Auto Update 2022/02/11 18:14:11

This commit is contained in:
motikan2010-bot 2022-02-12 03:14:11 +09:00
parent ca4075e762
commit 16dc0727bb
36 changed files with 188 additions and 147 deletions

View file

@ -936,17 +936,17 @@
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false,
"created_at": "2015-03-08T19:54:33Z",
"updated_at": "2022-01-02T05:27:32Z",
"updated_at": "2022-02-11T12:08:09Z",
"pushed_at": "2021-02-20T19:41:03Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-11T04:07:47Z",
"updated_at": "2022-02-11T12:54:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1286,
"watchers": 1287,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2015-3152 PoC",
"fork": false,
"created_at": "2015-04-05T17:48:12Z",
"updated_at": "2021-07-19T15:14:27Z",
"updated_at": "2022-02-11T17:26:45Z",
"pushed_at": "2015-05-11T22:39:06Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 43,
"watchers": 44,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-11T04:07:47Z",
"updated_at": "2022-02-11T12:54:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1286,
"watchers": 1287,
"score": 0
},
{

View file

@ -239,10 +239,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2022-01-04T11:09:38Z",
"updated_at": "2022-02-11T16:20:49Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
@ -253,7 +253,7 @@
],
"visibility": "public",
"forks": 115,
"watchers": 243,
"watchers": 244,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-11T04:07:47Z",
"updated_at": "2022-02-11T12:54:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1286,
"watchers": 1287,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-11T04:07:47Z",
"updated_at": "2022-02-11T12:54:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1286,
"watchers": 1287,
"score": 0
},
{

View file

@ -1223,12 +1223,12 @@
"pushed_at": "2019-05-22T02:13:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 411,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 411,
"watchers": 1,
"score": 0
},
@ -1709,12 +1709,12 @@
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1096,
"watchers_count": 1096,
"forks_count": 357,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 357,
"forks": 355,
"watchers": 1096,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-12T13:02:41Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 19,
"score": 0
},

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-11T04:07:47Z",
"updated_at": "2022-02-11T12:54:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1286,
"watchers": 1287,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2022-02-03T10:59:10Z",
"updated_at": "2022-02-11T17:47:17Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 556,
"watchers_count": 556,
"stargazers_count": 557,
"watchers_count": 557,
"forks_count": 152,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 152,
"watchers": 556,
"watchers": 557,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
"fork": false,
"created_at": "2019-03-12T14:18:20Z",
"updated_at": "2022-01-31T05:59:24Z",
"updated_at": "2022-02-11T13:03:57Z",
"pushed_at": "2019-03-13T01:24:21Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 86,
"watchers": 85,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Root your MediaTek device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-02-10T20:43:45Z",
"updated_at": "2022-02-11T12:49:49Z",
"pushed_at": "2022-01-05T15:52:13Z",
"stargazers_count": 82,
"watchers_count": 82,

View file

@ -1333,10 +1333,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2022-02-01T17:17:19Z",
"updated_at": "2022-02-11T18:10:19Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 445,
"watchers_count": 445,
"stargazers_count": 447,
"watchers_count": 447,
"forks_count": 148,
"allow_forking": true,
"is_template": false,
@ -1349,7 +1349,7 @@
],
"visibility": "public",
"forks": 148,
"watchers": 445,
"watchers": 447,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-11T04:07:47Z",
"updated_at": "2022-02-11T12:54:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1286,
"watchers": 1287,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2022-02-11T12:03:10Z",
"updated_at": "2022-02-11T12:34:37Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 152,
"watchers": 153,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-03-19T17:55:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 2,
"score": 0
},

