Auto Update 2022/03/17 06:14:49

This commit is contained in:
motikan2010-bot 2022-03-17 15:14:49 +09:00
parent 4b9ddaee3d
commit 53c4beae4a
40 changed files with 219 additions and 191 deletions

View file

@ -13,17 +13,17 @@
"description": "Sockstress (CVE-2008-4609) DDoS implementation written in Go",
"fork": false,
"created_at": "2016-05-06T17:21:32Z",
"updated_at": "2021-12-15T14:30:35Z",
"updated_at": "2022-03-17T04:21:22Z",
"pushed_at": "2016-07-02T18:52:16Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -98,7 +98,7 @@
"pushed_at": "2020-06-27T15:08:58Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -108,7 +108,7 @@
"pwn"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2015-03-09T21:42:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 0,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": " 翻译文章CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit(Aaron Adams of NCC )",
"fork": false,
"created_at": "2016-08-30T06:11:59Z",
"updated_at": "2021-07-21T09:01:30Z",
"updated_at": "2022-03-17T03:51:06Z",
"pushed_at": "2016-09-13T00:12:51Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2022-03-13T21:02:14Z",
"updated_at": "2022-03-17T04:31:26Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 899,
"watchers_count": 899,
"stargazers_count": 900,
"watchers_count": 900,
"forks_count": 411,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 411,
"watchers": 899,
"watchers": 900,
"score": 0
},
{
@ -212,17 +212,17 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2022-03-16T15:44:37Z",
"updated_at": "2022-03-17T00:35:26Z",
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 402,
"watchers_count": 402,
"forks_count": 143,
"stargazers_count": 404,
"watchers_count": 404,
"forks_count": 144,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 402,
"forks": 144,
"watchers": 404,
"score": 0
},
{
@ -239,10 +239,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2022-03-13T20:54:14Z",
"updated_at": "2022-03-17T04:31:51Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
@ -253,7 +253,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 249,
"watchers": 250,
"score": 0
},
{
@ -1065,17 +1065,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-16T19:14:24Z",
"updated_at": "2022-03-17T04:29:33Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 154,
"watchers": 155,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2022-03-09T08:54:32Z",
"updated_at": "2022-03-17T02:27:54Z",
"pushed_at": "2020-08-09T15:35:16Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -25,5 +25,32 @@
"forks": 14,
"watchers": 86,
"score": 0
},
{
"id": 470837048,
"name": "bazad1",
"full_name": "xigexbh\/bazad1",
"owner": {
"login": "xigexbh",
"id": 101782663,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101782663?v=4",
"html_url": "https:\/\/github.com\/xigexbh"
},
"html_url": "https:\/\/github.com\/xigexbh\/bazad1",
"description": "CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.",
"fork": false,
"created_at": "2022-03-17T03:38:01Z",
"updated_at": "2022-03-17T03:38:01Z",
"pushed_at": "2022-03-17T03:38:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-03-16T13:59:21Z",
"updated_at": "2022-03-17T03:04:08Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 502,
"watchers_count": 502,
"stargazers_count": 503,
"watchers_count": 503,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 502,
"watchers": 503,
"score": 0
}
]

View file

@ -74,10 +74,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2022-01-28T16:29:42Z",
"updated_at": "2022-03-17T06:05:19Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 514,
"watchers_count": 514,
"stargazers_count": 515,
"watchers_count": 515,
"forks_count": 167,
"allow_forking": true,
"is_template": false,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 514,
"watchers": 515,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Text Annotations. When setting the point attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process.",
"fork": false,
"created_at": "2018-06-25T19:34:36Z",
"updated_at": "2018-06-25T19:43:30Z",
"updated_at": "2022-03-17T03:11:39Z",
"pushed_at": "2018-06-25T19:43:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"forks": 5,
"watchers": 1,
"score": 0
}
]

View file

@ -369,10 +369,10 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2022-03-11T05:17:36Z",
"updated_at": "2022-03-17T03:21:23Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 367,
"watchers_count": 367,
"stargazers_count": 368,
"watchers_count": 368,
"forks_count": 193,
"allow_forking": true,
"is_template": false,
@ -390,7 +390,7 @@
],
"visibility": "public",
"forks": 193,
"watchers": 367,
"watchers": 368,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-03-16T02:37:25Z",
"updated_at": "2022-03-17T02:53:57Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3209,
"watchers_count": 3209,
"stargazers_count": 3210,
"watchers_count": 3210,
"forks_count": 954,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 954,
"watchers": 3209,
"watchers": 3210,
"score": 0
},
{

View file

@ -46,7 +46,7 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2022-02-17T04:50:28Z",
"updated_at": "2022-03-17T02:57:37Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 38,
"watchers_count": 38,

