Auto Update 2025/01/08 00:32:44

This commit is contained in:
motikan2010-bot 2025-01-08 09:32:44 +09:00
parent a29a1f8632
commit 298fff475a
2797 changed files with 210253 additions and 89 deletions

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-04T06:15:01Z",
"updated_at": "2025-01-07T22:35:05Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 117,
"score": 0,
"subscribers_count": 12
@ -50,13 +50,13 @@
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 109,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 109,
"forks": 110,
"watchers": 341,
"score": 0,
"subscribers_count": 48

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-04T06:15:01Z",
"updated_at": "2025-01-07T22:35:05Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 109,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 109,
"forks": 110,
"watchers": 341,
"score": 0,
"subscribers_count": 48

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-04T06:15:01Z",
"updated_at": "2025-01-07T22:35:05Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -429,10 +429,10 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2024-12-29T01:33:10Z",
"updated_at": "2025-01-07T21:31:09Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 428,
"watchers_count": 428,
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 135,
"allow_forking": true,
@ -447,7 +447,7 @@
],
"visibility": "public",
"forks": 135,
"watchers": 428,
"watchers": 429,
"score": 0,
"subscribers_count": 22
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-04T06:15:01Z",
"updated_at": "2025-01-07T22:35:05Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-04T06:15:01Z",
"updated_at": "2025-01-07T22:35:05Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
}

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2025-01-04T06:15:01Z",
"updated_at": "2025-01-07T22:35:05Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2014,
"watchers_count": 2014,
"stargazers_count": 2013,
"watchers_count": 2013,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2014,
"watchers": 2013,
"score": 0,
"subscribers_count": 38
},

View file

@ -174,6 +174,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2024-11-28T05:56:23Z",
"updated_at": "2025-01-07T22:34:48Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 216,
"watchers": 215,
"score": 0,
"subscribers_count": 14
},

View file

@ -152,7 +152,7 @@
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
},
{
"id": 333189009,

View file

@ -359,10 +359,10 @@
"description": "Laravel RCE Exploit Script - CVE-2021-3129",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2025-01-03T06:35:31Z",
"updated_at": "2025-01-07T22:35:15Z",
"pushed_at": "2024-09-22T13:10:27Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -386,7 +386,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability",
"fork": false,
"created_at": "2021-12-15T14:28:00Z",
"updated_at": "2024-11-16T10:28:23Z",
"updated_at": "2025-01-07T20:45:55Z",
"pushed_at": "2022-04-28T10:15:24Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 3
}

View file

@ -1346,10 +1346,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2025-01-04T14:02:51Z",
"updated_at": "2025-01-07T23:41:34Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -1358,7 +1358,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 2
},

View file

@ -3777,6 +3777,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -29,5 +29,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 913550439,
"name": "CVE-2021-41805",
"full_name": "acfirthh\/CVE-2021-41805",
"owner": {
"login": "acfirthh",
"id": 59393271,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59393271?v=4",
"html_url": "https:\/\/github.com\/acfirthh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/acfirthh\/CVE-2021-41805",
"description": "A proof-of-concept for CVE-2021-41805 which is a vulnerability in HashiCorp Consul Enterprise allowing for Remote Code Execution (RCE).",
"fork": false,
"created_at": "2025-01-07T22:45:14Z",
"updated_at": "2025-01-07T23:10:52Z",
"pushed_at": "2025-01-07T23:10:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-04T08:46:31Z",
"updated_at": "2025-01-07T19:19:51Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 819,
"watchers_count": 819,
"stargazers_count": 820,
"watchers_count": 820,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 819,
"watchers": 820,
"score": 0,
"subscribers_count": 13
},

View file

@ -10741,37 +10741,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 448039430,
"name": "Search-log4Jvuln-AppScanSTD",
"full_name": "jrocia\/Search-log4Jvuln-AppScanSTD",
"owner": {
"login": "jrocia",
"id": 69405400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69405400?v=4",
"html_url": "https:\/\/github.com\/jrocia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jrocia\/Search-log4Jvuln-AppScanSTD",
"description": "This Pwsh script run AppScan Standard scans against a list of web sites (URLs.txt) checking for Log4J (CVE-2021-44228) vulnerability",
"fork": false,
"created_at": "2022-01-14T16:47:20Z",
"updated_at": "2022-01-14T16:54:21Z",
"pushed_at": "2022-01-14T18:34:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448612058,
"name": "log4stdin",

33
2022/CVE-2022-0155.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 830527219,
"name": "CVE-2022-0155-PoC",
"full_name": "coana-tech\/CVE-2022-0155-PoC",
"owner": {
"login": "coana-tech",
"id": 66076970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66076970?v=4",
"html_url": "https:\/\/github.com\/coana-tech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/coana-tech\/CVE-2022-0155-PoC",
"description": null,
"fork": false,
"created_at": "2024-07-18T12:57:18Z",
"updated_at": "2024-07-18T13:01:28Z",
"pushed_at": "2024-07-18T13:01:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

72
2022/CVE-2022-0165.json Normal file
View file

@ -0,0 +1,72 @@
[
{
"id": 676524045,
"name": "CVE-2022-0165-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2022-0165-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2022-0165-EXPLOIT",
"description": "A PoC exploit for CVE-2022-0165 - Page Builder KingComposer WordPress Plugin - ID Parameter Validation Bypass",
"fork": false,
"created_at": "2023-08-09T11:53:18Z",
"updated_at": "2023-08-09T12:01:12Z",
"pushed_at": "2023-08-09T11:59:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 807412299,
"name": "CVE-2022-0165",
"full_name": "Cappricio-Securities\/CVE-2022-0165",
"owner": {
"login": "Cappricio-Securities",
"id": 102907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
"html_url": "https:\/\/github.com\/Cappricio-Securities",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2022-0165",
"description": "WordPress Page Builder KingComposer <=2.9.6 - Open Redirect",
"fork": false,
"created_at": "2024-05-29T04:00:25Z",
"updated_at": "2024-06-24T09:29:49Z",
"pushed_at": "2024-06-24T09:29:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bugbounty",
"bugbounty-tools",
"cve-2022-0165",
"cve-2022-0165-poc",
"cve-2022-0165-scanner",
"open-redirect",
"wordpress-page-builder-kingcomposer"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -30,6 +30,68 @@
"score": 0,
"subscribers_count": 39
},
{
"id": 452351785,
"name": "cve-2022-0185-crash-poc",
"full_name": "discordianfish\/cve-2022-0185-crash-poc",
"owner": {
"login": "discordianfish",
"id": 275966,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/275966?v=4",
"html_url": "https:\/\/github.com\/discordianfish",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/discordianfish\/cve-2022-0185-crash-poc",
"description": null,
"fork": false,
"created_at": "2022-01-26T16:27:50Z",
"updated_at": "2022-06-21T02:30:36Z",
"pushed_at": "2022-01-26T16:45:45Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 3
},
{
"id": 452756684,
"name": "CVE-2022-0185",
"full_name": "khaclep007\/CVE-2022-0185",
"owner": {
"login": "khaclep007",
"id": 45098044,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45098044?v=4",
"html_url": "https:\/\/github.com\/khaclep007",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/khaclep007\/CVE-2022-0185",
"description": null,
"fork": false,
"created_at": "2022-01-27T16:24:35Z",
"updated_at": "2022-01-27T16:25:54Z",
"pushed_at": "2022-01-27T16:25:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 460788495,
"name": "CVE-2022-0185",
@ -122,5 +184,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 786640173,
"name": "CVE-2022-0185-Case-Study",
"full_name": "dcheng69\/CVE-2022-0185-Case-Study",
"owner": {
"login": "dcheng69",
"id": 145501807,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145501807?v=4",
"html_url": "https:\/\/github.com\/dcheng69",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dcheng69\/CVE-2022-0185-Case-Study",
"description": null,
"fork": false,
"created_at": "2024-04-15T02:42:43Z",
"updated_at": "2024-05-10T01:22:51Z",
"pushed_at": "2024-05-09T17:07:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0219.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 450128440,
"name": "CVE-2022-0219",
"full_name": "Haxatron\/CVE-2022-0219",
"owner": {
"login": "Haxatron",
"id": 76475453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
"html_url": "https:\/\/github.com\/Haxatron",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
"description": null,
"fork": false,
"created_at": "2022-01-20T14:24:45Z",
"updated_at": "2022-01-20T14:24:45Z",
"pushed_at": "2022-01-20T14:35:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

66
2022/CVE-2022-0236.json Normal file
View file

@ -0,0 +1,66 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2023-01-28T03:56:57Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

42
2022/CVE-2022-0316.json Normal file
View file

@ -0,0 +1,42 @@
[
{
"id": 599217584,
"name": "CVE-2022-0316_wordpress_multiple_themes_exploit",
"full_name": "KTN1990\/CVE-2022-0316_wordpress_multiple_themes_exploit",
"owner": {
"login": "KTN1990",
"id": 33407405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
"html_url": "https:\/\/github.com\/KTN1990",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2022-0316_wordpress_multiple_themes_exploit",
"description": "( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2023-02-08T17:37:09Z",
"updated_at": "2024-09-05T09:11:44Z",
"pushed_at": "2023-02-09T15:59:30Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bot",
"botnet",
"exploit",
"hack",
"hacking",
"pentest",
"pentest-tool",
"shell"
],
"visibility": "public",
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0332.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 452082369,
"name": "CVE-2022-0332",
"full_name": "numanturle\/CVE-2022-0332",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-0332",
"description": null,
"fork": false,
"created_at": "2022-01-25T23:58:17Z",
"updated_at": "2024-08-12T20:20:04Z",
"pushed_at": "2022-01-26T00:18:26Z",
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 44,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -45,5 +45,67 @@
"watchers": 328,
"score": 0,
"subscribers_count": 6
},
{
"id": 608127887,
"name": "ChExp-CVE-2022-0337-",
"full_name": "maldev866\/ChExp-CVE-2022-0337-",
"owner": {
"login": "maldev866",
"id": 118355132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118355132?v=4",
"html_url": "https:\/\/github.com\/maldev866",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/maldev866\/ChExp-CVE-2022-0337-",
"description": null,
"fork": false,
"created_at": "2023-03-01T11:31:45Z",
"updated_at": "2023-03-01T11:33:31Z",
"pushed_at": "2023-03-01T11:33:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 721416376,
"name": "CVE-2022-0337-RePoC",
"full_name": "zer0ne1\/CVE-2022-0337-RePoC",
"owner": {
"login": "zer0ne1",
"id": 71746399,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71746399?v=4",
"html_url": "https:\/\/github.com\/zer0ne1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zer0ne1\/CVE-2022-0337-RePoC",
"description": null,
"fork": false,
"created_at": "2023-11-21T02:34:32Z",
"updated_at": "2023-11-21T02:36:09Z",
"pushed_at": "2023-12-12T02:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