View file

@ -327,5 +327,40 @@
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 458246235,
"name": "CVE-2020-9484",
"full_name": "ColdFusionX\/CVE-2020-9484",
"owner": {
"login": "ColdFusionX",
"id": 8522240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
"html_url": "https:\/\/github.com\/ColdFusionX"
},
"html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2020-9484",
"description": "POC - Apache Tomcat Deserialization Vulnerability (CVE-2020-9484)",
"fork": false,
"created_at": "2022-02-11T15:45:10Z",
"updated_at": "2022-02-11T18:04:19Z",
"pushed_at": "2022-02-11T18:02:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2020-9484",
"deserialization",
"docker",
"exploit",
"rce",
"serialization",
"tomcat"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2022-02-10T09:14:40Z",
"updated_at": "2022-02-11T14:27:36Z",
"pushed_at": "2022-01-29T10:15:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"forks": 6,
"watchers": 25,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE",
"fork": false,
"created_at": "2022-02-10T21:52:24Z",
"updated_at": "2022-02-11T02:55:59Z",
"pushed_at": "2022-02-10T21:52:25Z",
"updated_at": "2022-02-11T15:04:21Z",
"pushed_at": "2022-02-11T17:20:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,7 +25,7 @@
"exiftool"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 40,
"score": 0
},

View file

@ -67,7 +67,7 @@
"description": "Wordpress XXE injection 구축 자동화 및 PoC ",
"fork": false,
"created_at": "2021-06-01T10:10:25Z",
"updated_at": "2022-01-10T07:07:15Z",
"updated_at": "2022-02-11T16:48:24Z",
"pushed_at": "2022-01-10T07:07:12Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -969,17 +969,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-02-11T09:40:46Z",
"updated_at": "2022-02-11T18:03:05Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 431,
"watchers_count": 431,
"stargazers_count": 433,
"watchers_count": 433,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 431,
"watchers": 433,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-11T16:03:38Z",
"updated_at": "2022-01-22T05:10:24Z",
"updated_at": "2022-02-11T13:40:18Z",
"pushed_at": "2022-01-11T16:52:16Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 15,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 30,
"forks": 16,
"watchers": 31,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2022-01-06T03:32:04Z",
"updated_at": "2022-02-11T14:40:03Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 38,
"watchers": 39,
"score": 0
},
{

View file

@ -130,8 +130,8 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-02-10T16:11:32Z",
"pushed_at": "2021-08-31T16:59:09Z",
"updated_at": "2022-02-11T15:22:23Z",
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,

View file

@ -104,17 +104,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-02-11T10:18:29Z",
"updated_at": "2022-02-11T18:08:40Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1241,
"watchers_count": 1241,
"forks_count": 362,
"stargazers_count": 1248,
"watchers_count": 1248,
"forks_count": 364,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 362,
"watchers": 1241,
"forks": 364,
"watchers": 1248,
"score": 0
},
{
@ -185,11 +185,11 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-02-11T10:22:24Z",
"updated_at": "2022-02-11T13:08:27Z",
"pushed_at": "2022-01-29T06:22:16Z",
"stargazers_count": 737,
"watchers_count": 737,
"forks_count": 239,
"stargazers_count": 738,
"watchers_count": 738,
"forks_count": 238,
"allow_forking": true,
"is_template": false,
"topics": [
@ -198,8 +198,8 @@
"poc"
],
"visibility": "public",
"forks": 239,
"watchers": 737,
"forks": 238,
"watchers": 738,
"score": 0
},
{
@ -1584,7 +1584,7 @@
"fork": false,
"created_at": "2022-01-27T07:19:17Z",
"updated_at": "2022-02-08T13:51:01Z",
"pushed_at": "2022-02-08T13:54:17Z",
"pushed_at": "2022-02-11T14:32:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -1752,10 +1752,10 @@
"description": "LSM BPF module to block pwnkit (CVE-2021-4034) like exploits",
"fork": false,
"created_at": "2022-01-27T10:26:46Z",
"updated_at": "2022-02-11T07:39:46Z",
"updated_at": "2022-02-11T13:06:02Z",
"pushed_at": "2022-02-10T21:58:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1767,7 +1767,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -99,10 +99,10 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2022-02-09T23:25:20Z",
"updated_at": "2022-02-11T14:38:38Z",
"pushed_at": "2022-01-13T12:35:19Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -111,7 +111,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 205,
"watchers": 206,
"score": 0
},
{

