Auto Update 2022/04/20 12:19:26

This commit is contained in:
motikan2010-bot 2022-04-20 21:19:26 +09:00
parent 6d0b01d416
commit 46adff4333
63 changed files with 503 additions and 359 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-02-10T20:07:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
}

View file

@ -17,14 +17,14 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 105,
"forks_count": 106,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2008-0166"
],
"visibility": "public",
"forks": 105,
"forks": 106,
"watchers": 336,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-20T05:31:52Z",
"updated_at": "2022-04-20T07:37:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1328,
"watchers_count": 1328,
"stargazers_count": 1330,
"watchers_count": 1330,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 287,
"watchers": 1328,
"watchers": 1330,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-20T05:31:52Z",
"updated_at": "2022-04-20T07:37:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1328,
"watchers_count": 1328,
"stargazers_count": 1330,
"watchers_count": 1330,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 287,
"watchers": 1328,
"watchers": 1330,
"score": 0
},
{

View file

@ -492,5 +492,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 483583125,
"name": "CVE-2017-0199",
"full_name": "Phantomlancer123\/CVE-2017-0199",
"owner": {
"login": "Phantomlancer123",
"id": 102849364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102849364?v=4",
"html_url": "https:\/\/github.com\/Phantomlancer123"
},
"html_url": "https:\/\/github.com\/Phantomlancer123\/CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2022-04-20T09:07:52Z",
"updated_at": "2022-04-20T10:30:42Z",
"pushed_at": "2022-04-20T09:09:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-20T05:31:52Z",
"updated_at": "2022-04-20T07:37:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1328,
"watchers_count": 1328,
"stargazers_count": 1330,
"watchers_count": 1330,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 287,
"watchers": 1328,
"watchers": 1330,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-04-04T16:34:45Z",
"updated_at": "2022-04-20T06:20:14Z",
"pushed_at": "2022-02-23T00:44:17Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2022-03-16T13:26:43Z",
"updated_at": "2022-04-20T07:36:59Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 548,
"watchers_count": 548,
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 548,
"watchers": 547,
"score": 0
},
{

View file

@ -121,7 +121,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-13T19:44:19Z",
"updated_at": "2022-04-18T10:56:11Z",
"updated_at": "2022-04-20T06:32:51Z",
"pushed_at": "2022-04-13T19:46:12Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -204,5 +204,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 483543263,
"name": "CVE-2017-9841",
"full_name": "jax7sec\/CVE-2017-9841",
"owner": {
"login": "jax7sec",
"id": 102047728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102047728?v=4",
"html_url": "https:\/\/github.com\/jax7sec"
},
"html_url": "https:\/\/github.com\/jax7sec\/CVE-2017-9841",
"description": "CVE-2017-9841批量扫描及利用脚本。PHPUnit是其中的一个基于PHP的测试框架。 PHPUnit 4.8.28之前的版本和5.6.3之前的5.x版本中的Util\/PHP\/eval-stdin.php文件存在安全漏洞。远程攻击者可通过发送以<?php字符串开头的HTTP POST数据利用该漏洞执行任意PHP代码。",
"fork": false,
"created_at": "2022-04-20T07:01:20Z",
"updated_at": "2022-04-20T08:32:02Z",
"pushed_at": "2022-04-20T08:31:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-20T05:31:52Z",
"updated_at": "2022-04-20T07:37:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1328,
"watchers_count": 1328,
"stargazers_count": 1330,
"watchers_count": 1330,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 287,
"watchers": 1328,
"watchers": 1330,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2022-03-16T13:26:43Z",
"updated_at": "2022-04-20T07:36:59Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 548,
"watchers_count": 548,
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 548,
"watchers": 547,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-04-08T08:26:26Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 129,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2022-03-17T16:53:08Z",
"updated_at": "2022-04-20T09:35:49Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 117,
"watchers": 118,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-20T02:39:37Z",
"updated_at": "2022-04-20T10:57:41Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3265,
"watchers_count": 3265,
"forks_count": 969,
"stargazers_count": 3266,
"watchers_count": 3266,
"forks_count": 970,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 969,
"watchers": 3265,
"forks": 970,
"watchers": 3266,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-04-04T16:34:45Z",
"updated_at": "2022-04-20T06:20:14Z",
"pushed_at": "2022-02-23T00:44:17Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-20T05:31:52Z",
"updated_at": "2022-04-20T07:37:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1328,
"watchers_count": 1328,
"stargazers_count": 1330,
"watchers_count": 1330,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 287,
"watchers": 1328,
"watchers": 1330,
"score": 0
}
]

