Auto Update 2023/04/25 06:30:50

This commit is contained in:
motikan2010-bot 2023-04-25 15:30:50 +09:00
parent b0dbce4135
commit 4cecb280f0
46 changed files with 248 additions and 177 deletions

View file

@ -13,10 +13,10 @@
"description": "Linux local root exploit for CVE-2014-0038", "description": "Linux local root exploit for CVE-2014-0038",
"fork": false, "fork": false,
"created_at": "2014-02-02T12:34:57Z", "created_at": "2014-02-02T12:34:57Z",
"updated_at": "2023-03-21T10:06:05Z", "updated_at": "2023-04-25T01:19:03Z",
"pushed_at": "2014-04-18T10:26:02Z", "pushed_at": "2014-04-18T10:26:02Z",
"stargazers_count": 192, "stargazers_count": 191,
"watchers_count": 192, "watchers_count": 191,
"has_discussions": false, "has_discussions": false,
"forks_count": 48, "forks_count": 48,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 48, "forks": 48,
"watchers": 192, "watchers": 191,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z", "updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667, "stargazers_count": 1668,
"watchers_count": 1667, "watchers_count": 1668,
"has_discussions": false, "has_discussions": false,
"forks_count": 325, "forks_count": 325,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 325, "forks": 325,
"watchers": 1667, "watchers": 1668,
"score": 0 "score": 0
}, },
{ {

View file

@ -433,10 +433,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195", "description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false, "fork": false,
"created_at": "2016-11-25T21:08:01Z", "created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-04-21T20:31:56Z", "updated_at": "2023-04-25T04:23:52Z",
"pushed_at": "2021-04-08T11:35:12Z", "pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 729, "stargazers_count": 728,
"watchers_count": 729, "watchers_count": 728,
"has_discussions": false, "has_discussions": false,
"forks_count": 434, "forks_count": 434,
"allow_forking": true, "allow_forking": true,
@ -449,7 +449,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 434, "forks": 434,
"watchers": 729, "watchers": 728,
"score": 0 "score": 0
}, },
{ {

View file

@ -71,10 +71,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false, "fork": false,
"created_at": "2017-11-21T05:55:53Z", "created_at": "2017-11-21T05:55:53Z",
"updated_at": "2023-04-16T11:34:13Z", "updated_at": "2023-04-25T03:49:01Z",
"pushed_at": "2017-11-29T03:33:53Z", "pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 532, "stargazers_count": 531,
"watchers_count": 532, "watchers_count": 531,
"has_discussions": false, "has_discussions": false,
"forks_count": 260, "forks_count": 260,
"allow_forking": true, "allow_forking": true,
@ -83,7 +83,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 260, "forks": 260,
"watchers": 532, "watchers": 531,
"score": 0 "score": 0
}, },
{ {

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z", "updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667, "stargazers_count": 1668,
"watchers_count": 1667, "watchers_count": 1668,
"has_discussions": false, "has_discussions": false,
"forks_count": 325, "forks_count": 325,
"allow_forking": true, "allow_forking": true,
@ -75,7 +75,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 325, "forks": 325,
"watchers": 1667, "watchers": 1668,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false, "fork": false,
"created_at": "2018-01-04T00:28:50Z", "created_at": "2018-01-04T00:28:50Z",
"updated_at": "2023-04-03T16:02:52Z", "updated_at": "2023-04-25T01:52:13Z",
"pushed_at": "2018-01-10T01:14:44Z", "pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 721, "stargazers_count": 722,
"watchers_count": 721, "watchers_count": 722,
"has_discussions": false, "has_discussions": false,
"forks_count": 185, "forks_count": 185,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 185, "forks": 185,
"watchers": 721, "watchers": 722,
"score": 0 "score": 0
}, },
{ {

