Auto Update 2022/08/16 12:17:30

This commit is contained in:
motikan2010-bot 2022-08-16 21:17:30 +09:00
parent 2dc0777792
commit 2505c0b08c
50 changed files with 358 additions and 235 deletions

View file

@ -17,13 +17,13 @@
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 47,
"score": 0
}

View file

@ -125,10 +125,10 @@
"description": "Apache ActiveMQ PUT RCE Scan",
"fork": false,
"created_at": "2021-07-03T10:23:59Z",
"updated_at": "2022-02-20T07:22:00Z",
"updated_at": "2022-08-16T09:31:30Z",
"pushed_at": "2022-02-20T07:21:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2022-08-12T07:24:30Z",
"updated_at": "2022-08-16T08:48:21Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 683,
"watchers_count": 683,
"stargazers_count": 684,
"watchers_count": 684,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 290,
"watchers": 683,
"watchers": 684,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Test CVE-2018-0296 and extract usernames",
"fork": false,
"created_at": "2018-06-21T08:36:34Z",
"updated_at": "2022-06-14T13:06:12Z",
"updated_at": "2022-08-16T07:20:33Z",
"pushed_at": "2018-12-09T11:57:20Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 105,
"watchers": 104,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "POC for CVE-2018-1273",
"fork": false,
"created_at": "2018-04-17T13:41:00Z",
"updated_at": "2022-07-28T09:24:17Z",
"updated_at": "2022-08-16T06:46:59Z",
"pushed_at": "2018-06-05T15:07:18Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -56,7 +56,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2022-08-14T23:27:18Z",
"updated_at": "2022-08-16T07:56:41Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 456,
"watchers_count": 456,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 455,
"watchers": 456,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2022-08-13T20:40:31Z",
"updated_at": "2022-08-16T11:58:46Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -1934,10 +1934,10 @@
"description": "CVE-2019-0708 - BlueKeep (RDP)",
"fork": false,
"created_at": "2019-05-31T17:37:26Z",
"updated_at": "2022-07-28T13:40:48Z",
"updated_at": "2022-08-16T06:43:34Z",
"pushed_at": "2020-06-14T18:43:51Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -1945,7 +1945,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 41,
"watchers": 40,
"score": 0
},
{

View file

@ -73,13 +73,13 @@
"pushed_at": "2021-12-23T16:29:43Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 42,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"forks": 41,
"watchers": 152,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 727,
"watchers_count": 727,
"forks_count": 65,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"vulnerabilities"
],
"visibility": "public",
"forks": 65,
"forks": 64,
"watchers": 727,
"score": 0
}

View file

@ -17,13 +17,13 @@
"pushed_at": "2019-11-10T20:58:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 9,
"score": 0
}

View file

@ -1,30 +1,30 @@
[
{
"id": 207112945,
"id": 435291799,
"name": "fuzzenv-exiv2",
"full_name": "hazedic\/fuzzenv-exiv2",
"full_name": "5l1v3r1\/fuzzenv-exiv2",
"owner": {
"login": "hazedic",
"id": 13882826,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13882826?v=4",
"html_url": "https:\/\/github.com\/hazedic"
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/hazedic\/fuzzenv-exiv2",
"html_url": "https:\/\/github.com\/5l1v3r1\/fuzzenv-exiv2",
"description": "https:\/\/fuzzit.dev\/2019\/07\/11\/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing\/",
"fork": false,
"created_at": "2019-09-08T12:58:45Z",
"updated_at": "2021-12-05T22:15:27Z",
"created_at": "2021-12-05T22:15:28Z",
"updated_at": "2022-08-16T08:26:01Z",
"pushed_at": "2019-09-08T12:59:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-15T07:16:19Z",
"updated_at": "2022-08-16T09:41:49Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3482,
"watchers_count": 3482,
"forks_count": 1027,
"stargazers_count": 3485,
"watchers_count": 3485,
"forks_count": 1028,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell"
],
"visibility": "public",
"forks": 1027,
"watchers": 3482,
"forks": 1028,
"watchers": 3485,
"score": 0
},
{

