Auto Update 2022/03/09 12:14:39

This commit is contained in:
motikan2010-bot 2022-03-09 21:14:39 +09:00
parent a9ec3ebfbf
commit 232d7f0247
66 changed files with 571 additions and 1055 deletions

View file

@ -1,35 +0,0 @@
[
{
"id": 33029463,
"name": "BEAST-PoC",
"full_name": "mpgn\/BEAST-PoC",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/BEAST-PoC",
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2021-12-08T06:17:16Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [
"beast",
"plaintext-attack",
"python",
"sslv3",
"tls"
],
"visibility": "public",
"forks": 31,
"watchers": 51,
"score": 0
}
]

View file

@ -40,11 +40,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-08T04:40:45Z",
"updated_at": "2022-03-09T10:13:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"forks_count": 286,
"stargazers_count": 1306,
"watchers_count": 1306,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,8 +70,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 286,
"watchers": 1305,
"forks": 287,
"watchers": 1306,
"score": 0
},
{

View file

@ -1604,33 +1604,6 @@
"watchers": 2,
"score": 0
},
{
"id": 421096576,
"name": "ShellShock",
"full_name": "JowardBince\/ShellShock",
"owner": {
"login": "JowardBince",
"id": 66454005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66454005?v=4",
"html_url": "https:\/\/github.com\/JowardBince"
},
"html_url": "https:\/\/github.com\/JowardBince\/ShellShock",
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
"fork": false,
"created_at": "2021-10-25T16:13:48Z",
"updated_at": "2021-11-27T17:59:13Z",
"pushed_at": "2021-10-28T14:09:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 459666650,
"name": "ShellShock",

View file

@ -13,11 +13,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-08T04:40:45Z",
"updated_at": "2022-03-09T10:13:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"forks_count": 286,
"stargazers_count": 1306,
"watchers_count": 1306,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,8 +43,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 286,
"watchers": 1305,
"forks": 287,
"watchers": 1306,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 62454997,
"name": "CVE-2016-2468",
"full_name": "gitcollect\/CVE-2016-2468",
"owner": {
"login": "gitcollect",
"id": 17906239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
"html_url": "https:\/\/github.com\/gitcollect"
},
"html_url": "https:\/\/github.com\/gitcollect\/CVE-2016-2468",
"description": "Buildable Poc of CVE-2016-2468 based on http:\/\/retme.net\/index.php\/2016\/06\/12\/CVE-2016-2468.html",
"fork": false,
"created_at": "2016-07-02T14:37:31Z",
"updated_at": "2018-03-01T18:02:03Z",
"pushed_at": "2016-07-02T10:34:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1065,17 +1065,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-09T05:51:08Z",
"pushed_at": "2022-03-09T05:27:59Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 24,
"updated_at": "2022-03-09T11:46:43Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 74,
"forks": 28,
"watchers": 83,
"score": 0
}
]

View file

@ -136,12 +136,12 @@
"pushed_at": "2021-03-26T10:33:51Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 13,
"score": 0
}

View file

@ -40,11 +40,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-08T04:40:45Z",
"updated_at": "2022-03-09T10:13:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"forks_count": 286,
"stargazers_count": 1306,
"watchers_count": 1306,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,8 +70,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 286,
"watchers": 1305,
"forks": 287,
"watchers": 1306,
"score": 0
},
{

View file

@ -170,36 +170,6 @@
"watchers": 15,
"score": 0
},
{
"id": 84602394,
"name": "apache-struts2-CVE-2017-5638",
"full_name": "immunio\/apache-struts2-CVE-2017-5638",
"owner": {
"login": "immunio",
"id": 6700387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6700387?v=4",
"html_url": "https:\/\/github.com\/immunio"
},
"html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638",
"description": "Demo Application and Exploit",
"fork": false,
"created_at": "2017-03-10T21:33:25Z",
"updated_at": "2021-10-27T16:49:21Z",
"pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [
"apache-struts2-045",
"cve-2017-5638"
],
"visibility": "public",
"forks": 39,
"watchers": 37,
"score": 0
},
{
"id": 84620334,
"name": "OgnlContentTypeRejectorValve",
@ -1528,39 +1498,6 @@
"watchers": 1,
"score": 0
},
{
"id": 177221305,
"name": "CVE-2017-5638",
"full_name": "colorblindpentester\/CVE-2017-5638",
"owner": {
"login": "colorblindpentester",
"id": 45195264,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45195264?v=4",
"html_url": "https:\/\/github.com\/colorblindpentester"
},
"html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2017-5638",
"description": "CVE-2017-5638 (PoC Exploits)",
"fork": false,
"created_at": "2019-03-22T23:25:49Z",
"updated_at": "2019-03-22T23:30:08Z",
"pushed_at": "2019-03-22T23:29:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"cve-2017",
"cve-2017-5638",
"exploit",
"poc"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 202619396,
"name": "cve-2017-5638",

View file

@ -1,36 +1,4 @@
[
{
"id": 116768537,
"name": "exploit-cve-2017-5715",
"full_name": "opsxcq\/exploit-cve-2017-5715",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
"description": "Spectre exploit",
"fork": false,
"created_at": "2018-01-09T05:06:12Z",
"updated_at": "2022-02-21T01:51:16Z",
"pushed_at": "2018-01-09T22:27:25Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [
"exploit",
"intelbug",
"memory-leak",
"spectre"
],
"visibility": "public",
"forks": 19,
"watchers": 53,
"score": 0
},
{
"id": 117425769,
"name": "meltdown-spectre-bios-list",

View file

@ -13,17 +13,17 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2022-02-26T17:00:32Z",
"updated_at": "2022-03-09T08:54:32Z",
"pushed_at": "2020-08-09T15:35:16Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -32,32 +32,5 @@
"forks": 7,
"watchers": 31,
"score": 0
},
{
"id": 465062160,
"name": "tools-for-CVE-2018-1000001",
"full_name": "usernameid0\/tools-for-CVE-2018-1000001",
"owner": {
"login": "usernameid0",
"id": 100703550,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100703550?v=4",
"html_url": "https:\/\/github.com\/usernameid0"
},
"html_url": "https:\/\/github.com\/usernameid0\/tools-for-CVE-2018-1000001",
"description": "Tools for get offsets and adding patch for support i386",
"fork": false,
"created_at": "2022-03-01T21:27:37Z",
"updated_at": "2022-03-01T21:43:03Z",
"pushed_at": "2022-03-01T21:41:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -196,33 +196,6 @@
"watchers": 2,
"score": 0
},
{
"id": 410750342,
"name": "Bash-Script-CVE-2018-16763",
"full_name": "k4is3r13\/Bash-Script-CVE-2018-16763",
"owner": {
"login": "k4is3r13",
"id": 47679627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47679627?v=4",
"html_url": "https:\/\/github.com\/k4is3r13"
},
"html_url": "https:\/\/github.com\/k4is3r13\/Bash-Script-CVE-2018-16763",
"description": "FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages\/select\/ filter parameter or the preview\/ data parameter. This can lead to Pre-Auth Remote Code Execution.",
"fork": false,
"created_at": "2021-09-27T05:15:38Z",
"updated_at": "2021-11-30T23:31:45Z",
"pushed_at": "2021-11-30T23:31:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 424093201,
"name": "CVE-2018-16763",

