Auto Update 2022/03/06 12:14:15

This commit is contained in:
motikan2010-bot 2022-03-06 21:14:15 +09:00
parent 75fe78c2ef
commit 2fc99581c1
30 changed files with 175 additions and 119 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-01-17T22:01:39Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
"fork": false,
"created_at": "2018-02-22T05:31:13Z",
"updated_at": "2022-02-08T08:10:11Z",
"updated_at": "2022-03-06T11:40:18Z",
"pushed_at": "2018-02-25T08:49:07Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 51,
"watchers": 97,
"watchers": 98,
"score": 0
}
]

View file

@ -1291,17 +1291,17 @@
"description": "Struts02 s2-045 exploit program",
"fork": false,
"created_at": "2018-02-15T17:31:07Z",
"updated_at": "2022-03-04T09:17:38Z",
"updated_at": "2022-03-06T08:48:22Z",
"pushed_at": "2018-02-15T17:36:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"forks": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -874,5 +874,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 466670016,
"name": "CVE-2018-10933",
"full_name": "Onurhan1337\/CVE-2018-10933",
"owner": {
"login": "Onurhan1337",
"id": 60575283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60575283?v=4",
"html_url": "https:\/\/github.com\/Onurhan1337"
},
"html_url": "https:\/\/github.com\/Onurhan1337\/CVE-2018-10933",
"description": null,
"fork": false,
"created_at": "2022-03-06T07:43:02Z",
"updated_at": "2022-03-06T08:07:13Z",
"pushed_at": "2022-03-06T07:43:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -83,17 +83,17 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2022-02-06T21:46:46Z",
"updated_at": "2022-03-06T08:38:55Z",
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 479,
"watchers_count": 479,
"stargazers_count": 480,
"watchers_count": 480,
"forks_count": 174,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 174,
"watchers": 479,
"watchers": 480,
"score": 0
},
{

View file

@ -513,17 +513,17 @@
"description": "load-scripts.php file, which purpose is to retrieve several JavaScript packages through one single request.",
"fork": false,
"created_at": "2019-11-11T11:48:03Z",
"updated_at": "2020-06-08T17:03:46Z",
"updated_at": "2022-03-06T07:24:24Z",
"pushed_at": "2019-11-11T12:21:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 115,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"topics": [
@ -56,7 +56,7 @@
"sa-core-2018-002"
],
"visibility": "public",
"forks": 115,
"forks": 116,
"watchers": 342,
"score": 0
},

View file

@ -1705,17 +1705,17 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2022-03-03T03:23:35Z",
"updated_at": "2022-03-06T09:44:57Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1097,
"watchers_count": 1097,
"stargazers_count": 1098,
"watchers_count": 1098,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1097,
"watchers": 1098,
"score": 0
},
{

View file

@ -599,8 +599,8 @@
"description": "CVE-2019-11043 LAB",
"fork": false,
"created_at": "2022-03-04T16:25:16Z",
"updated_at": "2022-03-04T16:26:34Z",
"pushed_at": "2022-03-04T16:30:39Z",
"updated_at": "2022-03-06T07:42:17Z",
"pushed_at": "2022-03-06T07:42:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -272,7 +272,7 @@
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2022-01-25T20:15:05Z",
"updated_at": "2022-03-06T07:12:20Z",
"pushed_at": "2020-08-19T22:44:06Z",
"stargazers_count": 28,
"watchers_count": 28,

View file

@ -623,8 +623,8 @@
"description": "PoC for CVE-2020-0601 - CryptoAPI exploit",
"fork": false,
"created_at": "2020-01-28T21:24:54Z",
"updated_at": "2021-12-15T14:38:13Z",
"pushed_at": "2020-01-28T22:06:57Z",
"updated_at": "2022-03-06T10:53:40Z",
"pushed_at": "2022-03-06T10:53:31Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 4,

View file

@ -1722,17 +1722,17 @@
"description": null,
"fork": false,
"created_at": "2020-09-17T01:48:37Z",
"updated_at": "2022-02-28T11:21:56Z",
"updated_at": "2022-03-06T06:15:21Z",
"pushed_at": "2020-09-17T01:55:48Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 59,
"watchers": 60,
"score": 0
},
{

View file

@ -99,17 +99,17 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2022-03-03T02:03:08Z",
"updated_at": "2022-03-06T08:19:25Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 340,
"watchers": 341,
"score": 0
},
{

View file

@ -272,17 +272,17 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
"updated_at": "2021-12-15T14:41:37Z",
"updated_at": "2022-03-06T06:17:23Z",
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 104,
"watchers": 105,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2022-03-06T01:45:04Z",
"updated_at": "2022-03-06T11:13:18Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 192,
"watchers": 194,
"score": 0
}
]

View file

@ -969,17 +969,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-03-04T02:00:16Z",
"updated_at": "2022-03-06T07:35:49Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 448,
"watchers_count": 448,
"stargazers_count": 449,
"watchers_count": 449,
"forks_count": 120,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 448,
"watchers": 449,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability",
"fork": false,
"created_at": "2021-12-15T14:28:00Z",
"updated_at": "2021-12-17T12:07:12Z",
"updated_at": "2022-03-06T11:28:08Z",
"pushed_at": "2022-02-15T18:56:58Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-03-06T01:02:09Z",
"updated_at": "2022-03-06T09:48:52Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1379,
"watchers_count": 1379,
"stargazers_count": 1381,
"watchers_count": 1381,
"forks_count": 394,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 394,
"watchers": 1379,
"watchers": 1381,
"score": 0
},
{
@ -1234,17 +1234,17 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2022-02-28T11:42:22Z",
"updated_at": "2022-03-06T10:18:57Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -17,14 +17,14 @@
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 385,
"watchers_count": 385,
"forks_count": 82,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-40449"
],
"visibility": "public",
"forks": 82,
"forks": 83,
"watchers": 385,
"score": 0
},

