Auto Update 2022/03/23 00:14:36

This commit is contained in:
motikan2010-bot 2022-03-23 09:14:36 +09:00
parent 7de31026c4
commit 22824e85df
22 changed files with 135 additions and 126 deletions

View file

@ -13,17 +13,17 @@
"description": "Test utility for cve-2018-1002105", "description": "Test utility for cve-2018-1002105",
"fork": false, "fork": false,
"created_at": "2018-12-05T02:51:43Z", "created_at": "2018-12-05T02:51:43Z",
"updated_at": "2022-01-23T00:46:00Z", "updated_at": "2022-03-22T23:32:15Z",
"pushed_at": "2018-12-13T16:56:28Z", "pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 194, "stargazers_count": 196,
"watchers_count": 194, "watchers_count": 196,
"forks_count": 25, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 25,
"watchers": 194, "watchers": 196,
"score": 0 "score": 0
}, },
{ {

View file

@ -175,17 +175,17 @@
"description": "Laravel RCE exploit. CVE-2018-15133", "description": "Laravel RCE exploit. CVE-2018-15133",
"fork": false, "fork": false,
"created_at": "2020-12-21T22:02:08Z", "created_at": "2020-12-21T22:02:08Z",
"updated_at": "2022-03-22T17:56:45Z", "updated_at": "2022-03-22T23:53:49Z",
"pushed_at": "2022-03-22T17:56:41Z", "pushed_at": "2022-03-22T17:56:41Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 14, "watchers": 15,
"score": 0 "score": 0
}, },
{ {

View file

@ -94,17 +94,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-06-24T15:33:50Z", "created_at": "2019-06-24T15:33:50Z",
"updated_at": "2022-01-06T09:21:10Z", "updated_at": "2022-03-22T20:32:35Z",
"pushed_at": "2020-11-09T07:33:12Z", "pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 258, "stargazers_count": 259,
"watchers_count": 258, "watchers_count": 259,
"forks_count": 56, "forks_count": 56,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 56, "forks": 56,
"watchers": 258, "watchers": 259,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652", "description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
"fork": false, "fork": false,
"created_at": "2020-05-01T20:53:49Z", "created_at": "2020-05-01T20:53:49Z",
"updated_at": "2022-01-09T18:45:28Z", "updated_at": "2022-03-22T21:58:18Z",
"pushed_at": "2020-05-18T17:36:18Z", "pushed_at": "2020-05-18T17:36:18Z",
"stargazers_count": 110, "stargazers_count": 111,
"watchers_count": 110, "watchers_count": 111,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -55,7 +55,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 110, "watchers": 111,
"score": 0 "score": 0
}, },
{ {

View file

@ -95,7 +95,7 @@
"fork": false, "fork": false,
"created_at": "2022-03-21T23:05:38Z", "created_at": "2022-03-21T23:05:38Z",
"updated_at": "2022-03-21T23:05:39Z", "updated_at": "2022-03-21T23:05:39Z",
"pushed_at": "2022-03-22T03:00:11Z", "pushed_at": "2022-03-22T22:46:17Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-06-09T13:27:20Z", "pushed_at": "2021-06-09T13:27:20Z",
"stargazers_count": 145, "stargazers_count": 145,
"watchers_count": 145, "watchers_count": 145,
"forks_count": 23, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -35,7 +35,7 @@
"vulnerability" "vulnerability"
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 24,
"watchers": 145, "watchers": 145,
"score": 0 "score": 0
}, },

View file

@ -26,33 +26,6 @@
"watchers": 179, "watchers": 179,
"score": 0 "score": 0
}, },
{
"id": 422090493,
"name": "CVE-2021-22205",
"full_name": "XTeam-Wing\/CVE-2021-22205",
"owner": {
"login": "XTeam-Wing",
"id": 25416365,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4",
"html_url": "https:\/\/github.com\/XTeam-Wing"
},
"html_url": "https:\/\/github.com\/XTeam-Wing\/CVE-2021-22205",
"description": "Pocsuite3 For CVE-2021-22205",
"fork": false,
"created_at": "2021-10-28T06:29:37Z",
"updated_at": "2022-02-20T09:29:20Z",
"pushed_at": "2021-10-28T08:54:26Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 85,
"score": 0
},
{ {
"id": 422227118, "id": 422227118,
"name": "CVE-2021-22205", "name": "CVE-2021-22205",
@ -449,10 +422,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool", "description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false, "fork": false,
"created_at": "2021-11-11T04:34:07Z", "created_at": "2021-11-11T04:34:07Z",
"updated_at": "2022-03-20T15:42:43Z", "updated_at": "2022-03-23T00:09:22Z",
"pushed_at": "2022-01-16T15:54:14Z", "pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 127, "stargazers_count": 128,
"watchers_count": 127, "watchers_count": 128,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -466,7 +439,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 127, "watchers": 128,
"score": 0 "score": 0
}, },
{ {

