Auto Update 2023/04/25 06:30:50

This commit is contained in:
motikan2010-bot 2023-04-25 15:30:50 +09:00
parent b0dbce4135
commit 4cecb280f0
46 changed files with 248 additions and 177 deletions

View file

@ -13,10 +13,10 @@
"description": "Linux local root exploit for CVE-2014-0038",
"fork": false,
"created_at": "2014-02-02T12:34:57Z",
"updated_at": "2023-03-21T10:06:05Z",
"updated_at": "2023-04-25T01:19:03Z",
"pushed_at": "2014-04-18T10:26:02Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 192,
"watchers": 191,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z",
"updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667,
"watchers_count": 1667,
"stargazers_count": 1668,
"watchers_count": 1668,
"has_discussions": false,
"forks_count": 325,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 325,
"watchers": 1667,
"watchers": 1668,
"score": 0
},
{

View file

@ -433,10 +433,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-04-21T20:31:56Z",
"updated_at": "2023-04-25T04:23:52Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 729,
"watchers_count": 729,
"stargazers_count": 728,
"watchers_count": 728,
"has_discussions": false,
"forks_count": 434,
"allow_forking": true,
@ -449,7 +449,7 @@
],
"visibility": "public",
"forks": 434,
"watchers": 729,
"watchers": 728,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2023-04-16T11:34:13Z",
"updated_at": "2023-04-25T03:49:01Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 532,
"watchers_count": 532,
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 260,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 260,
"watchers": 532,
"watchers": 531,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z",
"updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667,
"watchers_count": 1667,
"stargazers_count": 1668,
"watchers_count": 1668,
"has_discussions": false,
"forks_count": 325,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 325,
"watchers": 1667,
"watchers": 1668,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2023-04-03T16:02:52Z",
"updated_at": "2023-04-25T01:52:13Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 721,
"watchers_count": 721,
"stargazers_count": 722,
"watchers_count": 722,
"has_discussions": false,
"forks_count": 185,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 185,
"watchers": 721,
"watchers": 722,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z",
"updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667,
"watchers_count": 1667,
"stargazers_count": 1668,
"watchers_count": 1668,
"has_discussions": false,
"forks_count": 325,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 325,
"watchers": 1667,
"watchers": 1668,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2023-04-20T23:07:01Z",
"updated_at": "2023-04-25T00:41:16Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 478,
"watchers_count": 478,
"stargazers_count": 477,
"watchers_count": 477,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 478,
"watchers": 477,
"score": 0
},
{

View file

@ -14,17 +14,17 @@
"fork": false,
"created_at": "2019-09-12T21:52:55Z",
"updated_at": "2023-01-26T00:33:33Z",
"pushed_at": "2019-09-12T22:19:47Z",
"pushed_at": "2023-04-25T05:29:09Z",
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 33,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-23T13:05:32Z",
"updated_at": "2023-04-25T03:32:26Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3734,
"watchers_count": 3734,
"stargazers_count": 3735,
"watchers_count": 3735,
"has_discussions": false,
"forks_count": 1077,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1077,
"watchers": 3734,
"watchers": 3735,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z",
"updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667,
"watchers_count": 1667,
"stargazers_count": 1668,
"watchers_count": 1668,
"has_discussions": false,
"forks_count": 325,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 325,
"watchers": 1667,
"watchers": 1668,
"score": 0
}
]

View file

@ -403,10 +403,10 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2023-04-21T05:13:57Z",
"updated_at": "2023-04-25T02:19:39Z",
"pushed_at": "2023-02-26T07:01:03Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -420,7 +420,7 @@
],
"visibility": "public",
"forks": 118,
"watchers": 301,
"watchers": 303,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2023-04-04T06:38:05Z",
"updated_at": "2023-04-25T03:49:10Z",
"pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 184,
"watchers": 183,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-23T13:05:32Z",
"updated_at": "2023-04-25T03:32:26Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3734,
"watchers_count": 3734,
"stargazers_count": 3735,
"watchers_count": 3735,
"has_discussions": false,
"forks_count": 1077,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1077,
"watchers": 3734,
"watchers": 3735,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
"fork": false,
"created_at": "2020-12-24T04:00:29Z",
"updated_at": "2023-02-01T03:02:36Z",
"updated_at": "2023-04-25T03:49:13Z",
"pushed_at": "2020-12-24T06:02:53Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 52,
"watchers": 51,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z",
"updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667,
"watchers_count": 1667,
"stargazers_count": 1668,
"watchers_count": 1668,
"has_discussions": false,
"forks_count": 325,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 325,
"watchers": 1667,
"watchers": 1668,
"score": 0
},
{

