Auto Update 2022/08/11 12:22:13

This commit is contained in:
motikan2010-bot 2022-08-11 21:22:13 +09:00
parent c594a74221
commit 2261134052
42 changed files with 213 additions and 255 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-10T06:47:02Z",
"updated_at": "2022-08-11T07:33:57Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1467,
"watchers_count": 1467,
"stargazers_count": 1468,
"watchers_count": 1468,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1467,
"watchers": 1468,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-10T06:47:02Z",
"updated_at": "2022-08-11T07:33:57Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1467,
"watchers_count": 1467,
"stargazers_count": 1468,
"watchers_count": 1468,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1467,
"watchers": 1468,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2017-18635",
"fork": false,
"created_at": "2019-10-16T21:27:40Z",
"updated_at": "2020-04-10T16:47:58Z",
"updated_at": "2022-08-11T08:22:01Z",
"pushed_at": "2019-10-19T18:37:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-10T06:47:02Z",
"updated_at": "2022-08-11T07:33:57Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1467,
"watchers_count": 1467,
"stargazers_count": 1468,
"watchers_count": 1468,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1467,
"watchers": 1468,
"score": 0
},
{

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-10T06:47:02Z",
"updated_at": "2022-08-11T07:33:57Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1467,
"watchers_count": 1467,
"stargazers_count": 1468,
"watchers_count": 1468,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1467,
"watchers": 1468,
"score": 0
},
{

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-11T05:15:17Z",
"updated_at": "2022-08-11T07:18:24Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3476,
"watchers_count": 3476,
"forks_count": 1024,
"stargazers_count": 3477,
"watchers_count": 3477,
"forks_count": 1023,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell"
],
"visibility": "public",
"forks": 1024,
"watchers": 3476,
"forks": 1023,
"watchers": 3477,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-10T06:47:02Z",
"updated_at": "2022-08-11T07:33:57Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1467,
"watchers_count": 1467,
"stargazers_count": 1468,
"watchers_count": 1468,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1467,
"watchers": 1468,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit of CVE-2019-8942 and CVE-2019-8943 ",
"fork": false,
"created_at": "2021-02-01T12:47:28Z",
"updated_at": "2022-06-24T17:34:23Z",
"updated_at": "2022-08-11T07:18:54Z",
"pushed_at": "2021-02-02T15:46:22Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
"fork": false,
"created_at": "2019-02-09T02:18:37Z",
"updated_at": "2022-08-02T14:50:24Z",
"updated_at": "2022-08-11T10:15:00Z",
"pushed_at": "2019-11-03T17:29:56Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-08-04T10:00:34Z",
"updated_at": "2022-08-11T08:17:45Z",
"pushed_at": "2022-05-04T14:12:43Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 96,
"watchers": 97,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB",
"fork": false,
"created_at": "2020-05-19T13:12:48Z",
"updated_at": "2022-02-28T18:48:29Z",
"updated_at": "2022-08-11T08:21:47Z",
"pushed_at": "2020-08-04T09:30:49Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-11T05:15:17Z",
"updated_at": "2022-08-11T07:18:24Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3476,
"watchers_count": 3476,
"forks_count": 1024,
"stargazers_count": 3477,
"watchers_count": 3477,
"forks_count": 1023,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell"
],
"visibility": "public",
"forks": 1024,
"watchers": 3476,
"forks": 1023,
"watchers": 3477,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-10T06:47:02Z",
"updated_at": "2022-08-11T07:33:57Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1467,
"watchers_count": 1467,
"stargazers_count": 1468,
"watchers_count": 1468,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1467,
"watchers": 1468,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
"fork": false,
"created_at": "2020-12-24T09:10:17Z",
"updated_at": "2022-08-10T15:06:28Z",
"updated_at": "2022-08-11T09:41:06Z",
"pushed_at": "2020-12-25T09:51:37Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
"updated_at": "2022-07-05T07:20:48Z",
"updated_at": "2022-08-11T08:12:42Z",
"pushed_at": "2020-06-02T08:30:22Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 83,
"watchers": 84,
"score": 0
}
]

