Auto Update 2022/11/18 18:26:09

This commit is contained in:
motikan2010-bot 2022-11-19 03:26:09 +09:00
parent bd6f1419ad
commit 3cd1d9ba3c
38 changed files with 254 additions and 180 deletions

View file

@ -143,5 +143,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 567728889,
"name": "CVE-2012-1823",
"full_name": "daai1\/CVE-2012-1823",
"owner": {
"login": "daai1",
"id": 86880819,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86880819?v=4",
"html_url": "https:\/\/github.com\/daai1"
},
"html_url": "https:\/\/github.com\/daai1\/CVE-2012-1823",
"description": null,
"fork": false,
"created_at": "2022-11-18T12:46:10Z",
"updated_at": "2022-11-18T12:47:34Z",
"pushed_at": "2022-11-18T12:47:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -47,7 +47,7 @@
"stargazers_count": 1539,
"watchers_count": 1539,
"has_discussions": false,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,7 +74,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1539,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
"fork": false,
"created_at": "2016-01-24T13:49:03Z",
"updated_at": "2022-07-20T11:41:39Z",
"updated_at": "2022-11-18T12:24:19Z",
"pushed_at": "2016-01-24T22:20:44Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 76,
"watchers": 75,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "PoC code for 32 bit Android OS",
"fork": false,
"created_at": "2015-09-12T01:31:36Z",
"updated_at": "2022-09-13T10:00:24Z",
"updated_at": "2022-11-18T12:24:17Z",
"pushed_at": "2015-12-15T05:42:02Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 93,
"watchers": 131,
"watchers": 130,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 1539,
"watchers_count": 1539,
"has_discussions": false,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,7 +45,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1539,
"score": 0
},

View file

@ -47,7 +47,7 @@
"stargazers_count": 1539,
"watchers_count": 1539,
"has_discussions": false,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,7 +74,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1539,
"score": 0
},

View file

@ -76,13 +76,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 2,
"score": 0
},

View file

@ -158,12 +158,12 @@
"description": "Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.",
"fork": false,
"created_at": "2022-10-04T21:09:27Z",
"updated_at": "2022-11-16T14:15:53Z",
"updated_at": "2022-11-18T13:59:19Z",
"pushed_at": "2022-11-16T22:49:39Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -174,8 +174,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 5,
"watchers": 33,
"forks": 6,
"watchers": 34,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)",
"fork": false,
"created_at": "2018-10-18T16:51:26Z",
"updated_at": "2022-08-13T08:25:28Z",
"updated_at": "2022-11-18T14:12:47Z",
"pushed_at": "2018-11-07T04:00:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -573,7 +573,7 @@
"stargazers_count": 1539,
"watchers_count": 1539,
"has_discussions": false,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -600,7 +600,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1539,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T15:54:55Z",
"updated_at": "2020-07-13T12:07:03Z",
"updated_at": "2022-11-18T13:46:41Z",
"pushed_at": "2019-06-12T12:25:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 54,
"score": 0
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 168,
"score": 0
},

View file

@ -192,7 +192,7 @@
"stargazers_count": 1539,
"watchers_count": 1539,
"has_discussions": false,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -219,7 +219,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1539,
"score": 0
}

View file

@ -366,13 +366,13 @@
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 35,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 34,
"watchers": 67,
"score": 0
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 24,
"watchers": 53,
"score": 0
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 18,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept code for CVE-2020-0728",
"fork": false,
"created_at": "2020-02-12T22:32:28Z",
"updated_at": "2022-10-04T23:08:25Z",
"updated_at": "2022-11-18T13:46:43Z",
"pushed_at": "2020-02-12T22:50:22Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 45,
"watchers": 46,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2020-07-29T15:56:50Z",
"updated_at": "2022-11-09T18:08:47Z",
"updated_at": "2022-11-18T13:46:47Z",
"pushed_at": "2020-07-30T07:48:40Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 114,
"watchers": 115,
"score": 0
}
]

View file

@ -110,10 +110,10 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
"updated_at": "2022-11-09T18:08:59Z",
"updated_at": "2022-11-18T13:46:48Z",
"pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -126,7 +126,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 169,
"watchers": 170,
"score": 0
},
{

View file

@ -390,10 +390,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2022-11-18T05:10:43Z",
"updated_at": "2022-11-18T13:30:29Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -408,7 +408,7 @@
],
"visibility": "public",
"forks": 105,
"watchers": 275,
"watchers": 276,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 1539,
"watchers_count": 1539,
"has_discussions": false,
"forks_count": 311,
"forks_count": 312,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -45,7 +45,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 311,
"forks": 312,
"watchers": 1539,
"score": 0
},