View file

@ -98,12 +98,12 @@
"pushed_at": "2022-03-01T16:11:31Z", "pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 228, "stargazers_count": 228,
"watchers_count": 228, "watchers_count": 228,
"forks_count": 39, "forks_count": 40,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 40,
"watchers": 228, "watchers": 228,
"score": 0 "score": 0
}, },

View file

@ -429,12 +429,12 @@
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 819, "stargazers_count": 819,
"watchers_count": 819, "watchers_count": 819,
"forks_count": 234, "forks_count": 235,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 234, "forks": 235,
"watchers": 819, "watchers": 819,
"score": 0 "score": 0
}, },

View file

@ -130,17 +130,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-06-14T20:08:20Z", "created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-03-12T00:47:11Z", "updated_at": "2022-03-22T18:37:19Z",
"pushed_at": "2022-02-11T15:22:20Z", "pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 31, "stargazers_count": 32,
"watchers_count": 31, "watchers_count": 32,
"forks_count": 19, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 20,
"watchers": 31, "watchers": 32,
"score": 0 "score": 0
}, },
{ {
@ -188,12 +188,12 @@
"pushed_at": "2021-06-20T07:38:13Z", "pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 50, "stargazers_count": 50,
"watchers_count": 50, "watchers_count": 50,
"forks_count": 29, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 29, "forks": 30,
"watchers": 50, "watchers": 50,
"score": 0 "score": 0
}, },

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-03-22T08:16:37Z", "updated_at": "2022-03-22T21:32:31Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1388, "stargazers_count": 1389,
"watchers_count": 1388, "watchers_count": 1389,
"forks_count": 454, "forks_count": 454,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 454, "forks": 454,
"watchers": 1388, "watchers": 1389,
"score": 0 "score": 0
}, },
{ {
@ -175,17 +175,17 @@
"description": "CVE-2021-40444", "description": "CVE-2021-40444",
"fork": false, "fork": false,
"created_at": "2021-12-19T08:16:07Z", "created_at": "2021-12-19T08:16:07Z",
"updated_at": "2022-03-10T18:18:49Z", "updated_at": "2022-03-22T21:48:37Z",
"pushed_at": "2021-12-19T08:27:33Z", "pushed_at": "2021-12-19T08:27:33Z",
"stargazers_count": 58, "stargazers_count": 59,
"watchers_count": 58, "watchers_count": 59,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 58, "watchers": 59,
"score": 0 "score": 0
}, },
{ {

29
2021/CVE-2021-41338.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 472963061,
"name": "firewall-cve",
"full_name": "Mario-Kart-Felix\/firewall-cve",
"owner": {
"login": "Mario-Kart-Felix",
"id": 76971465,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76971465?v=4",
"html_url": "https:\/\/github.com\/Mario-Kart-Felix"
},
"html_url": "https:\/\/github.com\/Mario-Kart-Felix\/firewall-cve",
"description": "Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability CVE-2021-41338 Security Vulnerability Released: Oct 12, 2021 Assigning CNA: Microsoft MITRE CVE-2021-41338 CVSS:3.1 5.5 \/ 5.0 Attack Vector Local Attack Complexity Low Privileges Required Low User Interaction None Scope Unchanged Confidentiality High Integrity None Availability None Exploit Code Maturity Proof-of-Concept Remediation Level Official Fix Report Confidence Confirmed Please see Common Vulnerability Scoring System for more information on the definition of these metrics. Exploitability The following table provides an exploitability assessment for this vulnerability at the time of original publication. Yes No Exploitation Less Likely",
"fork": false,
"created_at": "2022-03-22T22:53:32Z",
"updated_at": "2022-03-22T22:56:29Z",
"pushed_at": "2022-03-22T23:09:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-23T02:33:47Z", "pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 69, "stargazers_count": 69,
"watchers_count": 69, "watchers_count": 69,
"forks_count": 27, "forks_count": 28,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 28,
"watchers": 69, "watchers": 69,
"score": 0 "score": 0
}, },

