Auto Update 2022/06/21 06:16:28

This commit is contained in:
motikan2010-bot 2022-06-21 15:16:28 +09:00
parent d91259e268
commit 3fbeab6c6a
59 changed files with 1526 additions and 177 deletions

View file

@ -40,17 +40,17 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-06-20T15:10:26Z",
"updated_at": "2022-06-21T03:17:15Z",
"pushed_at": "2022-06-20T13:23:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2017-12-29T07:11:42Z",
"updated_at": "2022-04-10T03:24:18Z",
"updated_at": "2022-06-21T03:41:51Z",
"pushed_at": "2017-12-29T08:01:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 73,
"score": 0
},

View file

@ -153,17 +153,17 @@
"description": "fixed msf module for cve-2017-7269",
"fork": false,
"created_at": "2017-03-30T22:20:36Z",
"updated_at": "2022-06-13T06:40:41Z",
"updated_at": "2022-06-21T03:23:35Z",
"pushed_at": "2017-03-30T22:20:51Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 126,
"watchers": 127,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
"fork": false,
"created_at": "2018-10-15T07:44:43Z",
"updated_at": "2022-05-24T10:57:55Z",
"updated_at": "2022-06-21T02:49:38Z",
"pushed_at": "2021-01-06T01:11:32Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-06-20T09:40:51Z",
"updated_at": "2022-06-21T03:06:07Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 562,
"watchers_count": 562,
"stargazers_count": 563,
"watchers_count": 563,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 123,
"watchers": 562,
"watchers": 563,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2022-06-15T19:55:02Z",
"updated_at": "2022-06-21T05:34:36Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 343,
"watchers_count": 343,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 116,
"watchers": 342,
"watchers": 343,
"score": 0
},
{
@ -331,12 +331,12 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 58,
"forks": 59,
"watchers": 97,
"score": 0
},

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-20T15:13:27Z",
"updated_at": "2022-06-21T03:31:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3375,
"watchers_count": 3375,
"forks_count": 1006,
"stargazers_count": 3376,
"watchers_count": 3376,
"forks_count": 1008,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 1006,
"watchers": 3375,
"forks": 1008,
"watchers": 3376,
"score": 0
},
{

View file

@ -1219,17 +1219,17 @@
"description": "Shitrix : CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit ",
"fork": false,
"created_at": "2020-07-30T17:37:40Z",
"updated_at": "2022-04-26T10:35:40Z",
"updated_at": "2022-06-21T06:05:14Z",
"pushed_at": "2021-06-02T07:42:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"forks": 1,
"watchers": 7,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-19T07:00:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0
}

View file

@ -13,11 +13,11 @@
"description": "CVE-2020-12828 PoC and Analysis. ",
"fork": false,
"created_at": "2020-06-30T15:18:58Z",
"updated_at": "2022-01-09T00:31:18Z",
"updated_at": "2022-06-21T06:02:38Z",
"pushed_at": "2020-06-30T16:03:35Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,8 +29,8 @@
"writeup"
],
"visibility": "public",
"forks": 10,
"watchers": 28,
"forks": 11,
"watchers": 29,
"score": 0
}
]

View file

@ -98,12 +98,12 @@
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 933,
"watchers_count": 933,
"forks_count": 263,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 263,
"forks": 264,
"watchers": 933,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-20T15:13:27Z",
"updated_at": "2022-06-21T03:31:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3375,
"watchers_count": 3375,
"forks_count": 1006,
"stargazers_count": 3376,
"watchers_count": 3376,
"forks_count": 1008,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 1006,
"watchers": 3375,
"forks": 1008,
"watchers": 3376,
"score": 0
},
{

View file

@ -164,5 +164,34 @@
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 437570654,
"name": "CVE-2021-25646",
"full_name": "j2ekim\/CVE-2021-25646",
"owner": {
"login": "j2ekim",
"id": 33790074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33790074?v=4",
"html_url": "https:\/\/github.com\/j2ekim"
},
"html_url": "https:\/\/github.com\/j2ekim\/CVE-2021-25646",
"description": "Apache Druid remote code execution vulnerability - Apache Druid 远程代码执行漏洞利用 CVE-2021-25646",
"fork": false,
"created_at": "2021-12-12T14:40:12Z",
"updated_at": "2022-03-23T05:51:41Z",
"pushed_at": "2021-12-12T14:55:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-25646"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -130,17 +130,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-06-17T22:01:30Z",
"updated_at": "2022-06-21T03:30:46Z",
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 56,
"watchers": 57,
"score": 0
},
{
@ -312,33 +312,6 @@
"watchers": 4,
"score": 0
},
{
"id": 462040432,
"name": "Vivald0x6f",
"full_name": "Nosferatuvjr\/Vivald0x6f",
"owner": {
"login": "Nosferatuvjr",
"id": 67665267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67665267?v=4",
"html_url": "https:\/\/github.com\/Nosferatuvjr"
},
"html_url": "https:\/\/github.com\/Nosferatuvjr\/Vivald0x6f",
"description": "CVE-2021-3560 Polkit v0.105-26 Linux Privilege Escalation by Vivald0x6f",
"fork": false,
"created_at": "2022-02-21T21:39:29Z",
"updated_at": "2022-03-04T19:54:45Z",
"pushed_at": "2022-02-21T22:37:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 463667394,
"name": "CVE-2021-3560",