View file

@ -175,17 +175,17 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2022-04-18T06:02:14Z",
"updated_at": "2022-04-20T08:27:19Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 419,
"watchers_count": 419,
"stargazers_count": 420,
"watchers_count": 420,
"forks_count": 160,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 160,
"watchers": 419,
"watchers": 420,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2022-04-13T15:59:57Z",
"updated_at": "2022-04-20T10:43:33Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 577,
"watchers_count": 577,
"stargazers_count": 578,
"watchers_count": 578,
"forks_count": 154,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 154,
"watchers": 577,
"watchers": 578,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "This is a RCE bluetooth vulnerability on Android 8.0 and 9.0",
"fork": false,
"created_at": "2020-07-01T00:23:33Z",
"updated_at": "2022-03-31T13:12:51Z",
"updated_at": "2022-04-20T09:40:31Z",
"pushed_at": "2021-07-23T23:23:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2022-04-14T18:34:30Z",
"updated_at": "2022-04-20T07:46:15Z",
"pushed_at": "2022-04-15T06:57:49Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 35,
"watchers": 36,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-09-10T08:01:54Z",
"updated_at": "2021-10-15T08:10:42Z",
"updated_at": "2022-04-20T07:48:36Z",
"pushed_at": "2021-10-15T08:10:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

29
2020/CVE-2020-0380.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 483531367,
"name": "system_bt_AOSP10_r33_CVE-2020-0380",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2020-0380",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2020-0380",
"description": null,
"fork": false,
"created_at": "2022-04-20T06:19:13Z",
"updated_at": "2022-04-20T06:24:47Z",
"pushed_at": "2022-04-20T06:26:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2022-04-19T21:34:19Z",
"updated_at": "2022-04-20T07:16:57Z",
"pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 294,
"watchers_count": 294,
"stargazers_count": 295,
"watchers_count": 295,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 294,
"watchers": 295,
"score": 0
}
]

View file

@ -1582,17 +1582,17 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2022-04-06T21:41:05Z",
"updated_at": "2022-04-20T07:21:55Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 177,
"watchers": 178,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2020-07-25T11:56:48Z",
"updated_at": "2022-04-19T11:25:16Z",
"updated_at": "2022-04-20T09:35:52Z",
"pushed_at": "2020-07-27T02:43:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-20T02:39:37Z",
"updated_at": "2022-04-20T10:57:41Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3265,
"watchers_count": 3265,
"forks_count": 969,
"stargazers_count": 3266,
"watchers_count": 3266,
"forks_count": 970,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 969,
"watchers": 3265,
"forks": 970,
"watchers": 3266,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 86,
"score": 0
}

View file

@ -71,12 +71,12 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"forks": 67,
"watchers": 97,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-20T05:31:52Z",
"updated_at": "2022-04-20T07:37:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1328,
"watchers_count": 1328,
"stargazers_count": 1330,
"watchers_count": 1330,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 287,
"watchers": 1328,
"watchers": 1330,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-19T17:07:23Z",
"updated_at": "2022-04-19T19:14:52Z",
"pushed_at": "2022-04-19T19:41:31Z",
"pushed_at": "2022-04-20T07:35:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -99,17 +99,17 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2022-04-14T21:09:33Z",
"updated_at": "2022-04-20T09:28:22Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 360,
"watchers_count": 360,
"stargazers_count": 361,
"watchers_count": 361,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 360,
"watchers": 361,
"score": 0
},
{

