Auto Update 2022/09/19 18:20:25

This commit is contained in:
motikan2010-bot 2022-09-20 03:20:25 +09:00
parent 6ca6f0e2a4
commit 43403ff2c1
31 changed files with 286 additions and 146 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-18T09:36:01Z",
"updated_at": "2022-09-19T12:49:56Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1507,
"watchers_count": 1507,
"stargazers_count": 1508,
"watchers_count": 1508,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 307,
"watchers": 1507,
"watchers": 1508,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-18T09:36:01Z",
"updated_at": "2022-09-19T12:49:56Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1507,
"watchers_count": 1507,
"stargazers_count": 1508,
"watchers_count": 1508,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 307,
"watchers": 1507,
"watchers": 1508,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2022-09-01T15:21:28Z",
"updated_at": "2022-09-19T16:36:21Z",
"pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 49,
"watchers": 89,
"watchers": 90,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-18T09:36:01Z",
"updated_at": "2022-09-19T12:49:56Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1507,
"watchers_count": 1507,
"stargazers_count": 1508,
"watchers_count": 1508,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 307,
"watchers": 1507,
"watchers": 1508,
"score": 0
},
{

View file

@ -51,10 +51,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2022-07-27T07:08:54Z",
"updated_at": "2022-09-19T12:51:38Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 546,
"watchers": 547,
"score": 0
},
{

View file

@ -73,7 +73,7 @@
"pushed_at": "2022-07-18T16:24:55Z",
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 107,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -85,7 +85,7 @@
"sambacry"
],
"visibility": "public",
"forks": 107,
"forks": 108,
"watchers": 317,
"score": 0
},

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-18T09:36:01Z",
"updated_at": "2022-09-19T12:49:56Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1507,
"watchers_count": 1507,
"stargazers_count": 1508,
"watchers_count": 1508,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 307,
"watchers": 1507,
"watchers": 1508,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-09-19T10:53:13Z",
"updated_at": "2022-09-19T13:38:32Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 837,
"watchers_count": 837,
"stargazers_count": 838,
"watchers_count": 838,
"forks_count": 174,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 174,
"watchers": 837,
"watchers": 838,
"score": 0
},
{
@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-18T09:36:01Z",
"updated_at": "2022-09-19T12:49:56Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1507,
"watchers_count": 1507,
"stargazers_count": 1508,
"watchers_count": 1508,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 307,
"watchers": 1507,
"watchers": 1508,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
"fork": false,
"created_at": "2019-02-09T02:18:37Z",
"updated_at": "2022-08-11T10:15:00Z",
"updated_at": "2022-09-19T12:14:36Z",
"pushed_at": "2019-11-03T17:29:56Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -97,10 +97,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-09-17T03:38:41Z",
"updated_at": "2022-09-19T13:00:40Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 952,
"watchers_count": 952,
"stargazers_count": 953,
"watchers_count": 953,
"forks_count": 268,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 268,
"watchers": 952,
"watchers": 953,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-18T09:36:01Z",
"updated_at": "2022-09-19T12:49:56Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1507,
"watchers_count": 1507,
"stargazers_count": 1508,
"watchers_count": 1508,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 307,
"watchers": 1507,
"watchers": 1508,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-09-17T03:03:09Z",
"updated_at": "2022-09-19T13:02:38Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1613,
"watchers_count": 1613,
"stargazers_count": 1614,
"watchers_count": 1614,
"forks_count": 578,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 578,
"watchers": 1613,
"watchers": 1614,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2022-09-17T13:43:23Z",
"updated_at": "2022-09-19T17:41:46Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 7,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 59,
"forks": 8,
"watchers": 61,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Investigating the bug behind CVE-2021-26708",
"fork": false,
"created_at": "2021-02-15T20:27:06Z",
"updated_at": "2022-09-15T10:27:33Z",
"updated_at": "2022-09-19T17:59:32Z",
"pushed_at": "2021-02-16T03:03:54Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -45,7 +45,7 @@
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -54,7 +54,7 @@
"exploit"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 27,
"score": 0
}

View file

@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-09-19T11:40:02Z",
"updated_at": "2022-09-19T12:51:39Z",
"pushed_at": "2022-09-01T21:30:25Z",
"stargazers_count": 434,
"watchers_count": 434,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 434,
"watchers": 435,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-01-28T00:27:12Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0
}