View file

@ -13,11 +13,11 @@
"description": "Local Privilege Escalation in polkit's pkexec",
"fork": false,
"created_at": "2022-01-25T23:11:30Z",
"updated_at": "2022-06-20T17:37:03Z",
"updated_at": "2022-06-21T06:13:55Z",
"pushed_at": "2022-01-26T01:01:15Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 31,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,8 +26,8 @@
"exploit"
],
"visibility": "public",
"forks": 31,
"watchers": 67,
"forks": 32,
"watchers": 68,
"score": 0
},
{
@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-06-20T22:15:34Z",
"updated_at": "2022-06-21T03:13:01Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1567,
"watchers_count": 1567,
"stargazers_count": 1569,
"watchers_count": 1569,
"forks_count": 455,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 455,
"watchers": 1567,
"watchers": 1569,
"score": 0
},
{
@ -158,7 +158,7 @@
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 867,
"watchers_count": 867,
"forks_count": 281,
"forks_count": 280,
"allow_forking": true,
"is_template": false,
"topics": [
@ -167,7 +167,7 @@
"poc"
],
"visibility": "public",
"forks": 281,
"forks": 280,
"watchers": 867,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2022-06-20T10:21:52Z",
"updated_at": "2022-06-21T02:38:41Z",
"pushed_at": "2022-06-01T21:10:46Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 154,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 154,
"watchers": 674,
"watchers": 675,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-06-20T11:34:45Z",
"updated_at": "2022-06-21T04:47:09Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1106,
"watchers_count": 1106,
"stargazers_count": 1107,
"watchers_count": 1107,
"forks_count": 293,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 293,
"watchers": 1106,
"watchers": 1107,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2022-06-08T09:15:32Z",
"updated_at": "2022-06-21T03:09:06Z",
"pushed_at": "2021-12-15T06:18:15Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -555,10 +555,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-06-20T15:05:04Z",
"updated_at": "2022-06-21T05:05:40Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1403,
"watchers_count": 1403,
"stargazers_count": 1402,
"watchers_count": 1402,
"forks_count": 386,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 386,
"watchers": 1403,
"watchers": 1402,
"score": 0
},
{
@ -741,10 +741,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-06-20T08:26:34Z",
"updated_at": "2022-06-21T02:32:24Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 383,
"watchers_count": 383,
"stargazers_count": 384,
"watchers_count": 384,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
@ -756,7 +756,7 @@
],
"visibility": "public",
"forks": 82,
"watchers": 383,
"watchers": 384,
"score": 0
},
{
@ -8341,11 +8341,11 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2022-06-09T14:13:59Z",
"updated_at": "2022-06-21T06:12:58Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 26,
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [
@ -8355,8 +8355,8 @@
"vmsa-2021-0028"
],
"visibility": "public",
"forks": 26,
"watchers": 96,
"forks": 27,
"watchers": 97,
"score": 0
},
{

View file

@ -13,17 +13,71 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-06-13T05:30:39Z",
"updated_at": "2022-06-21T02:30:24Z",
"pushed_at": "2022-04-25T04:11:33Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 322,
"watchers": 323,
"score": 0
},
{
"id": 452351785,
"name": "cve-2022-0185-crash-poc",
"full_name": "discordianfish\/cve-2022-0185-crash-poc",
"owner": {
"login": "discordianfish",
"id": 275966,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/275966?v=4",
"html_url": "https:\/\/github.com\/discordianfish"
},
"html_url": "https:\/\/github.com\/discordianfish\/cve-2022-0185-crash-poc",
"description": null,
"fork": false,
"created_at": "2022-01-26T16:27:50Z",
"updated_at": "2022-06-21T02:30:36Z",
"pushed_at": "2022-01-26T16:45:45Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 452756684,
"name": "CVE-2022-0185",
"full_name": "khaclep007\/CVE-2022-0185",
"owner": {
"login": "khaclep007",
"id": 45098044,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45098044?v=4",
"html_url": "https:\/\/github.com\/khaclep007"
},
"html_url": "https:\/\/github.com\/khaclep007\/CVE-2022-0185",
"description": null,
"fork": false,
"created_at": "2022-01-27T16:24:35Z",
"updated_at": "2022-01-27T16:25:54Z",
"pushed_at": "2022-01-27T16:25:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{

29
2022/CVE-2022-0219.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 450128440,
"name": "CVE-2022-0219",
"full_name": "Haxatron\/CVE-2022-0219",
"owner": {
"login": "Haxatron",
"id": 76475453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
"html_url": "https:\/\/github.com\/Haxatron"
},
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
"description": null,
"fork": false,
"created_at": "2022-01-20T14:24:45Z",
"updated_at": "2022-01-20T14:24:45Z",
"pushed_at": "2022-01-20T14:35:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

58
2022/CVE-2022-0236.json Normal file
View file

@ -0,0 +1,58 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2022-01-19T06:18:40Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-0332.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 452082369,
"name": "CVE-2022-0332",
"full_name": "numanturle\/CVE-2022-0332",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-0332",
"description": null,
"fork": false,
"created_at": "2022-01-25T23:58:17Z",
"updated_at": "2022-06-02T07:06:18Z",
"pushed_at": "2022-01-26T00:18:26Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 29,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-03-19T12:01:26Z",
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 35,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [
@ -38,7 +38,7 @@
"writeups"
],
"visibility": "public",
"forks": 35,
"forks": 34,
"watchers": 267,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-06-15T01:58:37Z",
"updated_at": "2022-06-21T05:56:17Z",
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -1462,12 +1462,12 @@
"pushed_at": "2022-06-20T02:00:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
}