38
2022/CVE-2022-0412.json Normal file
View file

@ -0,0 +1,38 @@
[
{
"id": 683124631,
"name": "CVE-2022-0412_Exploit",
"full_name": "TcherB31\/CVE-2022-0412_Exploit",
"owner": {
"login": "TcherB31",
"id": 108927927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108927927?v=4",
"html_url": "https:\/\/github.com\/TcherB31",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TcherB31\/CVE-2022-0412_Exploit",
"description": "I'm write a exploit&scan for exploitation SQL Injection in WP from CVE-2022-0412",
"fork": false,
"created_at": "2023-08-25T16:54:28Z",
"updated_at": "2024-11-02T10:19:04Z",
"pushed_at": "2023-08-25T16:56:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"poc",
"sqlinjection",
"wordpess"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0435.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 630581068,
"name": "CVE-2022-0435",
"full_name": "wlswotmd\/CVE-2022-0435",
"owner": {
"login": "wlswotmd",
"id": 80761172,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80761172?v=4",
"html_url": "https:\/\/github.com\/wlswotmd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wlswotmd\/CVE-2022-0435",
"description": null,
"fork": false,
"created_at": "2023-04-20T17:29:02Z",
"updated_at": "2023-07-03T13:45:44Z",
"pushed_at": "2023-04-26T09:45:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0439.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 651257016,
"name": "CVE-2022-0439",
"full_name": "RandomRobbieBF\/CVE-2022-0439",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2022-0439",
"description": "CVE-2022-0439 - Email Subscribers & Newsletters < 5.3.2 - Subscriber+ Blind SQL injection",
"fork": false,
"created_at": "2023-06-08T21:20:22Z",
"updated_at": "2023-06-09T07:40:58Z",
"pushed_at": "2023-06-08T21:26:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -35,5 +35,102 @@
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 567613523,
"name": "cve-2022-0441",
"full_name": "SDragon1205\/cve-2022-0441",
"owner": {
"login": "SDragon1205",
"id": 80585189,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80585189?v=4",
"html_url": "https:\/\/github.com\/SDragon1205",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SDragon1205\/cve-2022-0441",
"description": "CVE-2022-0441 - MasterStudy LMS 2.7.6",
"fork": false,
"created_at": "2022-11-18T07:02:29Z",
"updated_at": "2022-11-20T12:52:35Z",
"pushed_at": "2022-11-18T07:07:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 648445645,
"name": "CVE-2022-0441",
"full_name": "tegal1337\/CVE-2022-0441",
"owner": {
"login": "tegal1337",
"id": 58784189,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58784189?v=4",
"html_url": "https:\/\/github.com\/tegal1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tegal1337\/CVE-2022-0441",
"description": "The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin",
"fork": false,
"created_at": "2023-06-02T01:53:32Z",
"updated_at": "2024-08-12T20:31:34Z",
"pushed_at": "2023-06-02T02:24:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-0441",
"wordpress-exploit",
"wordpress-plugin"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 699704500,
"name": "CVE-2022-0441",
"full_name": "kyukazamiqq\/CVE-2022-0441",
"owner": {
"login": "kyukazamiqq",
"id": 55656379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55656379?v=4",
"html_url": "https:\/\/github.com\/kyukazamiqq",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kyukazamiqq\/CVE-2022-0441",
"description": "Checker for CVE-2022-0441",
"fork": false,
"created_at": "2023-10-03T07:07:40Z",
"updated_at": "2023-10-03T07:09:30Z",
"pushed_at": "2023-10-03T07:09:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -35,5 +35,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 790152234,
"name": "CVE-2022-0482_exploit",
"full_name": "mija-pilkaite\/CVE-2022-0482_exploit",
"owner": {
"login": "mija-pilkaite",
"id": 115141099,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115141099?v=4",
"html_url": "https:\/\/github.com\/mija-pilkaite",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mija-pilkaite\/CVE-2022-0482_exploit",
"description": "A final project for \"Network Security\" class at NYCU (National Yang Ming Chiao Tung University, Taiwan). Exploiting a CVE in \"EasyAppointments\" software. ",
"fork": false,
"created_at": "2024-04-22T11:10:33Z",
"updated_at": "2024-05-11T09:48:18Z",
"pushed_at": "2024-04-22T12:09:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,128 @@
[
{
"id": 464299568,
"name": "can-ctr-escape-cve-2022-0492",
"full_name": "PaloAltoNetworks\/can-ctr-escape-cve-2022-0492",
"owner": {
"login": "PaloAltoNetworks",
"id": 4855743,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4855743?v=4",
"html_url": "https:\/\/github.com\/PaloAltoNetworks",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PaloAltoNetworks\/can-ctr-escape-cve-2022-0492",
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
"updated_at": "2024-11-05T04:01:34Z",
"pushed_at": "2022-03-09T00:09:46Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 47,
"score": 0,
"subscribers_count": 6
},
{
"id": 466710055,
"name": "CVE-2022-0492-Checker",
"full_name": "SofianeHamlaoui\/CVE-2022-0492-Checker",
"owner": {
"login": "SofianeHamlaoui",
"id": 16967174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16967174?v=4",
"html_url": "https:\/\/github.com\/SofianeHamlaoui",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SofianeHamlaoui\/CVE-2022-0492-Checker",
"description": "A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-03-06T10:57:09Z",
"updated_at": "2024-08-12T20:21:17Z",
"pushed_at": "2022-03-12T13:45:32Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 468660841,
"name": "CVE-2022-0492",
"full_name": "chenaotian\/CVE-2022-0492",
"owner": {
"login": "chenaotian",
"id": 86546351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
"html_url": "https:\/\/github.com\/chenaotian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-0492",
"description": "CVE-2022-0492 EXP and Analysis write up",
"fork": false,
"created_at": "2022-03-11T08:02:46Z",
"updated_at": "2024-08-12T20:21:27Z",
"pushed_at": "2022-03-11T09:33:24Z",
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 28,
"score": 0,
"subscribers_count": 3
},
{
"id": 471620496,
"name": "CVE-2022-0492",
"full_name": "bb33bb\/CVE-2022-0492",
"owner": {
"login": "bb33bb",
"id": 5463104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/bb33bb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bb33bb\/CVE-2022-0492",
"description": null,
"fork": false,
"created_at": "2022-03-19T07:13:56Z",
"updated_at": "2023-12-23T11:27:56Z",
"pushed_at": "2022-03-07T10:03:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 490291933,
"name": "device_renesas_kernel_AOSP10_r33_CVE-2022-0492",
@ -29,5 +153,74 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 529476500,
"name": "CVE-2022-0492-Container-Escape",
"full_name": "yoeelingBin\/CVE-2022-0492-Container-Escape",
"owner": {
"login": "yoeelingBin",
"id": 57822313,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57822313?v=4",
"html_url": "https:\/\/github.com\/yoeelingBin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yoeelingBin\/CVE-2022-0492-Container-Escape",
"description": "CVE-2022-0492-Container-Escape",
"fork": false,
"created_at": "2022-08-27T04:02:24Z",
"updated_at": "2022-09-16T14:15:14Z",
"pushed_at": "2022-08-28T08:19:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 603301567,
"name": "CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"full_name": "T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"owner": {
"login": "T1erno",
"id": 78065668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78065668?v=4",
"html_url": "https:\/\/github.com\/T1erno",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/T1erno\/CVE-2022-0492-Docker-Breakout-Checker-and-PoC",
"description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)",
"fork": false,
"created_at": "2023-02-18T04:48:25Z",
"updated_at": "2024-12-07T15:11:22Z",
"pushed_at": "2023-02-18T05:28:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-0492",
"docker-breakout",
"hacking",
"pentesting",
"privesc"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-0529.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 464348331,
"name": "unzip_poc",
"full_name": "nanaao\/unzip_poc",
"owner": {
"login": "nanaao",
"id": 77666853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
"html_url": "https:\/\/github.com\/nanaao",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nanaao\/unzip_poc",
"description": "CVE-2022-0529 & CVE-2022-0530",
"fork": false,
"created_at": "2022-02-28T05:20:03Z",
"updated_at": "2024-08-12T20:21:04Z",
"pushed_at": "2022-02-28T05:10:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 464353991,
"name": "unzip_poc",
"full_name": "ByteHackr\/unzip_poc",
"owner": {
"login": "ByteHackr",
"id": 30409831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
"html_url": "https:\/\/github.com\/ByteHackr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ByteHackr\/unzip_poc",
"description": "CVE-2022-0529 & CVE-2022-0530",
"fork": false,
"created_at": "2022-02-28T05:44:52Z",
"updated_at": "2024-08-12T20:21:04Z",
"pushed_at": "2022-02-28T06:01:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -29,5 +29,98 @@
"watchers": 88,
"score": 0,
"subscribers_count": 1
},
{
"id": 510988944,
"name": "CVE-2022-0543",
"full_name": "z92g\/CVE-2022-0543",
"owner": {
"login": "z92g",
"id": 108780847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108780847?v=4",
"html_url": "https:\/\/github.com\/z92g",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z92g\/CVE-2022-0543",
"description": "Redis 沙盒逃逸CVE-2022-0543POC&EXP",
"fork": false,
"created_at": "2022-07-06T04:35:59Z",
"updated_at": "2024-11-16T19:50:34Z",
"pushed_at": "2022-07-23T14:21:14Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 23,
"score": 0,
"subscribers_count": 3
},
{
"id": 531605589,
"name": "CVE-2022-0543",
"full_name": "JacobEbben\/CVE-2022-0543",
"owner": {
"login": "JacobEbben",
"id": 112503338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
"html_url": "https:\/\/github.com\/JacobEbben",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-0543",
"description": "Redis RCE through Lua Sandbox Escape vulnerability",
"fork": false,
"created_at": "2022-09-01T16:44:56Z",
"updated_at": "2024-06-04T09:59:22Z",
"pushed_at": "2022-09-02T22:46:08Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 638780954,
"name": "redisHack",
"full_name": "SiennaSkies\/redisHack",
"owner": {
"login": "SiennaSkies",
"id": 105592340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105592340?v=4",
"html_url": "https:\/\/github.com\/SiennaSkies",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SiennaSkies\/redisHack",
"description": "redis未授权、redis_CVE-2022-0543检测利用二合一脚本",
"fork": false,
"created_at": "2023-05-10T05:05:31Z",
"updated_at": "2024-12-08T15:52:10Z",
"pushed_at": "2023-05-11T09:23:28Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

40
2022/CVE-2022-0591.json Normal file
View file

@ -0,0 +1,40 @@
[
{
"id": 688625677,
"name": "FC3er",
"full_name": "im-hanzou\/FC3er",
"owner": {
"login": "im-hanzou",
"id": 61415393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
"html_url": "https:\/\/github.com\/im-hanzou",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/im-hanzou\/FC3er",
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-0591 - Formcraft3 < 3.8.28 - Unauthenticated SSRF",
"fork": false,
"created_at": "2023-09-07T18:41:43Z",
"updated_at": "2024-11-21T14:54:22Z",
"pushed_at": "2023-09-07T19:57:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"checker",
"cve-2022-0591",
"formcraft",
"formcraft3",
"wordpress",
"wordpress-plugin"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0666.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 516692900,
"name": "CVE-2022-0666",
"full_name": "keyboardancer\/CVE-2022-0666",
"owner": {
"login": "keyboardancer",
"id": 25246722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25246722?v=4",
"html_url": "https:\/\/github.com\/keyboardancer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/keyboardancer\/CVE-2022-0666",
"description": null,
"fork": false,
"created_at": "2022-07-22T09:38:20Z",
"updated_at": "2022-07-22T09:38:20Z",
"pushed_at": "2022-07-22T09:38:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0725.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 464371159,
"name": "keepass_poc",
"full_name": "ByteHackr\/keepass_poc",
"owner": {
"login": "ByteHackr",
"id": 30409831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
"html_url": "https:\/\/github.com\/ByteHackr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ByteHackr\/keepass_poc",
"description": "POC for KeePass [CVE-2022-0725]",
"fork": false,
"created_at": "2022-02-28T06:53:37Z",
"updated_at": "2025-01-04T05:44:44Z",
"pushed_at": "2022-03-12T14:31:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 3
}
]

