Auto Update 2022/05/12 06:16:12

This commit is contained in:
motikan2010-bot 2022-05-12 15:16:12 +09:00
parent 7722cc0677
commit 1227da945f
46 changed files with 352 additions and 231 deletions

View file

@ -67,10 +67,10 @@
"description": "PoC for distributed NTP reflection DoS (CVE-2013-5211)",
"fork": false,
"created_at": "2019-09-24T20:02:43Z",
"updated_at": "2022-02-24T03:58:44Z",
"updated_at": "2022-05-12T03:05:15Z",
"pushed_at": "2019-10-04T19:03:50Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -87,7 +87,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-11T14:15:36Z",
"updated_at": "2022-05-12T05:18:52Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1345,
"watchers": 1349,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-11T14:15:36Z",
"updated_at": "2022-05-12T05:18:52Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1345,
"watchers": 1349,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-11T14:15:36Z",
"updated_at": "2022-05-12T05:18:52Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1345,
"watchers": 1349,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-11T14:15:36Z",
"updated_at": "2022-05-12T05:18:52Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1345,
"watchers": 1349,
"score": 0
},
{

View file

@ -446,7 +446,7 @@
"fork": false,
"created_at": "2022-02-18T03:17:31Z",
"updated_at": "2022-02-18T03:18:21Z",
"pushed_at": "2022-02-18T03:53:58Z",
"pushed_at": "2022-05-12T02:35:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2861,17 +2861,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2022-05-10T02:59:44Z",
"updated_at": "2022-05-12T04:43:42Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 257,
"watchers": 258,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2022-05-08T18:50:37Z",
"updated_at": "2022-05-12T00:53:09Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-05-11T17:33:00Z",
"updated_at": "2022-05-12T03:38:55Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3303,
"watchers_count": 3303,
"forks_count": 988,
"stargazers_count": 3304,
"watchers_count": 3304,
"forks_count": 990,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 988,
"watchers": 3303,
"forks": 990,
"watchers": 3304,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-05-08T15:03:19Z",
"updated_at": "2022-05-12T03:07:08Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 804,
"watchers_count": 804,
"stargazers_count": 805,
"watchers_count": 805,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 804,
"watchers": 805,
"score": 0
},
{
@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-11T14:15:36Z",
"updated_at": "2022-05-12T05:18:52Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1345,
"watchers": 1349,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 56,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 56,
"forks": 57,
"watchers": 149,
"score": 0
},
@ -44,12 +44,12 @@
"pushed_at": "2019-08-19T17:33:56Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 29,
"watchers": 69,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2022-05-05T01:02:25Z",
"updated_at": "2022-05-12T02:43:02Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 621,
"watchers_count": 621,
"stargazers_count": 622,
"watchers_count": 622,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 156,
"watchers": 621,
"watchers": 622,
"score": 0
},
{

View file

@ -550,5 +550,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491348099,
"name": "CVE-2020-0688",
"full_name": "7heKnight\/CVE-2020-0688",
"owner": {
"login": "7heKnight",
"id": 60308445,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60308445?v=4",
"html_url": "https:\/\/github.com\/7heKnight"
},
"html_url": "https:\/\/github.com\/7heKnight\/CVE-2020-0688",
"description": "CVE-2020-0688_Microsoft Exchange default MachineKeySection deserialize vulnerability",
"fork": false,
"created_at": "2022-05-12T03:17:35Z",
"updated_at": "2022-05-12T03:18:14Z",
"pushed_at": "2022-05-12T04:04:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1333,10 +1333,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2022-05-09T05:05:31Z",
"updated_at": "2022-05-12T05:02:24Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"forks_count": 153,
"allow_forking": true,
"is_template": false,
@ -1349,7 +1349,7 @@
],
"visibility": "public",
"forks": 153,
"watchers": 460,
"watchers": 461,
"score": 0
},
{

View file

@ -102,12 +102,12 @@
"pushed_at": "2020-05-26T10:23:34Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 41,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-05-11T17:33:00Z",
"updated_at": "2022-05-12T03:38:55Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3303,
"watchers_count": 3303,
"forks_count": 988,
"stargazers_count": 3304,
"watchers_count": 3304,
"forks_count": 990,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 988,
"watchers": 3303,
"forks": 990,
"watchers": 3304,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-05-09T07:46:16Z",
"updated_at": "2022-05-12T00:50:48Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 299,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 949,
"watchers": 950,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-11T14:15:36Z",
"updated_at": "2022-05-12T05:18:52Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1345,
"watchers_count": 1345,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1345,
"watchers": 1349,
"score": 0
},
{