29
2021/CVE-2021-0433.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 483637216,
"name": "frameworks_base_AOSP10_r33_CVE-2021-0433",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0433",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2021-0433",
"description": null,
"fork": false,
"created_at": "2022-04-20T12:03:35Z",
"updated_at": "2022-04-20T12:15:48Z",
"pushed_at": "2022-04-20T12:15:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-0475.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 483536184,
"name": "system_bt_AOSP10_r33_CVE-2021-0475",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0475",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2021-0475",
"description": null,
"fork": false,
"created_at": "2022-04-20T06:36:43Z",
"updated_at": "2022-04-20T06:45:49Z",
"pushed_at": "2022-04-20T06:47:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
"updated_at": "2022-03-05T15:27:21Z",
"updated_at": "2022-04-20T08:01:06Z",
"pushed_at": "2021-07-07T15:43:05Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 215,
"watchers": 214,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-07T09:59:47Z",
"updated_at": "2021-02-07T10:35:05Z",
"updated_at": "2022-04-20T06:48:02Z",
"pushed_at": "2021-02-07T10:03:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,31 +1,4 @@
[
{
"id": 430315623,
"name": "spring-cloud-netflix-hystrix-dashboard-cve-2021-22053",
"full_name": "SecCoder-Security-Lab\/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053",
"owner": {
"login": "SecCoder-Security-Lab",
"id": 92973688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92973688?v=4",
"html_url": "https:\/\/github.com\/SecCoder-Security-Lab"
},
"html_url": "https:\/\/github.com\/SecCoder-Security-Lab\/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053",
"description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
"fork": false,
"created_at": "2021-11-21T08:47:56Z",
"updated_at": "2022-03-28T08:24:53Z",
"pushed_at": "2021-11-21T08:52:47Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"score": 0
},
{
"id": 430821052,
"name": "CVE-2021-22053",

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 64,
"score": 0
},

View file

@ -287,17 +287,17 @@
"description": "Laravel RCE (CVE-2021-3129)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2022-04-20T00:47:22Z",
"updated_at": "2022-04-20T07:49:39Z",
"pushed_at": "2022-04-18T23:24:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"forks": 4,
"watchers": 10,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2022-04-20T02:05:47Z",
"updated_at": "2022-04-20T07:58:17Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 93,
"watchers": 96,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2022-03-22T03:51:12Z",
"updated_at": "2022-04-20T09:51:35Z",
"pushed_at": "2021-08-25T01:00:49Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 41,
"watchers": 220,
"watchers": 221,
"score": 0
}
]