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z", "updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667, "stargazers_count": 1668,
"watchers_count": 1667, "watchers_count": 1668,
"has_discussions": false, "has_discussions": false,
"forks_count": 325, "forks_count": 325,
"allow_forking": true, "allow_forking": true,
@ -601,7 +601,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 325, "forks": 325,
"watchers": 1667, "watchers": 1668,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)", "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false, "fork": false,
"created_at": "2018-04-28T11:50:00Z", "created_at": "2018-04-28T11:50:00Z",
"updated_at": "2023-04-20T23:07:01Z", "updated_at": "2023-04-25T00:41:16Z",
"pushed_at": "2022-12-11T10:44:39Z", "pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 478, "stargazers_count": 477,
"watchers_count": 478, "watchers_count": 477,
"has_discussions": false, "has_discussions": false,
"forks_count": 60, "forks_count": 60,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 60, "forks": 60,
"watchers": 478, "watchers": 477,
"score": 0 "score": 0
}, },
{ {

View file

@ -14,17 +14,17 @@
"fork": false, "fork": false,
"created_at": "2019-09-12T21:52:55Z", "created_at": "2019-09-12T21:52:55Z",
"updated_at": "2023-01-26T00:33:33Z", "updated_at": "2023-01-26T00:33:33Z",
"pushed_at": "2019-09-12T22:19:47Z", "pushed_at": "2023-04-25T05:29:09Z",
"stargazers_count": 33, "stargazers_count": 33,
"watchers_count": 33, "watchers_count": 33,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 7,
"watchers": 33, "watchers": 33,
"score": 0 "score": 0
}, },

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-23T13:05:32Z", "updated_at": "2023-04-25T03:32:26Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3734, "stargazers_count": 3735,
"watchers_count": 3734, "watchers_count": 3735,
"has_discussions": false, "has_discussions": false,
"forks_count": 1077, "forks_count": 1077,
"allow_forking": true, "allow_forking": true,
@ -74,7 +74,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1077, "forks": 1077,
"watchers": 3734, "watchers": 3735,
"score": 0 "score": 0
}, },
{ {

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z", "updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667, "stargazers_count": 1668,
"watchers_count": 1667, "watchers_count": 1668,
"has_discussions": false, "has_discussions": false,
"forks_count": 325, "forks_count": 325,
"allow_forking": true, "allow_forking": true,
@ -220,7 +220,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 325, "forks": 325,
"watchers": 1667, "watchers": 1668,
"score": 0 "score": 0
} }
] ]

View file

@ -403,10 +403,10 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796", "description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false, "fork": false,
"created_at": "2020-03-12T18:34:40Z", "created_at": "2020-03-12T18:34:40Z",
"updated_at": "2023-04-21T05:13:57Z", "updated_at": "2023-04-25T02:19:39Z",
"pushed_at": "2023-02-26T07:01:03Z", "pushed_at": "2023-02-26T07:01:03Z",
"stargazers_count": 301, "stargazers_count": 303,
"watchers_count": 301, "watchers_count": 303,
"has_discussions": false, "has_discussions": false,
"forks_count": 118, "forks_count": 118,
"allow_forking": true, "allow_forking": true,
@ -420,7 +420,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 118, "forks": 118,
"watchers": 301, "watchers": 303,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统", "description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false, "fork": false,
"created_at": "2020-06-01T04:44:05Z", "created_at": "2020-06-01T04:44:05Z",
"updated_at": "2023-04-04T06:38:05Z", "updated_at": "2023-04-25T03:49:10Z",
"pushed_at": "2020-06-17T00:56:08Z", "pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 184, "stargazers_count": 183,
"watchers_count": 184, "watchers_count": 183,
"has_discussions": false, "has_discussions": false,
"forks_count": 47, "forks_count": 47,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 47, "forks": 47,
"watchers": 184, "watchers": 183,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-23T13:05:32Z", "updated_at": "2023-04-25T03:32:26Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3734, "stargazers_count": 3735,
"watchers_count": 3734, "watchers_count": 3735,
"has_discussions": false, "has_discussions": false,
"forks_count": 1077, "forks_count": 1077,
"allow_forking": true, "allow_forking": true,
@ -45,7 +45,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1077, "forks": 1077,
"watchers": 3734, "watchers": 3735,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege", "description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
"fork": false, "fork": false,
"created_at": "2020-12-24T04:00:29Z", "created_at": "2020-12-24T04:00:29Z",
"updated_at": "2023-02-01T03:02:36Z", "updated_at": "2023-04-25T03:49:13Z",
"pushed_at": "2020-12-24T06:02:53Z", "pushed_at": "2020-12-24T06:02:53Z",
"stargazers_count": 52, "stargazers_count": 51,
"watchers_count": 52, "watchers_count": 51,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 52, "watchers": 51,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-19T10:48:50Z", "updated_at": "2023-04-25T02:47:58Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1667, "stargazers_count": 1668,
"watchers_count": 1667, "watchers_count": 1668,
"has_discussions": false, "has_discussions": false,
"forks_count": 325, "forks_count": 325,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 325, "forks": 325,
"watchers": 1667, "watchers": 1668,
"score": 0 "score": 0
}, },
{ {

