Auto Update 2022/03/11 18:14:49

This commit is contained in:
motikan2010-bot 2022-03-12 03:14:49 +09:00
parent 80bd20debc
commit 2598ea0aca
36 changed files with 289 additions and 163 deletions

View file

@ -1065,17 +1065,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-11T11:47:04Z",
"updated_at": "2022-03-11T15:47:21Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 123,
"watchers": 124,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-09-17T13:51:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 4,
"score": 0
}

29
2017/CVE-2017-14954.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 468750108,
"name": "exploit_linux_kernel4.13",
"full_name": "echo-devim\/exploit_linux_kernel4.13",
"owner": {
"login": "echo-devim",
"id": 11312542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11312542?v=4",
"html_url": "https:\/\/github.com\/echo-devim"
},
"html_url": "https:\/\/github.com\/echo-devim\/exploit_linux_kernel4.13",
"description": "LPE on linux kernel based on CVE-2017-14954, CVE-2017-18344, CVE-2017-5123",
"fork": false,
"created_at": "2022-03-11T12:54:10Z",
"updated_at": "2022-03-11T13:05:16Z",
"pushed_at": "2022-03-11T13:06:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2022-03-11T12:07:16Z",
"updated_at": "2022-03-11T12:07:16Z",
"pushed_at": "2022-03-11T12:07:17Z",
"updated_at": "2022-03-11T12:09:34Z",
"pushed_at": "2022-03-11T12:09:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -148,17 +148,17 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2022-02-19T22:55:07Z",
"updated_at": "2022-03-11T15:08:14Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -523,17 +523,17 @@
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
"fork": false,
"created_at": "2020-11-29T17:36:11Z",
"updated_at": "2022-01-24T16:23:31Z",
"updated_at": "2022-03-11T12:11:07Z",
"pushed_at": "2020-11-29T17:48:55Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -25,5 +25,32 @@
"forks": 9,
"watchers": 22,
"score": 0
},
{
"id": 468758637,
"name": "CVE-2018-15727",
"full_name": "svnsyn\/CVE-2018-15727",
"owner": {
"login": "svnsyn",
"id": 25940289,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25940289?v=4",
"html_url": "https:\/\/github.com\/svnsyn"
},
"html_url": "https:\/\/github.com\/svnsyn\/CVE-2018-15727",
"description": "MSF Module CVE-2018-15727",
"fork": false,
"created_at": "2022-03-11T13:20:19Z",
"updated_at": "2022-03-11T13:21:58Z",
"pushed_at": "2022-03-11T14:17:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1807,5 +1807,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 468765128,
"name": "CVE-2018-6574",
"full_name": "frarinha\/CVE-2018-6574",
"owner": {
"login": "frarinha",
"id": 11481042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11481042?v=4",
"html_url": "https:\/\/github.com\/frarinha"
},
"html_url": "https:\/\/github.com\/frarinha\/CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2022-03-11T13:40:22Z",
"updated_at": "2022-03-11T14:03:09Z",
"pushed_at": "2022-03-11T14:06:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1702,
"watchers_count": 1702,
"forks_count": 255,
"forks_count": 253,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 255,
"forks": 253,
"watchers": 1702,
"score": 0
},

View file

@ -67,7 +67,7 @@
"description": "Atlassian Jira unauthen template injection",
"fork": false,
"created_at": "2021-05-04T06:30:47Z",
"updated_at": "2022-01-16T17:01:31Z",
"updated_at": "2022-03-11T17:25:53Z",
"pushed_at": "2021-11-29T14:26:48Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -13,10 +13,10 @@
"description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.",
"fork": false,
"created_at": "2020-12-01T13:49:26Z",
"updated_at": "2022-01-06T06:47:57Z",
"updated_at": "2022-03-11T17:55:03Z",
"pushed_at": "2020-12-07T00:12:21Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-03-05T00:03:35Z",
"updated_at": "2022-03-11T15:13:01Z",
"pushed_at": "2022-02-22T07:48:41Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 85,
"watchers": 86,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 907,
"watchers_count": 907,
"forks_count": 247,
"forks_count": 249,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 247,
"forks": 249,
"watchers": 907,
"score": 0
},