View file

@ -795,10 +795,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-18T11:41:04Z",
"updated_at": "2022-11-18T12:41:14Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 616,
"watchers_count": 616,
"stargazers_count": 617,
"watchers_count": 617,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -814,7 +814,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 616,
"watchers": 617,
"score": 0
},
{

View file

@ -77,19 +77,19 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-11-17T08:09:34Z",
"updated_at": "2022-11-18T12:41:55Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1701,
"watchers_count": 1701,
"stargazers_count": 1702,
"watchers_count": 1702,
"has_discussions": false,
"forks_count": 488,
"forks_count": 489,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 488,
"watchers": 1701,
"forks": 489,
"watchers": 1702,
"score": 0
},
{

View file

@ -1287,5 +1287,34 @@
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 567720828,
"name": "CVE-2021-41773",
"full_name": "12345qwert123456\/CVE-2021-41773",
"owner": {
"login": "12345qwert123456",
"id": 63474188,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
"html_url": "https:\/\/github.com\/12345qwert123456"
},
"html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-41773",
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
"fork": false,
"created_at": "2022-11-18T12:23:04Z",
"updated_at": "2022-11-18T18:02:12Z",
"pushed_at": "2022-11-18T18:04:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -455,5 +455,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 567841093,
"name": "CVE-2021-42013",
"full_name": "12345qwert123456\/CVE-2021-42013",
"owner": {
"login": "12345qwert123456",
"id": 63474188,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63474188?v=4",
"html_url": "https:\/\/github.com\/12345qwert123456"
},
"html_url": "https:\/\/github.com\/12345qwert123456\/CVE-2021-42013",
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50",
"fork": false,
"created_at": "2022-11-18T17:53:46Z",
"updated_at": "2022-11-18T18:02:31Z",
"pushed_at": "2022-11-18T18:03:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2022-11-15T13:10:15Z",
"updated_at": "2022-11-18T13:39:11Z",
"pushed_at": "2022-07-25T20:41:30Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 40,
"watchers": 41,
"score": 0
},
{
@ -411,10 +411,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-11-18T03:08:35Z",
"updated_at": "2022-11-18T16:06:12Z",
"pushed_at": "2022-11-18T08:36:03Z",
"stargazers_count": 542,
"watchers_count": 542,
"stargazers_count": 543,
"watchers_count": 543,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -428,7 +428,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 542,
"watchers": 543,
"score": 0
},
{
@ -2291,35 +2291,6 @@
"watchers": 7,
"score": 0
},
{
"id": 438650245,
"name": "log4j_temp_CVE-2021-44228",
"full_name": "111coding\/log4j_temp_CVE-2021-44228",
"owner": {
"login": "111coding",
"id": 49793527,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4",
"html_url": "https:\/\/github.com\/111coding"
},
"html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-15T14:01:23Z",
"updated_at": "2021-12-18T17:13:29Z",
"pushed_at": "2021-12-18T17:13:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438689577,
"name": "Log4j",
@ -3257,35 +3228,6 @@
"watchers": 0,
"score": 0
},
{
"id": 439658571,
"name": "log4j-pcap-activity",
"full_name": "Apipia\/log4j-pcap-activity",
"owner": {
"login": "Apipia",
"id": 17787069,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17787069?v=4",
"html_url": "https:\/\/github.com\/Apipia"
},
"html_url": "https:\/\/github.com\/Apipia\/log4j-pcap-activity",
"description": "A fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-18T16:09:49Z",
"updated_at": "2022-10-18T10:59:33Z",
"pushed_at": "2021-12-18T16:51:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 439698618,
"name": "log4shell-docker-lab",

View file

@ -111,7 +111,7 @@
"fork": false,
"created_at": "2022-11-08T15:22:55Z",
"updated_at": "2022-11-08T15:54:59Z",
"pushed_at": "2022-11-08T16:22:07Z",
"pushed_at": "2022-11-18T15:29:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -2232,10 +2232,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-11-16T03:44:14Z",
"updated_at": "2022-11-18T00:05:55Z",
"updated_at": "2022-11-18T16:57:17Z",
"pushed_at": "2022-11-16T03:50:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2244,7 +2244,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "lpe poc for cve-2022-21882 ",
"fork": false,
"created_at": "2022-02-07T03:45:36Z",
"updated_at": "2022-11-09T18:15:15Z",
"updated_at": "2022-11-18T13:47:02Z",
"pushed_at": "2022-02-07T03:49:37Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 41,
"watchers": 42,
"score": 0
},
{