View file

@ -99,17 +99,17 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2022-05-11T13:28:32Z",
"updated_at": "2022-05-12T02:19:38Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 375,
"watchers_count": 375,
"stargazers_count": 377,
"watchers_count": 377,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 375,
"watchers": 377,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false,
"created_at": "2021-03-08T05:07:15Z",
"updated_at": "2022-05-11T04:14:31Z",
"updated_at": "2022-05-12T02:50:45Z",
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-10T14:38:05Z",
"updated_at": "2022-04-12T11:08:03Z",
"updated_at": "2022-05-12T01:54:17Z",
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -150,10 +150,10 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2022-05-11T09:51:07Z",
"updated_at": "2022-05-12T02:10:48Z",
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@ -163,7 +163,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-05-09T07:46:16Z",
"updated_at": "2022-05-12T00:50:48Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 299,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 299,
"watchers": 949,
"watchers": 950,
"score": 0
},
{

View file

@ -998,17 +998,17 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2022-05-04T21:03:38Z",
"updated_at": "2022-05-12T00:52:30Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 296,
"watchers_count": 296,
"forks_count": 107,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 107,
"forks": 108,
"watchers": 296,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2022-05-08T18:50:37Z",
"updated_at": "2022-05-12T00:53:09Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -879,14 +879,14 @@
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 503,
"watchers_count": 503,
"forks_count": 97,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
"forks": 97,
"forks": 98,
"watchers": 503,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-05-10T06:34:06Z",
"updated_at": "2022-05-12T00:50:07Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 462,
"stargazers_count": 1411,
"watchers_count": 1411,
"forks_count": 463,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 462,
"watchers": 1410,
"forks": 463,
"watchers": 1411,
"score": 0
},
{

View file

@ -570,5 +570,32 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 491353620,
"name": "CVE-2021-41773-Scanner",
"full_name": "anldori\/CVE-2021-41773-Scanner",
"owner": {
"login": "anldori",
"id": 101538840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101538840?v=4",
"html_url": "https:\/\/github.com\/anldori"
},
"html_url": "https:\/\/github.com\/anldori\/CVE-2021-41773-Scanner",
"description": "CVE-2021-41773 Shodan scanner",
"fork": false,
"created_at": "2022-05-12T03:42:24Z",
"updated_at": "2022-05-12T03:42:49Z",
"pushed_at": "2022-05-12T03:44:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -107,37 +107,6 @@
"watchers": 12,
"score": 0
},
{
"id": 435877595,
"name": "CVE-2021-43798",
"full_name": "Mr-xn\/CVE-2021-43798",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-07T12:47:58Z",
"updated_at": "2022-04-11T04:08:51Z",
"pushed_at": "2021-12-07T16:27:56Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"grafana",
"vulnerability"
],
"visibility": "public",
"forks": 8,
"watchers": 29,
"score": 0
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-15T06:18:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 11,
"score": 0
},
@ -1882,17 +1882,17 @@
"description": "CVE-2021-44228log4j2 burp插件 Java版本dnslog选取了非dnslog.cn域名",
"fork": false,
"created_at": "2021-12-12T01:24:39Z",
"updated_at": "2022-05-07T16:02:05Z",
"updated_at": "2022-05-12T02:42:07Z",
"pushed_at": "2021-12-11T10:39:41Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -3406,17 +3406,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-05-11T19:09:00Z",
"updated_at": "2022-05-12T05:18:55Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2858,
"watchers_count": 2858,
"stargazers_count": 2862,
"watchers_count": 2862,
"forks_count": 706,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 706,
"watchers": 2858,
"watchers": 2862,
"score": 0
},
{
@ -10686,10 +10686,10 @@
"description": "Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.",
"fork": false,
"created_at": "2022-05-09T15:02:29Z",
"updated_at": "2022-05-11T18:36:58Z",
"updated_at": "2022-05-12T06:08:10Z",
"pushed_at": "2022-05-10T02:38:54Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -10703,7 +10703,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 10,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2022-05-11T21:02:57Z",
"updated_at": "2022-05-12T02:11:03Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 64,
"watchers": 65,
"score": 0
},
{
@ -148,17 +148,17 @@
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
"fork": false,
"created_at": "2022-05-09T07:39:55Z",
"updated_at": "2022-05-11T14:57:58Z",
"updated_at": "2022-05-12T04:39:25Z",
"pushed_at": "2022-05-09T10:23:11Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 8,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 45,
"forks": 9,
"watchers": 46,
"score": 0
},
{
@ -203,7 +203,7 @@
"fork": false,
"created_at": "2022-05-09T10:22:31Z",
"updated_at": "2022-05-11T21:34:07Z",
"pushed_at": "2022-05-10T05:09:11Z",
"pushed_at": "2022-05-12T05:56:13Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 21,
@ -283,17 +283,17 @@
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2022-05-11T23:45:21Z",
"updated_at": "2022-05-12T02:20:34Z",
"pushed_at": "2022-05-09T17:58:13Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 16,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 29,
"forks": 17,
"watchers": 30,
"score": 0
},
{
@ -310,17 +310,17 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2022-05-11T23:50:38Z",
"updated_at": "2022-05-12T04:51:03Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 24,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 138,
"forks": 25,
"watchers": 152,
"score": 0
},
{
@ -1018,17 +1018,17 @@
"description": null,
"fork": false,
"created_at": "2022-05-11T17:43:44Z",
"updated_at": "2022-05-11T20:20:30Z",
"updated_at": "2022-05-12T03:52:18Z",
"pushed_at": "2022-05-11T20:03:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
@ -1130,12 +1130,12 @@
"pushed_at": "2022-05-11T22:00:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2022-02-03T11:25:14Z",
"updated_at": "2022-05-10T02:40:11Z",
"updated_at": "2022-05-12T03:07:35Z",
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 155,
"watchers": 156,
"score": 0
},
{