View file

@ -105,10 +105,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell", "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false, "fork": false,
"created_at": "2020-08-19T03:34:06Z", "created_at": "2020-08-19T03:34:06Z",
"updated_at": "2023-04-24T04:19:52Z", "updated_at": "2023-04-25T03:34:58Z",
"pushed_at": "2020-08-25T03:17:32Z", "pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 490, "stargazers_count": 491,
"watchers_count": 490, "watchers_count": 491,
"has_discussions": false, "has_discussions": false,
"forks_count": 64, "forks_count": 64,
"allow_forking": true, "allow_forking": true,
@ -117,7 +117,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 64, "forks": 64,
"watchers": 490, "watchers": 491,
"score": 0 "score": 0
}, },
{ {

View file

@ -42,10 +42,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false, "fork": false,
"created_at": "2021-06-29T17:24:14Z", "created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-04-23T14:15:06Z", "updated_at": "2023-04-25T03:43:56Z",
"pushed_at": "2021-07-20T15:28:13Z", "pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1680, "stargazers_count": 1679,
"watchers_count": 1680, "watchers_count": 1679,
"has_discussions": false, "has_discussions": false,
"forks_count": 585, "forks_count": 585,
"allow_forking": true, "allow_forking": true,
@ -54,7 +54,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 585, "forks": 585,
"watchers": 1680, "watchers": 1679,
"score": 0 "score": 0
}, },
{ {

View file

@ -778,10 +778,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-24T07:20:09Z", "updated_at": "2023-04-25T04:24:03Z",
"pushed_at": "2022-12-15T04:07:54Z", "pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 896, "stargazers_count": 897,
"watchers_count": 896, "watchers_count": 897,
"has_discussions": false, "has_discussions": false,
"forks_count": 111, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
@ -797,7 +797,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 111, "forks": 111,
"watchers": 896, "watchers": 897,
"score": 0 "score": 0
} }
] ]

View file

@ -1412,5 +1412,34 @@
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 3,
"score": 0 "score": 0
},
{
"id": 632273646,
"name": "cve-2021-26855",
"full_name": "iceberg-N\/cve-2021-26855",
"owner": {
"login": "iceberg-N",
"id": 110767603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110767603?v=4",
"html_url": "https:\/\/github.com\/iceberg-N"
},
"html_url": "https:\/\/github.com\/iceberg-N\/cve-2021-26855",
"description": null,
"fork": false,
"created_at": "2023-04-25T04:29:35Z",
"updated_at": "2023-04-25T04:29:36Z",
"pushed_at": "2023-04-25T04:31:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -42,10 +42,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-01-14T05:52:17Z", "created_at": "2022-01-14T05:52:17Z",
"updated_at": "2022-12-25T09:32:26Z", "updated_at": "2023-04-25T01:56:36Z",
"pushed_at": "2022-01-14T05:56:09Z", "pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 24, "stargazers_count": 25,
"watchers_count": 24, "watchers_count": 25,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -54,7 +54,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 24, "watchers": 25,
"score": 0 "score": 0
} }
] ]