View file

@ -530,11 +530,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-08T04:40:45Z",
"updated_at": "2022-03-09T10:13:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"forks_count": 286,
"stargazers_count": 1306,
"watchers_count": 1306,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -560,8 +560,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 286,
"watchers": 1305,
"forks": 287,
"watchers": 1306,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2018-08-28T08:04:19Z",
"updated_at": "2022-01-17T15:13:46Z",
"updated_at": "2022-03-09T09:19:41Z",
"pushed_at": "2018-08-28T08:06:21Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 100,
"watchers": 101,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2018-4150 by @cmwdotme ",
"fork": false,
"created_at": "2018-05-08T16:12:59Z",
"updated_at": "2021-06-20T05:17:02Z",
"updated_at": "2022-03-09T10:45:29Z",
"pushed_at": "2018-05-08T16:14:50Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "incomplete exploit for CVE-2018-4150 (by cmwdotme) for devices without SMAP",
"fork": false,
"created_at": "2018-05-30T14:29:37Z",
"updated_at": "2020-09-29T08:51:45Z",
"updated_at": "2022-03-09T10:45:07Z",
"pushed_at": "2018-05-30T14:39:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-03-04T09:07:10Z",
"updated_at": "2022-03-09T08:15:07Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 495,
"watchers_count": 495,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 495,
"watchers": 496,
"score": 0
}
]

View file

@ -1,38 +1,4 @@
[
{
"id": 131405057,
"name": "NXLoader",
"full_name": "DavidBuchanan314\/NXLoader",
"owner": {
"login": "DavidBuchanan314",
"id": 13520633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4",
"html_url": "https:\/\/github.com\/DavidBuchanan314"
},
"html_url": "https:\/\/github.com\/DavidBuchanan314\/NXLoader",
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2022-03-01T15:43:25Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 444,
"watchers_count": 444,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2018-6242",
"exploit",
"nintendo",
"nintendo-switch",
"nintendo-switch-hacking",
"usb"
],
"visibility": "public",
"forks": 57,
"watchers": 444,
"score": 0
},
{
"id": 134342730,
"name": "rcm-modchips",

View file

@ -1,29 +0,0 @@
[
{
"id": 308459174,
"name": "CVE-2019-10779",
"full_name": "RepublicR0K\/CVE-2019-10779",
"owner": {
"login": "RepublicR0K",
"id": 73670332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73670332?v=4",
"html_url": "https:\/\/github.com\/RepublicR0K"
},
"html_url": "https:\/\/github.com\/RepublicR0K\/CVE-2019-10779",
"description": "GCHQ Stroom is vulnerable to Cross-Site Scripting due to the ability to load the Stroom dashboard on another site and insufficient protection against window event origins.",
"fork": false,
"created_at": "2020-10-29T21:56:32Z",
"updated_at": "2021-07-13T10:09:41Z",
"pushed_at": "2020-10-29T21:57:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -41,5 +41,32 @@
"forks": 7,
"watchers": 22,
"score": 0
},
{
"id": 467862315,
"name": "CVE-2019-10999",
"full_name": "qjh2333\/CVE-2019-10999",
"owner": {
"login": "qjh2333",
"id": 97860473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97860473?v=4",
"html_url": "https:\/\/github.com\/qjh2333"
},
"html_url": "https:\/\/github.com\/qjh2333\/CVE-2019-10999",
"description": null,
"fork": false,
"created_at": "2022-03-09T09:35:15Z",
"updated_at": "2022-03-09T09:35:15Z",
"pushed_at": "2022-03-09T09:43:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -26,33 +26,6 @@
"watchers": 1701,
"score": 0
},
{
"id": 217065303,
"name": "CVE-2019-11043",
"full_name": "B1gd0g\/CVE-2019-11043",
"owner": {
"login": "B1gd0g",
"id": 49259860,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49259860?v=4",
"html_url": "https:\/\/github.com\/B1gd0g"
},
"html_url": "https:\/\/github.com\/B1gd0g\/CVE-2019-11043",
"description": "CVE-2019-11043",
"fork": false,
"created_at": "2019-10-23T13:32:14Z",
"updated_at": "2020-09-07T00:53:59Z",
"pushed_at": "2019-10-23T13:35:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 217065801,
"name": "CVE-2019-11043",

View file

@ -1,31 +1,4 @@
[
{
"id": 203123412,
"name": "CVE-2019-15107",
"full_name": "jas502n\/CVE-2019-15107",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-15107",
"description": "CVE-2019-15107 Webmin RCE (unauthorized)",
"fork": false,
"created_at": "2019-08-19T07:43:16Z",
"updated_at": "2021-12-06T02:46:36Z",
"pushed_at": "2019-09-02T16:06:19Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 51,
"score": 0
},
{
"id": 203752840,
"name": "webmin_docker_and_exp",

View file

@ -94,17 +94,17 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-03-03T12:32:12Z",
"updated_at": "2022-03-09T06:43:49Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 797,
"watchers_count": 797,
"stargazers_count": 798,
"watchers_count": 798,
"forks_count": 171,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 171,
"watchers": 797,
"watchers": 798,
"score": 0
},
{
@ -175,11 +175,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-08T04:40:45Z",
"updated_at": "2022-03-09T10:13:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"forks_count": 286,
"stargazers_count": 1306,
"watchers_count": 1306,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -205,8 +205,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 286,
"watchers": 1305,
"forks": 287,
"watchers": 1306,
"score": 0
}
]

View file

@ -80,33 +80,6 @@
"watchers": 11,
"score": 0
},
{
"id": 184489534,
"name": "cve-2019-2725",
"full_name": "lasensio\/cve-2019-2725",
"owner": {
"login": "lasensio",
"id": 17970238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17970238?v=4",
"html_url": "https:\/\/github.com\/lasensio"
},
"html_url": "https:\/\/github.com\/lasensio\/cve-2019-2725",
"description": null,
"fork": false,
"created_at": "2019-05-01T22:25:14Z",
"updated_at": "2021-01-23T11:50:16Z",
"pushed_at": "2019-05-01T23:00:39Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 20,
"score": 0
},
{
"id": 184651903,
"name": "CVE-2019-2725",

