Auto Update 2022/04/15 18:15:06

This commit is contained in:
motikan2010-bot 2022-04-16 03:15:06 +09:00
parent 7a73729ead
commit 1393b2d86d
40 changed files with 253 additions and 218 deletions

View file

@ -142,14 +142,14 @@
{
"id": 470176260,
"name": "vsftpd-2.3.4",
"full_name": "PrestaDZ\/vsftpd-2.3.4",
"full_name": "Prestaa\/vsftpd-2.3.4",
"owner": {
"login": "PrestaDZ",
"login": "Prestaa",
"id": 95232318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95232318?v=4",
"html_url": "https:\/\/github.com\/PrestaDZ"
"html_url": "https:\/\/github.com\/Prestaa"
},
"html_url": "https:\/\/github.com\/PrestaDZ\/vsftpd-2.3.4",
"html_url": "https:\/\/github.com\/Prestaa\/vsftpd-2.3.4",
"description": "Simple python script to exploit VsFTPd 2.3.4 Backdoor Command Execution (CVE-2011-2523)",
"fork": false,
"created_at": "2022-03-15T13:39:19Z",

View file

@ -13,17 +13,17 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2022-04-12T14:09:04Z",
"updated_at": "2022-04-15T14:33:32Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2270,
"watchers_count": 2270,
"stargazers_count": 2269,
"watchers_count": 2269,
"forks_count": 480,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 480,
"watchers": 2270,
"watchers": 2269,
"score": 0
},
{
@ -148,17 +148,17 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2022-03-29T18:49:43Z",
"updated_at": "2022-04-15T14:33:30Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 579,
"watchers_count": 579,
"stargazers_count": 578,
"watchers_count": 578,
"forks_count": 232,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 232,
"watchers": 579,
"watchers": 578,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 288,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,7 +70,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 288,
"forks": 287,
"watchers": 1326,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 288,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,7 +43,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 288,
"forks": 287,
"watchers": 1326,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
"fork": false,
"created_at": "2016-05-03T16:47:32Z",
"updated_at": "2022-01-19T08:17:40Z",
"updated_at": "2022-04-15T12:28:41Z",
"pushed_at": "2019-03-10T02:18:00Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 178,
"watchers": 177,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-01-28T20:54:38Z",
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 118,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 118,
"forks": 116,
"watchers": 289,
"score": 0
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-14T16:31:46Z",
"updated_at": "2022-04-14T16:36:23Z",
"pushed_at": "2022-04-15T03:58:49Z",
"pushed_at": "2022-04-15T14:00:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -44,7 +44,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 288,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,7 +70,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 288,
"forks": 287,
"watchers": 1326,
"score": 0
},

View file

@ -346,10 +346,10 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2022-03-17T07:49:33Z",
"updated_at": "2022-04-15T12:28:28Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 403,
"watchers_count": 403,
"stargazers_count": 404,
"watchers_count": 404,
"forks_count": 148,
"allow_forking": true,
"is_template": false,
@ -362,7 +362,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 403,
"watchers": 404,
"score": 0
},
{

View file

@ -154,17 +154,17 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2022-04-14T11:14:55Z",
"updated_at": "2022-04-15T13:55:39Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 252,
"watchers": 251,
"score": 0
},
{

View file

@ -314,12 +314,12 @@
"pushed_at": "2018-08-30T00:16:01Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 18,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 17,
"watchers": 55,
"score": 0
},

View file

@ -534,7 +534,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 288,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -560,7 +560,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 288,
"forks": 287,
"watchers": 1326,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-04-12T06:14:09Z",
"updated_at": "2022-04-15T13:08:36Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 537,
"watchers_count": 537,
"stargazers_count": 538,
"watchers_count": 538,
"forks_count": 122,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 122,
"watchers": 537,
"watchers": 538,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 193,
"forks_count": 192,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 193,
"forks": 192,
"watchers": 468,
"score": 0
},

View file

@ -1223,12 +1223,12 @@
"pushed_at": "2019-05-22T02:13:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 411,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 411,
"forks": 410,
"watchers": 1,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-14T21:09:28Z",
"updated_at": "2022-04-15T13:17:23Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3260,
"watchers_count": 3260,
"stargazers_count": 3261,
"watchers_count": 3261,
"forks_count": 966,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 966,
"watchers": 3260,
"watchers": 3261,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 369,
"watchers_count": 369,
"forks_count": 125,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 125,
"forks": 124,
"watchers": 369,
"score": 0
},