View file

@ -105,10 +105,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2023-04-24T04:19:52Z",
"updated_at": "2023-04-25T03:34:58Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 490,
"watchers_count": 490,
"stargazers_count": 491,
"watchers_count": 491,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -117,7 +117,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 490,
"watchers": 491,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-04-23T14:15:06Z",
"updated_at": "2023-04-25T03:43:56Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1680,
"watchers_count": 1680,
"stargazers_count": 1679,
"watchers_count": 1679,
"has_discussions": false,
"forks_count": 585,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 585,
"watchers": 1680,
"watchers": 1679,
"score": 0
},
{

View file

@ -778,10 +778,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-24T07:20:09Z",
"updated_at": "2023-04-25T04:24:03Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 896,
"watchers_count": 896,
"stargazers_count": 897,
"watchers_count": 897,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -797,7 +797,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 896,
"watchers": 897,
"score": 0
}
]

View file

@ -1412,5 +1412,34 @@
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 632273646,
"name": "cve-2021-26855",
"full_name": "iceberg-N\/cve-2021-26855",
"owner": {
"login": "iceberg-N",
"id": 110767603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110767603?v=4",
"html_url": "https:\/\/github.com\/iceberg-N"
},
"html_url": "https:\/\/github.com\/iceberg-N\/cve-2021-26855",
"description": null,
"fork": false,
"created_at": "2023-04-25T04:29:35Z",
"updated_at": "2023-04-25T04:29:36Z",
"pushed_at": "2023-04-25T04:31:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2022-01-14T05:52:17Z",
"updated_at": "2022-12-25T09:32:26Z",
"updated_at": "2023-04-25T01:56:36Z",
"pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -2998,7 +2998,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -3009,7 +3009,7 @@
"python3"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 4,
"score": 0
},

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-04-24T19:21:01Z",
"updated_at": "2023-04-25T04:24:10Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 566,
"watchers_count": 566,
"stargazers_count": 565,
"watchers_count": 565,
"has_discussions": false,
"forks_count": 102,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 102,
"watchers": 566,
"watchers": 565,
"score": 0
},
{

View file

@ -1259,10 +1259,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-04-24T10:36:20Z",
"updated_at": "2023-04-25T05:45:23Z",
"pushed_at": "2023-03-21T03:01:52Z",
"stargazers_count": 657,
"watchers_count": 657,
"stargazers_count": 659,
"watchers_count": 659,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -1276,7 +1276,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 657,
"watchers": 659,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 76,
"score": 0
},

View file

@ -187,10 +187,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-22T09:16:58Z",
"updated_at": "2023-03-22T09:20:27Z",
"updated_at": "2023-04-25T01:05:15Z",
"pushed_at": "2023-03-22T09:20:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -199,7 +199,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -709,10 +709,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-24T07:20:09Z",
"updated_at": "2023-04-25T04:24:03Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 896,
"watchers_count": 896,
"stargazers_count": 897,
"watchers_count": 897,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -728,7 +728,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 896,
"watchers": 897,
"score": 0
},
{

View file

@ -249,10 +249,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2023-04-20T01:46:39Z",
"updated_at": "2023-04-25T01:46:58Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 348,
"watchers_count": 348,
"stargazers_count": 349,
"watchers_count": 349,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -261,7 +261,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 348,
"watchers": 349,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
"fork": false,
"created_at": "2022-12-22T17:52:26Z",
"updated_at": "2023-04-18T09:14:35Z",
"updated_at": "2023-04-25T03:29:35Z",
"pushed_at": "2022-12-26T09:49:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

33
2022/CVE-2022-33959.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 632274069,
"name": "CVE-2022-33959",
"full_name": "gitadvisor\/CVE-2022-33959",
"owner": {
"login": "gitadvisor",
"id": 84289402,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84289402?v=4",
"html_url": "https:\/\/github.com\/gitadvisor"
},
"html_url": "https:\/\/github.com\/gitadvisor\/CVE-2022-33959",
"description": "CVE-2022-33959 - 602 Client-Side Enforcement of Server-Side Security (CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:N)",
"fork": false,
"created_at": "2023-04-25T04:31:17Z",
"updated_at": "2023-04-25T04:38:14Z",
"pushed_at": "2023-04-25T04:39:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "CVE-2022-36537",
"fork": false,
"created_at": "2022-12-09T11:29:26Z",
"updated_at": "2023-03-23T10:12:27Z",
"updated_at": "2023-04-25T06:04:47Z",
"pushed_at": "2022-12-12T09:49:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"cybersecurity"
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"forks": 4,
"watchers": 9,
"score": 0
},
{
@ -46,10 +46,10 @@
"description": "POC of CVE-2022-36537",
"fork": false,
"created_at": "2022-12-09T14:15:52Z",
"updated_at": "2023-03-31T18:07:43Z",
"updated_at": "2023-04-25T04:52:01Z",
"pushed_at": "2022-12-11T13:13:21Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2023-04-11T03:08:41Z",
"updated_at": "2023-04-25T04:28:26Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 206,
"watchers": 207,
"score": 0
},
{