View file

@ -1,56 +0,0 @@
[
{
"id": 429731870,
"name": "CVE-2021-37580",
"full_name": "Liang2580\/CVE-2021-37580",
"owner": {
"login": "Liang2580",
"id": 27684409,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27684409?v=4",
"html_url": "https:\/\/github.com\/Liang2580"
},
"html_url": "https:\/\/github.com\/Liang2580\/CVE-2021-37580",
"description": "CVE-2021-37580",
"fork": false,
"created_at": "2021-11-19T09:00:37Z",
"updated_at": "2022-01-08T11:00:20Z",
"pushed_at": "2021-11-19T09:03:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0
},
{
"id": 429816997,
"name": "CVE-2021-37580",
"full_name": "Wing-song\/CVE-2021-37580",
"owner": {
"login": "Wing-song",
"id": 40231286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40231286?v=4",
"html_url": "https:\/\/github.com\/Wing-song"
},
"html_url": "https:\/\/github.com\/Wing-song\/CVE-2021-37580",
"description": " Apache ShenYu 管理员认证绕过 ",
"fork": false,
"created_at": "2021-11-19T13:59:26Z",
"updated_at": "2021-11-19T15:23:18Z",
"pushed_at": "2021-11-19T15:23:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -158,7 +158,7 @@
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 838,
"watchers_count": 838,
"forks_count": 270,
"forks_count": 269,
"allow_forking": true,
"is_template": false,
"topics": [
@ -167,7 +167,7 @@
"poc"
],
"visibility": "public",
"forks": 270,
"forks": 269,
"watchers": 838,
"score": 0
},
@ -1205,12 +1205,12 @@
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 57,
"score": 0
},
@ -1788,17 +1788,17 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-04-20T02:54:34Z",
"updated_at": "2022-04-20T08:27:07Z",
"pushed_at": "2022-04-19T12:33:32Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 241,
"watchers": 242,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-04-20T01:40:48Z",
"updated_at": "2022-04-20T09:10:59Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1393,
"watchers_count": 1393,
"stargazers_count": 1394,
"watchers_count": 1394,
"forks_count": 454,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 454,
"watchers": 1393,
"watchers": 1394,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2022-04-16T22:45:27Z",
"updated_at": "2022-04-20T11:51:30Z",
"pushed_at": "2022-04-19T10:30:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -125,12 +125,12 @@
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 361,
"watchers_count": 361,
"forks_count": 112,
"forks_count": 111,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 112,
"forks": 111,
"watchers": 361,
"score": 0
},
@ -394,14 +394,14 @@
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 977,
"watchers_count": 977,
"forks_count": 434,
"forks_count": 435,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 434,
"forks": 435,
"watchers": 977,
"score": 0
},
@ -880,10 +880,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-04-20T02:14:31Z",
"updated_at": "2022-04-20T09:46:16Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1323,
"watchers_count": 1323,
"stargazers_count": 1325,
"watchers_count": 1325,
"forks_count": 362,
"allow_forking": true,
"is_template": false,
@ -895,7 +895,7 @@
],
"visibility": "public",
"forks": 362,
"watchers": 1323,
"watchers": 1325,
"score": 0
},
{
@ -1208,10 +1208,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-04-19T16:45:00Z",
"updated_at": "2022-04-20T07:23:10Z",
"pushed_at": "2022-04-16T04:01:01Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 70,
"allow_forking": true,
"is_template": false,
@ -1223,7 +1223,7 @@
],
"visibility": "public",
"forks": 70,
"watchers": 299,
"watchers": 300,
"score": 0
},
{
@ -3465,17 +3465,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-04-17T16:57:45Z",
"updated_at": "2022-04-20T07:20:08Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2840,
"watchers_count": 2840,
"stargazers_count": 2839,
"watchers_count": 2839,
"forks_count": 691,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 691,
"watchers": 2840,
"watchers": 2839,
"score": 0
},
{
@ -5305,10 +5305,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-04-20T03:39:49Z",
"updated_at": "2022-04-20T11:26:36Z",
"pushed_at": "2022-01-27T16:08:20Z",
"stargazers_count": 414,
"watchers_count": 414,
"stargazers_count": 413,
"watchers_count": 413,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -5324,7 +5324,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 414,
"watchers": 413,
"score": 0
},
{
@ -5775,10 +5775,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-04-04T16:34:45Z",
"updated_at": "2022-04-20T06:20:14Z",
"pushed_at": "2022-02-23T00:44:17Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -5804,7 +5804,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2021-44529 Ivanti EPM 云服务设备 (CSA) 中的代码注入漏洞允许未经身份验证的用户以有限的权限nobody执行任意代码。",
"fork": false,
"created_at": "2022-04-16T15:19:39Z",
"updated_at": "2022-04-19T00:25:49Z",
"updated_at": "2022-04-20T11:03:48Z",
"pushed_at": "2022-04-16T15:20:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-13T09:00:44Z",
"updated_at": "2022-04-13T09:06:08Z",
"pushed_at": "2022-04-19T07:57:52Z",
"pushed_at": "2022-04-20T07:37:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
"updated_at": "2022-04-14T16:06:58Z",
"updated_at": "2022-04-20T08:10:21Z",
"pushed_at": "2022-04-03T15:07:31Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 166,
"watchers": 167,
"score": 0
},
{