View file

@ -179,7 +179,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 288,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -205,7 +205,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 288,
"forks": 287,
"watchers": 1326,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-04-13T00:59:41Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 11,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-14T21:09:28Z",
"updated_at": "2022-04-15T13:17:23Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3260,
"watchers_count": 3260,
"stargazers_count": 3261,
"watchers_count": 3261,
"forks_count": 966,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 966,
"watchers": 3260,
"watchers": 3261,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 288,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,7 +43,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 288,
"forks": 287,
"watchers": 1326,
"score": 0
},

View file

@ -205,8 +205,8 @@
"description": "Script en python para crear imagenes maliciosas (reverse shell)",
"fork": false,
"created_at": "2022-03-11T19:02:28Z",
"updated_at": "2022-04-11T18:21:40Z",
"pushed_at": "2022-04-04T02:20:07Z",
"updated_at": "2022-04-15T17:22:14Z",
"pushed_at": "2022-04-15T16:55:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,

View file

@ -84,8 +84,8 @@
"description": "Pasos a seguir para explotar la vulnerabilidad CVE-2021-27928",
"fork": false,
"created_at": "2022-03-29T02:54:37Z",
"updated_at": "2022-04-10T15:10:42Z",
"pushed_at": "2022-03-29T21:51:16Z",
"updated_at": "2022-04-15T17:22:18Z",
"pushed_at": "2022-04-15T16:59:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Due to a reflected XSS vulnerability in PowerSchool (CVE-2021-29386), it is possible to view other people's grades just by having them click on a link while they are logged in to PowerSchool. This demonstrates that with a proof-of-concept.",
"fork": false,
"created_at": "2020-11-26T00:43:36Z",
"updated_at": "2022-04-10T22:54:44Z",
"updated_at": "2022-04-15T13:45:11Z",
"pushed_at": "2021-05-20T13:27:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2022-04-15T09:57:15Z",
"updated_at": "2022-04-15T14:05:01Z",
"pushed_at": "2022-04-15T03:25:01Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 49,
"watchers": 52,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
"fork": false,
"created_at": "2022-04-15T04:23:44Z",
"updated_at": "2022-04-15T10:32:04Z",
"updated_at": "2022-04-15T12:32:15Z",
"pushed_at": "2022-04-15T08:52:11Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -94,17 +94,17 @@
"description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用",
"fork": false,
"created_at": "2022-04-15T11:30:26Z",
"updated_at": "2022-04-15T12:13:53Z",
"pushed_at": "2022-04-15T12:11:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"updated_at": "2022-04-15T15:25:12Z",
"pushed_at": "2022-04-15T15:25:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -184,17 +184,17 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2022-04-15T09:42:44Z",
"updated_at": "2022-04-15T18:11:57Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -1788,17 +1788,17 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-04-15T09:23:05Z",
"updated_at": "2022-04-15T17:44:59Z",
"pushed_at": "2022-04-09T08:06:43Z",
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 22,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 201,
"forks": 24,
"watchers": 208,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-04-13T09:11:33Z",
"updated_at": "2022-04-15T13:40:53Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1391,
"watchers_count": 1391,
"stargazers_count": 1390,
"watchers_count": 1390,
"forks_count": 454,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 454,
"watchers": 1391,
"watchers": 1390,
"score": 0
},
{
@ -53,6 +53,33 @@
"watchers": 0,
"score": 0
},
{
"id": 425935080,
"name": "word_mshtml",
"full_name": "Zeop-CyberSec\/word_mshtml",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
"description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
"fork": false,
"created_at": "2021-11-08T17:38:30Z",
"updated_at": "2021-12-11T21:29:07Z",
"pushed_at": "2021-11-09T11:12:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 430718153,
"name": "CVE-2021-40444",

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-04-15T11:27:35Z",
"updated_at": "2022-04-15T15:00:50Z",
"pushed_at": "2022-03-16T13:59:31Z",
"stargazers_count": 312,
"watchers_count": 312,
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 312,
"watchers": 313,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-04-15T09:37:03Z",
"updated_at": "2022-04-15T16:55:55Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 266,
"watchers_count": 266,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 266,
"watchers": 268,
"score": 0
},
{