View file

@ -1187,17 +1187,17 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-05-11T08:04:49Z",
"updated_at": "2022-05-12T00:59:38Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 69,
"watchers": 70,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-04-07T19:05:54Z",
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 81,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"topics": [
@ -31,7 +31,7 @@
"tomcat"
],
"visibility": "public",
"forks": 81,
"forks": 82,
"watchers": 260,
"score": 0
},
@ -81,10 +81,10 @@
"description": "Spring4Shell - Spring Core RCE - CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T17:05:46Z",
"updated_at": "2022-05-05T03:12:46Z",
"updated_at": "2022-05-12T04:41:27Z",
"pushed_at": "2022-04-04T14:09:11Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 77,
"watchers": 90,
"watchers": 91,
"score": 0
},
{
@ -119,17 +119,17 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-05-12T00:15:34Z",
"updated_at": "2022-05-12T02:34:44Z",
"pushed_at": "2022-04-05T16:02:33Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 224,
"watchers_count": 224,
"forks_count": 189,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 189,
"watchers": 220,
"watchers": 224,
"score": 0
},
{

View file

@ -287,7 +287,7 @@
"pushed_at": "2022-03-31T20:17:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
@ -303,7 +303,7 @@
"zabbix-agent"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 7,
"score": 0
},

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/heegong"
},
"html_url": "https:\/\/github.com\/heegong\/CVE-2022-24924",
"description": "Improper privilege management vulnerability in Samsung Video Player prior to version 7.3.15.30 allows attackers to execute video files without permission.",
"description": "An improper access control in LiveWallpaperService prior to versions 3.0.9.0 allows to create a specific named system directory without a proper permission.",
"fork": false,
"created_at": "2022-05-05T03:08:53Z",
"updated_at": "2022-05-05T03:11:55Z",
"updated_at": "2022-05-12T05:12:59Z",
"pushed_at": "2022-05-12T00:16:37Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,11 +13,11 @@
"description": "A \"Creation of Temporary Files in Directory with Insecure Permissions\" vulnerability in PrintixService.exe, in Printix's \"Printix Secure Cloud Print Management\", Version 1.3.1106.0 and below allows any logged in user to elevate any executable or file to the SYSTEM context. This is achieved by exploiting race conditions in the Installer.",
"fork": false,
"created_at": "2022-03-02T13:14:11Z",
"updated_at": "2022-03-31T20:33:33Z",
"updated_at": "2022-05-12T01:27:07Z",
"pushed_at": "2022-05-10T14:32:31Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"printix"
],
"visibility": "public",
"forks": 4,
"watchers": 4,
"forks": 5,
"watchers": 5,
"score": 0
}
]

View file

@ -10,20 +10,20 @@
"html_url": "https:\/\/github.com\/Pear1y"
},
"html_url": "https:\/\/github.com\/Pear1y\/CVE-2022-26133",
"description": "Atlassian Bitbucket Data Center反序列化漏洞(CVE-2022-26133)批量验证和利用脚本",
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-05-11T23:38:15Z",
"updated_at": "2022-05-12T05:58:04Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 13,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 66,
"forks": 17,
"watchers": 78,
"score": 0
}
]