View file

@ -28,5 +28,32 @@
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 468552106,
"name": "CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated",
"full_name": "TAPESH-TEAM\/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated",
"owner": {
"login": "TAPESH-TEAM",
"id": 83407483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83407483?v=4",
"html_url": "https:\/\/github.com\/TAPESH-TEAM"
},
"html_url": "https:\/\/github.com\/TAPESH-TEAM\/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated",
"description": "Seowon SLR-120S42G RCE Exploit \/ Remote Code Execution (Unauthenticated)",
"fork": false,
"created_at": "2022-03-11T00:16:35Z",
"updated_at": "2022-03-11T17:41:27Z",
"pushed_at": "2022-03-11T09:55:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.",
"fork": false,
"created_at": "2020-12-01T13:49:26Z",
"updated_at": "2022-01-06T06:47:57Z",
"updated_at": "2022-03-11T17:55:03Z",
"pushed_at": "2020-12-07T00:12:21Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -73,17 +73,17 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2022-02-12T15:36:23Z",
"updated_at": "2022-03-11T12:43:27Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 356,
"watchers_count": 356,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 355,
"watchers": 356,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 371,
"watchers_count": 371,
"forks_count": 113,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 113,
"forks": 114,
"watchers": 371,
"score": 0
},
@ -44,12 +44,12 @@
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 63,
"score": 0
},

View file

@ -244,5 +244,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 468843071,
"name": "CVE-2021-22204",
"full_name": "GatoGamer1155\/CVE-2021-22204",
"owner": {
"login": "GatoGamer1155",
"id": 95899548,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95899548?v=4",
"html_url": "https:\/\/github.com\/GatoGamer1155"
},
"html_url": "https:\/\/github.com\/GatoGamer1155\/CVE-2021-22204",
"description": "Script en python para crear imagenes maliciosas (reverse shell)",
"fork": false,
"created_at": "2022-03-11T17:31:07Z",
"updated_at": "2022-03-11T17:31:07Z",
"pushed_at": "2022-03-11T17:31:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -425,17 +425,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2022-03-10T20:22:41Z",
"updated_at": "2022-03-11T15:18:44Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 812,
"watchers_count": 812,
"stargazers_count": 813,
"watchers_count": 813,
"forks_count": 234,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 234,
"watchers": 812,
"watchers": 813,
"score": 0
},
{
@ -1371,10 +1371,10 @@
"html_url": "https:\/\/github.com\/GatoGamer1155"
},
"html_url": "https:\/\/github.com\/GatoGamer1155\/CVE-2021-3156",
"description": "About Script en python sobre la vulnerabilidad CVE-2021-3156",
"description": "Script en python sobre la vulnerabilidad CVE-2021-3156",
"fork": false,
"created_at": "2022-03-10T19:10:28Z",
"updated_at": "2022-03-10T19:10:50Z",
"updated_at": "2022-03-11T16:16:15Z",
"pushed_at": "2022-03-10T19:10:47Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-06-09T06:58:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"forks": 53,
"watchers": 4,
"score": 0
},

View file

@ -50,7 +50,7 @@
"pushed_at": "2022-01-26T01:01:15Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [
@ -59,7 +59,7 @@
"exploit"
],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 59,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-03-11T10:26:21Z",
"updated_at": "2022-03-11T12:57:09Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1383,
"watchers_count": 1383,
"stargazers_count": 1384,
"watchers_count": 1384,
"forks_count": 453,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 453,
"watchers": 1383,
"watchers": 1384,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-03-08T15:37:34Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 61,
"score": 0
}