View file

@ -44,12 +44,12 @@
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 570,
"watchers_count": 570,
"forks_count": 155,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 155,
"forks": 156,
"watchers": 570,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2022-03-08T17:39:32Z",
"updated_at": "2022-03-09T11:05:06Z",
"pushed_at": "2022-03-08T17:40:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2022-02-26T15:35:42Z",
"updated_at": "2022-03-09T06:25:49Z",
"pushed_at": "2021-10-29T07:46:53Z",
"stargazers_count": 320,
"watchers_count": 320,
"stargazers_count": 319,
"watchers_count": 319,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 320,
"watchers": 319,
"score": 0
}
]

View file

@ -1,47 +0,0 @@
[
{
"id": 303511670,
"name": "CVE-2020-16899",
"full_name": "advanced-threat-research\/CVE-2020-16899",
"owner": {
"login": "advanced-threat-research",
"id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research"
},
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899",
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2021-06-02T02:02:37Z",
"pushed_at": "2020-10-19T13:58:46Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
"atr",
"buffer-overflow",
"buffer-overflow-vulnerability",
"cve",
"cve-2020-16899",
"icmpv6",
"lua",
"mcafee",
"microsoft",
"neighbor-discovery",
"neighbor-discovery-protocol",
"rce",
"suricata",
"suricata-rule",
"tcpip-stack",
"vulnerability",
"windows-10"
],
"visibility": "public",
"forks": 6,
"watchers": 17,
"score": 0
}
]

View file

@ -98,12 +98,12 @@
"pushed_at": "2021-11-26T07:40:35Z",
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 100,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"forks": 101,
"watchers": 249,
"score": 0
},
@ -206,12 +206,12 @@
"pushed_at": "2020-02-21T08:45:51Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 8,
"score": 0
},
@ -233,12 +233,12 @@
"pushed_at": "2020-02-28T07:08:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 5,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-08T04:40:45Z",
"updated_at": "2022-03-09T10:13:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"forks_count": 286,
"stargazers_count": 1306,
"watchers_count": 1306,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,8 +43,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 286,
"watchers": 1305,
"forks": 287,
"watchers": 1306,
"score": 0
},
{

View file

@ -633,33 +633,6 @@
"watchers": 0,
"score": 0
},
{
"id": 277798487,
"name": "CVE-2020-5902",
"full_name": "k3nundrum\/CVE-2020-5902",
"owner": {
"login": "k3nundrum",
"id": 47409600,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47409600?v=4",
"html_url": "https:\/\/github.com\/k3nundrum"
},
"html_url": "https:\/\/github.com\/k3nundrum\/CVE-2020-5902",
"description": null,
"fork": false,
"created_at": "2020-07-07T11:31:31Z",
"updated_at": "2020-07-08T13:06:25Z",
"pushed_at": "2020-07-08T13:06:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 277800636,
"name": "CVE-2020-5902-F5-BIGIP",

View file

@ -179,12 +179,12 @@
"pushed_at": "2021-01-03T10:54:20Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 19,
"score": 0
},
@ -206,12 +206,12 @@
"pushed_at": "2021-01-15T10:51:58Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 16,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-03-08T04:14:28Z",
"updated_at": "2022-03-09T12:03:47Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1534,
"watchers_count": 1534,
"stargazers_count": 1535,
"watchers_count": 1535,
"forks_count": 556,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 556,
"watchers": 1534,
"watchers": 1535,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
"fork": false,
"created_at": "2022-02-18T14:19:58Z",
"updated_at": "2022-03-04T15:42:08Z",
"updated_at": "2022-03-09T07:23:22Z",
"pushed_at": "2022-02-19T13:52:32Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 143,
"watchers": 144,
"score": 0
},
{

View file

@ -25,32 +25,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 418722822,
"name": "CVE-2021-21234",
"full_name": "xiaojiangxl\/CVE-2021-21234",
"owner": {
"login": "xiaojiangxl",
"id": 58814935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814935?v=4",
"html_url": "https:\/\/github.com\/xiaojiangxl"
},
"html_url": "https:\/\/github.com\/xiaojiangxl\/CVE-2021-21234",
"description": null,
"fork": false,
"created_at": "2021-10-19T01:08:48Z",
"updated_at": "2021-12-13T03:39:02Z",
"pushed_at": "2021-10-19T01:18:49Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -148,5 +148,32 @@
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 402614345,
"name": "Dell-Driver-EoP-CVE-2021-21551",
"full_name": "ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551",
"owner": {
"login": "ihack4falafel",
"id": 17316888,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17316888?v=4",
"html_url": "https:\/\/github.com\/ihack4falafel"
},
"html_url": "https:\/\/github.com\/ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551",
"description": "Dell Driver EoP (CVE-2021-21551)",
"fork": false,
"created_at": "2021-09-03T01:47:03Z",
"updated_at": "2022-02-16T12:56:09Z",
"pushed_at": "2022-02-24T10:13:45Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 15,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2022-03-09T03:06:38Z",
"updated_at": "2022-03-09T08:11:42Z",
"pushed_at": "2021-07-09T19:38:41Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 71,
"watchers": 73,
"score": 0
}
]

View file

@ -121,18 +121,18 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2022-03-09T03:19:02Z",
"updated_at": "2022-03-09T08:00:12Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 65,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 65,
"forks": 66,
"watchers": 148,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
"updated_at": "2022-03-01T06:56:42Z",
"updated_at": "2022-03-09T08:05:13Z",
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 14,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 62,
"forks": 15,
"watchers": 63,
"score": 0
},
{

View file

@ -1,34 +0,0 @@
[
{
"id": 418585239,
"name": "CVE-2021-24884",
"full_name": "S1lkys\/CVE-2021-24884",
"owner": {
"login": "S1lkys",
"id": 40408435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
"html_url": "https:\/\/github.com\/S1lkys"
},
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-24884",
"description": "If an authenticated user who is able to edit Wordpress PHP code in any kind, clicks a malicious link, PHP code can be edited through XSS in Formidable Forms 4.09.04.",
"fork": false,
"created_at": "2021-10-18T16:37:08Z",
"updated_at": "2021-10-19T20:10:11Z",
"pushed_at": "2021-10-19T20:10:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"exploit",
"formidable",
"wordpress",
"xss"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -98,12 +98,12 @@
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 34,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 35,
"watchers": 206,
"score": 0
}

View file

@ -726,17 +726,17 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2022-03-08T20:34:24Z",
"updated_at": "2022-03-09T08:19:15Z",
"pushed_at": "2022-02-13T12:21:53Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2022-03-09T02:57:19Z",
"updated_at": "2022-03-09T11:53:45Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 225,
"watchers_count": 225,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 224,
"watchers": 225,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2022-03-05T01:07:11Z",
"updated_at": "2022-03-09T08:55:56Z",
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 104,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 104,
"watchers": 283,
"watchers": 284,
"score": 0
},
{