View file

@ -168,10 +168,10 @@
"description": "Dell Driver EoP (CVE-2021-21551)",
"fork": false,
"created_at": "2021-09-03T01:47:03Z",
"updated_at": "2022-07-29T21:49:05Z",
"updated_at": "2022-08-11T11:33:49Z",
"pushed_at": "2022-02-24T10:13:45Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -179,7 +179,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -1088,10 +1088,10 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2022-08-09T18:03:51Z",
"updated_at": "2022-08-11T08:44:46Z",
"pushed_at": "2021-11-16T04:00:14Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -1099,7 +1099,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 138,
"watchers": 139,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2022-08-09T08:57:58Z",
"updated_at": "2022-08-11T07:46:44Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-11T06:00:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-03-22T07:07:42Z",
"updated_at": "2022-03-22T07:07:42Z",
"pushed_at": "2022-04-20T03:34:42Z",
"pushed_at": "2022-08-11T07:23:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -517,11 +517,11 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-08-09T13:41:11Z",
"updated_at": "2022-08-11T11:06:01Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1444,
"watchers_count": 1444,
"forks_count": 400,
"stargazers_count": 1445,
"watchers_count": 1445,
"forks_count": 401,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -532,8 +532,8 @@
"security"
],
"visibility": "public",
"forks": 400,
"watchers": 1444,
"forks": 401,
"watchers": 1445,
"score": 0
},
{
@ -647,10 +647,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-08-11T03:15:21Z",
"updated_at": "2022-08-11T06:52:52Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 483,
"watchers_count": 483,
"stargazers_count": 484,
"watchers_count": 484,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
@ -663,7 +663,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 483,
"watchers": 484,
"score": 0
},
{
@ -680,10 +680,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-08-10T16:49:54Z",
"updated_at": "2022-08-11T07:45:01Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 834,
"watchers_count": 834,
"stargazers_count": 835,
"watchers_count": 835,
"forks_count": 175,
"allow_forking": true,
"is_template": false,
@ -704,7 +704,7 @@
],
"visibility": "public",
"forks": 175,
"watchers": 834,
"watchers": 835,
"score": 0
},
{
@ -2761,10 +2761,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-08-02T09:51:11Z",
"updated_at": "2022-08-11T10:22:49Z",
"pushed_at": "2022-04-24T08:56:47Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
@ -2778,7 +2778,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 323,
"watchers": 326,
"score": 0
},
{
@ -6120,7 +6120,7 @@
"pushed_at": "2021-12-20T12:03:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -6132,7 +6132,7 @@
"scanner"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 2,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.",
"fork": false,
"created_at": "2022-08-10T15:53:44Z",
"updated_at": "2022-08-11T05:18:08Z",
"updated_at": "2022-08-11T11:21:23Z",
"pushed_at": "2022-08-10T16:15:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -349,10 +349,10 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2022-05-14T08:31:32Z",
"updated_at": "2022-08-11T06:38:27Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -360,7 +360,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 35,
"watchers": 36,
"score": 0
},
{

View file

@ -26,33 +26,5 @@
"forks": 67,
"watchers": 472,
"score": 0
},
{
"id": 484817748,
"name": "CVE-2022-0995",
"full_name": "B0nfee\/CVE-2022-0995",
"owner": {
"login": "B0nfee",
"id": 104272697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104272697?v=4",
"html_url": "https:\/\/github.com\/B0nfee"
},
"html_url": "https:\/\/github.com\/B0nfee\/CVE-2022-0995",
"description": null,
"fork": false,
"created_at": "2022-04-23T17:48:40Z",
"updated_at": "2022-04-23T17:48:55Z",
"pushed_at": "2022-04-23T17:48:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-08-11T02:19:05Z",
"updated_at": "2022-08-11T07:02:10Z",
"pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 129,
"stargazers_count": 306,
"watchers_count": 306,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 129,
"watchers": 304,
"forks": 130,
"watchers": 306,
"score": 0
}
]

37
2022/CVE-2022-20829.json Normal file
View file

@ -0,0 +1,37 @@
[
{
"id": 486681156,
"name": "theway",
"full_name": "jbaines-r7\/theway",
"owner": {
"login": "jbaines-r7",
"id": 91965877,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
"html_url": "https:\/\/github.com\/jbaines-r7"
},
"html_url": "https:\/\/github.com\/jbaines-r7\/theway",
"description": "A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)",
"fork": false,
"created_at": "2022-04-28T17:04:58Z",
"updated_at": "2022-08-11T11:00:32Z",
"pushed_at": "2022-06-17T15:46:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"asa",
"asdm",
"cisco",
"cve-2022-20829",
"exploit",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-10T16:47:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -41,10 +41,10 @@
"description": "wo ee cve-2022-2185 gitlab authenticated rce",
"fork": false,
"created_at": "2022-07-29T11:14:03Z",
"updated_at": "2022-08-11T05:12:42Z",
"updated_at": "2022-08-11T09:11:37Z",
"pushed_at": "2022-07-29T11:28:59Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -142,33 +142,5 @@
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 484818043,
"name": "CVE-2022-21882",
"full_name": "B0nfee\/CVE-2022-21882",
"owner": {
"login": "B0nfee",
"id": 104272697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104272697?v=4",
"html_url": "https:\/\/github.com\/B0nfee"
},
"html_url": "https:\/\/github.com\/B0nfee\/CVE-2022-21882",
"description": null,
"fork": false,
"created_at": "2022-04-23T17:49:59Z",
"updated_at": "2022-04-23T17:54:35Z",
"pushed_at": "2022-04-23T17:50:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2022-08-11T05:07:04Z",
"updated_at": "2022-08-11T11:21:15Z",
"pushed_at": "2022-08-10T15:34:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"windows-boot"
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 3,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22639: Get a Root Shell on macOS Monterey",
"fork": false,
"created_at": "2022-03-17T06:16:54Z",
"updated_at": "2022-08-11T06:10:14Z",
"updated_at": "2022-08-11T07:52:10Z",
"pushed_at": "2022-04-05T05:11:29Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 108,
"watchers": 109,
"score": 0
}
]