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-03-15T16:18:32Z",
"updated_at": "2022-03-17T02:36:19Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 907,
"watchers_count": 907,
"stargazers_count": 908,
"watchers_count": 908,
"forks_count": 251,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 251,
"watchers": 907,
"watchers": 908,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-03-16T02:37:25Z",
"updated_at": "2022-03-17T02:53:57Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3209,
"watchers_count": 3209,
"stargazers_count": 3210,
"watchers_count": 3210,
"forks_count": 954,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 954,
"watchers": 3209,
"watchers": 3210,
"score": 0
},
{

View file

@ -88,17 +88,17 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2022-02-04T18:39:53Z",
"updated_at": "2022-03-17T02:40:33Z",
"pushed_at": "2021-12-18T20:52:39Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 174,
"watchers": 175,
"score": 0
},
{

View file

@ -46,7 +46,7 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2022-02-17T04:50:28Z",
"updated_at": "2022-03-17T02:57:37Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 38,
"watchers_count": 38,

View file

@ -73,17 +73,17 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2022-03-11T12:43:27Z",
"updated_at": "2022-03-17T06:10:58Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 356,
"watchers": 355,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2022-03-03T00:02:13Z",
"updated_at": "2022-03-17T05:12:18Z",
"pushed_at": "2022-01-03T21:44:29Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 48,
"watchers": 49,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Citrix ADC从权限绕过到RCE",
"fork": false,
"created_at": "2020-07-12T13:05:40Z",
"updated_at": "2021-12-15T14:39:47Z",
"updated_at": "2022-03-17T03:08:57Z",
"pushed_at": "2020-07-12T13:10:50Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"watchers": 35,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
"fork": false,
"created_at": "2022-01-17T21:35:19Z",
"updated_at": "2022-02-14T09:24:52Z",
"updated_at": "2022-03-17T05:55:49Z",
"pushed_at": "2022-03-16T02:58:42Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-03-15T16:19:02Z",
"updated_at": "2022-03-17T04:53:21Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1537,
"watchers_count": 1537,
"forks_count": 557,
"stargazers_count": 1538,
"watchers_count": 1538,
"forks_count": 558,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 557,
"watchers": 1537,
"forks": 558,
"watchers": 1538,
"score": 0
},
{

View file

@ -243,7 +243,7 @@
"score": 0
},
{
"id": 470597987,
"id": 470823423,
"name": "cve-2021-21300",
"full_name": "Jiang59991\/cve-2021-21300",
"owner": {
@ -255,9 +255,9 @@
"html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300",
"description": null,
"fork": false,
"created_at": "2022-03-16T13:36:02Z",
"updated_at": "2022-03-16T13:36:02Z",
"pushed_at": "2022-03-16T14:11:50Z",
"created_at": "2022-03-17T02:37:58Z",
"updated_at": "2022-03-17T02:37:58Z",
"pushed_at": "2022-03-17T02:47:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -88,14 +88,14 @@
"pushed_at": "2021-12-30T12:26:11Z",
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 134,
"forks_count": 135,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-21972"
],
"visibility": "public",
"forks": 134,
"forks": 135,
"watchers": 355,
"score": 0
},

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)",
"fork": false,
"created_at": "2022-03-14T06:42:45Z",
"updated_at": "2022-03-16T23:35:26Z",
"updated_at": "2022-03-17T03:51:13Z",
"pushed_at": "2022-03-14T07:58:37Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 4,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 25,
"forks": 5,
"watchers": 28,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2022-03-01T06:01:08Z",
"updated_at": "2022-03-17T02:28:48Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 101,
"watchers": 102,
"score": 0
},
{

View file

@ -969,17 +969,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-03-15T16:18:51Z",
"updated_at": "2022-03-17T04:13:40Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 457,
"watchers_count": 457,
"stargazers_count": 458,
"watchers_count": 458,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 457,
"watchers": 458,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
"fork": false,
"created_at": "2022-03-15T18:14:46Z",
"updated_at": "2022-03-16T18:02:37Z",
"updated_at": "2022-03-17T00:25:48Z",
"pushed_at": "2022-03-16T18:01:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -110,12 +110,12 @@
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1415,
"watchers_count": 1415,
"forks_count": 413,
"forks_count": 414,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 413,
"forks": 414,
"watchers": 1415,
"score": 0
},
@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-03-16T11:04:54Z",
"updated_at": "2022-03-17T04:45:02Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 83,
"watchers": 460,
"watchers": 461,
"score": 0
},
{
@ -1902,17 +1902,17 @@
"description": "Pre-compiled builds for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-27T17:43:24Z",
"updated_at": "2022-01-31T21:24:54Z",
"updated_at": "2022-03-17T04:06:57Z",
"pushed_at": "2022-01-28T20:38:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-11-28T01:12:40Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 20,
"score": 0
}