View file

@ -189,10 +189,10 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false,
"created_at": "2020-01-11T09:49:17Z",
"updated_at": "2022-07-19T15:02:06Z",
"updated_at": "2022-08-16T08:03:32Z",
"pushed_at": "2021-01-24T20:18:04Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -200,7 +200,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 147,
"watchers": 148,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-08-16T04:20:00Z",
"updated_at": "2022-08-16T10:38:08Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 821,
"watchers_count": 821,
"stargazers_count": 823,
"watchers_count": 823,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 821,
"watchers": 823,
"score": 0
},
{

View file

@ -1634,7 +1634,7 @@
"fork": false,
"created_at": "2022-06-23T07:18:17Z",
"updated_at": "2022-08-09T06:06:00Z",
"pushed_at": "2022-08-15T07:37:14Z",
"pushed_at": "2022-08-16T10:06:46Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-15T07:16:19Z",
"updated_at": "2022-08-16T09:41:49Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3482,
"watchers_count": 3482,
"forks_count": 1027,
"stargazers_count": 3485,
"watchers_count": 3485,
"forks_count": 1028,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell"
],
"visibility": "public",
"forks": 1027,
"watchers": 3482,
"forks": 1028,
"watchers": 3485,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": null,
"fork": false,
"created_at": "2020-11-24T02:40:04Z",
"updated_at": "2021-12-15T14:40:52Z",
"updated_at": "2022-08-16T07:21:56Z",
"pushed_at": "2020-11-24T02:59:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -41,18 +41,18 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-08-15T15:41:52Z",
"updated_at": "2022-08-16T09:31:00Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1593,
"watchers_count": 1593,
"forks_count": 572,
"stargazers_count": 1594,
"watchers_count": 1594,
"forks_count": 573,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 572,
"watchers": 1593,
"forks": 573,
"watchers": 1594,
"score": 0
},
{

View file

@ -90,7 +90,7 @@
"pushed_at": "2021-12-30T12:26:11Z",
"stargazers_count": 398,
"watchers_count": 398,
"forks_count": 138,
"forks_count": 139,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -98,7 +98,7 @@
"cve-2021-21972"
],
"visibility": "public",
"forks": 138,
"forks": 139,
"watchers": 398,
"score": 0
},

View file

@ -1064,13 +1064,13 @@
"pushed_at": "2021-03-31T11:57:38Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 216,
"score": 0
},

View file

@ -185,10 +185,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2022-08-07T10:55:07Z",
"updated_at": "2022-08-16T07:16:17Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
@ -196,7 +196,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 98,
"watchers": 99,
"score": 0
},
{

View file

@ -1004,18 +1004,18 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-08-13T15:20:02Z",
"updated_at": "2022-08-16T09:01:15Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 523,
"watchers_count": 523,
"forks_count": 144,
"stargazers_count": 526,
"watchers_count": 526,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 144,
"watchers": 523,
"forks": 145,
"watchers": 526,
"score": 0
},
{

View file

@ -878,10 +878,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-08-15T19:21:19Z",
"updated_at": "2022-08-16T07:18:59Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 587,
"watchers_count": 587,
"stargazers_count": 588,
"watchers_count": 588,
"forks_count": 120,
"allow_forking": true,
"is_template": false,
@ -891,7 +891,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 587,
"watchers": 588,
"score": 0
},
{
@ -3493,7 +3493,7 @@
"description": "I am not the real author of this exploits.. There are two exploits available, use any of one if it doesn't work use another one... Manual for this two exploit has given in README file. Please read that file before using it.. :) ",
"fork": false,
"created_at": "2022-03-04T15:41:12Z",
"updated_at": "2022-03-04T15:42:40Z",
"updated_at": "2022-08-16T11:11:01Z",
"pushed_at": "2022-03-04T15:49:41Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -3501,7 +3501,16 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve",
"cve-2021-4034",
"exploit",
"exploitation",
"exploits",
"hacking",
"poc",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -45,7 +45,7 @@
"pushed_at": "2022-06-22T20:21:42Z",
"stargazers_count": 696,
"watchers_count": 696,
"forks_count": 163,
"forks_count": 164,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 163,
"forks": 164,
"watchers": 696,
"score": 0
},