View file

@ -394,12 +394,12 @@
"pushed_at": "2022-01-31T05:56:55Z",
"stargazers_count": 941,
"watchers_count": 941,
"forks_count": 386,
"forks_count": 387,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 386,
"forks": 387,
"watchers": 941,
"score": 0
},
@ -964,10 +964,10 @@
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
"updated_at": "2022-02-03T14:11:02Z",
"updated_at": "2022-02-11T16:17:09Z",
"pushed_at": "2021-12-14T13:43:35Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -979,7 +979,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 77,
"watchers": 76,
"score": 0
},
{
@ -1374,7 +1374,7 @@
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-02-10T06:01:08Z",
"pushed_at": "2022-02-10T06:19:51Z",
"pushed_at": "2022-02-11T15:39:06Z",
"stargazers_count": 764,
"watchers_count": 764,
"forks_count": 156,
@ -3546,12 +3546,12 @@
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2712,
"watchers_count": 2712,
"forks_count": 655,
"forks_count": 654,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 655,
"forks": 654,
"watchers": 2712,
"score": 0
},
@ -4520,7 +4520,7 @@
"fork": false,
"created_at": "2021-12-13T17:25:52Z",
"updated_at": "2022-02-09T10:00:20Z",
"pushed_at": "2022-01-20T19:54:37Z",
"pushed_at": "2022-02-11T15:50:43Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
@ -8423,17 +8423,17 @@
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
"fork": false,
"created_at": "2021-12-19T14:48:30Z",
"updated_at": "2022-01-27T19:12:19Z",
"updated_at": "2022-02-11T14:32:58Z",
"pushed_at": "2021-12-22T15:56:21Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-02-11T09:02:10Z",
"updated_at": "2022-02-11T17:08:20Z",
"pushed_at": "2022-01-25T17:00:16Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 262,
"watchers": 263,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-02-11T11:05:30Z",
"updated_at": "2022-02-11T16:37:33Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 24,
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 104,
"forks": 26,
"watchers": 115,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2021-06-22T01:36:16Z",
"updated_at": "2022-02-11T01:42:10Z",
"pushed_at": "2022-02-09T02:42:03Z",
"pushed_at": "2022-02-11T13:59:14Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,

View file

@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-02-10T18:45:19Z",
"updated_at": "2022-02-11T15:11:43Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 97,
"watchers": 354,
"watchers": 355,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-02-11T10:14:41Z",
"updated_at": "2022-02-11T18:14:20Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 345,
"watchers_count": 345,
"forks_count": 61,
"stargazers_count": 362,
"watchers_count": 362,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 61,
"watchers": 345,
"forks": 62,
"watchers": 362,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-02-03T16:21:01Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -40,7 +40,7 @@
"zeroday"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0
}

View file

@ -1,7 +1,12 @@
# PoC in GitHub
## 2022
### CVE-2022-0185
### CVE-2022-0185 (-)
<code>
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
</code>
- [Crusaders-of-Rust/CVE-2022-0185](https://github.com/Crusaders-of-Rust/CVE-2022-0185)
- [discordianfish/cve-2022-0185-crash-poc](https://github.com/discordianfish/cve-2022-0185-crash-poc)
- [khaclep007/CVE-2022-0185](https://github.com/khaclep007/CVE-2022-0185)
@ -6135,6 +6140,7 @@ When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.
- [VICXOR/CVE-2020-9484](https://github.com/VICXOR/CVE-2020-9484)
- [DXY0411/CVE-2020-9484](https://github.com/DXY0411/CVE-2020-9484)
- [RepublicR0K/CVE-2020-9484](https://github.com/RepublicR0K/CVE-2020-9484)
- [ColdFusionX/CVE-2020-9484](https://github.com/ColdFusionX/CVE-2020-9484)
### CVE-2020-9495 (2020-06-19)