View file

@ -222,11 +222,11 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-09-11T18:35:07Z",
"updated_at": "2022-09-19T16:40:30Z",
"pushed_at": "2022-08-02T13:18:24Z",
"stargazers_count": 1005,
"watchers_count": 1005,
"forks_count": 449,
"stargazers_count": 1006,
"watchers_count": 1006,
"forks_count": 448,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -234,8 +234,8 @@
"log4shell"
],
"visibility": "public",
"forks": 449,
"watchers": 1005,
"forks": 448,
"watchers": 1006,
"score": 0
},
{
@ -426,7 +426,7 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-09-18T11:41:28Z",
"updated_at": "2022-09-19T16:40:27Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1471,
"watchers_count": 1471,
@ -523,10 +523,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-09-15T09:35:57Z",
"updated_at": "2022-09-19T17:40:24Z",
"pushed_at": "2022-08-31T05:56:13Z",
"stargazers_count": 508,
"watchers_count": 508,
"stargazers_count": 509,
"watchers_count": 509,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
@ -539,7 +539,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 508,
"watchers": 509,
"score": 0
},
{
@ -1337,7 +1337,7 @@
"pushed_at": "2022-05-05T08:50:49Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1349,7 +1349,7 @@
"poc"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 57,
"score": 0
},
@ -1479,10 +1479,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-09-19T06:27:57Z",
"updated_at": "2022-09-19T17:46:07Z",
"pushed_at": "2022-09-11T03:55:38Z",
"stargazers_count": 3049,
"watchers_count": 3049,
"stargazers_count": 3048,
"watchers_count": 3048,
"forks_count": 728,
"allow_forking": true,
"is_template": false,
@ -1490,7 +1490,7 @@
"topics": [],
"visibility": "public",
"forks": 728,
"watchers": 3049,
"watchers": 3048,
"score": 0
},
{
@ -2227,10 +2227,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-09-15T19:43:29Z",
"updated_at": "2022-09-19T14:56:07Z",
"pushed_at": "2022-04-24T08:56:47Z",
"stargazers_count": 352,
"watchers_count": 352,
"stargazers_count": 353,
"watchers_count": 353,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@ -2244,7 +2244,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 352,
"watchers": 353,
"score": 0
},
{
@ -5885,7 +5885,7 @@
"fork": false,
"created_at": "2021-12-24T20:00:12Z",
"updated_at": "2022-01-06T13:31:29Z",
"pushed_at": "2022-08-19T17:30:14Z",
"pushed_at": "2022-09-19T17:30:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -657,10 +657,10 @@
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-09T02:47:08Z",
"updated_at": "2022-09-15T07:14:09Z",
"updated_at": "2022-09-19T14:03:55Z",
"pushed_at": "2022-03-09T02:47:32Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -670,7 +670,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 29,
"watchers": 30,
"score": 0
},
{

View file

@ -122,18 +122,18 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-09-18T10:02:20Z",
"updated_at": "2022-09-19T15:08:45Z",
"pushed_at": "2022-08-04T18:26:18Z",
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 213,
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 212,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 213,
"watchers": 267,
"forks": 212,
"watchers": 268,
"score": 0
},
{

View file

@ -58,10 +58,10 @@
"description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload",
"fork": false,
"created_at": "2022-09-01T04:36:50Z",
"updated_at": "2022-09-19T10:46:53Z",
"updated_at": "2022-09-19T14:28:27Z",
"pushed_at": "2022-09-02T11:00:28Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -69,7 +69,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-09-12T14:59:22Z",
"updated_at": "2022-09-19T14:10:54Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 83,
"watchers": 82,
"score": 0
},
{
@ -125,18 +125,18 @@
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
"fork": false,
"created_at": "2022-09-18T21:35:19Z",
"updated_at": "2022-09-19T02:38:20Z",
"updated_at": "2022-09-19T13:10:06Z",
"pushed_at": "2022-09-18T21:38:47Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-09-19T09:16:09Z",
"updated_at": "2022-09-19T14:12:08Z",
"pushed_at": "2022-08-29T12:54:56Z",
"stargazers_count": 768,
"watchers_count": 768,
"stargazers_count": 769,
"watchers_count": 769,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 138,
"watchers": 768,
"watchers": 769,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-09-19T09:46:17Z",
"updated_at": "2022-09-19T15:00:45Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 308,
"watchers": 309,
"score": 0
},
{

View file

@ -773,10 +773,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-09-15T14:21:09Z",
"updated_at": "2022-09-19T17:19:31Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 333,
"watchers_count": 333,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -784,7 +784,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 332,
"watchers": 333,
"score": 0
},
{
@ -1950,15 +1950,20 @@
"description": "Proof of concept for CVE-2022-30190 (Follina).",
"fork": false,
"created_at": "2022-09-15T16:12:57Z",
"updated_at": "2022-09-16T01:01:09Z",
"pushed_at": "2022-09-16T18:46:13Z",
"updated_at": "2022-09-19T17:13:56Z",
"pushed_at": "2022-09-19T17:32:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2021-40444",
"follina",
"remote-code-execution",
"trojan"
],
"visibility": "public",
"forks": 1,
"watchers": 1,

35
2022/CVE-2022-31814.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 538083210,
"name": "SenselessViolence",
"full_name": "EvergreenCartoons\/SenselessViolence",
"owner": {
"login": "EvergreenCartoons",
"id": 113829980,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113829980?v=4",
"html_url": "https:\/\/github.com\/EvergreenCartoons"
},
"html_url": "https:\/\/github.com\/EvergreenCartoons\/SenselessViolence",
"description": "CVE-2022-31814 Exploitation Toolkit.",
"fork": false,
"created_at": "2022-09-18T11:10:04Z",
"updated_at": "2022-09-19T13:55:37Z",
"pushed_at": "2022-09-19T13:24:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"hacking",
"pfsense",
"security-tools"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Turning Your Computer Into a GPS Tracker With Apple Maps",
"fork": false,
"created_at": "2022-09-18T15:51:52Z",
"updated_at": "2022-09-19T07:30:38Z",
"updated_at": "2022-09-19T16:41:57Z",
"pushed_at": "2022-09-18T16:57:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -25,8 +25,8 @@
"macos"
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"forks": 3,
"watchers": 9,
"score": 0
}
]