255
2022/CVE-2022-0739.json Normal file
View file

@ -0,0 +1,255 @@
[
{
"id": 559657593,
"name": "CVE-2022-0739",
"full_name": "destr4ct\/CVE-2022-0739",
"owner": {
"login": "destr4ct",
"id": 77569644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77569644?v=4",
"html_url": "https:\/\/github.com\/destr4ct",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/destr4ct\/CVE-2022-0739",
"description": "Proof-of-Concept exploit (SQLI BookingPress before 1.0.11)",
"fork": false,
"created_at": "2022-10-30T19:32:15Z",
"updated_at": "2024-01-31T11:11:54Z",
"pushed_at": "2022-10-30T19:38:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 560664356,
"name": "CVE-2022-0739",
"full_name": "Chris01s\/CVE-2022-0739",
"owner": {
"login": "Chris01s",
"id": 31475621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31475621?v=4",
"html_url": "https:\/\/github.com\/Chris01s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chris01s\/CVE-2022-0739",
"description": "Simple bash script to automate the exploit of cve 2022 0739",
"fork": false,
"created_at": "2022-11-02T01:39:37Z",
"updated_at": "2024-08-12T20:28:08Z",
"pushed_at": "2022-11-02T02:18:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 573647044,
"name": "CVE-2022-0739",
"full_name": "BKreisel\/CVE-2022-0739",
"owner": {
"login": "BKreisel",
"id": 1513073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
"html_url": "https:\/\/github.com\/BKreisel",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BKreisel\/CVE-2022-0739",
"description": "🐍 Python Exploit for CVE-2022-0739",
"fork": false,
"created_at": "2022-12-03T01:33:07Z",
"updated_at": "2023-12-27T12:18:10Z",
"pushed_at": "2022-12-09T18:01:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-0739",
"exploit",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 577585825,
"name": "wp_bookingpress_1.0.11",
"full_name": "hadrian3689\/wp_bookingpress_1.0.11",
"owner": {
"login": "hadrian3689",
"id": 71423134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71423134?v=4",
"html_url": "https:\/\/github.com\/hadrian3689",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hadrian3689\/wp_bookingpress_1.0.11",
"description": "CVE-2022-0739 Wordpress BookingPress SQLi",
"fork": false,
"created_at": "2022-12-13T04:04:46Z",
"updated_at": "2023-07-06T21:54:38Z",
"pushed_at": "2022-12-13T16:59:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 581412484,
"name": "CVE-2022-0739",
"full_name": "G01d3nW01f\/CVE-2022-0739",
"owner": {
"login": "G01d3nW01f",
"id": 75846902,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4",
"html_url": "https:\/\/github.com\/G01d3nW01f",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2022-0739",
"description": null,
"fork": false,
"created_at": "2022-12-23T05:35:08Z",
"updated_at": "2022-12-23T05:36:55Z",
"pushed_at": "2022-12-23T05:36:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 586035039,
"name": "CVE-2022-0739",
"full_name": "viardant\/CVE-2022-0739",
"owner": {
"login": "viardant",
"id": 84291326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84291326?v=4",
"html_url": "https:\/\/github.com\/viardant",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/viardant\/CVE-2022-0739",
"description": "Exploit for WP BookingPress (< 1.0.11) based on destr4ct POC.",
"fork": false,
"created_at": "2023-01-06T19:07:11Z",
"updated_at": "2024-07-19T10:23:33Z",
"pushed_at": "2023-01-17T16:02:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 603458874,
"name": "CVE-2022-0739",
"full_name": "ElGanz0\/CVE-2022-0739",
"owner": {
"login": "ElGanz0",
"id": 103381132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103381132?v=4",
"html_url": "https:\/\/github.com\/ElGanz0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ElGanz0\/CVE-2022-0739",
"description": "BookingPress < 1.0.11 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2023-02-18T15:23:49Z",
"updated_at": "2023-02-18T15:24:59Z",
"pushed_at": "2023-02-23T21:49:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 616018302,
"name": "Bash-exploit-for-CVE-2022-0739",
"full_name": "lhamouche\/Bash-exploit-for-CVE-2022-0739",
"owner": {
"login": "lhamouche",
"id": 125658579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125658579?v=4",
"html_url": "https:\/\/github.com\/lhamouche",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lhamouche\/Bash-exploit-for-CVE-2022-0739",
"description": null,
"fork": false,
"created_at": "2023-03-19T11:35:03Z",
"updated_at": "2023-09-18T18:30:15Z",
"pushed_at": "2023-03-23T08:20:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,35 @@
[
{
"id": 470297034,
"name": "CVE-2022-0778",
"full_name": "drago-96\/CVE-2022-0778",
"owner": {
"login": "drago-96",
"id": 22937313,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22937313?v=4",
"html_url": "https:\/\/github.com\/drago-96",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/drago-96\/CVE-2022-0778",
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
"updated_at": "2024-11-21T13:26:19Z",
"pushed_at": "2022-04-03T15:07:31Z",
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 183,
"score": 0,
"subscribers_count": 17
},
{
"id": 477818601,
"name": "cve-2022-0778",
@ -97,5 +128,98 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 689922616,
"name": "openssl-1.1.1g_CVE-2022-0778",
"full_name": "Trinadh465\/openssl-1.1.1g_CVE-2022-0778",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/openssl-1.1.1g_CVE-2022-0778",
"description": null,
"fork": false,
"created_at": "2023-09-11T07:30:33Z",
"updated_at": "2023-09-11T07:33:47Z",
"pushed_at": "2023-09-11T07:34:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 710128947,
"name": "CVE-2022-0778",
"full_name": "jeongjunsoo\/CVE-2022-0778",
"owner": {
"login": "jeongjunsoo",
"id": 75816093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75816093?v=4",
"html_url": "https:\/\/github.com\/jeongjunsoo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jeongjunsoo\/CVE-2022-0778",
"description": null,
"fork": false,
"created_at": "2023-10-26T04:39:44Z",
"updated_at": "2023-10-26T04:39:44Z",
"pushed_at": "2023-10-26T07:09:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 773788494,
"name": "OpenSSL_1.0.1g_CVE-2022-0778",
"full_name": "hshivhare67\/OpenSSL_1.0.1g_CVE-2022-0778",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/OpenSSL_1.0.1g_CVE-2022-0778",
"description": null,
"fork": false,
"created_at": "2024-03-18T12:00:39Z",
"updated_at": "2024-03-18T12:02:10Z",
"pushed_at": "2024-03-18T12:02:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0811.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 472271080,
"name": "webhook-cve-2022-0811",
"full_name": "spiarh\/webhook-cve-2022-0811",
"owner": {
"login": "spiarh",
"id": 33934779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33934779?v=4",
"html_url": "https:\/\/github.com\/spiarh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/spiarh\/webhook-cve-2022-0811",
"description": "Simple webhook to block exploitation of CVE-2022-0811",
"fork": false,
"created_at": "2022-03-21T09:39:22Z",
"updated_at": "2024-08-12T20:21:44Z",
"pushed_at": "2022-03-21T09:58:35Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,40 @@
[
{
"id": 466595745,
"name": "Webmin-CVE-2022-0824-revshell",
"full_name": "faisalfs10x\/Webmin-CVE-2022-0824-revshell",
"owner": {
"login": "faisalfs10x",
"id": 51811615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
"html_url": "https:\/\/github.com\/faisalfs10x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/faisalfs10x\/Webmin-CVE-2022-0824-revshell",
"description": "Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC",
"fork": false,
"created_at": "2022-03-06T00:03:31Z",
"updated_at": "2025-01-03T12:07:53Z",
"pushed_at": "2022-03-06T07:01:15Z",
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"proof-of-concept",
"vulnerability"
],
"visibility": "public",
"forks": 38,
"watchers": 111,
"score": 0,
"subscribers_count": 4
},
{
"id": 472606012,
"name": "CVE-2022-0824",
@ -34,5 +70,73 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 552892049,
"name": "golang-webmin-CVE-2022-0824-revshell",
"full_name": "pizza-power\/golang-webmin-CVE-2022-0824-revshell",
"owner": {
"login": "pizza-power",
"id": 6135659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
"html_url": "https:\/\/github.com\/pizza-power",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pizza-power\/golang-webmin-CVE-2022-0824-revshell",
"description": "Exploit POC for CVE-2022-0824",
"fork": false,
"created_at": "2022-10-17T11:47:04Z",
"updated_at": "2022-10-18T03:27:54Z",
"pushed_at": "2022-10-17T13:56:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 563421791,
"name": "WebminRCE-exploit",
"full_name": "gokul-ramesh\/WebminRCE-exploit",
"owner": {
"login": "gokul-ramesh",
"id": 65040016,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65040016?v=4",
"html_url": "https:\/\/github.com\/gokul-ramesh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gokul-ramesh\/WebminRCE-exploit",
"description": "CVE-2022-0824, CVE-2022-0829, File Manger privilege exploit",
"fork": false,
"created_at": "2022-11-08T15:22:55Z",
"updated_at": "2022-12-12T05:03:39Z",
"pushed_at": "2022-11-18T15:29:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-0824",
"cve-2022-0829",
"exploit",
"webmin-rce",
"webmin-reverse-shell"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

File diff suppressed because it is too large Load diff

64
2022/CVE-2022-0848.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 468650717,
"name": "CVE-2022-0848",
"full_name": "dskmehra\/CVE-2022-0848",
"owner": {
"login": "dskmehra",
"id": 18103236,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18103236?v=4",
"html_url": "https:\/\/github.com\/dskmehra",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dskmehra\/CVE-2022-0848",
"description": null,
"fork": false,
"created_at": "2022-03-11T07:26:04Z",
"updated_at": "2023-07-06T22:02:34Z",
"pushed_at": "2022-03-11T07:29:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 514188117,
"name": "CVE-2022-0848-RCE",
"full_name": "Lay0us\/CVE-2022-0848-RCE",
"owner": {
"login": "Lay0us",
"id": 99304369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99304369?v=4",
"html_url": "https:\/\/github.com\/Lay0us",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lay0us\/CVE-2022-0848-RCE",
"description": null,
"fork": false,
"created_at": "2022-07-15T08:10:38Z",
"updated_at": "2023-07-06T22:02:41Z",
"pushed_at": "2022-07-15T06:29:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

33
2022/CVE-2022-0853.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 468269355,
"name": "CVE-2022-0853",
"full_name": "ByteHackr\/CVE-2022-0853",
"owner": {
"login": "ByteHackr",
"id": 30409831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
"html_url": "https:\/\/github.com\/ByteHackr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ByteHackr\/CVE-2022-0853",
"description": null,
"fork": false,
"created_at": "2022-03-10T09:10:56Z",
"updated_at": "2024-08-12T20:21:26Z",
"pushed_at": "2022-03-12T14:31:08Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"score": 0,
"subscribers_count": 3
}
]