56
2022/CVE-2022-20699.json Normal file
View file

@ -0,0 +1,56 @@
[
{
"id": 456573106,
"name": "CVE-2022-20699",
"full_name": "Audiobahn\/CVE-2022-20699",
"owner": {
"login": "Audiobahn",
"id": 98435709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98435709?v=4",
"html_url": "https:\/\/github.com\/Audiobahn"
},
"html_url": "https:\/\/github.com\/Audiobahn\/CVE-2022-20699",
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-06-15T19:59:15Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 232,
"score": 0
},
{
"id": 459040811,
"name": "CVE-2022-20699",
"full_name": "rohankumardubey\/CVE-2022-20699",
"owner": {
"login": "rohankumardubey",
"id": 82864904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82864904?v=4",
"html_url": "https:\/\/github.com\/rohankumardubey"
},
"html_url": "https:\/\/github.com\/rohankumardubey\/CVE-2022-20699",
"description": null,
"fork": false,
"created_at": "2022-02-14T06:23:06Z",
"updated_at": "2022-02-16T21:53:09Z",
"pushed_at": "2022-02-14T06:23:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

34
2022/CVE-2022-21241.json Normal file
View file

@ -0,0 +1,34 @@
[
{
"id": 379108906,
"name": "csv-plus_vulnerability",
"full_name": "satoki\/csv-plus_vulnerability",
"owner": {
"login": "satoki",
"id": 54702093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54702093?v=4",
"html_url": "https:\/\/github.com\/satoki"
},
"html_url": "https:\/\/github.com\/satoki\/csv-plus_vulnerability",
"description": "👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)",
"fork": false,
"created_at": "2021-06-22T01:36:16Z",
"updated_at": "2022-05-08T09:30:58Z",
"pushed_at": "2022-02-11T13:59:14Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [
"cybersecurity",
"exploit",
"poc",
"security"
],
"visibility": "public",
"forks": 7,
"watchers": 25,
"score": 0
}
]

29
2022/CVE-2022-21371.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 451918204,
"name": "CVE-2022-21371",
"full_name": "Mr-xn\/CVE-2022-21371",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-21371",
"description": "Oracle WebLogic Server 12.1.3.0.0 \/ 12.2.1.3.0 \/ 12.2.1.4.0 \/ 14.1.1.0.0 Local File Inclusion",
"fork": false,
"created_at": "2022-01-25T14:50:29Z",
"updated_at": "2022-06-01T14:50:07Z",
"pushed_at": "2022-01-25T14:52:21Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 26,
"score": 0
}
]

33
2022/CVE-2022-21658.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 450374545,
"name": "cve-2022-21658",
"full_name": "sagittarius-a\/cve-2022-21658",
"owner": {
"login": "sagittarius-a",
"id": 8809698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
"html_url": "https:\/\/github.com\/sagittarius-a"
},
"html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
"description": "POC for cve-2022-21658",
"fork": false,
"created_at": "2022-01-21T06:09:16Z",
"updated_at": "2022-01-21T06:10:05Z",
"pushed_at": "2022-01-21T06:09:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-21658",
"poc",
"rust"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,31 @@
[
{
"id": 446296593,
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"owner": {
"login": "UzJu",
"id": 50813806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
"html_url": "https:\/\/github.com\/UzJu"
},
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"description": "CVE-2022-21660",
"fork": false,
"created_at": "2022-01-10T05:50:35Z",
"updated_at": "2022-05-13T17:08:36Z",
"pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 28,
"score": 0
},
{
"id": 462232980,
"name": "CVE-2022-21660",

View file

@ -1,4 +1,58 @@
[
{
"id": 449096712,
"name": "CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
"full_name": "TAPESH-TEAM\/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
"owner": {
"login": "TAPESH-TEAM",
"id": 83407483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83407483?v=4",
"html_url": "https:\/\/github.com\/TAPESH-TEAM"
},
"html_url": "https:\/\/github.com\/TAPESH-TEAM\/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
"description": "WordPress Core 5.8.2 - 'WP_Query' SQL Injection",
"fork": false,
"created_at": "2022-01-18T01:05:04Z",
"updated_at": "2022-06-01T16:19:15Z",
"pushed_at": "2022-01-18T01:19:45Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"score": 0
},
{
"id": 458502807,
"name": "wordpress-CVE-2022-21661",
"full_name": "purple-WL\/wordpress-CVE-2022-21661",
"owner": {
"login": "purple-WL",
"id": 63894044,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4",
"html_url": "https:\/\/github.com\/purple-WL"
},
"html_url": "https:\/\/github.com\/purple-WL\/wordpress-CVE-2022-21661",
"description": null,
"fork": false,
"created_at": "2022-02-12T11:31:26Z",
"updated_at": "2022-05-01T22:00:20Z",
"pushed_at": "2022-02-17T03:59:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"score": 0
},
{
"id": 497289034,
"name": "Wordpress-cve-CVE-2022-21661",