View file

@ -337,17 +337,17 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2022-04-18T15:45:52Z",
"updated_at": "2022-04-20T10:00:35Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 33,
"watchers": 34,
"score": 0
},
{
@ -1105,12 +1105,12 @@
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"forks": 53,
"watchers": 237,
"score": 0
},
@ -1628,11 +1628,11 @@
"description": "Scripted Linux Privilege Escalation for the CVE-2022-0847 \"Dirty Pipe\" vulnerability",
"fork": false,
"created_at": "2022-04-17T04:28:24Z",
"updated_at": "2022-04-19T03:39:28Z",
"updated_at": "2022-04-20T11:04:08Z",
"pushed_at": "2022-04-18T10:20:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1648,8 +1648,8 @@
"security-tools"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"forks": 3,
"watchers": 3,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-15T19:37:35Z",
"updated_at": "2022-04-20T05:45:29Z",
"pushed_at": "2022-04-16T07:00:38Z",
"pushed_at": "2022-04-20T06:32:17Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,

56
2022/CVE-2022-21449.json Normal file
View file

@ -0,0 +1,56 @@
[
{
"id": 483607069,
"name": "jfrog-CVE-2022-21449",
"full_name": "jfrog\/jfrog-CVE-2022-21449",
"owner": {
"login": "jfrog",
"id": 499942,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499942?v=4",
"html_url": "https:\/\/github.com\/jfrog"
},
"html_url": "https:\/\/github.com\/jfrog\/jfrog-CVE-2022-21449",
"description": null,
"fork": false,
"created_at": "2022-04-20T10:23:07Z",
"updated_at": "2022-04-20T10:23:07Z",
"pushed_at": "2022-04-20T10:23:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 483632364,
"name": "CVE-2022-21449-vuln-test",
"full_name": "jmiettinen\/CVE-2022-21449-vuln-test",
"owner": {
"login": "jmiettinen",
"id": 724318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/724318?v=4",
"html_url": "https:\/\/github.com\/jmiettinen"
},
"html_url": "https:\/\/github.com\/jmiettinen\/CVE-2022-21449-vuln-test",
"description": "CVE-2022-21449 Vulnerability tester",
"fork": false,
"created_at": "2022-04-20T11:47:55Z",
"updated_at": "2022-04-20T11:48:13Z",
"pushed_at": "2022-04-20T11:48:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -260,7 +260,7 @@
"pushed_at": "2022-04-16T20:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -272,7 +272,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-04-18T14:21:20Z",
"updated_at": "2022-04-20T10:22:03Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 265,
"watchers": 266,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-04-20T03:18:41Z",
"updated_at": "2022-04-20T10:58:57Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 569,
"watchers_count": 569,
"stargazers_count": 570,
"watchers_count": 570,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 569,
"watchers": 570,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
"updated_at": "2022-04-12T10:32:19Z",
"updated_at": "2022-04-20T10:14:52Z",
"pushed_at": "2022-02-21T08:58:22Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 38,
"watchers": 39,
"score": 0
},
{

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-04-19T16:04:32Z",
"updated_at": "2022-04-20T09:15:25Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 209,
"watchers": 212,
"score": 0
},
{

View file

@ -85,7 +85,7 @@
"pushed_at": "2022-04-04T14:09:11Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 74,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"topics": [
@ -101,7 +101,7 @@
"working-example"
],
"visibility": "public",
"forks": 74,
"forks": 75,
"watchers": 82,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-04-04T16:34:45Z",
"updated_at": "2022-04-20T06:20:14Z",
"pushed_at": "2022-02-23T00:44:17Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-04-19T13:47:13Z",
"updated_at": "2022-04-20T07:40:16Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 374,
"watchers_count": 374,