252
2022/CVE-2022-0944.json Normal file
View file

@ -0,0 +1,252 @@
[
{
"id": 854311848,
"name": "CVE-2022-0944",
"full_name": "shhrew\/CVE-2022-0944",
"owner": {
"login": "shhrew",
"id": 179271961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179271961?v=4",
"html_url": "https:\/\/github.com\/shhrew",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shhrew\/CVE-2022-0944",
"description": "A proof of concept exploit for SQLPad RCE (CVE-2022-0944).",
"fork": false,
"created_at": "2024-09-08T23:39:24Z",
"updated_at": "2024-10-26T18:00:04Z",
"pushed_at": "2024-09-08T23:57:27Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 854473439,
"name": "CVE-2022-0944_RCE_Automation",
"full_name": "Philip-Otter\/CVE-2022-0944_RCE_Automation",
"owner": {
"login": "Philip-Otter",
"id": 78989650,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78989650?v=4",
"html_url": "https:\/\/github.com\/Philip-Otter",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Philip-Otter\/CVE-2022-0944_RCE_Automation",
"description": "PoC code written for CVE-2022-0944 to make exploitation easier. Based on information found here: https:\/\/huntr.com\/bounties\/46630727-d923-4444-a421-537ecd63e7fb",
"fork": false,
"created_at": "2024-09-09T08:33:17Z",
"updated_at": "2024-09-10T17:01:28Z",
"pushed_at": "2024-09-10T17:01:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 854781649,
"name": "CVE-2022-0944",
"full_name": "FlojBoj\/CVE-2022-0944",
"owner": {
"login": "FlojBoj",
"id": 170850781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170850781?v=4",
"html_url": "https:\/\/github.com\/FlojBoj",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FlojBoj\/CVE-2022-0944",
"description": "SQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])",
"fork": false,
"created_at": "2024-09-09T19:09:43Z",
"updated_at": "2024-12-09T18:18:45Z",
"pushed_at": "2024-09-10T14:23:01Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 855111543,
"name": "sqlpad-rce-exploit-CVE-2022-0944",
"full_name": "0xRoqeeb\/sqlpad-rce-exploit-CVE-2022-0944",
"owner": {
"login": "0xRoqeeb",
"id": 49154037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49154037?v=4",
"html_url": "https:\/\/github.com\/0xRoqeeb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xRoqeeb\/sqlpad-rce-exploit-CVE-2022-0944",
"description": null,
"fork": false,
"created_at": "2024-09-10T10:26:57Z",
"updated_at": "2025-01-04T18:22:26Z",
"pushed_at": "2024-09-10T16:18:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 856828078,
"name": "CVE-2022-0944_RCE_POC",
"full_name": "Robocopsita\/CVE-2022-0944_RCE_POC",
"owner": {
"login": "Robocopsita",
"id": 181462171,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181462171?v=4",
"html_url": "https:\/\/github.com\/Robocopsita",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Robocopsita\/CVE-2022-0944_RCE_POC",
"description": null,
"fork": false,
"created_at": "2024-09-13T09:30:08Z",
"updated_at": "2024-12-09T18:18:46Z",
"pushed_at": "2024-09-13T09:44:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 872147587,
"name": "CVE-2022-0944",
"full_name": "toneillcodes\/CVE-2022-0944",
"owner": {
"login": "toneillcodes",
"id": 148013535,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148013535?v=4",
"html_url": "https:\/\/github.com\/toneillcodes",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/toneillcodes\/CVE-2022-0944",
"description": "PoC for RCE in SQLPad (CVE-2022-0944)",
"fork": false,
"created_at": "2024-10-13T22:34:09Z",
"updated_at": "2024-10-14T14:08:05Z",
"pushed_at": "2024-10-14T14:08:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cybersecurity"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 878669450,
"name": "SQLPad-RCE-Exploit-CVE-2022-0944",
"full_name": "LipeOzyy\/SQLPad-RCE-Exploit-CVE-2022-0944",
"owner": {
"login": "LipeOzyy",
"id": 151560338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151560338?v=4",
"html_url": "https:\/\/github.com\/LipeOzyy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LipeOzyy\/SQLPad-RCE-Exploit-CVE-2022-0944",
"description": "CVE-2022-0944 Remote Code Execution Exploit",
"fork": false,
"created_at": "2024-10-25T20:31:09Z",
"updated_at": "2024-11-08T00:22:54Z",
"pushed_at": "2024-10-26T14:04:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 879408778,
"name": "SQLPad-6.10.0-Exploit-CVE-2022-0944",
"full_name": "0xDTC\/SQLPad-6.10.0-Exploit-CVE-2022-0944",
"owner": {
"login": "0xDTC",
"id": 95960398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95960398?v=4",
"html_url": "https:\/\/github.com\/0xDTC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xDTC\/SQLPad-6.10.0-Exploit-CVE-2022-0944",
"description": "Refurbish",
"fork": false,
"created_at": "2024-10-27T20:26:47Z",
"updated_at": "2025-01-07T12:53:41Z",
"pushed_at": "2025-01-07T12:53:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-0952.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 675703857,
"name": "CVE-2022-0952",
"full_name": "RandomRobbieBF\/CVE-2022-0952",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2022-0952",
"description": "Sitemap by click5 < 1.0.36 - Unauthenticated Arbitrary Options Update",
"fork": false,
"created_at": "2023-08-07T14:28:11Z",
"updated_at": "2024-08-12T20:32:23Z",
"pushed_at": "2023-08-09T10:14:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}
]

95
2022/CVE-2022-0995.json Normal file
View file

@ -0,0 +1,95 @@
[
{
"id": 474473639,
"name": "CVE-2022-0995",
"full_name": "Bonfee\/CVE-2022-0995",
"owner": {
"login": "Bonfee",
"id": 53857102,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53857102?v=4",
"html_url": "https:\/\/github.com\/Bonfee",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bonfee\/CVE-2022-0995",
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2024-11-19T23:46:23Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 495,
"watchers_count": 495,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 495,
"score": 0,
"subscribers_count": 8
},
{
"id": 612087603,
"name": "CVE-2022-0995",
"full_name": "AndreevSemen\/CVE-2022-0995",
"owner": {
"login": "AndreevSemen",
"id": 43631421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43631421?v=4",
"html_url": "https:\/\/github.com\/AndreevSemen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AndreevSemen\/CVE-2022-0995",
"description": "Реализация средств повышения привилегий в Linux",
"fork": false,
"created_at": "2023-03-10T07:05:45Z",
"updated_at": "2023-03-11T02:46:18Z",
"pushed_at": "2023-03-10T11:29:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 738494648,
"name": "CVE-2022-0995",
"full_name": "1nzag\/CVE-2022-0995",
"owner": {
"login": "1nzag",
"id": 29899371,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29899371?v=4",
"html_url": "https:\/\/github.com\/1nzag",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/1nzag\/CVE-2022-0995",
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2024-01-03T11:03:45Z",
"updated_at": "2024-01-03T11:20:25Z",
"pushed_at": "2024-01-03T11:12:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-1011.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 654390552,
"name": "CVE-2022-1011",
"full_name": "xkaneiki\/CVE-2022-1011",
"owner": {
"login": "xkaneiki",
"id": 26479696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26479696?v=4",
"html_url": "https:\/\/github.com\/xkaneiki",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xkaneiki\/CVE-2022-1011",
"description": "这个漏洞感觉只能信息泄露?",
"fork": false,
"created_at": "2023-06-16T03:02:38Z",
"updated_at": "2024-02-21T03:54:26Z",
"pushed_at": "2023-06-16T04:13:42Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-1012.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 564211865,
"name": "Linux-4.19.72_CVE-2022-1012",
"full_name": "nanopathi\/Linux-4.19.72_CVE-2022-1012",
"owner": {
"login": "nanopathi",
"id": 26024136,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4",
"html_url": "https:\/\/github.com\/nanopathi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nanopathi\/Linux-4.19.72_CVE-2022-1012",
"description": null,
"fork": false,
"created_at": "2022-11-10T08:30:12Z",
"updated_at": "2022-11-10T08:30:12Z",
"pushed_at": "2022-11-10T08:30:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,35 @@
[
{
"id": 476936527,
"name": "CVE-2022-1015",
"full_name": "pqlx\/CVE-2022-1015",
"owner": {
"login": "pqlx",
"id": 39501965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39501965?v=4",
"html_url": "https:\/\/github.com\/pqlx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pqlx\/CVE-2022-1015",
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2024-12-23T23:38:25Z",
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 202,
"score": 0,
"subscribers_count": 7
},
{
"id": 477188610,
"name": "CVE-2022-1015-1016",
@ -29,5 +60,253 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 526318455,
"name": "bob_kern_exp1",
"full_name": "shuttterman\/bob_kern_exp1",
"owner": {
"login": "shuttterman",
"id": 59496260,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59496260?v=4",
"html_url": "https:\/\/github.com\/shuttterman",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shuttterman\/bob_kern_exp1",
"description": "CVE-2022-1015",
"fork": false,
"created_at": "2022-08-18T17:54:49Z",
"updated_at": "2022-08-07T06:18:16Z",
"pushed_at": "2022-08-06T12:40:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 556222673,
"name": "CVE-2022-1015",
"full_name": "ysanatomic\/CVE-2022-1015",
"owner": {
"login": "ysanatomic",
"id": 41269324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
"html_url": "https:\/\/github.com\/ysanatomic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ysanatomic\/CVE-2022-1015",
"description": "A write-up and LPE PoC of an OOB read and write vulnerability in the Linux Kernel.",
"fork": false,
"created_at": "2022-10-23T10:57:43Z",
"updated_at": "2024-03-29T09:10:30Z",
"pushed_at": "2022-11-12T06:58:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 600659828,
"name": "CVE-2022-1015",
"full_name": "wlswotmd\/CVE-2022-1015",
"owner": {
"login": "wlswotmd",
"id": 80761172,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80761172?v=4",
"html_url": "https:\/\/github.com\/wlswotmd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wlswotmd\/CVE-2022-1015",
"description": null,
"fork": false,
"created_at": "2023-02-12T07:06:40Z",
"updated_at": "2023-02-12T07:09:56Z",
"pushed_at": "2023-04-26T09:40:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 610271922,
"name": "CVE-2022-1015",
"full_name": "delsploit\/CVE-2022-1015",
"owner": {
"login": "delsploit",
"id": 127108998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127108998?v=4",
"html_url": "https:\/\/github.com\/delsploit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/delsploit\/CVE-2022-1015",
"description": null,
"fork": false,
"created_at": "2023-03-06T12:50:43Z",
"updated_at": "2023-03-06T12:51:55Z",
"pushed_at": "2023-03-06T12:51:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 617380197,
"name": "CVE-2022-1015",
"full_name": "pivik271\/CVE-2022-1015",
"owner": {
"login": "pivik271",
"id": 82135340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82135340?v=4",
"html_url": "https:\/\/github.com\/pivik271",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pivik271\/CVE-2022-1015",
"description": null,
"fork": false,
"created_at": "2023-03-22T09:16:58Z",
"updated_at": "2023-04-25T01:05:15Z",
"pushed_at": "2023-03-22T09:20:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 675264070,
"name": "CVE-2022-1015",
"full_name": "more-kohii\/CVE-2022-1015",
"owner": {
"login": "more-kohii",
"id": 87258637,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87258637?v=4",
"html_url": "https:\/\/github.com\/more-kohii",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/more-kohii\/CVE-2022-1015",
"description": "Linux Kernel 1-Day Analysis & Exploitation",
"fork": false,
"created_at": "2023-08-06T10:46:49Z",
"updated_at": "2024-07-02T09:40:21Z",
"pushed_at": "2023-08-08T00:42:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 698913839,
"name": "CVE-2022-1015",
"full_name": "0range1337\/CVE-2022-1015",
"owner": {
"login": "0range1337",
"id": 146405672,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146405672?v=4",
"html_url": "https:\/\/github.com\/0range1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0range1337\/CVE-2022-1015",
"description": null,
"fork": false,
"created_at": "2023-10-01T11:18:48Z",
"updated_at": "2023-10-01T11:18:48Z",
"pushed_at": "2024-03-18T12:45:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 872919160,
"name": "CVE-2022-1015",
"full_name": "seadragnol\/CVE-2022-1015",
"owner": {
"login": "seadragnol",
"id": 55611051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55611051?v=4",
"html_url": "https:\/\/github.com\/seadragnol",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/seadragnol\/CVE-2022-1015",
"description": null,
"fork": false,
"created_at": "2024-10-15T09:51:06Z",
"updated_at": "2024-10-15T10:09:11Z",
"pushed_at": "2024-10-15T10:09:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