View file

@ -45,10 +45,10 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-11-15T17:36:03Z",
"updated_at": "2022-11-18T14:35:52Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 282,
"watchers": 283,
"score": 0
},
{
@ -712,10 +712,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-18T11:41:04Z",
"updated_at": "2022-11-18T12:41:14Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 616,
"watchers_count": 616,
"stargazers_count": 617,
"watchers_count": 617,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -731,7 +731,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 616,
"watchers": 617,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation",
"fork": false,
"created_at": "2022-09-05T15:31:56Z",
"updated_at": "2022-11-15T17:40:54Z",
"updated_at": "2022-11-18T15:23:38Z",
"pushed_at": "2022-09-05T14:25:17Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 70,
"watchers": 71,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-11-18T07:26:44Z",
"updated_at": "2022-11-18T13:34:29Z",
"pushed_at": "2022-11-07T16:21:14Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 300,
"watchers_count": 300,
"has_discussions": false,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 299,
"forks": 51,
"watchers": 300,
"score": 0
},
{

View file

@ -14,11 +14,11 @@
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-11-16T01:14:45Z",
"pushed_at": "2022-11-17T12:24:25Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 525,
"watchers_count": 525,
"has_discussions": false,
"forks_count": 114,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"spookyssl"
],
"visibility": "public",
"forks": 114,
"forks": 115,
"watchers": 525,
"score": 0
},

36
2022/CVE-2022-40127.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 567740887,
"name": "CVE-2022-40127",
"full_name": "Mr-xn\/CVE-2022-40127",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-40127",
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
"fork": false,
"created_at": "2022-11-18T13:19:23Z",
"updated_at": "2022-11-18T15:25:45Z",
"pushed_at": "2022-11-18T13:26:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-airflow",
"cve",
"poc",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -42,12 +42,12 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2022-11-17T15:23:09Z",
"updated_at": "2022-11-18T16:48:31Z",
"pushed_at": "2022-11-14T17:54:57Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,8 +60,8 @@
"zimbra"
],
"visibility": "public",
"forks": 13,
"watchers": 63,
"forks": 14,
"watchers": 66,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root",
"fork": false,
"created_at": "2022-08-03T21:20:29Z",
"updated_at": "2022-11-18T09:47:09Z",
"updated_at": "2022-11-18T14:59:55Z",
"pushed_at": "2022-10-20T17:37:43Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -4087,6 +4087,14 @@ A misconfiguration in the Service Mode profile directory of Clash for Windows v0
- [LovelyWei/CVE-2022-40126](https://github.com/LovelyWei/CVE-2022-40126)
### CVE-2022-40127 (2022-11-14)
<code>
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.
</code>
- [Mr-xn/CVE-2022-40127](https://github.com/Mr-xn/CVE-2022-40127)
### CVE-2022-40140 (2022-09-19)
<code>
@ -7900,6 +7908,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [juuso0/CVE-2021-41773](https://github.com/juuso0/CVE-2021-41773)
- [aqiao-jashell/CVE-2021-41773](https://github.com/aqiao-jashell/CVE-2021-41773)
- [aqiao-jashell/py-CVE-2021-41773](https://github.com/aqiao-jashell/py-CVE-2021-41773)
- [12345qwert123456/CVE-2021-41773](https://github.com/12345qwert123456/CVE-2021-41773)
### CVE-2021-41946 (2022-05-18)
@ -7938,6 +7947,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [mightysai1997/cve-2021-42013](https://github.com/mightysai1997/cve-2021-42013)
- [mightysai1997/cve-2021-42013L](https://github.com/mightysai1997/cve-2021-42013L)
- [mightysai1997/cve-2021-42013.get](https://github.com/mightysai1997/cve-2021-42013.get)
- [12345qwert123456/CVE-2021-42013](https://github.com/12345qwert123456/CVE-2021-42013)
### CVE-2021-42056 (2022-06-24)
@ -8485,7 +8495,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228)
- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228)
@ -8517,7 +8526,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [ankur-katiyar/log4j-docker](https://github.com/ankur-katiyar/log4j-docker)
- [immunityinc/Log4j-JNDIServer](https://github.com/immunityinc/Log4j-JNDIServer)
- [DANSI/PowerShell-Log4J-Scanner](https://github.com/DANSI/PowerShell-Log4J-Scanner)
- [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity)
- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab)
- [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study)
- [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228)
@ -27966,6 +27974,7 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
- [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823)
- [daai1/CVE-2012-1823](https://github.com/daai1/CVE-2012-1823)
### CVE-2012-1870 (2012-07-10)