View file

@ -1258,10 +1258,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-08-07T07:55:56Z",
"updated_at": "2022-08-11T10:18:57Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -1269,7 +1269,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 100,
"watchers": 101,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2022-08-08T16:15:59Z",
"updated_at": "2022-08-11T06:50:46Z",
"pushed_at": "2022-03-22T00:56:07Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 106,
"watchers": 107,
"score": 0
}
]

View file

@ -82,33 +82,5 @@
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 484817930,
"name": "CVE-2022-25636",
"full_name": "B0nfee\/CVE-2022-25636",
"owner": {
"login": "B0nfee",
"id": 104272697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104272697?v=4",
"html_url": "https:\/\/github.com\/B0nfee"
},
"html_url": "https:\/\/github.com\/B0nfee\/CVE-2022-25636",
"description": null,
"fork": false,
"created_at": "2022-04-23T17:49:30Z",
"updated_at": "2022-04-23T17:54:43Z",
"pushed_at": "2022-04-23T17:49:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-08-11T06:05:35Z",
"updated_at": "2022-08-11T10:47:54Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-11T04:17:54Z",
"pushed_at": "2022-08-10T01:24:47Z",
"stargazers_count": 619,
"watchers_count": 619,
"forks_count": 113,
"updated_at": "2022-08-11T08:18:35Z",
"pushed_at": "2022-08-11T09:35:18Z",
"stargazers_count": 622,
"watchers_count": 622,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"gui"
],
"visibility": "public",
"forks": 113,
"watchers": 619,
"forks": 117,
"watchers": 622,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-08-05T01:14:19Z",
"updated_at": "2022-08-11T10:40:13Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 58,
"score": 0
}

View file

@ -47,10 +47,10 @@
"description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)",
"fork": false,
"created_at": "2022-08-09T10:29:48Z",
"updated_at": "2022-08-11T05:35:58Z",
"updated_at": "2022-08-11T10:33:47Z",
"pushed_at": "2022-08-09T14:55:35Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -69,18 +69,18 @@
"description": "CVE",
"fork": false,
"created_at": "2022-08-10T03:21:19Z",
"updated_at": "2022-08-11T03:06:54Z",
"updated_at": "2022-08-11T12:01:58Z",
"pushed_at": "2022-08-10T03:25:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"forks": 4,
"watchers": 13,
"score": 0
}
]

View file

@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-08-10T13:36:36Z",
"updated_at": "2022-08-11T10:14:21Z",
"pushed_at": "2022-08-05T14:46:52Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 125,
"watchers": 127,
"score": 0
}
]

View file

@ -258,7 +258,6 @@ An out-of-bounds (OOB) memory write flaw was found in the Linux kernels watch
</code>
- [Bonfee/CVE-2022-0995](https://github.com/Bonfee/CVE-2022-0995)
- [B0nfee/CVE-2022-0995](https://github.com/B0nfee/CVE-2022-0995)
### CVE-2022-0997 (2022-05-17)
@ -601,6 +600,14 @@ Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
- [rohankumardubey/CVE-2022-20699](https://github.com/rohankumardubey/CVE-2022-20699)
### CVE-2022-20829 (2022-06-24)
<code>
A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
</code>
- [jbaines-r7/theway](https://github.com/jbaines-r7/theway)
### CVE-2022-20866 (2022-08-10)
<code>
@ -714,7 +721,6 @@ Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022
- [L4ys/CVE-2022-21882](https://github.com/L4ys/CVE-2022-21882)
- [sailay1996/cve-2022-21882-poc](https://github.com/sailay1996/cve-2022-21882-poc)
- [r1l4-i3pur1l4/CVE-2022-21882](https://github.com/r1l4-i3pur1l4/CVE-2022-21882)
- [B0nfee/CVE-2022-21882](https://github.com/B0nfee/CVE-2022-21882)
### CVE-2022-21894 (2022-01-11)
@ -1740,7 +1746,6 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca
- [Bonfee/CVE-2022-25636](https://github.com/Bonfee/CVE-2022-25636)
- [chenaotian/CVE-2022-25636](https://github.com/chenaotian/CVE-2022-25636)
- [veritas501/CVE-2022-25636-PipeVersion](https://github.com/veritas501/CVE-2022-25636-PipeVersion)
- [B0nfee/CVE-2022-25636](https://github.com/B0nfee/CVE-2022-25636)
### CVE-2022-25640 (2022-02-23)