View file

@ -13,17 +13,17 @@
"description": "exploit for CVE-2021-43848", "description": "exploit for CVE-2021-43848",
"fork": false, "fork": false,
"created_at": "2022-02-03T16:31:13Z", "created_at": "2022-02-03T16:31:13Z",
"updated_at": "2022-02-08T23:28:24Z", "updated_at": "2022-03-22T19:22:51Z",
"pushed_at": "2022-02-03T16:36:55Z", "pushed_at": "2022-02-03T16:36:55Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-03-22T13:29:42Z", "updated_at": "2022-03-22T19:42:05Z",
"pushed_at": "2022-03-20T16:33:49Z", "pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1276, "stargazers_count": 1275,
"watchers_count": 1276, "watchers_count": 1275,
"forks_count": 347, "forks_count": 347,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -922,7 +922,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 347, "forks": 347,
"watchers": 1276, "watchers": 1275,
"score": 0 "score": 0
}, },
{ {
@ -1375,10 +1375,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-11T11:18:46Z", "created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-03-16T12:53:22Z", "updated_at": "2022-03-22T20:31:13Z",
"pushed_at": "2022-02-17T20:52:22Z", "pushed_at": "2022-02-17T20:52:22Z",
"stargazers_count": 778, "stargazers_count": 779,
"watchers_count": 778, "watchers_count": 779,
"forks_count": 163, "forks_count": 163,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1398,7 +1398,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 163, "forks": 163,
"watchers": 778, "watchers": 779,
"score": 0 "score": 0
}, },
{ {
@ -2454,7 +2454,7 @@
"description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)", "description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)",
"fork": false, "fork": false,
"created_at": "2021-12-12T11:28:34Z", "created_at": "2021-12-12T11:28:34Z",
"updated_at": "2022-03-10T22:18:21Z", "updated_at": "2022-03-22T18:45:58Z",
"pushed_at": "2022-02-23T19:10:53Z", "pushed_at": "2022-02-23T19:10:53Z",
"stargazers_count": 47, "stargazers_count": 47,
"watchers_count": 47, "watchers_count": 47,
@ -3575,17 +3575,17 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228", "description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-13T04:14:18Z", "created_at": "2021-12-13T04:14:18Z",
"updated_at": "2022-03-21T17:31:42Z", "updated_at": "2022-03-22T23:05:13Z",
"pushed_at": "2022-01-21T11:43:49Z", "pushed_at": "2022-01-21T11:43:49Z",
"stargazers_count": 259, "stargazers_count": 260,
"watchers_count": 259, "watchers_count": 260,
"forks_count": 90, "forks_count": 90,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 90, "forks": 90,
"watchers": 259, "watchers": 260,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false, "fork": false,
"created_at": "2022-03-19T08:10:46Z", "created_at": "2022-03-19T08:10:46Z",
"updated_at": "2022-03-22T17:46:36Z", "updated_at": "2022-03-22T23:59:14Z",
"pushed_at": "2022-03-19T12:01:26Z", "pushed_at": "2022-03-19T12:01:26Z",
"stargazers_count": 180, "stargazers_count": 184,
"watchers_count": 180, "watchers_count": 184,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -39,7 +39,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 180, "watchers": 184,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt", "description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false, "fork": false,
"created_at": "2022-03-15T19:06:33Z", "created_at": "2022-03-15T19:06:33Z",
"updated_at": "2022-03-22T17:52:52Z", "updated_at": "2022-03-22T19:01:59Z",
"pushed_at": "2022-03-21T12:12:16Z", "pushed_at": "2022-03-21T12:12:16Z",
"stargazers_count": 115, "stargazers_count": 116,
"watchers_count": 115, "watchers_count": 116,
"forks_count": 30, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 30,
"watchers": 115, "watchers": 116,
"score": 0 "score": 0
}, },
{ {