View file

@ -2998,7 +2998,7 @@
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -3009,7 +3009,7 @@
"python3" "python3"
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 4, "watchers": 4,
"score": 0 "score": 0
}, },

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-04-24T19:21:01Z", "updated_at": "2023-04-25T04:24:10Z",
"pushed_at": "2023-01-29T03:31:27Z", "pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 566, "stargazers_count": 565,
"watchers_count": 566, "watchers_count": 565,
"has_discussions": false, "has_discussions": false,
"forks_count": 102, "forks_count": 102,
"allow_forking": true, "allow_forking": true,
@ -59,7 +59,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 102, "forks": 102,
"watchers": 566, "watchers": 565,
"score": 0 "score": 0
}, },
{ {

View file

@ -1259,10 +1259,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-04-24T10:36:20Z", "updated_at": "2023-04-25T05:45:23Z",
"pushed_at": "2023-03-21T03:01:52Z", "pushed_at": "2023-03-21T03:01:52Z",
"stargazers_count": 657, "stargazers_count": 659,
"watchers_count": 657, "watchers_count": 659,
"has_discussions": false, "has_discussions": false,
"forks_count": 113, "forks_count": 113,
"allow_forking": true, "allow_forking": true,
@ -1276,7 +1276,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 113, "forks": 113,
"watchers": 657, "watchers": 659,
"score": 0 "score": 0
}, },
{ {

View file

@ -18,13 +18,13 @@
"stargazers_count": 76, "stargazers_count": 76,
"watchers_count": 76, "watchers_count": 76,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 33,
"watchers": 76, "watchers": 76,
"score": 0 "score": 0
}, },

View file

@ -187,10 +187,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-03-22T09:16:58Z", "created_at": "2023-03-22T09:16:58Z",
"updated_at": "2023-03-22T09:20:27Z", "updated_at": "2023-04-25T01:05:15Z",
"pushed_at": "2023-03-22T09:20:24Z", "pushed_at": "2023-03-22T09:20:24Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -199,7 +199,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -709,10 +709,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-24T07:20:09Z", "updated_at": "2023-04-25T04:24:03Z",
"pushed_at": "2022-12-15T04:07:54Z", "pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 896, "stargazers_count": 897,
"watchers_count": 896, "watchers_count": 897,
"has_discussions": false, "has_discussions": false,
"forks_count": 111, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
@ -728,7 +728,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 111, "forks": 111,
"watchers": 896, "watchers": 897,
"score": 0 "score": 0
}, },
{ {

View file

@ -249,10 +249,10 @@
"description": "警惕 一种针对红队的新型溯源手段!", "description": "警惕 一种针对红队的新型溯源手段!",
"fork": false, "fork": false,
"created_at": "2022-07-27T15:48:19Z", "created_at": "2022-07-27T15:48:19Z",
"updated_at": "2023-04-20T01:46:39Z", "updated_at": "2023-04-25T01:46:58Z",
"pushed_at": "2022-07-27T15:55:01Z", "pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 348, "stargazers_count": 349,
"watchers_count": 348, "watchers_count": 349,
"has_discussions": false, "has_discussions": false,
"forks_count": 81, "forks_count": 81,
"allow_forking": true, "allow_forking": true,
@ -261,7 +261,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 81, "forks": 81,
"watchers": 348, "watchers": 349,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.", "description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
"fork": false, "fork": false,
"created_at": "2022-12-22T17:52:26Z", "created_at": "2022-12-22T17:52:26Z",
"updated_at": "2023-04-18T09:14:35Z", "updated_at": "2023-04-25T03:29:35Z",
"pushed_at": "2022-12-26T09:49:16Z", "pushed_at": "2022-12-26T09:49:16Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 6, "watchers": 7,
"score": 0 "score": 0
} }
] ]