29
2021/CVE-2021-35042.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 410014595,
"name": "CVE-2021-35042",
"full_name": "r4vi\/CVE-2021-35042",
"owner": {
"login": "r4vi",
"id": 565628,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/565628?v=4",
"html_url": "https:\/\/github.com\/r4vi"
},
"html_url": "https:\/\/github.com\/r4vi\/CVE-2021-35042",
"description": null,
"fork": false,
"created_at": "2021-09-24T15:30:25Z",
"updated_at": "2021-11-16T09:48:31Z",
"pushed_at": "2022-02-10T16:43:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 427206143,
"name": "CVE-2021-38666-poc",
"full_name": "DarkSprings\/CVE-2021-38666-poc",
"owner": {
"login": "DarkSprings",
"id": 90366126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
"html_url": "https:\/\/github.com\/DarkSprings"
},
"html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-38666-poc",
"description": null,
"fork": false,
"created_at": "2021-11-12T02:21:27Z",
"updated_at": "2021-11-30T07:27:35Z",
"pushed_at": "2021-11-12T02:32:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 437242073,
"name": "CVE-2021-38666",

View file

@ -1,34 +0,0 @@
[
{
"id": 418598904,
"name": "CVE-2021-40101",
"full_name": "S1lkys\/CVE-2021-40101",
"owner": {
"login": "S1lkys",
"id": 40408435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
"html_url": "https:\/\/github.com\/S1lkys"
},
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-40101",
"description": "Survey XSS combined with CSRF leads to Admin Account Takeover in Concrete5 8.5.4",
"fork": false,
"created_at": "2021-10-18T17:18:28Z",
"updated_at": "2021-11-10T20:22:06Z",
"pushed_at": "2021-10-18T17:50:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"concrete5",
"cve-2021-40101",
"exploit",
"xss"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-03-08T12:08:59Z",
"updated_at": "2022-03-09T09:19:47Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1391,
"watchers_count": 1391,
"forks_count": 401,
"stargazers_count": 1393,
"watchers_count": 1393,
"forks_count": 402,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 401,
"watchers": 1391,
"forks": 402,
"watchers": 1393,
"score": 0
},
{
@ -1234,17 +1234,17 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2022-03-07T02:31:13Z",
"updated_at": "2022-03-09T07:15:19Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 49,
"watchers": 51,
"score": 0
},
{
@ -1261,10 +1261,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
"updated_at": "2022-03-09T02:58:20Z",
"updated_at": "2022-03-09T11:33:43Z",
"pushed_at": "2022-02-07T15:42:00Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -1287,7 +1287,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 36,
"watchers": 37,
"score": 0
},
{
@ -3522,5 +3522,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467844609,
"name": "Polkit-s-Pkexec-CVE-2021-4034",
"full_name": "ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034",
"owner": {
"login": "ITMarcin2211",
"id": 60057530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4",
"html_url": "https:\/\/github.com\/ITMarcin2211"
},
"html_url": "https:\/\/github.com\/ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034",
"description": "Polkit's Pkexec CVE-2021-4034 Proof Of Concept and Patching",
"fork": false,
"created_at": "2022-03-09T08:44:02Z",
"updated_at": "2022-03-09T08:51:49Z",
"pushed_at": "2022-03-09T08:54:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-40374.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 401673817,
"name": "CVE-2021-40374",
"full_name": "DCKento\/CVE-2021-40374",
"owner": {
"login": "DCKento",
"id": 20635370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20635370?v=4",
"html_url": "https:\/\/github.com\/DCKento"
},
"html_url": "https:\/\/github.com\/DCKento\/CVE-2021-40374",
"description": "XSS",
"fork": false,
"created_at": "2021-08-31T11:12:49Z",
"updated_at": "2021-10-30T14:45:52Z",
"pushed_at": "2021-10-30T14:48:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

29
2021/CVE-2021-40375.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 401673921,
"name": "CVE-2021-40375",
"full_name": "DCKento\/CVE-2021-40375",
"owner": {
"login": "DCKento",
"id": 20635370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20635370?v=4",
"html_url": "https:\/\/github.com\/DCKento"
},
"html_url": "https:\/\/github.com\/DCKento\/CVE-2021-40375",
"description": null,
"fork": false,
"created_at": "2021-08-31T11:13:14Z",
"updated_at": "2021-10-30T14:45:53Z",
"pushed_at": "2021-10-30T14:49:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-03-09T05:22:24Z",
"updated_at": "2022-03-09T06:55:38Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1381,
"watchers_count": 1381,
"stargazers_count": 1382,
"watchers_count": 1382,
"forks_count": 453,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 453,
"watchers": 1381,
"watchers": 1382,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-02T19:07:37Z",
"updated_at": "2022-03-09T05:12:26Z",
"updated_at": "2022-03-09T12:03:34Z",
"pushed_at": "2022-03-08T15:37:34Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 8,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 32,
"forks": 9,
"watchers": 41,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 416209688,
"name": "goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
"full_name": "kimusan\/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
"owner": {
"login": "kimusan",
"id": 1150049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1150049?v=4",
"html_url": "https:\/\/github.com\/kimusan"
},
"html_url": "https:\/\/github.com\/kimusan\/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-",
"description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
"fork": false,
"created_at": "2021-10-12T06:21:02Z",
"updated_at": "2022-01-20T06:50:27Z",
"pushed_at": "2021-10-18T20:56:31Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 21,
"score": 0
},
{
"id": 444456600,
"name": "CVE-2021-42342",