View file

@ -120,33 +120,6 @@
"watchers": 12,
"score": 0
},
{
"id": 414376599,
"name": "CVE-2021-41773",
"full_name": "AssassinUKG\/CVE-2021-41773",
"owner": {
"login": "AssassinUKG",
"id": 5285547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5285547?v=4",
"html_url": "https:\/\/github.com\/AssassinUKG"
},
"html_url": "https:\/\/github.com\/AssassinUKG\/CVE-2021-41773",
"description": "Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T21:37:18Z",
"updated_at": "2021-10-20T23:04:09Z",
"pushed_at": "2021-10-20T23:04:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 414804962,
"name": "CVE-2021-41773",
@ -228,33 +201,6 @@
"watchers": 0,
"score": 0
},
{
"id": 419301010,
"name": "CVE-2021-41773",
"full_name": "qwutony\/CVE-2021-41773",
"owner": {
"login": "qwutony",
"id": 45024645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45024645?v=4",
"html_url": "https:\/\/github.com\/qwutony"
},
"html_url": "https:\/\/github.com\/qwutony\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-20T11:27:12Z",
"updated_at": "2021-10-20T12:26:59Z",
"pushed_at": "2021-10-20T12:26:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 419369252,
"name": "CVE-2021-41773",

View file

@ -49,12 +49,12 @@
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 55,
"forks": 56,
"watchers": 267,
"score": 0
},

View file

@ -10598,7 +10598,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-03-07T10:11:58Z",
"pushed_at": "2022-03-11T11:58:22Z",
"pushed_at": "2022-03-11T12:59:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -10773,7 +10773,34 @@
"fork": false,
"created_at": "2022-03-10T14:57:30Z",
"updated_at": "2022-03-10T15:56:57Z",
"pushed_at": "2022-03-10T20:09:36Z",
"pushed_at": "2022-03-11T17:49:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 468746734,
"name": "CVE-2021-44228",
"full_name": "Jun-5heng\/CVE-2021-44228",
"owner": {
"login": "Jun-5heng",
"id": 88525975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
"html_url": "https:\/\/github.com\/Jun-5heng"
},
"html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-44228",
"description": "Log4j2组件命令执行RCE \/ Code By:Jun_sheng",
"fork": false,
"created_at": "2022-03-11T12:43:15Z",
"updated_at": "2022-03-11T13:24:13Z",
"pushed_at": "2022-03-11T13:24:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-0185 POC and Docker and Analysis write up",
"fork": false,
"created_at": "2022-02-18T09:27:34Z",
"updated_at": "2022-03-09T02:04:33Z",
"updated_at": "2022-03-11T16:12:45Z",
"pushed_at": "2022-03-08T14:24:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-0492 EXP and Analysis write up",
"fork": false,
"created_at": "2022-03-11T08:02:46Z",
"updated_at": "2022-03-11T08:06:36Z",
"updated_at": "2022-03-11T13:49:51Z",
"pushed_at": "2022-03-11T09:33:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "POC for KeePass [CVE-2022-0725]",
"fork": false,
"created_at": "2022-02-28T06:53:37Z",
"updated_at": "2022-03-01T02:32:17Z",
"updated_at": "2022-03-11T14:31:44Z",
"pushed_at": "2022-03-11T03:37:14Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-11T11:47:04Z",
"updated_at": "2022-03-11T15:47:21Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 123,
"watchers": 124,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-11T10:04:16Z",
"updated_at": "2022-03-11T16:33:22Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 768,
"watchers_count": 768,
"forks_count": 145,
"stargazers_count": 773,
"watchers_count": 773,
"forks_count": 149,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 145,
"watchers": 768,
"forks": 149,
"watchers": 773,
"score": 0
},
{
@ -287,12 +287,12 @@
"pushed_at": "2022-03-08T09:14:25Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 39,
"score": 0
},
@ -341,12 +341,12 @@
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 9,
"watchers": 12,
"score": 0
},
@ -391,17 +391,17 @@
"description": "The Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2022-03-08T13:48:55Z",
"updated_at": "2022-03-11T05:11:43Z",
"updated_at": "2022-03-11T15:47:31Z",
"pushed_at": "2022-03-08T13:54:08Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 29,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2022-02-01T18:14:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-11T11:42:19Z",
"updated_at": "2022-03-11T16:25:05Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 93,
"stargazers_count": 491,
"watchers_count": 491,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 93,
"watchers": 486,
"forks": 95,
"watchers": 491,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-03-03T14:03:30Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"forks": 54,
"watchers": 163,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "cve-2022-23131 exp",
"fork": false,
"created_at": "2022-02-18T08:38:53Z",
"updated_at": "2022-03-09T05:42:27Z",
"updated_at": "2022-03-11T13:44:25Z",
"pushed_at": "2022-02-21T04:27:48Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 79,
"watchers": 80,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-03-11T03:54:03Z",
"updated_at": "2022-03-11T13:48:27Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 146,
"watchers": 147,
"score": 0
}
]