33
2022/CVE-2022-33959.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 632274069,
"name": "CVE-2022-33959",
"full_name": "gitadvisor\/CVE-2022-33959",
"owner": {
"login": "gitadvisor",
"id": 84289402,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84289402?v=4",
"html_url": "https:\/\/github.com\/gitadvisor"
},
"html_url": "https:\/\/github.com\/gitadvisor\/CVE-2022-33959",
"description": "CVE-2022-33959 - 602 Client-Side Enforcement of Server-Side Security (CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:N)",
"fork": false,
"created_at": "2023-04-25T04:31:17Z",
"updated_at": "2023-04-25T04:38:14Z",
"pushed_at": "2023-04-25T04:39:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "CVE-2022-36537", "description": "CVE-2022-36537",
"fork": false, "fork": false,
"created_at": "2022-12-09T11:29:26Z", "created_at": "2022-12-09T11:29:26Z",
"updated_at": "2023-03-23T10:12:27Z", "updated_at": "2023-04-25T06:04:47Z",
"pushed_at": "2022-12-12T09:49:03Z", "pushed_at": "2022-12-12T09:49:03Z",
"stargazers_count": 7, "stargazers_count": 9,
"watchers_count": 7, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"cybersecurity" "cybersecurity"
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 7, "watchers": 9,
"score": 0 "score": 0
}, },
{ {
@ -46,10 +46,10 @@
"description": "POC of CVE-2022-36537", "description": "POC of CVE-2022-36537",
"fork": false, "fork": false,
"created_at": "2022-12-09T14:15:52Z", "created_at": "2022-12-09T14:15:52Z",
"updated_at": "2023-03-31T18:07:43Z", "updated_at": "2023-04-25T04:52:01Z",
"pushed_at": "2022-12-11T13:13:21Z", "pushed_at": "2022-12-11T13:13:21Z",
"stargazers_count": 24, "stargazers_count": 25,
"watchers_count": 24, "watchers_count": 25,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -66,7 +66,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 24, "watchers": 25,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false, "fork": false,
"created_at": "2022-09-12T19:22:44Z", "created_at": "2022-09-12T19:22:44Z",
"updated_at": "2023-04-11T03:08:41Z", "updated_at": "2023-04-25T04:28:26Z",
"pushed_at": "2022-09-19T19:41:34Z", "pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 206, "stargazers_count": 207,
"watchers_count": 206, "watchers_count": 207,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 206, "watchers": 207,
"score": 0 "score": 0
}, },
{ {

View file

@ -220,10 +220,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false, "fork": false,
"created_at": "2022-09-26T08:58:21Z", "created_at": "2022-09-26T08:58:21Z",
"updated_at": "2023-04-24T01:27:29Z", "updated_at": "2023-04-25T01:06:08Z",
"pushed_at": "2022-09-26T13:20:38Z", "pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 245, "stargazers_count": 246,
"watchers_count": 245, "watchers_count": 246,
"has_discussions": false, "has_discussions": false,
"forks_count": 45, "forks_count": 45,
"allow_forking": true, "allow_forking": true,
@ -236,7 +236,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 45, "forks": 45,
"watchers": 245, "watchers": 246,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理", "description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false, "fork": false,
"created_at": "2022-08-04T08:22:41Z", "created_at": "2022-08-04T08:22:41Z",
"updated_at": "2023-04-20T01:37:36Z", "updated_at": "2023-04-25T02:40:48Z",
"pushed_at": "2022-08-19T09:04:09Z", "pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 225, "stargazers_count": 226,
"watchers_count": 225, "watchers_count": 226,
"has_discussions": false, "has_discussions": false,
"forks_count": 30, "forks_count": 30,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 30, "forks": 30,
"watchers": 225, "watchers": 226,
"score": 0 "score": 0
} }
] ]

View file

@ -71,10 +71,10 @@
"description": "harbor unauthorized detection", "description": "harbor unauthorized detection",
"fork": false, "fork": false,
"created_at": "2023-03-21T10:40:19Z", "created_at": "2023-03-21T10:40:19Z",
"updated_at": "2023-04-23T08:07:21Z", "updated_at": "2023-04-25T03:35:20Z",
"pushed_at": "2023-03-28T04:23:42Z", "pushed_at": "2023-03-28T04:23:42Z",
"stargazers_count": 2, "stargazers_count": 5,
"watchers_count": 2, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -83,7 +83,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 5,
"score": 0 "score": 0
} }
] ]