95
2022/CVE-2022-1026.json Normal file
View file

@ -0,0 +1,95 @@
[
{
"id": 614407734,
"name": "kyocera-cve-2022-1026",
"full_name": "ac3lives\/kyocera-cve-2022-1026",
"owner": {
"login": "ac3lives",
"id": 26721330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26721330?v=4",
"html_url": "https:\/\/github.com\/ac3lives",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ac3lives\/kyocera-cve-2022-1026",
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
"fork": false,
"created_at": "2023-03-15T14:23:41Z",
"updated_at": "2024-12-14T13:37:59Z",
"pushed_at": "2023-03-15T14:33:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 666781357,
"name": "nmap-printer-nse-scripts",
"full_name": "flamebarke\/nmap-printer-nse-scripts",
"owner": {
"login": "flamebarke",
"id": 39644720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39644720?v=4",
"html_url": "https:\/\/github.com\/flamebarke",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/flamebarke\/nmap-printer-nse-scripts",
"description": "NSE port of CVE-2022-1026 exploit for mass identification and exploitation",
"fork": false,
"created_at": "2023-07-15T14:56:55Z",
"updated_at": "2024-04-11T01:51:49Z",
"pushed_at": "2023-07-15T14:59:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 814582796,
"name": "kygocera",
"full_name": "r0lh\/kygocera",
"owner": {
"login": "r0lh",
"id": 51697374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4",
"html_url": "https:\/\/github.com\/r0lh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0lh\/kygocera",
"description": "Improved Golang Version of Rapid7 PoC for CVE-2022-1026",
"fork": false,
"created_at": "2024-06-13T09:40:02Z",
"updated_at": "2024-06-13T12:18:39Z",
"pushed_at": "2024-06-13T12:18:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-10270.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 587225929,
"name": "sunflower_exp",
"full_name": "baimaobg\/sunflower_exp",
"owner": {
"login": "baimaobg",
"id": 110097762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110097762?v=4",
"html_url": "https:\/\/github.com\/baimaobg",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/baimaobg\/sunflower_exp",
"description": "Sunflower CVE-2022-10270 vulnerability exploitation tool",
"fork": false,
"created_at": "2023-01-10T08:56:15Z",
"updated_at": "2024-10-31T04:35:59Z",
"pushed_at": "2023-01-10T10:27:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,5 +29,191 @@
"watchers": 16,
"score": 0,
"subscribers_count": 3
},
{
"id": 541212587,
"name": "Sophos-Vulnerability",
"full_name": "jam620\/Sophos-Vulnerability",
"owner": {
"login": "jam620",
"id": 17382838,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17382838?v=4",
"html_url": "https:\/\/github.com\/jam620",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jam620\/Sophos-Vulnerability",
"description": "CVE-2022-1040",
"fork": false,
"created_at": "2022-09-25T15:15:01Z",
"updated_at": "2024-06-21T00:10:24Z",
"pushed_at": "2022-09-25T15:15:44Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 547354997,
"name": "cve-2022-1040",
"full_name": "Keith-amateur\/cve-2022-1040",
"owner": {
"login": "Keith-amateur",
"id": 83109029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83109029?v=4",
"html_url": "https:\/\/github.com\/Keith-amateur",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Keith-amateur\/cve-2022-1040",
"description": "Save the trouble to open the burpsuite...",
"fork": false,
"created_at": "2022-10-07T14:44:42Z",
"updated_at": "2022-10-27T18:19:10Z",
"pushed_at": "2022-10-19T14:21:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 559654558,
"name": "CVE-2022-1040",
"full_name": "jackson5sec\/CVE-2022-1040",
"owner": {
"login": "jackson5sec",
"id": 17192323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17192323?v=4",
"html_url": "https:\/\/github.com\/jackson5sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jackson5sec\/CVE-2022-1040",
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-10-30T19:20:57Z",
"updated_at": "2024-05-06T09:40:29Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 586568152,
"name": "CVE-2022-1040",
"full_name": "michealadams30\/CVE-2022-1040",
"owner": {
"login": "michealadams30",
"id": 113975732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
"html_url": "https:\/\/github.com\/michealadams30",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/michealadams30\/CVE-2022-1040",
"description": "Sophos EXploit",
"fork": false,
"created_at": "2023-01-08T15:46:00Z",
"updated_at": "2023-01-08T15:46:00Z",
"pushed_at": "2023-01-08T15:48:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 696656893,
"name": "CVE-2022-1040",
"full_name": "Cyb3rEnthusiast\/CVE-2022-1040",
"owner": {
"login": "Cyb3rEnthusiast",
"id": 143934696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143934696?v=4",
"html_url": "https:\/\/github.com\/Cyb3rEnthusiast",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cyb3rEnthusiast\/CVE-2022-1040",
"description": "New exploitation of 2020 Sophos vuln",
"fork": false,
"created_at": "2023-09-26T07:26:42Z",
"updated_at": "2023-09-26T07:27:10Z",
"pushed_at": "2023-09-26T07:29:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752960539,
"name": "CVE-2022-1040",
"full_name": "xMr110\/CVE-2022-1040",
"owner": {
"login": "xMr110",
"id": 42313754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42313754?v=4",
"html_url": "https:\/\/github.com\/xMr110",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xMr110\/CVE-2022-1040",
"description": null,
"fork": false,
"created_at": "2024-02-05T07:35:41Z",
"updated_at": "2024-02-05T07:35:42Z",
"pushed_at": "2024-02-05T07:36:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-1068.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 586786744,
"name": "CVE-2022-1068",
"full_name": "webraybtl\/CVE-2022-1068",
"owner": {
"login": "webraybtl",
"id": 95903558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95903558?v=4",
"html_url": "https:\/\/github.com\/webraybtl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/webraybtl\/CVE-2022-1068",
"description": "Modbus Slave缓冲区溢出漏洞CVE-2022-1068分析与复现",
"fork": false,
"created_at": "2023-01-09T08:23:37Z",
"updated_at": "2023-09-05T10:24:54Z",
"pushed_at": "2023-07-06T06:36:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-1096.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 475602956,
"name": "Chrome-and-Edge-Version-Dumper",
"full_name": "Mav3r1ck0x1\/Chrome-and-Edge-Version-Dumper",
"owner": {
"login": "Mav3r1ck0x1",
"id": 55414177,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55414177?v=4",
"html_url": "https:\/\/github.com\/Mav3r1ck0x1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mav3r1ck0x1\/Chrome-and-Edge-Version-Dumper",
"description": "Powershell script that dumps Chrome and Edge version to a text file in order to determine if you need to update due to CVE-2022-1096",
"fork": false,
"created_at": "2022-03-29T20:06:33Z",
"updated_at": "2024-08-12T20:21:58Z",
"pushed_at": "2022-03-30T17:59:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-1119.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 519086294,
"name": "CVE-2022-1119",
"full_name": "z92g\/CVE-2022-1119",
"owner": {
"login": "z92g",
"id": 108780847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108780847?v=4",
"html_url": "https:\/\/github.com\/z92g",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z92g\/CVE-2022-1119",
"description": "WordPress Simple File List FileRead POC",
"fork": false,
"created_at": "2022-07-29T05:04:26Z",
"updated_at": "2023-04-27T05:22:13Z",
"pushed_at": "2022-07-30T08:12:45Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,5 +29,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 563734755,
"name": "CVE-2022-1162",
"full_name": "ipsBruno\/CVE-2022-1162",
"owner": {
"login": "ipsBruno",
"id": 6839604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6839604?v=4",
"html_url": "https:\/\/github.com\/ipsBruno",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ipsBruno\/CVE-2022-1162",
"description": "A simple tool to enumerate users in gitlab",
"fork": false,
"created_at": "2022-11-09T08:14:28Z",
"updated_at": "2024-11-04T00:36:43Z",
"pushed_at": "2022-11-09T09:30:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-1203.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 674165540,
"name": "CVE-2022-1203",
"full_name": "RandomRobbieBF\/CVE-2022-1203",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2022-1203",
"description": "Content Mask < 1.8.4 - Subscriber+ Arbitrary Options Update",
"fork": false,
"created_at": "2023-08-03T09:39:15Z",
"updated_at": "2024-08-12T20:32:20Z",
"pushed_at": "2023-08-03T09:43:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-1227.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 622123920,
"name": "CVE-2022-1227_Exploit",
"full_name": "iridium-soda\/CVE-2022-1227_Exploit",
"owner": {
"login": "iridium-soda",
"id": 32727642,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32727642?v=4",
"html_url": "https:\/\/github.com\/iridium-soda",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iridium-soda\/CVE-2022-1227_Exploit",
"description": "A script for exploiting CVE-2022-1227",
"fork": false,
"created_at": "2023-04-01T07:28:15Z",
"updated_at": "2024-06-20T08:23:31Z",
"pushed_at": "2023-04-13T12:36:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -97,5 +97,67 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 531401741,
"name": "CVE-2022-1292",
"full_name": "greek0x0\/CVE-2022-1292",
"owner": {
"login": "greek0x0",
"id": 104328056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104328056?v=4",
"html_url": "https:\/\/github.com\/greek0x0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/greek0x0\/CVE-2022-1292",
"description": "OpenSSL",
"fork": false,
"created_at": "2022-09-01T07:00:00Z",
"updated_at": "2023-07-06T22:18:33Z",
"pushed_at": "2022-09-01T07:00:56Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 536322502,
"name": "CVE-2022-1292",
"full_name": "und3sc0n0c1d0\/CVE-2022-1292",
"owner": {
"login": "und3sc0n0c1d0",
"id": 32236059,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
"html_url": "https:\/\/github.com\/und3sc0n0c1d0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/und3sc0n0c1d0\/CVE-2022-1292",
"description": "Automation to validate the impact of the vulnerability CVE-2022-1292 on a specific system.",
"fork": false,
"created_at": "2022-09-13T22:01:05Z",
"updated_at": "2024-10-26T07:16:57Z",
"pushed_at": "2022-12-09T06:58:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -97,5 +97,98 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 594762176,
"name": "CVE-2022-1329",
"full_name": "dexit\/CVE-2022-1329",
"owner": {
"login": "dexit",
"id": 6205151,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
"html_url": "https:\/\/github.com\/dexit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
"description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-29T15:13:34Z",
"updated_at": "2023-02-20T12:39:20Z",
"pushed_at": "2022-12-28T12:11:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 818198561,
"name": "CVE-2022-1329",
"full_name": "phanthibichtram12\/CVE-2022-1329",
"owner": {
"login": "phanthibichtram12",
"id": 95855503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95855503?v=4",
"html_url": "https:\/\/github.com\/phanthibichtram12",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/phanthibichtram12\/CVE-2022-1329",
"description": null,
"fork": false,
"created_at": "2024-06-21T10:05:03Z",
"updated_at": "2024-06-21T10:38:10Z",
"pushed_at": "2024-06-21T10:38:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 871297880,
"name": "CVE-2022-1329",
"full_name": "AgustinESI\/CVE-2022-1329",
"owner": {
"login": "AgustinESI",
"id": 73068658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73068658?v=4",
"html_url": "https:\/\/github.com\/AgustinESI",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AgustinESI\/CVE-2022-1329",
"description": null,
"fork": false,
"created_at": "2024-10-11T16:57:20Z",
"updated_at": "2024-12-20T10:58:12Z",
"pushed_at": "2024-12-20T10:58:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-1364.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 722060198,
"name": "cve-2022-1364",
"full_name": "A1Lin\/cve-2022-1364",
"owner": {
"login": "A1Lin",
"id": 22007644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22007644?v=4",
"html_url": "https:\/\/github.com\/A1Lin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/A1Lin\/cve-2022-1364",
"description": null,
"fork": false,
"created_at": "2023-11-22T10:55:34Z",
"updated_at": "2024-02-12T08:33:55Z",
"pushed_at": "2023-11-22T11:09:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