View file

@ -220,10 +220,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2023-04-24T01:27:29Z",
"updated_at": "2023-04-25T01:06:08Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -236,7 +236,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 245,
"watchers": 246,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2023-04-20T01:37:36Z",
"updated_at": "2023-04-25T02:40:48Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 225,
"watchers": 226,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2023-04-23T08:07:21Z",
"updated_at": "2023-04-25T03:35:20Z",
"pushed_at": "2023-03-28T04:23:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-21T14:37:04Z",
"updated_at": "2023-04-25T05:15:22Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 180,
"watchers": 181,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability",
"fork": false,
"created_at": "2023-04-13T04:51:41Z",
"updated_at": "2023-04-13T04:57:31Z",
"updated_at": "2023-04-25T01:38:35Z",
"pushed_at": "2023-04-13T04:53:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -42,12 +42,12 @@
"description": "CVE-2023-1671-POC, based on dnslog platform",
"fork": false,
"created_at": "2023-04-24T15:53:42Z",
"updated_at": "2023-04-25T00:05:49Z",
"updated_at": "2023-04-25T02:11:56Z",
"pushed_at": "2023-04-24T16:18:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -55,8 +55,8 @@
"cve-2023-1671"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
"fork": false,
"created_at": "2023-04-16T10:05:13Z",
"updated_at": "2023-04-25T00:26:22Z",
"updated_at": "2023-04-25T05:10:21Z",
"pushed_at": "2023-04-18T13:02:21Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Reproduce CVE-2023-2033",
"fork": false,
"created_at": "2023-04-17T00:25:16Z",
"updated_at": "2023-04-18T11:40:40Z",
"updated_at": "2023-04-25T02:29:27Z",
"pushed_at": "2023-04-19T00:40:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2023-04-22T00:00:35Z",
"updated_at": "2023-04-25T01:44:27Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -91,7 +91,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 104,
"watchers": 105,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-04-24T13:10:30Z",
"updated_at": "2023-04-25T01:22:57Z",
"pushed_at": "2023-04-23T17:54:49Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 82,
"watchers": 527,
"watchers": 528,
"score": 0
},
{

View file

@ -80,10 +80,10 @@
"description": "CVE-2023-22809 Linux Sudo",
"fork": false,
"created_at": "2023-04-06T03:11:48Z",
"updated_at": "2023-04-13T04:59:34Z",
"updated_at": "2023-04-25T01:31:27Z",
"pushed_at": "2023-04-06T03:17:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -92,7 +92,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-09T10:49:46Z",
"updated_at": "2023-04-20T14:05:29Z",
"updated_at": "2023-04-25T02:04:44Z",
"pushed_at": "2023-02-09T11:00:26Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 82,
"watchers": 84,
"score": 0
}
]

View file

@ -71,19 +71,19 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2023-04-25T00:06:33Z",
"updated_at": "2023-04-25T02:00:53Z",
"pushed_at": "2023-04-22T21:50:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"forks": 5,
"watchers": 14,
"score": 0
}
]

View file

@ -5204,6 +5204,14 @@ The Apache Spark UI offers the possibility to enable ACLs via the configuration
- [Vulnmachines/Apache-spark-CVE-2022-33891](https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891)
- [ps-interactive/lab_security_apache_spark_emulation_detection](https://github.com/ps-interactive/lab_security_apache_spark_emulation_detection)
### CVE-2022-33959 (2023-04-07)
<code>
IBM Sterling Order Management 10.0 could allow a user to bypass validation and perform unauthorized actions on behalf of other users. IBM X-Force ID: 229320.
</code>
- [gitadvisor/CVE-2022-33959](https://github.com/gitadvisor/CVE-2022-33959)
### CVE-2022-33980 (2022-07-06)
<code>
@ -9822,6 +9830,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
- [kh4sh3i/ProxyLogon](https://github.com/kh4sh3i/ProxyLogon)
- [byinarie/Zirconium](https://github.com/byinarie/Zirconium)
- [heikanet/Microsoft-Exchange-RCE](https://github.com/heikanet/Microsoft-Exchange-RCE)
- [iceberg-N/cve-2021-26855](https://github.com/iceberg-N/cve-2021-26855)
### CVE-2021-26856
- [avi8892/CVE-2021-26856](https://github.com/avi8892/CVE-2021-26856)