View file

@ -183,10 +183,10 @@
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
"updated_at": "2022-03-05T20:44:45Z",
"updated_at": "2022-03-09T08:29:23Z",
"pushed_at": "2021-12-11T02:49:41Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 104,
"watchers": 105,
"score": 0
},
{
@ -772,17 +772,17 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
"updated_at": "2022-02-14T08:27:55Z",
"updated_at": "2022-03-09T07:20:57Z",
"pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 173,
"watchers": 172,
"score": 0
},
{
@ -1894,10 +1894,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-03-08T10:56:38Z",
"updated_at": "2022-03-09T07:02:09Z",
"pushed_at": "2022-01-17T19:47:41Z",
"stargazers_count": 617,
"watchers_count": 617,
"stargazers_count": 618,
"watchers_count": 618,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
@ -1916,7 +1916,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 617,
"watchers": 618,
"score": 0
},
{
@ -2651,17 +2651,17 @@
"description": "Python script that sends CVE-2021-44228 log4j payload requests to url list",
"fork": false,
"created_at": "2021-12-12T13:28:31Z",
"updated_at": "2021-12-20T13:16:16Z",
"updated_at": "2022-03-09T07:20:53Z",
"pushed_at": "2021-12-12T13:39:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 8,
"watchers": 7,
"score": 0
},
{
@ -3548,17 +3548,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-03-09T05:46:38Z",
"updated_at": "2022-03-09T08:08:04Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2771,
"watchers_count": 2771,
"stargazers_count": 2772,
"watchers_count": 2772,
"forks_count": 674,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 674,
"watchers": 2771,
"watchers": 2772,
"score": 0
},
{
@ -4963,7 +4963,7 @@
"pushed_at": "2022-01-02T16:34:49Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [
@ -4976,7 +4976,7 @@
"log4shell"
],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 51,
"score": 0
},
@ -5971,12 +5971,12 @@
"pushed_at": "2022-02-03T20:02:09Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 96,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
"forks": 95,
"watchers": 336,
"score": 0
},
@ -6800,17 +6800,17 @@
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
"updated_at": "2022-03-07T18:24:00Z",
"updated_at": "2022-03-09T06:29:52Z",
"pushed_at": "2022-01-23T22:37:41Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 68,
"watchers": 69,
"score": 0
},
{
@ -8685,17 +8685,17 @@
"description": "log4j2 RCE漏洞CVE-2021-44228)内网扫描器可用于在不出网的条件下进行漏洞扫描帮助企业内部快速发现Log4jShell漏洞。",
"fork": false,
"created_at": "2021-12-20T13:41:35Z",
"updated_at": "2022-03-08T02:25:19Z",
"updated_at": "2022-03-09T07:57:58Z",
"pushed_at": "2021-12-21T06:11:58Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-03-09T05:40:10Z",
"updated_at": "2022-03-09T06:44:30Z",
"pushed_at": "2022-01-25T17:00:16Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 306,
"watchers_count": 306,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 305,
"watchers": 306,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
"updated_at": "2022-03-09T03:13:15Z",
"updated_at": "2022-03-09T06:57:40Z",
"pushed_at": "2022-03-09T00:09:46Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 30,
"score": 0
},
{
@ -44,12 +44,12 @@
"pushed_at": "2022-03-06T17:19:38Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 8,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
"fork": false,
"created_at": "2022-03-06T00:03:31Z",
"updated_at": "2022-03-09T05:56:43Z",
"updated_at": "2022-03-09T09:50:24Z",
"pushed_at": "2022-03-06T07:01:15Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 53,
"watchers": 59,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2022-03-07T15:52:23Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 40,
"score": 0
},
@ -71,12 +71,12 @@
"pushed_at": "2022-03-07T17:59:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 4,
"score": 0
},
@ -94,17 +94,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-09T06:14:32Z",
"pushed_at": "2022-03-09T05:27:59Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 24,
"updated_at": "2022-03-09T11:46:43Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 75,
"forks": 28,
"watchers": 83,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-09T06:13:01Z",
"updated_at": "2022-03-09T12:02:43Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 431,
"watchers_count": 431,
"forks_count": 99,
"stargazers_count": 488,
"watchers_count": 488,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 99,
"watchers": 431,
"forks": 109,
"watchers": 488,
"score": 0
},
{
@ -206,12 +206,12 @@
"pushed_at": "2022-03-08T01:50:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 0,
"score": 0
},
@ -233,12 +233,12 @@
"pushed_at": "2022-03-08T09:31:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 5,
"watchers": 2,
"score": 0
},
@ -260,12 +260,12 @@
"pushed_at": "2022-03-08T05:18:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 0,
"score": 0
},
@ -283,17 +283,17 @@
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
"fork": false,
"created_at": "2022-03-08T09:10:51Z",
"updated_at": "2022-03-09T06:05:02Z",
"updated_at": "2022-03-09T10:00:33Z",
"pushed_at": "2022-03-08T09:14:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"forks": 5,
"watchers": 11,
"score": 0
},
{
@ -310,17 +310,17 @@
"description": "An exploit for CVE-2022-0847 dirty-pipe vulnerability",
"fork": false,
"created_at": "2022-03-08T10:40:07Z",
"updated_at": "2022-03-08T10:42:34Z",
"updated_at": "2022-03-09T07:15:27Z",
"pushed_at": "2022-03-08T11:15:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0
},
{
@ -337,17 +337,17 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2022-03-09T05:27:28Z",
"updated_at": "2022-03-09T08:44:38Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 3,
"watchers": 5,
"score": 0
},
{
@ -364,16 +364,16 @@
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2022-03-08T12:43:43Z",
"updated_at": "2022-03-08T12:50:25Z",
"updated_at": "2022-03-09T09:12:37Z",
"pushed_at": "2022-03-08T13:15:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -391,17 +391,17 @@
"description": "The Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2022-03-08T13:48:55Z",
"updated_at": "2022-03-09T05:24:47Z",
"updated_at": "2022-03-09T07:16:02Z",
"pushed_at": "2022-03-08T13:54:08Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 0,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"forks": 1,
"watchers": 11,
"score": 0
},
{
@ -422,12 +422,12 @@
"pushed_at": "2022-03-08T15:35:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -449,12 +449,12 @@
"pushed_at": "2022-03-08T15:47:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
},
@ -580,17 +580,17 @@
"description": "A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection.",
"fork": false,
"created_at": "2022-03-09T01:55:04Z",
"updated_at": "2022-03-09T02:01:30Z",
"updated_at": "2022-03-09T07:16:19Z",
"pushed_at": "2022-03-09T02:01:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
{
@ -634,46 +634,19 @@
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-09T02:47:08Z",
"updated_at": "2022-03-09T04:03:00Z",
"updated_at": "2022-03-09T12:06:00Z",
"pushed_at": "2022-03-09T02:47:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-0847"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 467779512,
"name": "Dirtypipe-exploit",
"full_name": "MRNIKO1\/Dirtypipe-exploit",
"owner": {
"login": "MRNIKO1",
"id": 72093135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72093135?v=4",
"html_url": "https:\/\/github.com\/MRNIKO1"
},
"html_url": "https:\/\/github.com\/MRNIKO1\/Dirtypipe-exploit",
"description": "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)",
"fork": false,
"created_at": "2022-03-09T04:42:59Z",
"updated_at": "2022-03-09T04:42:59Z",
"pushed_at": "2022-03-09T04:43:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 4,
"watchers": 6,
"score": 0
},
{
@ -694,6 +667,87 @@
"pushed_at": "2022-03-09T06:16:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 467818101,
"name": "Dirtypipe-exploit",
"full_name": "nanaao\/Dirtypipe-exploit",
"owner": {
"login": "nanaao",
"id": 77666853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
"html_url": "https:\/\/github.com\/nanaao"
},
"html_url": "https:\/\/github.com\/nanaao\/Dirtypipe-exploit",
"description": "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)",
"fork": false,
"created_at": "2022-03-09T07:16:57Z",
"updated_at": "2022-03-09T11:39:58Z",
"pushed_at": "2022-03-09T04:43:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467872655,
"name": "cve-2022-0847dirtypipe-exploit",
"full_name": "AyoubNajim\/cve-2022-0847dirtypipe-exploit",
"owner": {
"login": "AyoubNajim",
"id": 68334573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68334573?v=4",
"html_url": "https:\/\/github.com\/AyoubNajim"
},
"html_url": "https:\/\/github.com\/AyoubNajim\/cve-2022-0847dirtypipe-exploit",
"description": null,
"fork": false,
"created_at": "2022-03-09T10:05:53Z",
"updated_at": "2022-03-09T10:15:23Z",
"pushed_at": "2022-03-09T10:16:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 467878952,
"name": "pentestblog-CVE-2022-0847",
"full_name": "pentestblogin\/pentestblog-CVE-2022-0847",
"owner": {
"login": "pentestblogin",
"id": 70894330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70894330?v=4",
"html_url": "https:\/\/github.com\/pentestblogin"
},
"html_url": "https:\/\/github.com\/pentestblogin\/pentestblog-CVE-2022-0847",
"description": null,
"fork": false,
"created_at": "2022-03-09T10:24:42Z",
"updated_at": "2022-03-09T10:26:10Z",
"pushed_at": "2022-03-09T10:26:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,