29
2022/CVE-2022-21877.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 456710810,
"name": "cve-2022-21877",
"full_name": "Big5-sec\/cve-2022-21877",
"owner": {
"login": "Big5-sec",
"id": 29749118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29749118?v=4",
"html_url": "https:\/\/github.com\/Big5-sec"
},
"html_url": "https:\/\/github.com\/Big5-sec\/cve-2022-21877",
"description": "a demonstration PoC for CVE-2022-21877 (storage spaces controller memory leak)",
"fork": false,
"created_at": "2022-02-07T23:18:17Z",
"updated_at": "2022-03-08T16:15:39Z",
"pushed_at": "2022-02-08T22:53:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,4 +1,143 @@
[
{
"id": 452529582,
"name": "CVE-2022-21882",
"full_name": "KaLendsi\/CVE-2022-21882",
"owner": {
"login": "KaLendsi",
"id": 68001644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
"html_url": "https:\/\/github.com\/KaLendsi"
},
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2022-21882",
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-06-17T09:18:22Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 130,
"watchers": 415,
"score": 0
},
{
"id": 454493738,
"name": "CVE-2022-21882",
"full_name": "David-Honisch\/CVE-2022-21882",
"owner": {
"login": "David-Honisch",
"id": 35835504,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35835504?v=4",
"html_url": "https:\/\/github.com\/David-Honisch"
},
"html_url": "https:\/\/github.com\/David-Honisch\/CVE-2022-21882",
"description": "CVE-2022-21882",
"fork": false,
"created_at": "2022-02-01T17:58:29Z",
"updated_at": "2022-04-12T22:32:21Z",
"pushed_at": "2022-02-01T18:14:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"score": 0
},
{
"id": 455137692,
"name": "CVE-2022-21882",
"full_name": "L4ys\/CVE-2022-21882",
"owner": {
"login": "L4ys",
"id": 5360374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5360374?v=4",
"html_url": "https:\/\/github.com\/L4ys"
},
"html_url": "https:\/\/github.com\/L4ys\/CVE-2022-21882",
"description": null,
"fork": false,
"created_at": "2022-02-03T11:25:14Z",
"updated_at": "2022-06-20T05:24:57Z",
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 159,
"score": 0
},
{
"id": 456348360,
"name": "cve-2022-21882-poc",
"full_name": "sailay1996\/cve-2022-21882-poc",
"owner": {
"login": "sailay1996",
"id": 16739401,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
"html_url": "https:\/\/github.com\/sailay1996"
},
"html_url": "https:\/\/github.com\/sailay1996\/cve-2022-21882-poc",
"description": "lpe poc for cve-2022-21882 ",
"fork": false,
"created_at": "2022-02-07T03:45:36Z",
"updated_at": "2022-06-12T09:32:22Z",
"pushed_at": "2022-02-07T03:49:37Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-21882",
"privilege-escalation",
"windows-exploitation"
],
"visibility": "public",
"forks": 15,
"watchers": 34,
"score": 0
},
{
"id": 459331281,
"name": "CVE-2022-21882",
"full_name": "r1l4-i3pur1l4\/CVE-2022-21882",
"owner": {
"login": "r1l4-i3pur1l4",
"id": 76409019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76409019?v=4",
"html_url": "https:\/\/github.com\/r1l4-i3pur1l4"
},
"html_url": "https:\/\/github.com\/r1l4-i3pur1l4\/CVE-2022-21882",
"description": null,
"fork": false,
"created_at": "2022-02-14T21:28:15Z",
"updated_at": "2022-05-06T17:45:49Z",
"pushed_at": "2022-02-15T08:29:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 484818043,
"name": "CVE-2022-21882",

View file

@ -1,4 +1,31 @@
[
{
"id": 446683592,
"name": "cve-2022-21907",
"full_name": "corelight\/cve-2022-21907",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-21907",
"description": "cve-2022-21907",
"fork": false,
"created_at": "2022-01-11T05:00:55Z",
"updated_at": "2022-03-21T07:03:34Z",
"pushed_at": "2022-01-26T20:31:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 448387955,
"name": "CVE-2022-21907",
@ -46,6 +73,87 @@
"watchers": 22,
"score": 0
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-06-15T19:59:12Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 362,
"watchers_count": 362,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 362,
"score": 0
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2022-04-15T05:51:32Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 461942989,
"name": "CVE-2022-21907-RCE-POC",

32
2022/CVE-2022-21999.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 457033886,
"name": "SpoolFool",
"full_name": "ly4k\/SpoolFool",
"owner": {
"login": "ly4k",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ly4k"
},
"html_url": "https:\/\/github.com\/ly4k\/SpoolFool",
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-06-19T08:34:13Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 600,
"watchers_count": 600,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-21999",
"cve-2022-22718"
],
"visibility": "public",
"forks": 124,
"watchers": 600,
"score": 0
}
]

29
2022/CVE-2022-22296.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 450430110,
"name": "CVE-2022-22296",
"full_name": "vlakhani28\/CVE-2022-22296",
"owner": {
"login": "vlakhani28",
"id": 42069316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
"html_url": "https:\/\/github.com\/vlakhani28"
},
"html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
"description": "All Details about CVE-2022-22296",
"fork": false,
"created_at": "2022-01-21T09:29:21Z",
"updated_at": "2022-01-21T09:29:21Z",
"pushed_at": "2022-01-21T09:45:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploits CVE-2022-22588 vulnerability on iOS 15.2 and lower. Provided for research purposes only.",
"fork": false,
"created_at": "2022-01-01T07:38:48Z",
"updated_at": "2022-03-15T06:35:33Z",
"updated_at": "2022-06-21T05:32:42Z",
"pushed_at": "2022-03-09T18:32:20Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 21,
"watchers": 22,
"score": 0
},
{
@ -54,12 +54,12 @@
"pushed_at": "2022-06-19T04:30:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
}