View file

@ -312,10 +312,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2022-07-19T06:07:31Z",
"updated_at": "2022-08-16T10:20:06Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -332,7 +332,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 52,
"watchers": 51,
"score": 0
},
{

View file

@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-08-15T12:52:13Z",
"updated_at": "2022-08-16T09:16:21Z",
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 379,
"watchers_count": 379,
"stargazers_count": 380,
"watchers_count": 380,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 379,
"watchers": 380,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1129,
"watchers_count": 1129,
"forks_count": 295,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 295,
"forks": 296,
"watchers": 1129,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "Trying to reproduce CVE-2021-43908",
"fork": false,
"created_at": "2022-08-12T05:18:43Z",
"updated_at": "2022-08-15T16:03:56Z",
"updated_at": "2022-08-16T09:02:27Z",
"pushed_at": "2022-08-14T12:01:31Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"forks": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -250,10 +250,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-08-13T11:01:33Z",
"updated_at": "2022-08-16T11:40:48Z",
"pushed_at": "2022-08-02T13:18:24Z",
"stargazers_count": 1000,
"watchers_count": 1000,
"stargazers_count": 1002,
"watchers_count": 1002,
"forks_count": 447,
"allow_forking": true,
"is_template": false,
@ -263,7 +263,7 @@
],
"visibility": "public",
"forks": 447,
"watchers": 1000,
"watchers": 1002,
"score": 0
},
{
@ -469,10 +469,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-08-16T04:45:51Z",
"updated_at": "2022-08-16T09:36:18Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 839,
"watchers_count": 839,
"stargazers_count": 841,
"watchers_count": 841,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
@ -500,7 +500,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 839,
"watchers": 841,
"score": 0
},
{
@ -680,10 +680,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-08-16T01:06:10Z",
"updated_at": "2022-08-16T11:47:57Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 836,
"watchers_count": 836,
"stargazers_count": 835,
"watchers_count": 835,
"forks_count": 176,
"allow_forking": true,
"is_template": false,
@ -704,7 +704,7 @@
],
"visibility": "public",
"forks": 176,
"watchers": 836,
"watchers": 835,
"score": 0
},
{
@ -1778,10 +1778,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-08-16T00:07:23Z",
"updated_at": "2022-08-16T10:00:25Z",
"pushed_at": "2022-07-20T08:14:48Z",
"stargazers_count": 3013,
"watchers_count": 3013,
"stargazers_count": 3014,
"watchers_count": 3014,
"forks_count": 726,
"allow_forking": true,
"is_template": false,
@ -1789,7 +1789,7 @@
"topics": [],
"visibility": "public",
"forks": 726,
"watchers": 3013,
"watchers": 3014,
"score": 0
},
{
@ -2733,7 +2733,7 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-08-12T16:13:48Z",
"updated_at": "2022-08-16T11:35:29Z",
"pushed_at": "2022-04-24T08:56:47Z",
"stargazers_count": 329,
"watchers_count": 329,

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-04-03T15:07:31Z",
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 48,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"forks": 49,
"watchers": 175,
"score": 0
},