View file

@ -40,17 +40,17 @@
"description": "Watchguard RCE POC CVE-2022-26318",
"fork": false,
"created_at": "2022-04-18T15:14:30Z",
"updated_at": "2022-04-19T08:32:21Z",
"updated_at": "2022-04-20T11:10:14Z",
"pushed_at": "2022-04-18T15:19:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -67,10 +67,10 @@
"description": "Remote Code Execution Exploit in the RPC Library",
"fork": false,
"created_at": "2022-04-14T08:12:24Z",
"updated_at": "2022-04-20T05:59:30Z",
"updated_at": "2022-04-20T10:26:38Z",
"pushed_at": "2022-04-19T17:04:04Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -79,7 +79,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 10,
"score": 0
},
{
@ -127,12 +127,12 @@
"pushed_at": "2022-04-15T03:54:36Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 63,
"score": 0
},
@ -150,11 +150,11 @@
"description": null,
"fork": false,
"created_at": "2022-04-16T14:09:59Z",
"updated_at": "2022-04-20T01:29:12Z",
"updated_at": "2022-04-20T11:17:39Z",
"pushed_at": "2022-04-19T08:30:25Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 14,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [
@ -165,8 +165,8 @@
"rce"
],
"visibility": "public",
"forks": 14,
"watchers": 37,
"forks": 16,
"watchers": 41,
"score": 0
},
{
@ -183,17 +183,17 @@
"description": "A proof of concept of the CVE-2022-26809-RCE vulnerability.",
"fork": false,
"created_at": "2022-04-18T03:45:45Z",
"updated_at": "2022-04-18T03:47:08Z",
"updated_at": "2022-04-20T11:08:26Z",
"pushed_at": "2022-04-18T05:57:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
{
@ -210,17 +210,17 @@
"description": "vuln scaner and exploit ",
"fork": false,
"created_at": "2022-04-18T19:26:59Z",
"updated_at": "2022-04-20T03:41:16Z",
"updated_at": "2022-04-20T11:42:55Z",
"pushed_at": "2022-04-18T20:28:21Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 3,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"forks": 4,
"watchers": 29,
"score": 0
},
{
@ -264,17 +264,17 @@
"description": "CVE-2022-26809 exploit",
"fork": false,
"created_at": "2022-04-19T09:28:28Z",
"updated_at": "2022-04-19T18:33:57Z",
"updated_at": "2022-04-20T11:11:16Z",
"pushed_at": "2022-04-19T09:37:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -291,10 +291,10 @@
"description": "cve-2022-26809 Remote Code Execution Exploit in the RPC Library ",
"fork": false,
"created_at": "2022-04-19T10:01:54Z",
"updated_at": "2022-04-20T03:00:10Z",
"updated_at": "2022-04-20T09:18:42Z",
"pushed_at": "2022-04-19T10:35:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -305,7 +305,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-04-20T06:08:13Z",
"updated_at": "2022-04-20T12:18:45Z",
"pushed_at": "2022-04-19T12:03:49Z",
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 77,
"stargazers_count": 511,
"watchers_count": 511,
"forks_count": 80,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 492,
"forks": 80,
"watchers": 511,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "Powershell to mitigate CVE-2022-29072",
"fork": false,
"created_at": "2022-04-18T17:08:43Z",
"updated_at": "2022-04-19T18:21:22Z",
"updated_at": "2022-04-20T11:54:30Z",
"pushed_at": "2022-04-18T22:29:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -272,6 +272,15 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [Mr-xn/CVE-2022-21371](https://github.com/Mr-xn/CVE-2022-21371)
### CVE-2022-21449 (2022-04-19)
<code>
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
</code>
- [jfrog/jfrog-CVE-2022-21449](https://github.com/jfrog/jfrog-CVE-2022-21449)
- [jmiettinen/CVE-2022-21449-vuln-test](https://github.com/jmiettinen/CVE-2022-21449-vuln-test)
### CVE-2022-21658 (2022-01-20)
<code>