164
2022/CVE-2022-1386.json Normal file
View file

@ -0,0 +1,164 @@
[
{
"id": 607455905,
"name": "CVE-2022-1386",
"full_name": "ardzz\/CVE-2022-1386",
"owner": {
"login": "ardzz",
"id": 38525912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38525912?v=4",
"html_url": "https:\/\/github.com\/ardzz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ardzz\/CVE-2022-1386",
"description": null,
"fork": false,
"created_at": "2023-02-28T02:08:59Z",
"updated_at": "2024-09-21T12:00:44Z",
"pushed_at": "2023-03-09T16:25:57Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 609709956,
"name": "fubucker",
"full_name": "im-hanzou\/fubucker",
"owner": {
"login": "im-hanzou",
"id": 61415393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61415393?v=4",
"html_url": "https:\/\/github.com\/im-hanzou",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/im-hanzou\/fubucker",
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-1386 - Fusion Builder < 3.6.2 - Unauthenticated SSRF",
"fork": false,
"created_at": "2023-03-05T01:46:41Z",
"updated_at": "2024-06-04T12:12:38Z",
"pushed_at": "2023-03-08T18:25:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"avada",
"checker",
"cve-2022-1386",
"fusion-builder",
"theme-fusion",
"wordpress"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 697749113,
"name": "CVE-2022-1386-Mass_Vulnerability",
"full_name": "zycoder0day\/CVE-2022-1386-Mass_Vulnerability",
"owner": {
"login": "zycoder0day",
"id": 31403046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31403046?v=4",
"html_url": "https:\/\/github.com\/zycoder0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zycoder0day\/CVE-2022-1386-Mass_Vulnerability",
"description": null,
"fork": false,
"created_at": "2023-09-28T11:55:43Z",
"updated_at": "2023-09-28T17:30:07Z",
"pushed_at": "2023-09-28T11:56:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 768474131,
"name": "CVE-2022-1386",
"full_name": "satyasai1460\/CVE-2022-1386",
"owner": {
"login": "satyasai1460",
"id": 68277833,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68277833?v=4",
"html_url": "https:\/\/github.com\/satyasai1460",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/satyasai1460\/CVE-2022-1386",
"description": null,
"fork": false,
"created_at": "2024-03-07T06:35:33Z",
"updated_at": "2024-03-07T14:37:43Z",
"pushed_at": "2024-03-07T06:54:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 898463801,
"name": "CVE-2022-1386",
"full_name": "lamcodeofpwnosec\/CVE-2022-1386",
"owner": {
"login": "lamcodeofpwnosec",
"id": 47277287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47277287?v=4",
"html_url": "https:\/\/github.com\/lamcodeofpwnosec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lamcodeofpwnosec\/CVE-2022-1386",
"description": "Fusion Builder < 3.6.2 - Unauthenticated SSRF",
"fork": false,
"created_at": "2024-12-04T12:48:53Z",
"updated_at": "2024-12-04T12:51:24Z",
"pushed_at": "2024-12-04T12:51:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1575,5 +1575,551 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 509548569,
"name": "CVE-2022-1388_refresh",
"full_name": "Luchoane\/CVE-2022-1388_refresh",
"owner": {
"login": "Luchoane",
"id": 40374879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
"html_url": "https:\/\/github.com\/Luchoane",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
"fork": false,
"created_at": "2022-07-01T18:08:50Z",
"updated_at": "2022-07-07T19:22:09Z",
"pushed_at": "2022-07-01T20:04:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 510239425,
"name": "CVE-2022-1388",
"full_name": "jbharucha05\/CVE-2022-1388",
"owner": {
"login": "jbharucha05",
"id": 13020621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
"html_url": "https:\/\/github.com\/jbharucha05",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
"description": "CVE-2022-1388, bypassing iControl REST authentication",
"fork": false,
"created_at": "2022-07-04T06:31:56Z",
"updated_at": "2022-07-04T07:08:22Z",
"pushed_at": "2022-07-04T10:37:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"f5-big-ip-icontrol-rest-rce",
"f5-bigip"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 557286411,
"name": "CVE-2022-1388",
"full_name": "On-Cyber-War\/CVE-2022-1388",
"owner": {
"login": "On-Cyber-War",
"id": 114944421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114944421?v=4",
"html_url": "https:\/\/github.com\/On-Cyber-War",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/On-Cyber-War\/CVE-2022-1388",
"description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-10-25T12:15:31Z",
"updated_at": "2022-10-25T12:15:31Z",
"pushed_at": "2022-10-25T12:23:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 557293075,
"name": "CVE-2022-1388",
"full_name": "forktheplanet\/CVE-2022-1388",
"owner": {
"login": "forktheplanet",
"id": 61333042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61333042?v=4",
"html_url": "https:\/\/github.com\/forktheplanet",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/forktheplanet\/CVE-2022-1388",
"description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-10-25T12:29:54Z",
"updated_at": "2023-08-14T21:05:37Z",
"pushed_at": "2023-05-19T05:55:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 572343924,
"name": "CVE-2022-1388",
"full_name": "revanmalang\/CVE-2022-1388",
"owner": {
"login": "revanmalang",
"id": 91707288,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91707288?v=4",
"html_url": "https:\/\/github.com\/revanmalang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/revanmalang\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-11-30T04:06:56Z",
"updated_at": "2022-12-16T12:56:47Z",
"pushed_at": "2022-11-30T04:07:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 575059061,
"name": "CVE-2022-1388",
"full_name": "amitlttwo\/CVE-2022-1388",
"owner": {
"login": "amitlttwo",
"id": 55759090,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55759090?v=4",
"html_url": "https:\/\/github.com\/amitlttwo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amitlttwo\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-12-06T16:59:56Z",
"updated_at": "2023-02-07T11:10:10Z",
"pushed_at": "2023-02-07T11:02:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 576167094,
"name": "CVE-2022-1388",
"full_name": "M4fiaB0y\/CVE-2022-1388",
"owner": {
"login": "M4fiaB0y",
"id": 95071636,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95071636?v=4",
"html_url": "https:\/\/github.com\/M4fiaB0y",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/M4fiaB0y\/CVE-2022-1388",
"description": "Scan IP ranges for IP's vulnerable to the F5 Big IP exploit (CVE-2022-1388)",
"fork": false,
"created_at": "2022-12-09T06:51:21Z",
"updated_at": "2022-12-09T06:52:56Z",
"pushed_at": "2022-12-09T06:51:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 580855703,
"name": "CVE-2022-1388",
"full_name": "devengpk\/CVE-2022-1388",
"owner": {
"login": "devengpk",
"id": 41437020,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41437020?v=4",
"html_url": "https:\/\/github.com\/devengpk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/devengpk\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-12-21T16:11:48Z",
"updated_at": "2023-07-06T22:42:46Z",
"pushed_at": "2022-12-21T17:35:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 581717116,
"name": "CVE-2022-1388",
"full_name": "vaelwolf\/CVE-2022-1388",
"owner": {
"login": "vaelwolf",
"id": 58718722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58718722?v=4",
"html_url": "https:\/\/github.com\/vaelwolf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vaelwolf\/CVE-2022-1388",
"description": "-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams",
"fork": false,
"created_at": "2022-12-24T03:59:24Z",
"updated_at": "2024-04-08T13:11:02Z",
"pushed_at": "2022-12-25T02:43:04Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"exploit",
"pcap",
"reverse-shell"
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 627124485,
"name": "tippa-my-tongue",
"full_name": "j-baines\/tippa-my-tongue",
"owner": {
"login": "j-baines",
"id": 113205286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113205286?v=4",
"html_url": "https:\/\/github.com\/j-baines",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/j-baines\/tippa-my-tongue",
"description": "F5 BIG-IP Exploit Using CVE-2022-1388 and CVE-2022-41800",
"fork": false,
"created_at": "2023-04-12T20:46:03Z",
"updated_at": "2023-04-14T17:24:44Z",
"pushed_at": "2023-04-12T21:03:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"cve-2022-41800"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 665620716,
"name": "F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study",
"full_name": "SudeepaShiranthaka\/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study",
"owner": {
"login": "SudeepaShiranthaka",
"id": 58376903,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58376903?v=4",
"html_url": "https:\/\/github.com\/SudeepaShiranthaka",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SudeepaShiranthaka\/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study",
"description": "F5-BIG-IP Remote Code Execution Vulnerability CVE-2022-1388: A Case Study",
"fork": false,
"created_at": "2023-07-12T15:53:33Z",
"updated_at": "2023-07-12T15:53:34Z",
"pushed_at": "2023-07-12T15:54:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 673481578,
"name": "refresh",
"full_name": "battleofthebots\/refresh",
"owner": {
"login": "battleofthebots",
"id": 122462368,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122462368?v=4",
"html_url": "https:\/\/github.com\/battleofthebots",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/battleofthebots\/refresh",
"description": "CVE-2022-1388 - F5 Router RCE Replica",
"fork": false,
"created_at": "2023-08-01T18:12:52Z",
"updated_at": "2023-10-16T10:21:39Z",
"pushed_at": "2023-10-11T22:07:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 738523749,
"name": "CVE-2022-1388-exploit",
"full_name": "nvk0x\/CVE-2022-1388-exploit",
"owner": {
"login": "nvk0x",
"id": 22233431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22233431?v=4",
"html_url": "https:\/\/github.com\/nvk0x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nvk0x\/CVE-2022-1388-exploit",
"description": "exploit poc",
"fork": false,
"created_at": "2024-01-03T12:28:06Z",
"updated_at": "2024-06-02T06:33:07Z",
"pushed_at": "2024-01-03T12:28:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 741149336,
"name": "CVE-2022-1388",
"full_name": "nico989\/CVE-2022-1388",
"owner": {
"login": "nico989",
"id": 55981787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55981787?v=4",
"html_url": "https:\/\/github.com\/nico989",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nico989\/CVE-2022-1388",
"description": "PoC for CVE-2022-1388 affecting F5 BIG-IP.",
"fork": false,
"created_at": "2024-01-09T19:52:36Z",
"updated_at": "2024-03-23T10:44:09Z",
"pushed_at": "2024-01-12T22:42:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 793842153,
"name": "CVE-2022-1388",
"full_name": "gotr00t0day\/CVE-2022-1388",
"owner": {
"login": "gotr00t0day",
"id": 48636787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4",
"html_url": "https:\/\/github.com\/gotr00t0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2022-1388",
"description": "A remote code execution vulnerability exists in the iControl REST API feature of F5's BIG-IP product. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands with root privileges.",
"fork": false,
"created_at": "2024-04-30T01:10:05Z",
"updated_at": "2024-11-08T09:40:55Z",
"pushed_at": "2024-04-30T01:12:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 856503073,
"name": "CVE-2022-1388",
"full_name": "impost0r\/CVE-2022-1388",
"owner": {
"login": "impost0r",
"id": 16020669,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16020669?v=4",
"html_url": "https:\/\/github.com\/impost0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/impost0r\/CVE-2022-1388",
"description": "Old weaponized CVE-2022-1388 exploit.",
"fork": false,
"created_at": "2024-09-12T17:25:23Z",
"updated_at": "2024-09-12T17:27:23Z",
"pushed_at": "2024-09-12T17:27:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892945436,
"name": "cve-2022-1388-poc",
"full_name": "XiaomingX\/cve-2022-1388-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2022-1388-poc",
"description": "CVE-2022-1388 是一个影响 F5 BIG-IP 应用交付控制器ADC的严重漏洞。以下是对其原理和危害的详细介绍",
"fork": false,
"created_at": "2024-11-23T05:39:26Z",
"updated_at": "2024-12-08T18:36:57Z",
"pushed_at": "2024-11-23T05:41:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exp",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-1421.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 513177414,
"name": "CVE-2022-1421",
"full_name": "nb1b3k\/CVE-2022-1421",
"owner": {
"login": "nb1b3k",
"id": 35418661,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35418661?v=4",
"html_url": "https:\/\/github.com\/nb1b3k",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nb1b3k\/CVE-2022-1421",
"description": null,
"fork": false,
"created_at": "2022-07-12T14:34:48Z",
"updated_at": "2024-01-09T09:55:01Z",
"pushed_at": "2022-11-01T12:44:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-1442.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 674189234,
"name": "CVE-2022-1442",
"full_name": "RandomRobbieBF\/CVE-2022-1442",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2022-1442",
"description": "WordPress Plugin Metform <= 2.1.3 - Improper Access Control Allowing Unauthenticated Sensitive Information Disclosure",
"fork": false,
"created_at": "2023-08-03T10:47:28Z",
"updated_at": "2024-08-12T20:32:20Z",
"pushed_at": "2023-08-03T10:49:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