View file

@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-08-15T15:42:13Z",
"updated_at": "2022-08-16T07:41:44Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 296,
"watchers_count": 296,
"stargazers_count": 295,
"watchers_count": 295,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 296,
"watchers": 295,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)",
"fork": false,
"created_at": "2022-05-05T15:25:53Z",
"updated_at": "2022-05-24T05:24:31Z",
"updated_at": "2022-08-16T11:13:46Z",
"pushed_at": "2022-05-05T22:49:40Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 26,
"watchers": 25,
"score": 0
},
{
@ -69,10 +69,10 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2022-08-13T08:05:58Z",
"updated_at": "2022-08-16T11:10:23Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 82,
"watchers": 81,
"score": 0
},
{
@ -153,10 +153,10 @@
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
"fork": false,
"created_at": "2022-05-09T07:39:55Z",
"updated_at": "2022-08-03T17:35:49Z",
"updated_at": "2022-08-16T11:10:22Z",
"pushed_at": "2022-05-15T02:30:40Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 58,
"watchers": 57,
"score": 0
},
{
@ -181,10 +181,10 @@
"description": "batch scan CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T10:06:11Z",
"updated_at": "2022-06-21T09:37:19Z",
"updated_at": "2022-08-16T11:10:19Z",
"pushed_at": "2022-05-09T10:07:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0
},
{
@ -349,10 +349,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-05-09T14:01:38Z",
"updated_at": "2022-08-02T05:13:59Z",
"updated_at": "2022-08-16T11:10:14Z",
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -363,7 +363,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 23,
"watchers": 22,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-10T13:15:20Z",
"updated_at": "2022-08-15T15:42:28Z",
"updated_at": "2022-08-16T07:26:12Z",
"pushed_at": "2022-06-13T17:00:33Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-08-16T06:18:39Z",
"updated_at": "2022-08-16T09:38:44Z",
"pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 315,
"watchers_count": 315,
"forks_count": 136,
"stargazers_count": 316,
"watchers_count": 316,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 136,
"watchers": 315,
"forks": 137,
"watchers": 316,
"score": 0
}
]

30
2022/CVE-2022-20224.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 525345539,
"name": "system_bt_AOSP10_r33_CVE-2022-20224",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20224",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20224",
"description": null,
"fork": false,
"created_at": "2022-08-16T11:14:27Z",
"updated_at": "2022-08-16T11:35:31Z",
"pushed_at": "2022-08-16T11:35:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

30
2022/CVE-2022-20229.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 525362989,
"name": "system_bt_AOSP10_r33_CVE-2022-20229",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
"description": null,
"fork": false,
"created_at": "2022-08-16T12:08:11Z",
"updated_at": "2022-08-16T12:10:21Z",
"pushed_at": "2022-08-16T12:11:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-16T02:01:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
"fork": false,
"created_at": "2022-03-26T01:40:04Z",
"updated_at": "2022-08-15T15:42:15Z",
"updated_at": "2022-08-16T11:44:54Z",
"pushed_at": "2022-04-15T16:31:43Z",
"stargazers_count": 336,
"watchers_count": 336,
"stargazers_count": 335,
"watchers_count": 335,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 336,
"watchers": 335,
"score": 0
},
{
@ -51,10 +51,10 @@
"description": "CVE-2022-22963 PoC ",
"fork": false,
"created_at": "2022-03-30T05:04:24Z",
"updated_at": "2022-08-12T09:21:23Z",
"updated_at": "2022-08-16T11:47:44Z",
"pushed_at": "2022-03-30T06:01:04Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 100,
"watchers": 99,
"score": 0
},
{