29
2022/CVE-2022-22828.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 452487266,
"name": "CVE-2022-22828",
"full_name": "videnlabs\/CVE-2022-22828",
"owner": {
"login": "videnlabs",
"id": 97770137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97770137?v=4",
"html_url": "https:\/\/github.com\/videnlabs"
},
"html_url": "https:\/\/github.com\/videnlabs\/CVE-2022-22828",
"description": "Write-up of CVE-2022-22828",
"fork": false,
"created_at": "2022-01-27T00:29:47Z",
"updated_at": "2022-01-27T01:53:47Z",
"pushed_at": "2022-01-27T01:32:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-22850.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 451154958,
"name": "CVE-2022-22850",
"full_name": "Sant268\/CVE-2022-22850",
"owner": {
"login": "Sant268",
"id": 26564273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26564273?v=4",
"html_url": "https:\/\/github.com\/Sant268"
},
"html_url": "https:\/\/github.com\/Sant268\/CVE-2022-22850",
"description": null,
"fork": false,
"created_at": "2022-01-23T16:00:34Z",
"updated_at": "2022-01-24T06:20:46Z",
"pushed_at": "2022-01-27T02:37:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-22851.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 451155234,
"name": "CVE-2022-22851",
"full_name": "Sant268\/CVE-2022-22851",
"owner": {
"login": "Sant268",
"id": 26564273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26564273?v=4",
"html_url": "https:\/\/github.com\/Sant268"
},
"html_url": "https:\/\/github.com\/Sant268\/CVE-2022-22851",
"description": null,
"fork": false,
"created_at": "2022-01-23T16:01:26Z",
"updated_at": "2022-01-24T06:20:47Z",
"pushed_at": "2022-01-27T03:04:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-22852.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 451155350,
"name": "CVE-2022-22852",
"full_name": "Sant268\/CVE-2022-22852",
"owner": {
"login": "Sant268",
"id": 26564273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26564273?v=4",
"html_url": "https:\/\/github.com\/Sant268"
},
"html_url": "https:\/\/github.com\/Sant268\/CVE-2022-22852",
"description": null,
"fork": false,
"created_at": "2022-01-23T16:01:49Z",
"updated_at": "2022-01-24T06:20:48Z",
"pushed_at": "2022-01-27T03:04:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-22919.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 452417006,
"name": "CVE-2022-22919",
"full_name": "jdordonezn\/CVE-2022-22919",
"owner": {
"login": "jdordonezn",
"id": 20976774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20976774?v=4",
"html_url": "https:\/\/github.com\/jdordonezn"
},
"html_url": "https:\/\/github.com\/jdordonezn\/CVE-2022-22919",
"description": null,
"fork": false,
"created_at": "2022-01-26T19:45:27Z",
"updated_at": "2022-01-26T19:45:27Z",
"pushed_at": "2022-01-26T19:45:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1764,17 +1764,17 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-06-20T15:10:26Z",
"updated_at": "2022-06-21T03:17:15Z",
"pushed_at": "2022-06-20T13:23:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -1,4 +1,58 @@
[
{
"id": 450827017,
"name": "CVE-2022-23046",
"full_name": "jcarabantes\/CVE-2022-23046",
"owner": {
"login": "jcarabantes",
"id": 9590425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9590425?v=4",
"html_url": "https:\/\/github.com\/jcarabantes"
},
"html_url": "https:\/\/github.com\/jcarabantes\/CVE-2022-23046",
"description": null,
"fork": false,
"created_at": "2022-01-22T13:35:40Z",
"updated_at": "2022-02-16T08:00:53Z",
"pushed_at": "2022-01-24T17:29:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 459366538,
"name": "CVE-2022-23046",
"full_name": "dnr6419\/CVE-2022-23046",
"owner": {
"login": "dnr6419",
"id": 43310843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
"html_url": "https:\/\/github.com\/dnr6419"
},
"html_url": "https:\/\/github.com\/dnr6419\/CVE-2022-23046",
"description": "SQL Injection Vulnerability on PhpIPAM v1.4.4",
"fork": false,
"created_at": "2022-02-15T00:00:22Z",
"updated_at": "2022-02-15T07:12:02Z",
"pushed_at": "2022-02-15T00:25:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 495567632,
"name": "CVE-2022-23046",

View file

@ -44,5 +44,34 @@
"forks": 10,
"watchers": 28,
"score": 0
},
{
"id": 450360735,
"name": "CVE-2022-RCE",
"full_name": "AlphabugX\/CVE-2022-RCE",
"owner": {
"login": "AlphabugX",
"id": 27001865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/AlphabugX"
},
"html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
"fork": false,
"created_at": "2022-01-21T05:07:59Z",
"updated_at": "2022-03-23T17:19:31Z",
"pushed_at": "2022-01-21T05:21:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2020-"
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
}
]

29
2022/CVE-2022-23378.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 448138999,
"name": "CVE-2022-23378",
"full_name": "TheGetch\/CVE-2022-23378",
"owner": {
"login": "TheGetch",
"id": 7243819,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7243819?v=4",
"html_url": "https:\/\/github.com\/TheGetch"
},
"html_url": "https:\/\/github.com\/TheGetch\/CVE-2022-23378",
"description": "Authenticated reflected XSS in TastyIgniter version v3.2.2.",
"fork": false,
"created_at": "2022-01-14T23:54:36Z",
"updated_at": "2022-04-19T19:10:21Z",
"pushed_at": "2022-02-16T14:36:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

