [Hattan-515/POC-CVE-2021-41773](https://github.com/Hattan-515/POC-CVE-2021-41773)
- [Hattan515/POC-CVE-2021-41773](https://github.com/Hattan515/POC-CVE-2021-41773)
- [twseptian/cve-2021-41773](https://github.com/twseptian/cve-2021-41773)
- [noflowpls/CVE-2021-41773](https://github.com/noflowpls/CVE-2021-41773)
- [McSl0vv/CVE-2021-41773](https://github.com/McSl0vv/CVE-2021-41773)