View file

@ -26,33 +26,6 @@
"watchers": 221,
"score": 0
},
{
"id": 457817909,
"name": "CVE-2022-20699",
"full_name": "puckiestyle\/CVE-2022-20699",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-20699",
"description": null,
"fork": false,
"created_at": "2022-02-10T14:40:25Z",
"updated_at": "2022-02-10T14:40:40Z",
"pushed_at": "2022-02-10T14:40:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 459040811,
"name": "CVE-2022-20699",

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-03-08T01:05:06Z",
"updated_at": "2022-03-09T11:40:55Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 198,
"watchers": 201,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
"updated_at": "2022-03-04T11:03:24Z",
"updated_at": "2022-03-09T08:42:44Z",
"pushed_at": "2022-02-21T08:58:22Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
"updated_at": "2022-03-09T06:10:37Z",
"updated_at": "2022-03-09T08:55:07Z",
"pushed_at": "2022-03-03T14:03:30Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 158,
"watchers": 159,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
"fork": false,
"created_at": "2022-03-03T13:13:02Z",
"updated_at": "2022-03-09T03:19:42Z",
"updated_at": "2022-03-09T09:39:53Z",
"pushed_at": "2022-03-03T14:31:32Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 19,
"watchers": 20,
"score": 0
},
{
@ -447,17 +447,17 @@
"description": "CVE-2022-22947批量检测脚本超时时间不超过2s已更新可反弹shell的EXP欢迎师傅们试用",
"fork": false,
"created_at": "2022-03-04T11:31:00Z",
"updated_at": "2022-03-08T09:46:36Z",
"updated_at": "2022-03-09T09:11:33Z",
"pushed_at": "2022-03-08T09:43:50Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -582,7 +582,7 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947批量检测工具",
"fork": false,
"created_at": "2022-03-07T09:14:50Z",
"updated_at": "2022-03-08T10:43:15Z",
"updated_at": "2022-03-09T06:21:27Z",
"pushed_at": "2022-03-08T02:09:38Z",
"stargazers_count": 3,
"watchers_count": 3,
@ -690,17 +690,17 @@
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
"fork": false,
"created_at": "2022-03-08T09:32:36Z",
"updated_at": "2022-03-09T02:11:24Z",
"updated_at": "2022-03-09T08:34:39Z",
"pushed_at": "2022-03-08T09:36:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 3,
"watchers": 4,
"score": 0
},
{
@ -717,8 +717,8 @@
"description": "调试代码包含断点信息,直接导入即可进行调试",
"fork": false,
"created_at": "2022-03-08T10:07:54Z",
"updated_at": "2022-03-08T10:07:54Z",
"pushed_at": "2022-03-08T10:07:55Z",
"updated_at": "2022-03-09T07:44:58Z",
"pushed_at": "2022-03-09T07:44:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -188,33 +188,6 @@
"watchers": 9,
"score": 0
},
{
"id": 462818933,
"name": "cve-2022-23131-exp",
"full_name": "random-robbie\/cve-2022-23131-exp",
"owner": {
"login": "random-robbie",
"id": 4902869,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4",
"html_url": "https:\/\/github.com\/random-robbie"
},
"html_url": "https:\/\/github.com\/random-robbie\/cve-2022-23131-exp",
"description": "Zabbix SSO Bypass",
"fork": false,
"created_at": "2022-02-23T16:34:03Z",
"updated_at": "2022-02-26T11:22:28Z",
"pushed_at": "2022-02-23T16:37:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 463061723,
"name": "CVE-2022-23131",

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-03-09T06:01:28Z",
"updated_at": "2022-03-09T11:50:27Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 23,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 101,
"forks": 24,
"watchers": 114,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25943",
"fork": false,
"created_at": "2021-07-09T23:34:57Z",
"updated_at": "2022-03-09T03:37:03Z",
"pushed_at": "2022-03-08T13:41:23Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"updated_at": "2022-03-09T08:22:49Z",
"pushed_at": "2022-03-09T08:26:45Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"forks": 7,
"watchers": 15,
"score": 0
}
]