47
2022/CVE-2022-23808.json Normal file
View file

@ -0,0 +1,47 @@
[
{
"id": 454474679,
"name": "CVE-2022-23808",
"full_name": "dipakpanchal456\/CVE-2022-23808",
"owner": {
"login": "dipakpanchal456",
"id": 31427462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31427462?v=4",
"html_url": "https:\/\/github.com\/dipakpanchal456"
},
"html_url": "https:\/\/github.com\/dipakpanchal456\/CVE-2022-23808",
"description": "phpMyAdmin XSS ",
"fork": false,
"created_at": "2022-02-01T17:02:03Z",
"updated_at": "2022-06-15T19:59:14Z",
"pushed_at": "2022-02-03T16:21:01Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [
"bugbounty",
"cross-site-scripting",
"database",
"exploit",
"exploitation",
"hacking",
"infosec",
"owasp",
"owasp-top-10",
"pentesting",
"phpmyadmin",
"poc",
"redteam",
"redteaming",
"vulnerability",
"xss",
"zeroday"
],
"visibility": "public",
"forks": 15,
"watchers": 81,
"score": 0
}
]

29
2022/CVE-2022-23967.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 452399615,
"name": "CVE-2022-23967",
"full_name": "MaherAzzouzi\/CVE-2022-23967",
"owner": {
"login": "MaherAzzouzi",
"id": 62230190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62230190?v=4",
"html_url": "https:\/\/github.com\/MaherAzzouzi"
},
"html_url": "https:\/\/github.com\/MaherAzzouzi\/CVE-2022-23967",
"description": "TightVNC Vulnerability.",
"fork": false,
"created_at": "2022-01-26T18:49:43Z",
"updated_at": "2022-04-18T09:06:27Z",
"pushed_at": "2022-01-26T18:53:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0
}
]

29
2022/CVE-2022-24032.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 453420302,
"name": "CVE-2022-24032",
"full_name": "jdordonezn\/CVE-2022-24032",
"owner": {
"login": "jdordonezn",
"id": 20976774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20976774?v=4",
"html_url": "https:\/\/github.com\/jdordonezn"
},
"html_url": "https:\/\/github.com\/jdordonezn\/CVE-2022-24032",
"description": null,
"fork": false,
"created_at": "2022-01-29T14:25:03Z",
"updated_at": "2022-01-29T14:25:03Z",
"pushed_at": "2022-01-29T14:25:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-24348.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 456161456,
"name": "CVE-2022-24348-2",
"full_name": "jkroepke\/CVE-2022-24348-2",
"owner": {
"login": "jkroepke",
"id": 1560587,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1560587?v=4",
"html_url": "https:\/\/github.com\/jkroepke"
},
"html_url": "https:\/\/github.com\/jkroepke\/CVE-2022-24348-2",
"description": "Find similar issues like CVE-2022-24348",
"fork": false,
"created_at": "2022-02-06T13:39:57Z",
"updated_at": "2022-02-14T08:21:26Z",
"pushed_at": "2022-02-06T13:44:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-25258.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 459503187,
"name": "d-os-descriptor",
"full_name": "szymonh\/d-os-descriptor",
"owner": {
"login": "szymonh",
"id": 12231135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12231135?v=4",
"html_url": "https:\/\/github.com\/szymonh"
},
"html_url": "https:\/\/github.com\/szymonh\/d-os-descriptor",
"description": "CVE-2022-25258 - Demo exploit targeting usb gadget's os descriptor handler",
"fork": false,
"created_at": "2022-02-15T09:04:25Z",
"updated_at": "2022-02-17T08:51:30Z",
"pushed_at": "2022-02-16T20:40:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-06-20T19:50:23Z",
"updated_at": "2022-06-21T04:52:58Z",
"pushed_at": "2022-06-20T10:10:08Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 65,
"watchers": 68,
"score": 0
},
{
@ -1019,7 +1019,7 @@
"fork": false,
"created_at": "2022-06-12T20:24:36Z",
"updated_at": "2022-06-12T20:24:48Z",
"pushed_at": "2022-06-13T03:16:15Z",
"pushed_at": "2022-06-21T04:50:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -436,17 +436,17 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2022-06-21T00:16:56Z",
"updated_at": "2022-06-21T04:33:13Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 57,
"watchers": 60,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Windows Network File System Crash PoC",
"fork": false,
"created_at": "2022-06-17T01:42:55Z",
"updated_at": "2022-06-20T16:44:49Z",
"updated_at": "2022-06-21T01:39:19Z",
"pushed_at": "2022-06-17T01:50:26Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-28118",
"fork": false,
"created_at": "2021-05-30T05:14:19Z",
"updated_at": "2022-05-03T09:29:34Z",
"updated_at": "2022-06-21T02:53:38Z",
"pushed_at": "2022-03-27T11:36:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
"updated_at": "2022-06-20T19:33:56Z",
"updated_at": "2022-06-21T03:48:04Z",
"pushed_at": "2022-06-16T12:42:43Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 152,
"watchers": 155,
"score": 0
},
{

View file

@ -697,7 +697,7 @@
"pushed_at": "2022-06-18T12:05:58Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -708,7 +708,7 @@
"scanner"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 8,
"score": 0
},
@ -780,17 +780,17 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-06-20T04:54:15Z",
"updated_at": "2022-06-21T03:55:53Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 274,
"watchers": 277,
"score": 0
},
{