View file

@ -322,33 +322,6 @@
"watchers": 4,
"score": 0
},
{
"id": 436926113,
"name": "Log4j-0Day-Fix",
"full_name": "Szczurowsky\/Log4j-0Day-Fix",
"owner": {
"login": "Szczurowsky",
"id": 70973416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70973416?v=4",
"html_url": "https:\/\/github.com\/Szczurowsky"
},
"html_url": "https:\/\/github.com\/Szczurowsky\/Log4j-0Day-Fix",
"description": "Plugin which fixes 0day exploit (CVE-2021-44228) with Log4j apache package",
"fork": false,
"created_at": "2021-12-10T09:43:49Z",
"updated_at": "2021-12-10T10:03:31Z",
"pushed_at": "2021-12-10T10:04:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436933689,
"name": "Log4jPatch",
@ -417,19 +390,19 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-04-12T17:49:22Z",
"updated_at": "2022-04-15T17:07:06Z",
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 432,
"stargazers_count": 977,
"watchers_count": 977,
"forks_count": 433,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 432,
"watchers": 976,
"forks": 433,
"watchers": 977,
"score": 0
},
{
@ -907,10 +880,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-04-15T04:28:54Z",
"updated_at": "2022-04-15T18:06:59Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1310,
"watchers_count": 1310,
"stargazers_count": 1311,
"watchers_count": 1311,
"forks_count": 362,
"allow_forking": true,
"is_template": false,
@ -922,7 +895,7 @@
],
"visibility": "public",
"forks": 362,
"watchers": 1310,
"watchers": 1311,
"score": 0
},
{
@ -5332,10 +5305,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-04-12T15:28:57Z",
"updated_at": "2022-04-15T12:18:14Z",
"pushed_at": "2022-01-27T16:08:20Z",
"stargazers_count": 411,
"watchers_count": 411,
"stargazers_count": 412,
"watchers_count": 412,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -5351,7 +5324,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 411,
"watchers": 412,
"score": 0
},
{

View file

@ -87,17 +87,17 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-04-12T09:00:54Z",
"updated_at": "2022-04-15T17:17:22Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 358,
"watchers_count": 358,
"stargazers_count": 359,
"watchers_count": 359,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 358,
"watchers": 359,
"score": 0
},
{
@ -141,10 +141,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-04-07T01:11:43Z",
"updated_at": "2022-04-15T15:29:43Z",
"pushed_at": "2022-04-13T07:33:57Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -158,7 +158,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 60,
"watchers": 61,
"score": 0
},
{
@ -229,17 +229,17 @@
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2022-04-15T12:15:05Z",
"updated_at": "2022-04-15T15:30:43Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 16,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 83,
"forks": 17,
"watchers": 86,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-04-14T16:21:15Z",
"updated_at": "2022-04-15T16:00:02Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 565,
"watchers_count": 565,
"stargazers_count": 566,
"watchers_count": 566,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 565,
"watchers": 566,
"score": 0
}
]