View file

@ -93,8 +93,10 @@ Improper Access Control to Remote Code Execution in GitHub repository webmin/web
- [dadhee/CVE-2022-0847_DirtyPipeExploit](https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit)
- [Greetdawn/CVE-2022-0847-DirtyPipe](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe)
- [Al1ex/CVE-2022-0847](https://github.com/Al1ex/CVE-2022-0847)
- [MRNIKO1/Dirtypipe-exploit](https://github.com/MRNIKO1/Dirtypipe-exploit)
- [Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit)
- [nanaao/Dirtypipe-exploit](https://github.com/nanaao/Dirtypipe-exploit)
- [AyoubNajim/cve-2022-0847dirtypipe-exploit](https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit)
- [pentestblogin/pentestblog-CVE-2022-0847](https://github.com/pentestblogin/pentestblog-CVE-2022-0847)
### CVE-2022-20699 (2022-02-10)
@ -103,7 +105,6 @@ Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345
</code>
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
- [puckiestyle/CVE-2022-20699](https://github.com/puckiestyle/CVE-2022-20699)
- [rohankumardubey/CVE-2022-20699](https://github.com/rohankumardubey/CVE-2022-20699)
### CVE-2022-21241 (2022-02-08)
@ -335,7 +336,6 @@ In the case of instances where the SAML SSO authentication is enabled (non-defau
- [0tt7/CVE-2022-23131](https://github.com/0tt7/CVE-2022-23131)
- [zwjjustdoit/cve-2022-23131](https://github.com/zwjjustdoit/cve-2022-23131)
- [L0ading-x/cve-2022-23131](https://github.com/L0ading-x/cve-2022-23131)
- [random-robbie/cve-2022-23131-exp](https://github.com/random-robbie/cve-2022-23131-exp)
- [trganda/CVE-2022-23131](https://github.com/trganda/CVE-2022-23131)
- [pykiller/CVE-2022-23131](https://github.com/pykiller/CVE-2022-23131)
- [Fa1c0n35/zabbix-cve-2022-23131](https://github.com/Fa1c0n35/zabbix-cve-2022-23131)
@ -1216,6 +1216,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [T369-Real/pwnkit-pwn](https://github.com/T369-Real/pwnkit-pwn)
- [GatoGamer1155/CVE-2021-4034](https://github.com/GatoGamer1155/CVE-2021-4034)
- [bakhtiyarsierad/CVE-2021-4034-bug-root](https://github.com/bakhtiyarsierad/CVE-2021-4034-bug-root)
- [ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034](https://github.com/ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034)
### CVE-2021-4043 (2022-02-04)
@ -1353,7 +1354,6 @@ spring-boot-actuator-logview in a library that adds a simple logfile viewer as s
</code>
- [PwCNO-CTO/CVE-2021-21234](https://github.com/PwCNO-CTO/CVE-2021-21234)
- [xiaojiangxl/CVE-2021-21234](https://github.com/xiaojiangxl/CVE-2021-21234)
### CVE-2021-21300 (2021-03-09)
@ -1445,6 +1445,7 @@ Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability
- [arnaudluti/PS-CVE-2021-21551](https://github.com/arnaudluti/PS-CVE-2021-21551)
- [mathisvickie/CVE-2021-21551](https://github.com/mathisvickie/CVE-2021-21551)
- [mzakocs/CVE-2021-21551-POC](https://github.com/mzakocs/CVE-2021-21551-POC)
- [ihack4falafel/Dell-Driver-EoP-CVE-2021-21551](https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551)
### CVE-2021-21972 (2021-02-24)
@ -1802,14 +1803,6 @@ The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does n
- [fimtow/CVE-2021-24750](https://github.com/fimtow/CVE-2021-24750)
### CVE-2021-24884 (2021-10-25)
<code>
The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject certain HTML Tags like &lt;audio&gt;,&lt;video&gt;,&lt;img&gt;,&lt;a&gt; and&lt;button&gt;.This could allow an unauthenticated, remote attacker to exploit a HTML-injection byinjecting a malicous link. The HTML-injection may trick authenticated users to follow the link. If the Link gets clicked, Javascript code can be executed. The vulnerability is due to insufficient sanitization of the &quot;data-frmverify&quot; tag for links in the web-based entry inspection page of affected systems. A successful exploitation incomibantion with CSRF could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These actions include stealing the users account by changing their password or allowing attackers to submit their own code through an authenticated user resulting in Remote Code Execution. If an authenticated user who is able to edit Wordpress PHP Code in any kind, clicks the malicious link, PHP code can be edited.
</code>
- [S1lkys/CVE-2021-24884](https://github.com/S1lkys/CVE-2021-24884)
### CVE-2021-25281 (2021-02-26)
<code>
@ -2845,6 +2838,14 @@ Telenot CompasX versions prior to 32.0 use a weak seed for random number generat
- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
### CVE-2021-35042 (2021-07-02)
<code>
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
</code>
- [r4vi/CVE-2021-35042](https://github.com/r4vi/CVE-2021-35042)
### CVE-2021-35211 (2021-07-14)
<code>
@ -3020,7 +3021,6 @@ Open Management Infrastructure Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
</code>
- [DarkSprings/CVE-2021-38666-poc](https://github.com/DarkSprings/CVE-2021-38666-poc)
- [JaneMandy/CVE-2021-38666](https://github.com/JaneMandy/CVE-2021-38666)
### CVE-2021-39316 (2021-08-31)
@ -3050,14 +3050,6 @@ Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and ear
- [lsw29475/CVE-2021-39863](https://github.com/lsw29475/CVE-2021-39863)
### CVE-2021-40101 (2021-11-30)
<code>
An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.
</code>
- [S1lkys/CVE-2021-40101](https://github.com/S1lkys/CVE-2021-40101)
### CVE-2021-40154 (2021-12-01)
<code>
@ -3083,6 +3075,12 @@ An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can
- [Vulnmachines/HAProxy_CVE-2021-40346](https://github.com/Vulnmachines/HAProxy_CVE-2021-40346)
- [alexOarga/CVE-2021-40346](https://github.com/alexOarga/CVE-2021-40346)
### CVE-2021-40374
- [DCKento/CVE-2021-40374](https://github.com/DCKento/CVE-2021-40374)
### CVE-2021-40375
- [DCKento/CVE-2021-40375](https://github.com/DCKento/CVE-2021-40375)
### CVE-2021-40438 (2021-09-16)
<code>
@ -3429,7 +3427,6 @@ dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugf
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
</code>
- [kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-](https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-)
- [Mr-xn/CVE-2021-42342](https://github.com/Mr-xn/CVE-2021-42342)
### CVE-2021-42392 (2022-01-07)
@ -5769,7 +5766,6 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
- [jiansiting/CVE-2020-5902](https://github.com/jiansiting/CVE-2020-5902)
- [wdlid/CVE-2020-5902-fix](https://github.com/wdlid/CVE-2020-5902-fix)
- [Any3ite/CVE-2020-5902-F5BIG](https://github.com/Any3ite/CVE-2020-5902-F5BIG)
- [k3nundrum/CVE-2020-5902](https://github.com/k3nundrum/CVE-2020-5902)
- [inho28/CVE-2020-5902-F5-BIGIP](https://github.com/inho28/CVE-2020-5902-F5-BIGIP)
- [cristiano-corrado/f5_scanner](https://github.com/cristiano-corrado/f5_scanner)
- [ajdumanhug/CVE-2020-5902](https://github.com/ajdumanhug/CVE-2020-5902)
@ -8007,14 +8003,6 @@ A remote code execution vulnerability exists when the Windows TCP/IP stack impro
- [komomon/CVE-2020-16898-EXP-POC](https://github.com/komomon/CVE-2020-16898-EXP-POC)
- [komomon/CVE-2020-16898--EXP-POC](https://github.com/komomon/CVE-2020-16898--EXP-POC)
### CVE-2020-16899 (2020-10-16)
<code>
A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Denial of Service Vulnerability'.
</code>