@ -853,7 +862,12 @@ ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution v
- [gerr-re/cve-2022-24644](https://github.com/gerr-re/cve-2022-24644)
### CVE-2022-24675
### CVE-2022-24675 (2022-04-20)
<code>
encoding/pem in Go before 1.17.9 and 1.8.x before 1.8.1 has a Decode stack overflow via a large amount of PEM data.
</code>
- [jfrog/jfrog-CVE-2022-24675](https://github.com/jfrog/jfrog-CVE-2022-24675)
### CVE-2022-24693 (2022-03-29)
@ -1310,6 +1324,14 @@ In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise
- [Satheesh575555/System_bt_AOSP10-r33_CVE-2021-0397](https://github.com/Satheesh575555/System_bt_AOSP10-r33_CVE-2021-0397)
### CVE-2021-0433 (2021-04-13)
<code>
In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090
</code>
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0433](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0433)
### CVE-2021-0472 (2021-06-11)
<code>
@ -1318,6 +1340,14 @@ In shouldLockKeyguard of LockTaskController.java, there is a possible way to exi
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0472](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0472)
### CVE-2021-0475 (2021-06-11)
<code>
In on_l2cap_data_ind of btif_sock_l2cap.cc, there is possible memory corruption due to a use after free. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-175686168
</code>
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0475](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2021-0475)
### CVE-2021-0476 (2021-06-11)
<code>
@ -2402,7 +2432,6 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.
</code>
- [SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053](https://github.com/SecCoder-Security-Lab/spring-cloud-netflix-hystrix-dashboard-cve-2021-22053)
- [Vulnmachines/CVE-2021-22053](https://github.com/Vulnmachines/CVE-2021-22053)
### CVE-2021-22192 (2021-03-24)
@ -3783,15 +3812,6 @@ Windows Elevation of Privilege Vulnerability
- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal)
### CVE-2021-37580 (2021-11-16)
<code>
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
</code>
- [Liang2580/CVE-2021-37580](https://github.com/Liang2580/CVE-2021-37580)
- [Wing-song/CVE-2021-37580](https://github.com/Wing-song/CVE-2021-37580)
### CVE-2021-37624 (2021-10-25)
<code>
@ -5580,6 +5600,14 @@ In gatt_process_read_by_type_rsp of gatt_cl.cc, there is a possible out of bound
- [Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0377](https://github.com/Satheesh575555/system_bt_AOSP10_r33_CVE-2020-0377)
### CVE-2020-0380 (2020-09-17)
<code>
In allocExcessBits of bitalloc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146398979
</code>
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2020-0380](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2020-0380)
### CVE-2020-0391 (2020-09-17)
<code>
@ -17860,6 +17888,7 @@ Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1,
- [jacobsoo/RTF-Cleaner](https://github.com/jacobsoo/RTF-Cleaner)
- [likescam/CVE-2017-0199](https://github.com/likescam/CVE-2017-0199)
- [stealth-ronin/CVE-2017-0199-PY-KIT](https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT)
- [Phantomlancer123/CVE-2017-0199](https://github.com/Phantomlancer123/CVE-2017-0199)
### CVE-2017-0204 (2017-04-12)
@ -19161,6 +19190,7 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem
- [rodnt/laravel-phpunit-rce-masscaner](https://github.com/rodnt/laravel-phpunit-rce-masscaner)
- [akr3ch/CVE-2017-9841](https://github.com/akr3ch/CVE-2017-9841)
- [0zvxr/CVE-2017-9841](https://github.com/0zvxr/CVE-2017-9841)
- [jax7sec/CVE-2017-9841](https://github.com/jax7sec/CVE-2017-9841)
### CVE-2017-9934 (2017-07-17)