64
2022/CVE-2022-1471.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 608740009,
"name": "SnakeYAML-CVE-2022-1471-POC",
"full_name": "1fabunicorn\/SnakeYAML-CVE-2022-1471-POC",
"owner": {
"login": "1fabunicorn",
"id": 19752126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19752126?v=4",
"html_url": "https:\/\/github.com\/1fabunicorn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/1fabunicorn\/SnakeYAML-CVE-2022-1471-POC",
"description": "Code for veracode blog",
"fork": false,
"created_at": "2023-03-02T16:33:02Z",
"updated_at": "2024-07-19T18:50:15Z",
"pushed_at": "2023-03-02T16:50:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 637852784,
"name": "snakeyaml_cve_poc",
"full_name": "falconkei\/snakeyaml_cve_poc",
"owner": {
"login": "falconkei",
"id": 19479860,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19479860?v=4",
"html_url": "https:\/\/github.com\/falconkei",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/falconkei\/snakeyaml_cve_poc",
"description": "SnakeYAML-CVE-2022-1471-POC",
"fork": false,
"created_at": "2023-05-08T14:46:22Z",
"updated_at": "2024-03-11T18:38:49Z",
"pushed_at": "2023-12-24T13:26:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-14733.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 580686451,
"name": "CVE-2022-14733",
"full_name": "hkzck\/CVE-2022-14733",
"owner": {
"login": "hkzck",
"id": 48936012,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48936012?v=4",
"html_url": "https:\/\/github.com\/hkzck",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hkzck\/CVE-2022-14733",
"description": null,
"fork": false,
"created_at": "2022-12-21T07:28:12Z",
"updated_at": "2022-12-21T07:28:12Z",
"pushed_at": "2022-12-21T07:30:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-1565.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 818221073,
"name": "CVE-2022-1565",
"full_name": "phanthibichtram12\/CVE-2022-1565",
"owner": {
"login": "phanthibichtram12",
"id": 95855503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95855503?v=4",
"html_url": "https:\/\/github.com\/phanthibichtram12",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/phanthibichtram12\/CVE-2022-1565",
"description": null,
"fork": false,
"created_at": "2024-06-21T11:08:26Z",
"updated_at": "2024-06-21T11:10:04Z",
"pushed_at": "2024-06-21T11:10:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -91,5 +91,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 631257182,
"name": "cve-2022-1609-exploit",
"full_name": "w4r3s\/cve-2022-1609-exploit",
"owner": {
"login": "w4r3s",
"id": 119853210,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119853210?v=4",
"html_url": "https:\/\/github.com\/w4r3s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/w4r3s\/cve-2022-1609-exploit",
"description": "Exploit for CVE-2022-1609 WordPress Weblizar Backdoor.",
"fork": false,
"created_at": "2023-04-22T12:51:09Z",
"updated_at": "2023-07-05T12:08:37Z",
"pushed_at": "2023-04-22T12:51:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-1679.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 557313564,
"name": "-Detection-and-Mitigation-for-CVE-2022-1679",
"full_name": "EkamSinghWalia\/-Detection-and-Mitigation-for-CVE-2022-1679",
"owner": {
"login": "EkamSinghWalia",
"id": 106553324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
"html_url": "https:\/\/github.com\/EkamSinghWalia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/EkamSinghWalia\/-Detection-and-Mitigation-for-CVE-2022-1679",
"description": null,
"fork": false,
"created_at": "2022-10-25T13:15:20Z",
"updated_at": "2022-11-11T16:23:49Z",
"pushed_at": "2022-10-25T13:17:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 690703239,
"name": "Detection-and-Mitigation-for-CVE-2022-1679",
"full_name": "ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
"owner": {
"login": "ov3rwatch",
"id": 23441286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23441286?v=4",
"html_url": "https:\/\/github.com\/ov3rwatch",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
"description": null,
"fork": false,
"created_at": "2023-09-12T17:47:01Z",
"updated_at": "2023-09-12T17:48:39Z",
"pushed_at": "2023-09-12T17:48:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-1802.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 526810658,
"name": "CVE-2022-1802",
"full_name": "mistymntncop\/CVE-2022-1802",
"owner": {
"login": "mistymntncop",
"id": 105329747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105329747?v=4",
"html_url": "https:\/\/github.com\/mistymntncop",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mistymntncop\/CVE-2022-1802",
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2024-10-20T03:46:31Z",
"pushed_at": "2023-02-20T23:29:21Z",
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 153,
"score": 0,
"subscribers_count": 12
}
]

View file

@ -29,5 +29,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 529194635,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20007",
"full_name": "pazhanivel07\/frameworks_base_AOSP10_r33_CVE-2022-20007",
"owner": {
"login": "pazhanivel07",
"id": 97434034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
"html_url": "https:\/\/github.com\/pazhanivel07",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pazhanivel07\/frameworks_base_AOSP10_r33_CVE-2022-20007",
"description": null,
"fork": false,
"created_at": "2022-08-26T09:25:36Z",
"updated_at": "2023-03-27T01:17:22Z",
"pushed_at": "2022-08-26T09:37:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20009.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 675254019,
"name": "android-gadget",
"full_name": "szymonh\/android-gadget",
"owner": {
"login": "szymonh",
"id": 12231135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12231135?v=4",
"html_url": "https:\/\/github.com\/szymonh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/szymonh\/android-gadget",
"description": "CVE-2022-20009 - Description and sample exploit for Android USB Gadgets",
"fork": false,
"created_at": "2023-08-06T10:01:32Z",
"updated_at": "2024-11-30T08:30:37Z",
"pushed_at": "2023-08-06T11:03:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-20120.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 905192929,
"name": "ABL_ROP",
"full_name": "boredpentester\/ABL_ROP",
"owner": {
"login": "boredpentester",
"id": 47897567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47897567?v=4",
"html_url": "https:\/\/github.com\/boredpentester",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/boredpentester\/ABL_ROP",
"description": "Experimenting with CVE-2022-20120 (Pixel Bootloader \/ ABL) using Unicorn, derived from eShard's emulator at https:\/\/github.com\/eshard\/pixel6-boot\/blob\/main\/run_abl_public.ipynb",
"fork": false,
"created_at": "2024-12-18T10:44:34Z",
"updated_at": "2024-12-19T01:13:59Z",
"pushed_at": "2024-12-18T11:00:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20126.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 534168096,
"name": "packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
"full_name": "Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
"description": null,
"fork": false,
"created_at": "2022-09-08T10:51:13Z",
"updated_at": "2022-10-11T12:56:48Z",
"pushed_at": "2022-09-08T10:56:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20128.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 534637282,
"name": "CVE-2022-20128",
"full_name": "irsl\/CVE-2022-20128",
"owner": {
"login": "irsl",
"id": 6357121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6357121?v=4",
"html_url": "https:\/\/github.com\/irsl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/irsl\/CVE-2022-20128",
"description": "Android Debug Bridge (adb) was vulnerable to directory traversal attacks that could have been mounted by rogue\/compromised adb daemons during an adb pull operation.",
"fork": false,
"created_at": "2022-09-09T12:40:21Z",
"updated_at": "2024-09-04T07:29:05Z",
"pushed_at": "2022-09-09T12:42:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 2
}
]