189
README.md
View file

@ -8,11 +8,30 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu
</code>
- [Crusaders-of-Rust/CVE-2022-0185](https://github.com/Crusaders-of-Rust/CVE-2022-0185)
- [discordianfish/cve-2022-0185-crash-poc](https://github.com/discordianfish/cve-2022-0185-crash-poc)
- [khaclep007/CVE-2022-0185](https://github.com/khaclep007/CVE-2022-0185)
- [chenaotian/CVE-2022-0185](https://github.com/chenaotian/CVE-2022-0185)
- [shahparkhan/cve-2022-0185](https://github.com/shahparkhan/cve-2022-0185)
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
### CVE-2022-0219 (2022-01-20)
<code>
Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
</code>
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
### CVE-2022-0236 (2022-01-18)
<code>
The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
<code>
@ -21,6 +40,14 @@ Improper Restriction of XML External Entity Reference in GitHub repository hazel
- [achuna33/CVE-2022-0265](https://github.com/achuna33/CVE-2022-0265)
### CVE-2022-0332 (2022-01-25)
<code>
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
</code>
- [numanturle/CVE-2022-0332](https://github.com/numanturle/CVE-2022-0332)
### CVE-2022-0337
- [Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera](https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera)
@ -418,6 +445,31 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007)
### CVE-2022-20699 (2022-02-10)
<code>
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
</code>
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
- [rohankumardubey/CVE-2022-20699](https://github.com/rohankumardubey/CVE-2022-20699)
### CVE-2022-21241 (2022-02-08)
<code>
Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a remote unauthenticated attacker to inject an arbitrary script or an arbitrary OS command via a specially crafted CSV file that contains HTML a tag.
</code>
- [satoki/csv-plus_vulnerability](https://github.com/satoki/csv-plus_vulnerability)
### CVE-2022-21371 (2022-01-19)
<code>
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
</code>
- [Mr-xn/CVE-2022-21371](https://github.com/Mr-xn/CVE-2022-21371)
### CVE-2022-21449 (2022-04-19)
<code>
@ -431,12 +483,21 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
### CVE-2022-21658 (2022-01-20)
<code>
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
</code>
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
### CVE-2022-21660 (2022-02-09)
<code>
Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
</code>
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@ -445,6 +506,8 @@ Gin-vue-admin is a backstage management system based on vue and gin. In versions
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
</code>
- [TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection](https://github.com/TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection)
- [purple-WL/wordpress-CVE-2022-21661](https://github.com/purple-WL/wordpress-CVE-2022-21661)
- [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661)
- [PyterSmithDarkGhost/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection-main](https://github.com/PyterSmithDarkGhost/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection-main)
@ -464,12 +527,25 @@ Tensorflow is an Open Source Machine Learning Framework. The implementation of s
- [mwina/CVE-2022-21728-test](https://github.com/mwina/CVE-2022-21728-test)
### CVE-2022-21877 (2022-01-11)
<code>
Storage Spaces Controller Information Disclosure Vulnerability.
</code>
- [Big5-sec/cve-2022-21877](https://github.com/Big5-sec/cve-2022-21877)
### CVE-2022-21882 (2022-01-11)
<code>
Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21887.
</code>
- [KaLendsi/CVE-2022-21882](https://github.com/KaLendsi/CVE-2022-21882)
- [David-Honisch/CVE-2022-21882](https://github.com/David-Honisch/CVE-2022-21882)
- [L4ys/CVE-2022-21882](https://github.com/L4ys/CVE-2022-21882)
- [sailay1996/cve-2022-21882-poc](https://github.com/sailay1996/cve-2022-21882-poc)
- [r1l4-i3pur1l4/CVE-2022-21882](https://github.com/r1l4-i3pur1l4/CVE-2022-21882)
- [B0nfee/CVE-2022-21882](https://github.com/B0nfee/CVE-2022-21882)
### CVE-2022-21907 (2022-01-11)
@ -478,7 +554,11 @@ Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022
HTTP Protocol Stack Remote Code Execution Vulnerability.
</code>
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [coconut20/CVE-2022-21907-RCE-POC](https://github.com/coconut20/CVE-2022-21907-RCE-POC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
@ -503,6 +583,22 @@ Roaming Security Rights Management Services Remote Code Execution Vulnerability.
- [0vercl0k/CVE-2022-21974](https://github.com/0vercl0k/CVE-2022-21974)
### CVE-2022-21999 (2022-02-09)
<code>
Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-22717, CVE-2022-22718.
</code>
- [ly4k/SpoolFool](https://github.com/ly4k/SpoolFool)
### CVE-2022-22296 (2022-01-24)
<code>
Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
</code>
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
### CVE-2022-22536 (2022-02-09)
<code>
@ -564,6 +660,14 @@ addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer ove
- [nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827](https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827)
### CVE-2022-22828 (2022-01-27)
<code>
An insecure direct object reference for the file-download URL in Synametrics SynaMan before 5.0 allows a remote attacker to access unshared files via a modified base64-encoded filename string.
</code>
- [videnlabs/CVE-2022-22828](https://github.com/videnlabs/CVE-2022-22828)
### CVE-2022-22845 (2022-01-09)
<code>
@ -572,6 +676,30 @@ QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e