View file

@ -446,10 +446,10 @@
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
"fork": false,
"created_at": "2021-12-10T14:22:49Z",
"updated_at": "2022-03-10T01:59:24Z",
"updated_at": "2022-03-17T02:06:09Z",
"pushed_at": "2021-12-14T15:16:15Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 124,
"watchers": 123,
"score": 0
},
{
@ -2678,10 +2678,10 @@
"description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script",
"fork": false,
"created_at": "2021-12-12T13:45:08Z",
"updated_at": "2022-02-22T19:20:59Z",
"updated_at": "2022-03-17T03:09:03Z",
"pushed_at": "2021-12-15T08:14:56Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -2695,7 +2695,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 39,
"watchers": 40,
"score": 0
},
{
@ -3548,17 +3548,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-03-16T07:45:10Z",
"updated_at": "2022-03-17T04:35:41Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2782,
"watchers_count": 2782,
"stargazers_count": 2783,
"watchers_count": 2783,
"forks_count": 677,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 677,
"watchers": 2782,
"watchers": 2783,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-01-25T17:00:16Z",
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 41,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"forks": 42,
"watchers": 310,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
"updated_at": "2022-03-17T00:16:24Z",
"updated_at": "2022-03-17T05:23:43Z",
"pushed_at": "2022-03-15T21:12:46Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"watchers": 32,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-03-06T07:01:15Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 63,
"score": 0
}

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-16T19:14:24Z",
"updated_at": "2022-03-17T04:29:33Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 154,
"watchers": 155,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-16T21:38:08Z",
"updated_at": "2022-03-17T04:21:06Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 840,
"watchers_count": 840,
"forks_count": 168,
"stargazers_count": 842,
"watchers_count": 842,
"forks_count": 169,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 168,
"watchers": 840,
"forks": 169,
"watchers": 842,
"score": 0
},
{
@ -526,17 +526,17 @@
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
"fork": false,
"created_at": "2022-03-08T17:13:24Z",
"updated_at": "2022-03-16T12:45:53Z",
"updated_at": "2022-03-17T02:17:27Z",
"pushed_at": "2022-03-08T19:53:16Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0
},
{
@ -634,10 +634,10 @@
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-09T02:47:08Z",
"updated_at": "2022-03-16T07:25:04Z",
"updated_at": "2022-03-17T04:41:14Z",
"pushed_at": "2022-03-09T02:47:32Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -646,7 +646,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0
},
{
@ -1074,17 +1074,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-03-17T00:07:16Z",
"updated_at": "2022-03-17T05:14:47Z",
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 132,
"watchers": 146,
"score": 0
},
{
@ -1101,7 +1101,7 @@
"description": "CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. \/etc\/passwd, \/etc\/shadow.",
"fork": false,
"created_at": "2022-03-13T05:51:06Z",
"updated_at": "2022-03-13T06:07:15Z",
"updated_at": "2022-03-17T02:55:09Z",
"pushed_at": "2022-03-13T06:02:30Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-23940",
"fork": false,
"created_at": "2022-03-06T17:05:02Z",
"updated_at": "2022-03-12T03:05:58Z",
"updated_at": "2022-03-17T02:42:03Z",
"pushed_at": "2022-03-11T06:38:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -148,17 +148,17 @@
"description": "Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit ",
"fork": false,
"created_at": "2022-03-16T09:19:12Z",
"updated_at": "2022-03-16T09:19:38Z",
"updated_at": "2022-03-17T04:39:04Z",
"pushed_at": "2022-03-16T09:19:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-03-16T22:59:20Z",
"updated_at": "2022-03-17T05:56:54Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 245,
"watchers_count": 245,
"forks_count": 50,
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 245,
"forks": 51,
"watchers": 253,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.",
"fork": false,
"created_at": "2022-03-16T14:42:21Z",
"updated_at": "2022-03-16T19:49:38Z",
"updated_at": "2022-03-17T05:37:03Z",
"pushed_at": "2022-03-16T19:51:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"forks": 5,
"watchers": 12,
"score": 0
}
]

View file

@ -14056,6 +14056,7 @@ In iOS before 11.3, tvOS before 11.3, watchOS before 4.3, and macOS before High
</code>
- [bazad/x18-leak](https://github.com/bazad/x18-leak)
- [xigexbh/bazad1](https://github.com/xigexbh/bazad1)
### CVE-2018-4193 (2018-06-08)