View file

@ -79,18 +79,18 @@
"description": null,
"fork": false,
"created_at": "2022-07-20T22:52:43Z",
"updated_at": "2022-07-25T09:44:37Z",
"updated_at": "2022-09-19T13:06:15Z",
"pushed_at": "2022-07-20T22:53:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0
},
{

View file

@ -61,6 +61,34 @@
"watchers": 4,
"score": 0
},
{
"id": 533698492,
"name": "CVE-2022-36804",
"full_name": "notdls\/CVE-2022-36804",
"owner": {
"login": "notdls",
"id": 25024098,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25024098?v=4",
"html_url": "https:\/\/github.com\/notdls"
},
"html_url": "https:\/\/github.com\/notdls\/CVE-2022-36804",
"description": "A real exploit for BitBucket RCE CVE-2022-36804",
"fork": false,
"created_at": "2022-09-07T09:35:49Z",
"updated_at": "2022-09-19T16:14:37Z",
"pushed_at": "2022-09-07T12:09:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 534942603,
"name": "CVE-2022-36804-MASS-RCE",
@ -116,5 +144,61 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 538498180,
"name": "CVE-2022-36804-POC-RCE",
"full_name": "CEOrbey\/CVE-2022-36804-POC-RCE",
"owner": {
"login": "CEOrbey",
"id": 112818434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112818434?v=4",
"html_url": "https:\/\/github.com\/CEOrbey"
},
"html_url": "https:\/\/github.com\/CEOrbey\/CVE-2022-36804-POC-RCE",
"description": null,
"fork": false,
"created_at": "2022-09-19T12:46:33Z",
"updated_at": "2022-09-19T12:53:13Z",
"pushed_at": "2022-09-19T13:03:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 538510407,
"name": "CVE-2022-36804-PoC",
"full_name": "notxesh\/CVE-2022-36804-PoC",
"owner": {
"login": "notxesh",
"id": 49665312,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49665312?v=4",
"html_url": "https:\/\/github.com\/notxesh"
},
"html_url": "https:\/\/github.com\/notxesh\/CVE-2022-36804-PoC",
"description": "Proof of Concept exploit for CVE-2022-36804 affecting BitBucket versions <8.3.1",
"fork": false,
"created_at": "2022-09-19T13:15:13Z",
"updated_at": "2022-09-19T17:24:58Z",
"pushed_at": "2022-09-19T13:49:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2022-09-19T06:24:07Z",
"updated_at": "2022-09-19T17:55:22Z",
"pushed_at": "2022-09-14T07:45:40Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 145,
"watchers": 148,
"score": 0
},
{

View file

@ -3190,6 +3190,14 @@ do_request in request.c in muhttpd before 1.1.7 allows remote attackers to read
- [xpgdgit/CVE-2022-31793](https://github.com/xpgdgit/CVE-2022-31793)
### CVE-2022-31814 (2022-09-05)
<code>
pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.
</code>
- [EvergreenCartoons/SenselessViolence](https://github.com/EvergreenCartoons/SenselessViolence)
### CVE-2022-31854 (2022-07-07)
<code>
@ -3543,8 +3551,11 @@ Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 befor
- [cryptolakk/CVE-2022-36804-RCE](https://github.com/cryptolakk/CVE-2022-36804-RCE)
- [CEOrbey/CVE-2022-36804-POC](https://github.com/CEOrbey/CVE-2022-36804-POC)
- [notdls/CVE-2022-36804](https://github.com/notdls/CVE-2022-36804)
- [CEOrbey/CVE-2022-36804-MASS-RCE](https://github.com/CEOrbey/CVE-2022-36804-MASS-RCE)
- [CEOrbey/CVE-2022-36804-RCE](https://github.com/CEOrbey/CVE-2022-36804-RCE)
- [CEOrbey/CVE-2022-36804-POC-RCE](https://github.com/CEOrbey/CVE-2022-36804-POC-RCE)
- [notxesh/CVE-2022-36804-PoC](https://github.com/notxesh/CVE-2022-36804-PoC)
### CVE-2022-36946 (2022-07-27)
@ -3591,7 +3602,12 @@ JFinal CMS 5.1.0 is vulnerable to SQL Injection.
### CVE-2022-37202
- [AgainstTheLight/CVE-2022-37202](https://github.com/AgainstTheLight/CVE-2022-37202)
### CVE-2022-37203
### CVE-2022-37203 (2022-09-19)
<code>
JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
</code>
- [AgainstTheLight/CVE-2022-37203](https://github.com/AgainstTheLight/CVE-2022-37203)
### CVE-2022-37204