Auto Update 2022/07/16 00:16:04

This commit is contained in:
motikan2010-bot 2022-07-16 09:16:04 +09:00
parent 21829fb324
commit 1655c5e8bd
19 changed files with 81 additions and 81 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 380,
"watchers_count": 380,
"forks_count": 153,
"forks_count": 154,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 153,
"forks": 154,
"watchers": 380,
"score": 0
},

View file

@ -98,7 +98,7 @@
"fork": false,
"created_at": "2020-05-22T03:28:49Z",
"updated_at": "2022-02-23T14:25:50Z",
"pushed_at": "2021-12-09T22:20:51Z",
"pushed_at": "2022-07-15T20:57:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,

View file

@ -102,7 +102,7 @@
"fork": false,
"created_at": "2019-12-19T07:45:21Z",
"updated_at": "2019-12-19T08:09:43Z",
"pushed_at": "2022-06-03T00:55:38Z",
"pushed_at": "2022-07-15T20:46:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
"fork": false,
"created_at": "2018-10-15T07:44:43Z",
"updated_at": "2022-06-21T12:36:42Z",
"updated_at": "2022-07-15T22:08:04Z",
"pushed_at": "2021-01-06T01:11:32Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -42,7 +42,7 @@
"fork": false,
"created_at": "2020-05-22T17:10:10Z",
"updated_at": "2022-02-23T14:25:50Z",
"pushed_at": "2021-12-09T22:24:33Z",
"pushed_at": "2022-07-15T20:57:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-24T04:33:55Z",
"updated_at": "2022-02-23T14:25:45Z",
"pushed_at": "2022-01-21T23:43:12Z",
"pushed_at": "2022-07-15T20:57:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-21T14:00:33Z",
"updated_at": "2022-06-09T10:28:50Z",
"pushed_at": "2021-12-09T22:26:47Z",
"pushed_at": "2022-07-15T20:58:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,

View file

@ -41,10 +41,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-07-14T14:57:47Z",
"updated_at": "2022-07-15T19:52:45Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1479,
"watchers_count": 1479,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 336,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 336,
"watchers": 1479,
"watchers": 1480,
"score": 0
},
{
@ -916,10 +916,10 @@
"description": "POC for checking multiple hosts for Zerologon vulnerability",
"fork": false,
"created_at": "2020-09-29T18:45:44Z",
"updated_at": "2022-01-19T20:22:15Z",
"updated_at": "2022-07-15T19:52:37Z",
"pushed_at": "2020-10-05T07:47:02Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -927,7 +927,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -98,7 +98,7 @@
"fork": false,
"created_at": "2020-07-14T02:42:41Z",
"updated_at": "2022-04-14T08:25:21Z",
"pushed_at": "2022-07-07T22:15:55Z",
"pushed_at": "2022-07-15T21:03:09Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,

View file

@ -41,10 +41,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2022-07-15T18:03:38Z",
"updated_at": "2022-07-15T22:26:36Z",
"pushed_at": "2022-07-01T00:33:57Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -55,7 +55,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -153,10 +153,10 @@
"description": "desc_race exploit for iOS 15.0 - 15.1.1 (with stable kernel r\/w primitives) (CVE-2021-30955) ",
"fork": false,
"created_at": "2022-03-15T13:30:38Z",
"updated_at": "2022-06-29T14:20:51Z",
"updated_at": "2022-07-15T21:29:30Z",
"pushed_at": "2022-04-15T21:22:07Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 7,
"score": 0
},
{

View file

@ -4137,5 +4137,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 514403582,
"name": "cve-2021-4034",
"full_name": "n0v4mx\/cve-2021-4034",
"owner": {
"login": "n0v4mx",
"id": 88459207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88459207?v=4",
"html_url": "https:\/\/github.com\/n0v4mx"
},
"html_url": "https:\/\/github.com\/n0v4mx\/cve-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-07-15T20:58:48Z",
"updated_at": "2022-07-15T20:58:48Z",
"pushed_at": "2022-07-15T21:01:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2015,10 +2015,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-07-15T18:00:11Z",
"updated_at": "2022-07-15T22:17:42Z",
"pushed_at": "2022-05-17T13:25:17Z",
"stargazers_count": 2961,
"watchers_count": 2961,
"stargazers_count": 2962,
"watchers_count": 2962,
"forks_count": 719,
"allow_forking": true,
"is_template": false,
@ -2026,7 +2026,7 @@
"topics": [],
"visibility": "public",
"forks": 719,
"watchers": 2961,
"watchers": 2962,
"score": 0
},
{
@ -2309,34 +2309,6 @@
"watchers": 0,
"score": 0
},
{
"id": 437820134,
"name": "cve-2021-44228-log4j-exploits",
"full_name": "lov3r\/cve-2021-44228-log4j-exploits",
"owner": {
"login": "lov3r",
"id": 33676682,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33676682?v=4",
"html_url": "https:\/\/github.com\/lov3r"
},
"html_url": "https:\/\/github.com\/lov3r\/cve-2021-44228-log4j-exploits",
"description": null,
"fork": false,
"created_at": "2021-12-13T09:58:11Z",
"updated_at": "2021-12-13T10:22:19Z",
"pushed_at": "2021-12-13T10:22:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437838249,
"name": "log4jScan",

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-07-10T18:21:40Z",
"updated_at": "2022-07-15T18:34:42Z",
"pushed_at": "2022-04-25T04:11:33Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 327,
"watchers_count": 327,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 326,
"watchers": 327,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)",
"fork": false,
"created_at": "2022-06-24T07:55:52Z",
"updated_at": "2022-07-15T17:48:29Z",
"updated_at": "2022-07-15T21:24:21Z",
"pushed_at": "2022-07-05T21:13:44Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -155,10 +155,10 @@
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
"updated_at": "2022-07-05T01:05:40Z",
"updated_at": "2022-07-15T20:12:29Z",
"pushed_at": "2022-04-25T20:38:57Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -166,7 +166,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 13,
"watchers": 15,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -25,7 +25,7 @@
"cve-2022-29464"
],
"visibility": "public",
"forks": 66,
"forks": 67,
"watchers": 290,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-32119 - Arox-Unrestricted-File-Upload",
"fork": false,
"created_at": "2022-04-06T04:33:47Z",
"updated_at": "2022-07-15T16:35:39Z",
"updated_at": "2022-07-16T00:02:14Z",
"pushed_at": "2022-07-15T02:34:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"forks": 5,
"watchers": 9,
"score": 0
}
]

View file

@ -3918,6 +3918,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [wudicainiao/cve-2021-4034](https://github.com/wudicainiao/cve-2021-4034)
- [TanmoyG1800/CVE-2021-4034](https://github.com/TanmoyG1800/CVE-2021-4034)
- [CronoX1/CVE-2021-4034](https://github.com/CronoX1/CVE-2021-4034)
- [n0v4mx/cve-2021-4034](https://github.com/n0v4mx/cve-2021-4034)
### CVE-2021-4043 (2022-02-04)
@ -6606,7 +6607,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [avwolferen/Sitecore.Solr-log4j-mitigation](https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation)
- [kek-Sec/log4j-scanner-CVE-2021-44228](https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228)
- [Camphul/log4shell-spring-framework-research](https://github.com/Camphul/log4shell-spring-framework-research)
- [lov3r/cve-2021-44228-log4j-exploits](https://github.com/lov3r/cve-2021-44228-log4j-exploits)
- [sinakeshmiri/log4jScan](https://github.com/sinakeshmiri/log4jScan)
- [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner)
- [LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228)