- [advanced-threat-research/CVE-2020-16899](https://github.com/advanced-threat-research/CVE-2020-16899)
### CVE-2020-16938 (2020-10-16)
<code>
@ -10009,7 +9997,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [shack2/javaserializetools](https://github.com/shack2/javaserializetools)
- [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961)
- [iceMatcha/CNTA-2019-0014xCVE-2019-2725](https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725)
- [lasensio/cve-2019-2725](https://github.com/lasensio/cve-2019-2725)
- [davidmthomsen/CVE-2019-2725](https://github.com/davidmthomsen/CVE-2019-2725)
- [leerina/CVE-2019-2725](https://github.com/leerina/CVE-2019-2725)
- [zhusx110/cve-2019-2725](https://github.com/zhusx110/cve-2019-2725)
@ -11252,14 +11239,6 @@ mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints
- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758)
- [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758)
### CVE-2019-10779 (2020-01-27)
<code>
All versions of stroom:stroom-app before 5.5.12 and all versions of the 6.0.0 branch before 6.0.25 are affected by Cross-site Scripting. An attacker website is able to load the Stroom UI into a hidden iframe. Using that iframe, the attacker site can issue commands to the Stroom UI via an XSS vulnerability to take full control of the Stroom UI on behalf of the logged-in user.
</code>
- [RepublicR0K/CVE-2019-10779](https://github.com/RepublicR0K/CVE-2019-10779)
### CVE-2019-10869 (2019-05-07)
<code>
@ -11283,6 +11262,7 @@ The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in
</code>
- [tacnetsol/CVE-2019-10999](https://github.com/tacnetsol/CVE-2019-10999)
- [qjh2333/CVE-2019-10999](https://github.com/qjh2333/CVE-2019-10999)
### CVE-2019-11043 (2019-10-28)
@ -11291,7 +11271,6 @@ In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in
</code>
- [neex/phuip-fpizdam](https://github.com/neex/phuip-fpizdam)
- [B1gd0g/CVE-2019-11043](https://github.com/B1gd0g/CVE-2019-11043)
- [tinker-li/CVE-2019-11043](https://github.com/tinker-li/CVE-2019-11043)
- [jas502n/CVE-2019-11043](https://github.com/jas502n/CVE-2019-11043)
- [AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-](https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-)
@ -12272,7 +12251,6 @@ The &quot;HTML Include and replace macro&quot; plugin before 1.5.0 for Confluenc
An issue was discovered in Webmin &lt;=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
</code>
- [jas502n/CVE-2019-15107](https://github.com/jas502n/CVE-2019-15107)
- [HACHp1/webmin_docker_and_exp](https://github.com/HACHp1/webmin_docker_and_exp)
- [ketlerd/CVE-2019-15107](https://github.com/ketlerd/CVE-2019-15107)
- [AdministratorGithub/CVE-2019-15107](https://github.com/AdministratorGithub/CVE-2019-15107)
@ -14155,7 +14133,6 @@ Integer overflow in computing the required allocation size when instantiating a
Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer overflow vulnerability in BootROM Recovery Mode (RCM). An attacker with physical access to the device's USB and the ability to force the device to reboot into RCM could exploit the vulnerability to execute unverified code.
</code>
- [DavidBuchanan314/NXLoader](https://github.com/DavidBuchanan314/NXLoader)
- [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips)
- [ChrisFigura/react-tegra-payload-launcher](https://github.com/ChrisFigura/react-tegra-payload-launcher)
- [austinhartzheim/fusee-gelee](https://github.com/austinhartzheim/fusee-gelee)
@ -15935,7 +15912,6 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
- [uwueviee/Fu3l-F1lt3r](https://github.com/uwueviee/Fu3l-F1lt3r)
- [shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--](https://github.com/shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--)
- [NeKroFR/CVE-2018-16763](https://github.com/NeKroFR/CVE-2018-16763)
- [k4is3r13/Bash-Script-CVE-2018-16763](https://github.com/k4is3r13/Bash-Script-CVE-2018-16763)
- [padsalatushal/CVE-2018-16763](https://github.com/padsalatushal/CVE-2018-16763)
- [SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763)
- [4n0nym0u5dk/CVE-2018-16763](https://github.com/4n0nym0u5dk/CVE-2018-16763)
@ -16476,7 +16452,6 @@ In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpat
</code>
- [0x00-0x00/CVE-2018-1000001](https://github.com/0x00-0x00/CVE-2018-1000001)
- [usernameid0/tools-for-CVE-2018-1000001](https://github.com/usernameid0/tools-for-CVE-2018-1000001)
### CVE-2018-1000006 (2018-01-24)
@ -17154,7 +17129,6 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro)
- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)
- [immunio/apache-struts2-CVE-2017-5638](https://github.com/immunio/apache-struts2-CVE-2017-5638)
- [Masahiro-Yamada/OgnlContentTypeRejectorValve](https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve)
- [aljazceru/CVE-2017-5638-Apache-Struts2](https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2)
- [sjitech/test_struts2_vulnerability_CVE-2017-5638](https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638)
@ -17203,7 +17177,6 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
- [Iletee/struts2-rce](https://github.com/Iletee/struts2-rce)
- [andypitcher/check_struts](https://github.com/andypitcher/check_struts)
- [un4ckn0wl3z/CVE-2017-5638](https://github.com/un4ckn0wl3z/CVE-2017-5638)
- [colorblindpentester/CVE-2017-5638](https://github.com/colorblindpentester/CVE-2017-5638)
- [injcristianrojas/cve-2017-5638](https://github.com/injcristianrojas/cve-2017-5638)
- [pasannirmana/Aspire](https://github.com/pasannirmana/Aspire)
- [ludy-dev/XworkStruts-RCE](https://github.com/ludy-dev/XworkStruts-RCE)
@ -17256,7 +17229,6 @@ Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletio
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
</code>
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
@ -19323,14 +19295,6 @@ The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows a
- [jianqiangzhao/CVE-2016-2434](https://github.com/jianqiangzhao/CVE-2016-2434)
### CVE-2016-2468 (2016-06-12)
<code>
The Qualcomm GPU driver in Android before 2016-06-01 on Nexus 5, 5X, 6, 6P, and 7 devices allows attackers to gain privileges via a crafted application, aka internal bug 27475454.
</code>
- [gitcollect/CVE-2016-2468](https://github.com/gitcollect/CVE-2016-2468)
### CVE-2016-2555 (2017-04-13)
<code>
@ -21701,7 +21665,6 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- [MuirlandOracle/CVE-2014-6271-IPFire](https://github.com/MuirlandOracle/CVE-2014-6271-IPFire)
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
- [b4keSn4ke/shellshock](https://github.com/b4keSn4ke/shellshock)
- [JowardBince/ShellShock](https://github.com/JowardBince/ShellShock)
- [0bfxgh0st-secondary/ShellShock](https://github.com/0bfxgh0st-secondary/ShellShock)
### CVE-2014-6287 (2014-10-07)
@ -22764,14 +22727,6 @@ The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x throu
- [SECFORCE/CVE-2011-3368](https://github.com/SECFORCE/CVE-2011-3368)
- [colorblindpentester/CVE-2011-3368](https://github.com/colorblindpentester/CVE-2011-3368)
### CVE-2011-3389 (2011-09-06)
<code>
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a &quot;BEAST&quot; attack.
</code>
- [mpgn/BEAST-PoC](https://github.com/mpgn/BEAST-PoC)
### CVE-2011-3556 (2011-10-19)
<code>