View file

@ -337,17 +337,17 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.", "description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false, "fork": false,
"created_at": "2022-03-08T11:49:40Z", "created_at": "2022-03-08T11:49:40Z",
"updated_at": "2022-03-22T10:23:42Z", "updated_at": "2022-03-22T22:48:14Z",
"pushed_at": "2022-03-08T11:52:22Z", "pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 30, "stargazers_count": 31,
"watchers_count": 30, "watchers_count": 31,
"forks_count": 15, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 16,
"watchers": 30, "watchers": 31,
"score": 0 "score": 0
}, },
{ {
@ -530,12 +530,12 @@
"pushed_at": "2022-03-18T09:32:30Z", "pushed_at": "2022-03-18T09:32:30Z",
"stargazers_count": 23, "stargazers_count": 23,
"watchers_count": 23, "watchers_count": 23,
"forks_count": 9, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 10,
"watchers": 23, "watchers": 23,
"score": 0 "score": 0
}, },
@ -1074,17 +1074,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false, "fork": false,
"created_at": "2022-03-12T20:57:24Z", "created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-03-22T12:59:42Z", "updated_at": "2022-03-22T18:58:15Z",
"pushed_at": "2022-03-15T00:26:45Z", "pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 175, "stargazers_count": 176,
"watchers_count": 175, "watchers_count": 176,
"forks_count": 30, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 31,
"watchers": 175, "watchers": 176,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false, "fork": false,
"created_at": "2022-02-08T17:25:44Z", "created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-22T08:48:23Z", "updated_at": "2022-03-22T20:33:38Z",
"pushed_at": "2022-02-09T16:54:09Z", "pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 523, "stargazers_count": 524,
"watchers_count": 523, "watchers_count": 524,
"forks_count": 103, "forks_count": 103,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -26,7 +26,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 103, "forks": 103,
"watchers": 523, "watchers": 524,
"score": 0 "score": 0
} }
] ]

View file

@ -67,17 +67,17 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp", "description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false, "fork": false,
"created_at": "2022-02-18T11:51:47Z", "created_at": "2022-02-18T11:51:47Z",
"updated_at": "2022-03-21T06:28:13Z", "updated_at": "2022-03-22T20:36:06Z",
"pushed_at": "2022-02-24T15:02:12Z", "pushed_at": "2022-02-24T15:02:12Z",
"stargazers_count": 84, "stargazers_count": 85,
"watchers_count": 84, "watchers_count": 85,
"forks_count": 33, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 33, "forks": 33,
"watchers": 84, "watchers": 85,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,11 +13,11 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.", "description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false, "fork": false,
"created_at": "2022-01-28T20:37:14Z", "created_at": "2022-01-28T20:37:14Z",
"updated_at": "2022-03-22T14:43:09Z", "updated_at": "2022-03-22T23:20:44Z",
"pushed_at": "2022-03-22T00:56:07Z", "pushed_at": "2022-03-22T00:56:07Z",
"stargazers_count": 29, "stargazers_count": 34,
"watchers_count": 29, "watchers_count": 34,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -28,8 +28,8 @@
"souls-games" "souls-games"
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 29, "watchers": 34,
"score": 0 "score": 0
} }
] ]

View file

@ -1842,7 +1842,6 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
</code> </code>
- [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205) - [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205)
- [XTeam-Wing/CVE-2021-22205](https://github.com/XTeam-Wing/CVE-2021-22205)
- [r0eXpeR/CVE-2021-22205](https://github.com/r0eXpeR/CVE-2021-22205) - [r0eXpeR/CVE-2021-22205](https://github.com/r0eXpeR/CVE-2021-22205)
- [antx-code/CVE-2021-22205](https://github.com/antx-code/CVE-2021-22205) - [antx-code/CVE-2021-22205](https://github.com/antx-code/CVE-2021-22205)
- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205) - [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205)
@ -3462,6 +3461,14 @@ Metabase is an open source data analytics platform. In affected versions a secur
- [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script) - [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script)
- [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277) - [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277)
### CVE-2021-41338 (2021-10-12)
<code>
Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability
</code>
- [Mario-Kart-Felix/firewall-cve](https://github.com/Mario-Kart-Felix/firewall-cve)
### CVE-2021-41349 (2021-11-09) ### CVE-2021-41349 (2021-11-09)
<code> <code>