View file

@ -337,5 +337,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491349181,
"name": "CVE-2022-26809",
"full_name": "Calvitz\/CVE-2022-26809",
"owner": {
"login": "Calvitz",
"id": 105359678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105359678?v=4",
"html_url": "https:\/\/github.com\/Calvitz"
},
"html_url": "https:\/\/github.com\/Calvitz\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-05-12T03:22:31Z",
"updated_at": "2022-05-12T03:27:11Z",
"pushed_at": "2022-05-12T03:26:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-26923.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 491338151,
"name": "TryHackMe-CVE-2022-26923",
"full_name": "r1skkam\/TryHackMe-CVE-2022-26923",
"owner": {
"login": "r1skkam",
"id": 58542375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
"html_url": "https:\/\/github.com\/r1skkam"
},
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-CVE-2022-26923",
"description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services",
"fork": false,
"created_at": "2022-05-12T02:31:50Z",
"updated_at": "2022-05-12T05:33:57Z",
"pushed_at": "2022-05-12T03:24:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-27134.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 468680773,
"name": "CVE-batdappboomx",
"full_name": "Kenun99\/CVE-batdappboomx",
"owner": {
"login": "Kenun99",
"id": 43341053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43341053?v=4",
"html_url": "https:\/\/github.com\/Kenun99"
},
"html_url": "https:\/\/github.com\/Kenun99\/CVE-batdappboomx",
"description": "CVE-2022-27134",
"fork": false,
"created_at": "2022-03-11T09:09:19Z",
"updated_at": "2022-05-12T05:54:24Z",
"pushed_at": "2022-05-12T05:54:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-05-11T13:42:17Z",
"updated_at": "2022-05-12T06:08:30Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 330,
"watchers": 331,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Home Owners Collection Management System 1.0 - Reflected XSS",
"fork": false,
"created_at": "2022-05-11T06:28:28Z",
"updated_at": "2022-05-11T06:28:28Z",
"updated_at": "2022-05-12T01:25:54Z",
"pushed_at": "2022-05-11T06:29:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,14 +17,14 @@
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 59,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-29464"
],
"visibility": "public",
"forks": 59,
"forks": 60,
"watchers": 272,
"score": 0
},

View file

@ -1330,6 +1330,18 @@ Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID i
- [XmasSnowREAL/CVE-2022-26809-RCE](https://github.com/XmasSnowREAL/CVE-2022-26809-RCE)
- [ExploitPwner/CVE-2022-26809-RCE-POC](https://github.com/ExploitPwner/CVE-2022-26809-RCE-POC)
- [seciurdt/CVE-2022-26809-RCE](https://github.com/seciurdt/CVE-2022-26809-RCE)
- [Calvitz/CVE-2022-26809](https://github.com/Calvitz/CVE-2022-26809)
### CVE-2022-26923 (2022-05-10)
<code>
Active Directory Domain Services Elevation of Privilege Vulnerability.
</code>
- [r1skkam/TryHackMe-CVE-2022-26923](https://github.com/r1skkam/TryHackMe-CVE-2022-26923)
### CVE-2022-27134
- [Kenun99/CVE-batdappboomx](https://github.com/Kenun99/CVE-batdappboomx)
### CVE-2022-27226 (2022-03-18)
@ -4708,6 +4720,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [vuongnv3389-sec/cve-2021-41773](https://github.com/vuongnv3389-sec/cve-2021-41773)
- [Chocapikk/CVE-2021-41773](https://github.com/Chocapikk/CVE-2021-41773)
- [wangfly-me/Apache_Penetration_Tool](https://github.com/wangfly-me/Apache_Penetration_Tool)
- [anldori/CVE-2021-41773-Scanner](https://github.com/anldori/CVE-2021-41773-Scanner)
### CVE-2021-41962 (2021-12-16)
@ -5014,7 +5027,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
- [Mr-xn/CVE-2021-43798](https://github.com/Mr-xn/CVE-2021-43798)
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
@ -6498,6 +6510,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
- [SLSteff/CVE-2020-0688-Scanner](https://github.com/SLSteff/CVE-2020-0688-Scanner)
- [MrTiz/CVE-2020-0688](https://github.com/MrTiz/CVE-2020-0688)
- [ann0906/proxylogon](https://github.com/ann0906/proxylogon)
- [7heKnight/CVE-2020-0688](https://github.com/7heKnight/CVE-2020-0688)
### CVE-2020-0692 (2020-02-11)