View file

@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false, "fork": false,
"created_at": "2023-03-16T02:20:52Z", "created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-21T14:37:04Z", "updated_at": "2023-04-25T05:15:22Z",
"pushed_at": "2023-03-16T02:22:28Z", "pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 180, "stargazers_count": 181,
"watchers_count": 180, "watchers_count": 181,
"has_discussions": false, "has_discussions": false,
"forks_count": 22, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
@ -54,7 +54,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 22,
"watchers": 180, "watchers": 181,
"score": 0 "score": 0
} }
] ]

View file

@ -71,10 +71,10 @@
"description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability", "description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability",
"fork": false, "fork": false,
"created_at": "2023-04-13T04:51:41Z", "created_at": "2023-04-13T04:51:41Z",
"updated_at": "2023-04-13T04:57:31Z", "updated_at": "2023-04-25T01:38:35Z",
"pushed_at": "2023-04-13T04:53:53Z", "pushed_at": "2023-04-13T04:53:53Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -83,7 +83,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
}, },
{ {

View file

@ -42,12 +42,12 @@
"description": "CVE-2023-1671-POC, based on dnslog platform", "description": "CVE-2023-1671-POC, based on dnslog platform",
"fork": false, "fork": false,
"created_at": "2023-04-24T15:53:42Z", "created_at": "2023-04-24T15:53:42Z",
"updated_at": "2023-04-25T00:05:49Z", "updated_at": "2023-04-25T02:11:56Z",
"pushed_at": "2023-04-24T16:18:24Z", "pushed_at": "2023-04-24T16:18:24Z",
"stargazers_count": 1, "stargazers_count": 3,
"watchers_count": 1, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -55,8 +55,8 @@
"cve-2023-1671" "cve-2023-1671"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 1, "watchers": 3,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user", "description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
"fork": false, "fork": false,
"created_at": "2023-04-16T10:05:13Z", "created_at": "2023-04-16T10:05:13Z",
"updated_at": "2023-04-25T00:26:22Z", "updated_at": "2023-04-25T05:10:21Z",
"pushed_at": "2023-04-18T13:02:21Z", "pushed_at": "2023-04-18T13:02:21Z",
"stargazers_count": 66, "stargazers_count": 67,
"watchers_count": 66, "watchers_count": 67,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 66, "watchers": 67,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Reproduce CVE-2023-2033", "description": "Reproduce CVE-2023-2033",
"fork": false, "fork": false,
"created_at": "2023-04-17T00:25:16Z", "created_at": "2023-04-17T00:25:16Z",
"updated_at": "2023-04-18T11:40:40Z", "updated_at": "2023-04-25T02:29:27Z",
"pushed_at": "2023-04-19T00:40:18Z", "pushed_at": "2023-04-19T00:40:18Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -71,10 +71,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ", "description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false, "fork": false,
"created_at": "2023-03-10T19:08:28Z", "created_at": "2023-03-10T19:08:28Z",
"updated_at": "2023-04-22T00:00:35Z", "updated_at": "2023-04-25T01:44:27Z",
"pushed_at": "2023-03-10T20:16:53Z", "pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 104, "stargazers_count": 105,
"watchers_count": 104, "watchers_count": 105,
"has_discussions": false, "has_discussions": false,
"forks_count": 33, "forks_count": 33,
"allow_forking": true, "allow_forking": true,
@ -91,7 +91,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 33, "forks": 33,
"watchers": 104, "watchers": 105,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测", "description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
"fork": false, "fork": false,
"created_at": "2023-02-13T03:42:27Z", "created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-04-24T13:10:30Z", "updated_at": "2023-04-25T01:22:57Z",
"pushed_at": "2023-04-23T17:54:49Z", "pushed_at": "2023-04-23T17:54:49Z",
"stargazers_count": 527, "stargazers_count": 528,
"watchers_count": 527, "watchers_count": 528,
"has_discussions": false, "has_discussions": false,
"forks_count": 82, "forks_count": 82,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 82, "forks": 82,
"watchers": 527, "watchers": 528,
"score": 0 "score": 0
}, },
{ {