View file

@ -127,7 +127,12 @@ OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.
- [dskmehra/CVE-2022-0848](https://github.com/dskmehra/CVE-2022-0848)
### CVE-2022-0853
### CVE-2022-0853 (-)
<code>
A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak on the JBoss client-side, when using UserTransaction repeatedly and leads to information leakage vulnerability.
</code>
- [ByteHackr/CVE-2022-0853](https://github.com/ByteHackr/CVE-2022-0853)
### CVE-2022-20699 (2022-02-10)
@ -1668,6 +1673,7 @@ Improper neutralization of user data in the DjVu file format in ExifTool version
- [trganda/CVE-2021-22204](https://github.com/trganda/CVE-2021-22204)
- [0xBruno/CVE-2021-22204](https://github.com/0xBruno/CVE-2021-22204)
- [tuhin81/CVE-2021-22204-exiftool](https://github.com/tuhin81/CVE-2021-22204-exiftool)
- [GatoGamer1155/CVE-2021-22204](https://github.com/GatoGamer1155/CVE-2021-22204)
### CVE-2021-22205 (2021-04-23)
@ -3354,11 +3360,9 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [Zeop-CyberSec/apache_normalize_path](https://github.com/Zeop-CyberSec/apache_normalize_path)
- [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773)
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
- [LudovicPatho/CVE-2021-41773](https://github.com/LudovicPatho/CVE-2021-41773)
- [qwutony/CVE-2021-41773](https://github.com/qwutony/CVE-2021-41773)
- [LayarKacaSiber/CVE-2021-41773](https://github.com/LayarKacaSiber/CVE-2021-41773)
- [BabyTeam1024/CVE-2021-41773](https://github.com/BabyTeam1024/CVE-2021-41773)
- [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773)
@ -4259,6 +4263,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [paulvkitor/log4shellwithlog4j2_13_3](https://github.com/paulvkitor/log4shellwithlog4j2_13_3)
- [cryst4lliz3/CVE-2021-44228](https://github.com/cryst4lliz3/CVE-2021-44228)
- [MiguelM001/vulescanjndilookup](https://github.com/MiguelM001/vulescanjndilookup)
- [Jun-5heng/CVE-2021-44228](https://github.com/Jun-5heng/CVE-2021-44228)
### CVE-2021-44270
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
@ -8160,6 +8165,7 @@ SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the i
</code>
- [Al1ex/CVE-2020-17456](https://github.com/Al1ex/CVE-2020-17456)
- [TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated](https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated)
### CVE-2020-17496 (2020-08-12)
@ -14357,6 +14363,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
- [imojne/CVE-2018-6574-POC](https://github.com/imojne/CVE-2018-6574-POC)
- [thpless/CVE-2018-6574](https://github.com/thpless/CVE-2018-6574)
- [twseptian/CVE-2018-6574](https://github.com/twseptian/CVE-2018-6574)
- [frarinha/CVE-2018-6574](https://github.com/frarinha/CVE-2018-6574)
### CVE-2018-6622 (2018-08-17)
@ -15786,6 +15793,7 @@ Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authenticatio
</code>
- [u238/grafana-CVE-2018-15727](https://github.com/u238/grafana-CVE-2018-15727)
- [svnsyn/CVE-2018-15727](https://github.com/svnsyn/CVE-2018-15727)
### CVE-2018-15832 (2018-09-20)
@ -18543,6 +18551,14 @@ Certain D-Link products are affected by: Buffer Overflow. This affects DIR-880L
- [badnack/d_link_880_bug](https://github.com/badnack/d_link_880_bug)
### CVE-2017-14954 (2017-09-30)
<code>
The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call.
</code>
- [echo-devim/exploit_linux_kernel4.13](https://github.com/echo-devim/exploit_linux_kernel4.13)
### CVE-2017-15120 (2018-07-27)
<code>