- [OmriBaso/CVE-2022-22845-Exploit](https://github.com/OmriBaso/CVE-2022-22845-Exploit)
### CVE-2022-22850 (2022-01-26)
<code>
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_types.
</code>
- [Sant268/CVE-2022-22850](https://github.com/Sant268/CVE-2022-22850)
### CVE-2022-22851 (2022-01-26)
<code>
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php
</code>
- [Sant268/CVE-2022-22851](https://github.com/Sant268/CVE-2022-22851)
### CVE-2022-22852 (2022-01-26)
<code>
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_list.
</code>
- [Sant268/CVE-2022-22852](https://github.com/Sant268/CVE-2022-22852)
### CVE-2022-22909 (2022-03-02)
<code>
@ -589,6 +717,14 @@ O2OA v6.4.7 was discovered to contain a remote code execution (RCE) vulnerabilit
- [aodsec/CVE-2022-22916](https://github.com/aodsec/CVE-2022-22916)
### CVE-2022-22919 (2022-01-29)
<code>
Adenza AxiomSL ControllerView through 10.8.1 allows redirection for SSO login URLs.
</code>
- [jdordonezn/CVE-2022-22919](https://github.com/jdordonezn/CVE-2022-22919)
### CVE-2022-22947 (2022-03-03)
<code>
@ -825,6 +961,8 @@ In Spring Security versions 5.5.6 and 5.6.3 and older unsupported versions, Rege
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the &quot;subnet&quot; parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
</code>
- [jcarabantes/CVE-2022-23046](https://github.com/jcarabantes/CVE-2022-23046)
- [dnr6419/CVE-2022-23046](https://github.com/dnr6419/CVE-2022-23046)
- [bernauers/CVE-2022-23046](https://github.com/bernauers/CVE-2022-23046)
### CVE-2022-23131 (2022-01-13)
@ -878,6 +1016,7 @@ By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configu
</code>
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
### CVE-2022-23342
- [InitRoot/CVE-2022-23342](https://github.com/InitRoot/CVE-2022-23342)
@ -885,6 +1024,14 @@ By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configu
### CVE-2022-23361
- [ViNi0608/CVE-2022-23361](https://github.com/ViNi0608/CVE-2022-23361)
### CVE-2022-23378 (2022-02-09)
<code>
A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of TastyIgniter. The &quot;items%5B0%5D%5Bpath%5D&quot; parameter of a request made to /admin/allergens/edit/1 is vulnerable.
</code>
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
### CVE-2022-23642 (2022-02-18)
<code>
@ -917,6 +1064,14 @@ Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed serve
- [fbusr/CVE-2022-23779](https://github.com/fbusr/CVE-2022-23779)
### CVE-2022-23808 (2022-01-21)
<code>
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
</code>
- [dipakpanchal456/CVE-2022-23808](https://github.com/dipakpanchal456/CVE-2022-23808)
### CVE-2022-23812 (2022-03-16)
<code>
@ -957,6 +1112,14 @@ SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Auth
- [manuelz120/CVE-2022-23940](https://github.com/manuelz120/CVE-2022-23940)
### CVE-2022-23967 (2022-01-26)
<code>
In TightVNC 1.3.10, there is an integer signedness error and resultant heap-based buffer overflow in InitialiseRFBConnection in rfbproto.c (for the vncviewer component). There is no check on the size given to malloc, e.g., -1 is accepted. This allocates a chunk of size zero, which will give a heap pointer. However, one can send 0xffffffff bytes of data, which can have a DoS impact or lead to remote code execution.
</code>
- [MaherAzzouzi/CVE-2022-23967](https://github.com/MaherAzzouzi/CVE-2022-23967)
### CVE-2022-23990 (2022-01-26)
<code>
@ -965,6 +1128,14 @@ Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog functi
- [Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23990](https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23990)
### CVE-2022-24032 (2022-01-29)
<code>
Adenza AxiomSL ControllerView through 10.8.1 is vulnerable to user enumeration. An attacker can identify valid usernames on the platform because a failed login attempt produces a different error message when the username is valid.
</code>
- [jdordonezn/CVE-2022-24032](https://github.com/jdordonezn/CVE-2022-24032)
### CVE-2022-24086 (2022-02-16)
<code>
@ -1027,6 +1198,14 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
### CVE-2022-24348 (2022-02-04)
<code>
Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related to Helm charts because of an error in helmTemplate in repository.go. For example, an attacker may be able to discover credentials stored in a YAML file.
</code>
- [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2)
### CVE-2022-24449 (2022-04-28)
<code>
@ -1275,6 +1454,14 @@ SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has
- [polling-repo-continua/CVE-2022-25257](https://github.com/polling-repo-continua/CVE-2022-25257)
- [RobertDra/CVE-2022-25257](https://github.com/RobertDra/CVE-2022-25257)
### CVE-2022-25258 (2022-02-16)
<code>
An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.
</code>
- [szymonh/d-os-descriptor](https://github.com/szymonh/d-os-descriptor)
### CVE-2022-25313 (2022-02-17)
<code>
@ -3177,7 +3364,6 @@ It was found that polkit could be tricked into bypassing the credential checks f
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
- [Nosferatuvjr/Vivald0x6f](https://github.com/Nosferatuvjr/Vivald0x6f)
- [innxrmxst/CVE-2021-3560](https://github.com/innxrmxst/CVE-2021-3560)
- [GatoGamer1155/CVE-2021-3560](https://github.com/GatoGamer1155/CVE-2021-3560)
- [RicterZ/CVE-2021-3560-Authentication-Agent](https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent)
@ -4005,6 +4191,7 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
- [1n7erface/PocList](https://github.com/1n7erface/PocList)
- [givemefivw/CVE-2021-25646](https://github.com/givemefivw/CVE-2021-25646)
- [j2ekim/CVE-2021-25646](https://github.com/j2ekim/CVE-2021-25646)
### CVE-2021-25679 (2021-04-20)