View file

@ -80,10 +80,10 @@
"description": "CVE-2023-22809 Linux Sudo", "description": "CVE-2023-22809 Linux Sudo",
"fork": false, "fork": false,
"created_at": "2023-04-06T03:11:48Z", "created_at": "2023-04-06T03:11:48Z",
"updated_at": "2023-04-13T04:59:34Z", "updated_at": "2023-04-25T01:31:27Z",
"pushed_at": "2023-04-06T03:17:33Z", "pushed_at": "2023-04-06T03:17:33Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -92,7 +92,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-02-09T10:49:46Z", "created_at": "2023-02-09T10:49:46Z",
"updated_at": "2023-04-20T14:05:29Z", "updated_at": "2023-04-25T02:04:44Z",
"pushed_at": "2023-02-09T11:00:26Z", "pushed_at": "2023-02-09T11:00:26Z",
"stargazers_count": 82, "stargazers_count": 84,
"watchers_count": 82, "watchers_count": 84,
"has_discussions": false, "has_discussions": false,
"forks_count": 29, "forks_count": 29,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 29, "forks": 29,
"watchers": 82, "watchers": 84,
"score": 0 "score": 0
} }
] ]

View file

@ -71,19 +71,19 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350", "description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false, "fork": false,
"created_at": "2023-04-22T21:34:06Z", "created_at": "2023-04-22T21:34:06Z",
"updated_at": "2023-04-25T00:06:33Z", "updated_at": "2023-04-25T02:00:53Z",
"pushed_at": "2023-04-22T21:50:35Z", "pushed_at": "2023-04-22T21:50:35Z",
"stargazers_count": 11, "stargazers_count": 14,
"watchers_count": 11, "watchers_count": 14,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 5,
"watchers": 11, "watchers": 14,
"score": 0 "score": 0
} }
] ]

View file

@ -5204,6 +5204,14 @@ The Apache Spark UI offers the possibility to enable ACLs via the configuration
- [Vulnmachines/Apache-spark-CVE-2022-33891](https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891) - [Vulnmachines/Apache-spark-CVE-2022-33891](https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891)
- [ps-interactive/lab_security_apache_spark_emulation_detection](https://github.com/ps-interactive/lab_security_apache_spark_emulation_detection) - [ps-interactive/lab_security_apache_spark_emulation_detection](https://github.com/ps-interactive/lab_security_apache_spark_emulation_detection)
### CVE-2022-33959 (2023-04-07)
<code>
IBM Sterling Order Management 10.0 could allow a user to bypass validation and perform unauthorized actions on behalf of other users. IBM X-Force ID: 229320.
</code>
- [gitadvisor/CVE-2022-33959](https://github.com/gitadvisor/CVE-2022-33959)
### CVE-2022-33980 (2022-07-06) ### CVE-2022-33980 (2022-07-06)
<code> <code>
@ -9822,6 +9830,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
- [kh4sh3i/ProxyLogon](https://github.com/kh4sh3i/ProxyLogon) - [kh4sh3i/ProxyLogon](https://github.com/kh4sh3i/ProxyLogon)
- [byinarie/Zirconium](https://github.com/byinarie/Zirconium) - [byinarie/Zirconium](https://github.com/byinarie/Zirconium)
- [heikanet/Microsoft-Exchange-RCE](https://github.com/heikanet/Microsoft-Exchange-RCE) - [heikanet/Microsoft-Exchange-RCE](https://github.com/heikanet/Microsoft-Exchange-RCE)
- [iceberg-N/cve-2021-26855](https://github.com/iceberg-N/cve-2021-26855)
### CVE-2021-26856 ### CVE-2021-26856
- [avi8892/CVE-2021-26856](https://github.com/avi8892/CVE-2021-26856) - [avi8892/CVE-2021-26856](https://github.com/avi8892/CVE-2021-26856)