33
2022/CVE-2022-20130.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 509461641,
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"description": null,
"fork": false,
"created_at": "2022-07-01T13:16:14Z",
"updated_at": "2022-07-01T13:25:04Z",
"pushed_at": "2022-07-01T13:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-20138.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 515158255,
"name": "ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138",
"full_name": "ShaikUsaf\/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138",
"description": null,
"fork": false,
"created_at": "2022-07-18T11:36:28Z",
"updated_at": "2022-07-18T11:38:43Z",
"pushed_at": "2022-07-18T11:39:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 563392111,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20138",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20138",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20138",
"description": null,
"fork": false,
"created_at": "2022-11-08T14:16:45Z",
"updated_at": "2023-03-27T01:35:23Z",
"pushed_at": "2022-11-08T14:26:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20140.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 778237386,
"name": "system_bt_aosp10_cve-2022-20140",
"full_name": "RenukaSelvar\/system_bt_aosp10_cve-2022-20140",
"owner": {
"login": "RenukaSelvar",
"id": 165150685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165150685?v=4",
"html_url": "https:\/\/github.com\/RenukaSelvar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RenukaSelvar\/system_bt_aosp10_cve-2022-20140",
"description": null,
"fork": false,
"created_at": "2024-03-27T10:45:21Z",
"updated_at": "2024-03-27T10:48:05Z",
"pushed_at": "2024-03-27T10:48:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-20142.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 510346412,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"description": null,
"fork": false,
"created_at": "2022-07-04T12:16:05Z",
"updated_at": "2023-03-27T01:20:35Z",
"pushed_at": "2022-07-04T12:21:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 529215266,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
"full_name": "pazhanivel07\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"owner": {
"login": "pazhanivel07",
"id": 97434034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
"html_url": "https:\/\/github.com\/pazhanivel07",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pazhanivel07\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"description": null,
"fork": false,
"created_at": "2022-08-26T10:35:11Z",
"updated_at": "2023-03-27T01:20:22Z",
"pushed_at": "2022-08-26T10:42:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-20186.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 578715432,
"name": "CVE-2022-20186_CTXZ",
"full_name": "Bariskizilkaya\/CVE-2022-20186_CTXZ",
"owner": {
"login": "Bariskizilkaya",
"id": 39498732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39498732?v=4",
"html_url": "https:\/\/github.com\/Bariskizilkaya",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bariskizilkaya\/CVE-2022-20186_CTXZ",
"description": null,
"fork": false,
"created_at": "2022-12-15T17:57:26Z",
"updated_at": "2024-10-28T11:27:09Z",
"pushed_at": "2022-10-30T12:26:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 821468476,
"name": "CVE-2022-20186",
"full_name": "SmileTabLabo\/CVE-2022-20186",
"owner": {
"login": "SmileTabLabo",
"id": 112930114,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112930114?v=4",
"html_url": "https:\/\/github.com\/SmileTabLabo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SmileTabLabo\/CVE-2022-20186",
"description": null,
"fork": false,
"created_at": "2024-06-28T15:53:30Z",
"updated_at": "2024-06-28T17:27:31Z",
"pushed_at": "2024-06-28T17:05:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20223.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 878325587,
"name": "cve-2022-20223",
"full_name": "xbee9\/cve-2022-20223",
"owner": {
"login": "xbee9",
"id": 183838019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183838019?v=4",
"html_url": "https:\/\/github.com\/xbee9",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xbee9\/cve-2022-20223",
"description": "A simple bash script for exploiting Android 10\/11\/12 using cve-2022-20223.",
"fork": false,
"created_at": "2024-10-25T07:22:46Z",
"updated_at": "2024-10-25T07:29:30Z",
"pushed_at": "2024-10-25T07:29:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-20224.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 526077942,
"name": "system_bt_AOSP10_r33_CVE-2022-20224",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20224",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20224",
"description": null,
"fork": false,
"created_at": "2022-08-18T06:04:41Z",
"updated_at": "2022-08-18T06:22:42Z",
"pushed_at": "2022-08-18T06:24:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 624387380,
"name": "platform_system_bt_AOSP10_r33_CVE-2022-20224",
"full_name": "hshivhare67\/platform_system_bt_AOSP10_r33_CVE-2022-20224",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/platform_system_bt_AOSP10_r33_CVE-2022-20224",
"description": null,
"fork": false,
"created_at": "2023-04-06T11:02:47Z",
"updated_at": "2023-04-06T11:08:20Z",
"pushed_at": "2023-04-06T11:09:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20229.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 526095462,
"name": "system_bt_AOSP10_r33_CVE-2022-20229",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
"description": null,
"fork": false,
"created_at": "2022-08-18T07:02:43Z",
"updated_at": "2022-10-11T16:09:15Z",
"pushed_at": "2022-08-18T07:07:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

95
2022/CVE-2022-20338.json Normal file
View file

@ -0,0 +1,95 @@
[
{
"id": 718530988,
"name": "frameworks_base_AOSP_06_r22_CVE-2022-20338",
"full_name": "Satheesh575555\/frameworks_base_AOSP_06_r22_CVE-2022-20338",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP_06_r22_CVE-2022-20338",
"description": null,
"fork": false,
"created_at": "2023-11-14T09:21:58Z",
"updated_at": "2023-11-14T10:03:13Z",
"pushed_at": "2023-11-14T09:44:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 720348499,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20338",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20338",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20338",
"description": null,
"fork": false,
"created_at": "2023-11-18T07:44:41Z",
"updated_at": "2023-11-18T07:44:41Z",
"pushed_at": "2023-11-18T07:44:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 720410510,
"name": "frameworks_base_AOSP_10_r33_CVE-2022-20338",
"full_name": "Trinadh465\/frameworks_base_AOSP_10_r33_CVE-2022-20338",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP_10_r33_CVE-2022-20338",
"description": null,
"fork": false,
"created_at": "2023-11-18T12:02:22Z",
"updated_at": "2023-11-18T12:45:06Z",
"pushed_at": "2023-11-18T13:52:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

95
2022/CVE-2022-20347.json Normal file
View file

@ -0,0 +1,95 @@
[
{
"id": 536559328,
"name": "packages_apps_settings_AOSP10_r33_CVE-2022-20347",
"full_name": "ShaikUsaf\/packages_apps_settings_AOSP10_r33_CVE-2022-20347",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/packages_apps_settings_AOSP10_r33_CVE-2022-20347",
"description": null,
"fork": false,
"created_at": "2022-09-14T12:06:24Z",
"updated_at": "2022-09-15T01:06:38Z",
"pushed_at": "2022-09-14T12:06:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 537400803,
"name": "packages_apps_Settings_AOSP10_r33_CVE-2022-20347",
"full_name": "Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2022-20347",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Settings_AOSP10_r33_CVE-2022-20347",
"description": null,
"fork": false,
"created_at": "2022-09-16T09:59:04Z",
"updated_at": "2022-09-16T09:59:04Z",
"pushed_at": "2022-09-16T09:59:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 624363447,
"name": "platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347",
"full_name": "hshivhare67\/platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/platform_packages_apps_settings_AOSP10_r33_CVE-2022-20347",
"description": null,
"fork": false,
"created_at": "2023-04-06T09:54:28Z",
"updated_at": "2023-04-06T10:32:43Z",
"pushed_at": "2023-04-07T03:29:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20360.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 645233752,
"name": "packages_apps_Settings_AOSP_10_r33_CVE-2022-20360",
"full_name": "726232111\/packages_apps_Settings_AOSP_10_r33_CVE-2022-20360",
"owner": {
"login": "726232111",
"id": 34729943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34729943?v=4",
"html_url": "https:\/\/github.com\/726232111",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/726232111\/packages_apps_Settings_AOSP_10_r33_CVE-2022-20360",
"description": null,
"fork": false,
"created_at": "2023-05-25T07:56:24Z",
"updated_at": "2023-05-25T07:56:24Z",
"pushed_at": "2022-09-09T07:35:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

38
2022/CVE-2022-20361.json Normal file
View file

@ -0,0 +1,38 @@
[
{
"id": 525921405,
"name": "blur",
"full_name": "francozappa\/blur",
"owner": {
"login": "francozappa",
"id": 4628017,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4628017?v=4",
"html_url": "https:\/\/github.com\/francozappa",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/francozappa\/blur",
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2024-11-22T02:56:40Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bluetooth",
"bluetooth-le",
"bluetooth-low-energy",
"ctkd"
],
"visibility": "public",
"forks": 5,
"watchers": 17,
"score": 0,
"subscribers_count": 3
}
]

37
2022/CVE-2022-20409.json Normal file
View file

@ -0,0 +1,37 @@
[
{
"id": 569017471,
"name": "bad_io_uring",
"full_name": "Markakd\/bad_io_uring",
"owner": {
"login": "Markakd",
"id": 18663141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18663141?v=4",
"html_url": "https:\/\/github.com\/Markakd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Markakd\/bad_io_uring",
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2025-01-05T19:20:06Z",
"pushed_at": "2024-10-17T16:26:39Z",
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"android-exploitation",
"android-root",
"kernel-exploitation"
],
"visibility": "public",
"forks": 24,
"watchers": 164,
"score": 0,
"subscribers_count": 5
}
]

33
2022/CVE-2022-20413.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 589955117,
"name": "frameworks_av-r33_CVE-2022-20413",
"full_name": "pazhanivel07\/frameworks_av-r33_CVE-2022-20413",
"owner": {
"login": "pazhanivel07",
"id": 97434034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
"html_url": "https:\/\/github.com\/pazhanivel07",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pazhanivel07\/frameworks_av-r33_CVE-2022-20413",
"description": null,
"fork": false,
"created_at": "2023-01-17T10:33:22Z",
"updated_at": "2023-03-23T01:13:28Z",
"pushed_at": "2023-01-17T11:20:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20421.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 617890338,
"name": "badspin",
"full_name": "0xkol\/badspin",
"owner": {
"login": "0xkol",
"id": 58270928,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58270928?v=4",
"html_url": "https:\/\/github.com\/0xkol",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xkol\/badspin",
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2025-01-01T14:03:35Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 237,
"score": 0,
"subscribers_count": 7
}
]

33
2022/CVE-2022-20452.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 587387036,
"name": "LeakValue",
"full_name": "michalbednarski\/LeakValue",
"owner": {
"login": "michalbednarski",
"id": 1826899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4",
"html_url": "https:\/\/github.com\/michalbednarski",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/michalbednarski\/LeakValue",
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-12-30T08:15:22Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 281,
"watchers_count": 281,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 281,
"score": 0,
"subscribers_count": 9
}
]

33
2022/CVE-2022-20456.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 647688194,
"name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20456",
"full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20456",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20456",
"description": null,
"fork": false,
"created_at": "2023-05-31T10:07:10Z",
"updated_at": "2023-05-31T10:15:36Z",
"pushed_at": "2023-05-31T10:13:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20470.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 584611982,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20470",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
"description": null,
"fork": false,
"created_at": "2023-01-03T03:54:59Z",
"updated_at": "2023-03-27T01:47:22Z",
"pushed_at": "2023-01-03T04:01:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-20473.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 584289667,
"name": "frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"description": null,
"fork": false,
"created_at": "2023-01-02T05:55:37Z",
"updated_at": "2023-01-02T05:55:37Z",
"pushed_at": null,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 584624006,
"name": "frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"description": null,
"fork": false,
"created_at": "2023-01-03T04:51:12Z",
"updated_at": "2023-01-03T04:53:10Z",
"pushed_at": "2023-01-03T04:53:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20474.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 888350695,
"name": "CVE-2022-20474",
"full_name": "cxxsheng\/CVE-2022-20474",
"owner": {
"login": "cxxsheng",
"id": 15044840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15044840?v=4",
"html_url": "https:\/\/github.com\/cxxsheng",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cxxsheng\/CVE-2022-20474",
"description": "PoC of CVE-2022-20474",
"fork": false,
"created_at": "2024-11-14T08:48:59Z",
"updated_at": "2024-12-01T14:56:17Z",
"pushed_at": "2024-12-01T14:56:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-20489.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 647715589,
"name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old",
"full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old",
"description": null,
"fork": false,
"created_at": "2023-05-31T11:22:01Z",
"updated_at": "2023-05-31T11:56:29Z",
"pushed_at": "2023-05-31T11:55:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 647728712,
"name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20489",
"full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20489",
"description": null,
"fork": false,
"created_at": "2023-05-31T11:56:48Z",
"updated_at": "2023-05-31T12:05:37Z",
"pushed_at": "2023-05-31T12:03:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

33
2022/CVE-2022-20490.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 647702001,
"name": "platform_frameworks_base_AOSP10_r33_CVE-2022-20490",
"full_name": "hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20490",
"owner": {
"login": "hshivhare67",
"id": 67005408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67005408?v=4",
"html_url": "https:\/\/github.com\/hshivhare67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hshivhare67\/platform_frameworks_base_AOSP10_r33_CVE-2022-20490",
"description": null,
"fork": false,
"created_at": "2023-05-31T10:45:35Z",
"updated_at": "2023-05-31T10:52:34Z",
"pushed_at": "2023-05-31T10:51:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

Some files were not shown because too many files have changed in this diff Show more