View file

@ -1165,5 +1165,39 @@
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 482005646,
"name": "cve-2022-22947",
"full_name": "twseptian\/cve-2022-22947",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian"
},
"html_url": "https:\/\/github.com\/twseptian\/cve-2022-22947",
"description": "Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)",
"fork": false,
"created_at": "2022-04-15T15:41:36Z",
"updated_at": "2022-04-15T15:45:26Z",
"pushed_at": "2022-04-15T15:48:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"command-injection",
"cve-2022-22947",
"rce",
"remote-code-execution",
"spring-cloud-gateway",
"spring-framework"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-04-15T11:54:10Z",
"updated_at": "2022-04-15T16:43:00Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 165,
"watchers": 166,
"score": 0
},
{
@ -340,17 +340,17 @@
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
"fork": false,
"created_at": "2022-04-13T16:18:56Z",
"updated_at": "2022-04-15T12:14:34Z",
"updated_at": "2022-04-15T12:36:57Z",
"pushed_at": "2022-04-14T13:36:54Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-03-26T01:40:04Z",
"updated_at": "2022-04-13T03:29:21Z",
"pushed_at": "2022-04-01T13:24:31Z",
"pushed_at": "2022-04-15T16:31:43Z",
"stargazers_count": 315,
"watchers_count": 315,
"forks_count": 79,
@ -395,12 +395,12 @@
"pushed_at": "2022-04-14T11:13:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-04-14T18:13:33Z",
"updated_at": "2022-04-15T16:28:31Z",
"pushed_at": "2022-04-07T19:05:54Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 75,
"watchers": 243,
"watchers": 244,
"score": 0
},
{
@ -123,12 +123,12 @@
"pushed_at": "2022-04-05T16:02:33Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 182,
"forks_count": 183,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 182,
"forks": 183,
"watchers": 207,
"score": 0
},
@ -313,17 +313,17 @@
"description": "Spring Framework RCE (Quick pentest notes)",
"fork": false,
"created_at": "2022-03-31T15:43:06Z",
"updated_at": "2022-04-05T13:15:56Z",
"updated_at": "2022-04-15T18:10:36Z",
"pushed_at": "2022-04-07T19:12:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
"fork": false,
"created_at": "2022-04-14T03:41:32Z",
"updated_at": "2022-04-14T10:27:56Z",
"updated_at": "2022-04-15T13:36:48Z",
"pushed_at": "2022-04-14T03:44:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -67,10 +67,10 @@
"description": "Remote Code Execution Exploit in the RPC Library",
"fork": false,
"created_at": "2022-04-14T08:12:24Z",
"updated_at": "2022-04-14T19:41:00Z",
"updated_at": "2022-04-15T15:06:27Z",
"pushed_at": "2022-04-14T09:03:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -79,7 +79,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -123,17 +123,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-14T23:42:17Z",
"updated_at": "2022-04-15T11:04:44Z",
"updated_at": "2022-04-15T15:05:31Z",
"pushed_at": "2022-04-14T23:57:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 4,
"score": 0
},
{
@ -150,17 +150,17 @@
"description": "CVE-2022-26809-RCE-EXP",
"fork": false,
"created_at": "2022-04-15T04:13:22Z",
"updated_at": "2022-04-15T10:31:21Z",
"updated_at": "2022-04-15T13:15:39Z",
"pushed_at": "2022-04-15T03:54:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"forks": 5,
"watchers": 6,
"score": 0
},
{
@ -204,11 +204,11 @@
"description": "CVE-2022-26809-RCE-EXP-POC",
"fork": false,
"created_at": "2022-04-15T04:35:41Z",
"updated_at": "2022-04-15T11:49:44Z",
"updated_at": "2022-04-15T14:08:22Z",
"pushed_at": "2022-04-15T04:38:11Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [
@ -218,8 +218,8 @@
"windows"
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"forks": 5,
"watchers": 15,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-04-15T06:17:09Z",
"updated_at": "2022-04-15T14:20:48Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 303,
"watchers_count": 303,
"forks_count": 40,
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 303,
"forks": 41,
"watchers": 304,
"score": 0
}
]

View file

@ -512,6 +512,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
- [aesm1p/CVE-2022-22947-POC-Reproduce](https://github.com/aesm1p/CVE-2022-22947-POC-Reproduce)
- [Ha0Liu/CVE-2022-22947](https://github.com/Ha0Liu/CVE-2022-22947)
- [F6JO/Burp_VulPscan](https://github.com/F6JO/Burp_VulPscan)
- [twseptian/cve-2022-22947](https://github.com/twseptian/cve-2022-22947)
### CVE-2022-22948 (2022-03-29)
@ -3813,6 +3814,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
- [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project)
- [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml)
- [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)
- [lisinan988/CVE-2021-40444-exp](https://github.com/lisinan988/CVE-2021-40444-exp)
- [34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit](https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit)
@ -4536,7 +4538,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [y35uishere/Log4j2-CVE-2021-44228](https://github.com/y35uishere/Log4j2-CVE-2021-44228)
- [CreeperHost/Log4jPatcher](https://github.com/CreeperHost/Log4jPatcher)
- [DragonSurvivalEU/RCE](https://github.com/DragonSurvivalEU/RCE)
- [Szczurowsky/Log4j-0Day-Fix](https://github.com/Szczurowsky/Log4j-0Day-Fix)
- [simonis/Log4jPatch](https://github.com/simonis/Log4jPatch)
- [zlepper/CVE-2021-44228-Test-Server](https://github.com/zlepper/CVE-2021-44228-Test-Server)
- [christophetd/log4shell-vulnerable-app](https://github.com/christophetd/log4shell-vulnerable-app)
@ -23798,7 +23799,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which
- [Gr4ykt/CVE-2011-2523](https://github.com/Gr4ykt/CVE-2011-2523)
- [padsalatushal/CVE-2011-2523](https://github.com/padsalatushal/CVE-2011-2523)
- [whoamins/vsFTPd-2.3.4-exploit](https://github.com/whoamins/vsFTPd-2.3.4-exploit)
- [PrestaDZ/vsftpd-2.3.4](https://github.com/PrestaDZ/vsftpd-2.3.4)
- [Prestaa/vsftpd-2.3.4](https://github.com/Prestaa/vsftpd-2.3.4)
### CVE-2011-2894 (2011-10-04)