View file

@ -1107,10 +1107,10 @@
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
"fork": false,
"created_at": "2022-04-04T21:01:26Z",
"updated_at": "2022-06-28T18:30:24Z",
"updated_at": "2022-08-16T11:40:47Z",
"pushed_at": "2022-04-07T16:04:53Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -1118,7 +1118,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 10,
"score": 0
},
{
@ -1555,10 +1555,10 @@
"description": "Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Plugin",
"fork": false,
"created_at": "2022-04-11T12:37:58Z",
"updated_at": "2022-07-14T11:13:33Z",
"updated_at": "2022-08-16T10:33:10Z",
"pushed_at": "2022-04-11T12:39:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -1566,7 +1566,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"watchers": 1,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-08-15T15:42:27Z",
"updated_at": "2022-08-16T06:42:43Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 491,
"watchers_count": 491,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 491,
"watchers": 492,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-07-17T11:25:12Z",
"updated_at": "2022-07-27T13:26:20Z",
"updated_at": "2022-08-16T06:31:21Z",
"pushed_at": "2022-07-17T11:32:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-16T01:17:22Z",
"updated_at": "2022-08-16T06:27:18Z",
"pushed_at": "2022-08-15T07:00:18Z",
"stargazers_count": 653,
"watchers_count": 653,
"forks_count": 122,
"stargazers_count": 654,
"watchers_count": 654,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"gui"
],
"visibility": "public",
"forks": 122,
"watchers": 653,
"forks": 123,
"watchers": 654,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2022-08-16T04:51:28Z",
"updated_at": "2022-08-16T09:00:31Z",
"pushed_at": "2022-08-13T18:02:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"forks": 3,
"watchers": 13,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-14T22:22:55Z",
"updated_at": "2022-08-16T00:04:24Z",
"updated_at": "2022-08-16T08:14:31Z",
"pushed_at": "2022-08-14T22:25:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -682,10 +682,10 @@
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-02T06:45:19Z",
"updated_at": "2022-08-15T19:02:03Z",
"updated_at": "2022-08-16T06:51:51Z",
"pushed_at": "2022-08-02T04:48:04Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -699,7 +699,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -772,10 +772,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-08-16T02:15:07Z",
"updated_at": "2022-08-16T06:47:53Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 328,
"watchers_count": 328,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -783,7 +783,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 327,
"watchers": 328,
"score": 0
},
{
@ -1391,11 +1391,11 @@
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-09T09:32:10Z",
"updated_at": "2022-08-15T00:09:18Z",
"updated_at": "2022-08-16T11:53:49Z",
"pushed_at": "2022-06-16T07:28:13Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1411,8 +1411,8 @@
"word"
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"forks": 4,
"watchers": 10,
"score": 0
},
{

30
2022/CVE-2022-30592.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 521908781,
"name": "HTTP3-attacks",
"full_name": "efchatz\/HTTP3-attacks",
"owner": {
"login": "efchatz",
"id": 43434138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434138?v=4",
"html_url": "https:\/\/github.com\/efchatz"
},
"html_url": "https:\/\/github.com\/efchatz\/HTTP3-attacks",
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2022-08-16T08:58:01Z",
"pushed_at": "2022-08-16T09:03:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-07-30T07:53:43Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 96,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false,
"created_at": "2022-08-11T11:47:17Z",
"updated_at": "2022-08-15T17:21:13Z",
"updated_at": "2022-08-16T07:31:11Z",
"pushed_at": "2022-08-11T19:25:11Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 28,
"watchers": 29,
"score": 0
}
]

View file

@ -591,6 +591,22 @@ In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possib
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
### CVE-2022-20224 (2022-07-13)
<code>
In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure in the Bluetooth stack with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220732646
</code>
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224)
### CVE-2022-20229 (2022-07-13)
<code>
In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184
</code>
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229)
### CVE-2022-20699 (2022-02-10)
<code>
@ -2728,6 +2744,14 @@ A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W)
- [efchatz/QUIC-attacks](https://github.com/efchatz/QUIC-attacks)
### CVE-2022-30592 (2022-05-11)
<code>
liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.
</code>
- [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks)
### CVE-2022-30594 (2022-05-12)
<code>
@ -15742,7 +15766,7 @@ One Identity Cloud Access Manager 8.1.3 does not use HTTP Strict Transport Secur
There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
</code>
- [hazedic/fuzzenv-exiv2](https://github.com/hazedic/fuzzenv-exiv2)
- [5l1v3r1/fuzzenv-exiv2](https://github.com/5l1v3r1/fuzzenv-exiv2)
### CVE-2019-13574 (2019-07-11)