View file

@ -354,17 +354,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-03-06T05:54:27Z",
"updated_at": "2022-03-06T10:28:39Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 24,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Windows Common Log File System Driver POC",
"fork": false,
"created_at": "2021-12-21T01:51:41Z",
"updated_at": "2022-02-23T23:18:12Z",
"updated_at": "2022-03-06T11:30:59Z",
"pushed_at": "2021-12-21T06:57:06Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 72,
"watchers": 73,
"score": 0
}
]

View file

@ -1235,10 +1235,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-03-04T10:35:04Z",
"updated_at": "2022-03-06T11:48:52Z",
"pushed_at": "2022-02-18T08:54:03Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 248,
"watchers_count": 248,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
@ -1250,7 +1250,7 @@
],
"visibility": "public",
"forks": 62,
"watchers": 247,
"watchers": 248,
"score": 0
},
{
@ -3152,7 +3152,7 @@
"pushed_at": "2022-01-18T08:18:21Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [
@ -3163,7 +3163,7 @@
"poc"
],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 40,
"score": 0
},
@ -3552,12 +3552,12 @@
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2768,
"watchers_count": 2768,
"forks_count": 672,
"forks_count": 673,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 672,
"forks": 673,
"watchers": 2768,
"score": 0
},
@ -9414,12 +9414,12 @@
"pushed_at": "2021-12-24T18:57:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-03-05T13:02:14Z",
"updated_at": "2022-03-06T06:17:46Z",
"pushed_at": "2022-01-25T17:00:16Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 299,
"watchers": 300,
"score": 0
},
{

View file

@ -17,13 +17,40 @@
"pushed_at": "2022-02-28T01:25:57Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"score": 0
},
{
"id": 466710055,
"name": "CVE-2022-0492-Checker",
"full_name": "SofianeHamlaoui\/CVE-2022-0492-Checker",
"owner": {
"login": "SofianeHamlaoui",
"id": 16967174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16967174?v=4",
"html_url": "https:\/\/github.com\/SofianeHamlaoui"
},
"html_url": "https:\/\/github.com\/SofianeHamlaoui\/CVE-2022-0492-Checker",
"description": "A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-03-06T10:57:09Z",
"updated_at": "2022-03-06T12:13:14Z",
"pushed_at": "2022-03-06T12:11:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 13,
"watchers": 0,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
"fork": false,
"created_at": "2022-03-06T00:03:31Z",
"updated_at": "2022-03-06T06:15:29Z",
"pushed_at": "2022-03-06T00:36:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"updated_at": "2022-03-06T11:59:08Z",
"pushed_at": "2022-03-06T07:01:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-03-06T05:58:52Z",
"updated_at": "2022-03-06T11:11:06Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 35,
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,8 +29,8 @@
"rtf"
],
"visibility": "public",
"forks": 35,
"watchers": 196,
"forks": 36,
"watchers": 197,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T18:53:56Z",
"updated_at": "2022-03-04T13:13:07Z",
"updated_at": "2022-03-06T11:11:17Z",
"pushed_at": "2022-02-26T19:12:12Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 8,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [
@ -30,8 +30,8 @@
"wordpad"
],
"visibility": "public",
"forks": 8,
"watchers": 39,
"forks": 9,
"watchers": 40,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-06T01:03:22Z",
"updated_at": "2022-03-06T09:25:47Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 475,
"watchers_count": 475,
"stargazers_count": 476,
"watchers_count": 476,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 90,
"watchers": 475,
"watchers": 476,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
"updated_at": "2022-03-06T05:21:32Z",
"updated_at": "2022-03-06T11:36:50Z",
"pushed_at": "2022-03-03T14:03:30Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 146,
"watchers": 149,
"score": 0
},
{
@ -339,17 +339,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-03-06T05:54:27Z",
"updated_at": "2022-03-06T10:28:39Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 24,
"score": 0
},
{

View file

@ -45,6 +45,7 @@ A vulnerability was found in the Linux kernels cgroup_release_agent_write in
</code>
- [PaloAltoNetworks/can-ctr-escape-cve-2022-0492](https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492)
- [SofianeHamlaoui/CVE-2022-0492-Checker](https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker)
### CVE-2022-0529 (2022-02-09)
@ -15045,6 +15046,7 @@ A vulnerability was found in libssh's server-side state machine before versions
- [lalishasanduwara/CVE-2018-10933](https://github.com/lalishasanduwara/CVE-2018-10933)
- [JoSecMx/CVE-2018-10933_Scanner](https://github.com/JoSecMx/CVE-2018-10933_Scanner)
- [cyberharsh/Libssh-server-CVE-2018-10933](https://github.com/cyberharsh/Libssh-server-CVE-2018-10933)
- [Onurhan1337/CVE-2018-10933](https://github.com/Onurhan1337/CVE-2018-10933)
### CVE-2018-10936 (2018-08-30)