Auto Update 2022/11/12 18:17:23

This commit is contained in:
motikan2010-bot 2022-11-13 03:17:23 +09:00
parent 1157f551e8
commit 5454711100
42 changed files with 220 additions and 190 deletions

View file

@ -13,10 +13,10 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
"updated_at": "2022-10-05T14:33:38Z",
"updated_at": "2022-11-12T14:42:47Z",
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 284,
"watchers_count": 284,
"stargazers_count": 285,
"watchers_count": 285,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 189,
"watchers": 284,
"watchers": 285,
"score": 0
},
{

View file

@ -234,5 +234,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 565183343,
"name": "cve-2017-16995.c",
"full_name": "ivilpez\/cve-2017-16995.c",
"owner": {
"login": "ivilpez",
"id": 118066631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118066631?v=4",
"html_url": "https:\/\/github.com\/ivilpez"
},
"html_url": "https:\/\/github.com\/ivilpez\/cve-2017-16995.c",
"description": null,
"fork": false,
"created_at": "2022-11-12T15:47:19Z",
"updated_at": "2022-11-12T16:00:39Z",
"pushed_at": "2022-11-12T16:37:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -394,10 +394,10 @@
"description": "Weblogic 反序列化漏洞(CVE-2018-2628)",
"fork": false,
"created_at": "2018-06-05T11:00:40Z",
"updated_at": "2022-11-09T18:00:09Z",
"updated_at": "2022-11-12T15:29:11Z",
"pushed_at": "2019-09-30T01:18:02Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -406,7 +406,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -102,10 +102,10 @@
"description": "Aggressor Script to launch IE driveby for CVE-2018-4878",
"fork": false,
"created_at": "2018-02-10T09:30:18Z",
"updated_at": "2022-10-12T20:05:51Z",
"updated_at": "2022-11-12T14:41:21Z",
"pushed_at": "2018-02-10T19:39:10Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -114,7 +114,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2022-11-09T17:59:34Z",
"updated_at": "2022-11-12T12:58:10Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 117,
"watchers": 342,
"watchers": 341,
"score": 0
},
{
@ -78,10 +78,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2022-11-09T17:59:41Z",
"updated_at": "2022-11-12T12:58:10Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 536,
"watchers_count": 536,
"stargazers_count": 535,
"watchers_count": 535,
"has_discussions": false,
"forks_count": 172,
"allow_forking": true,
@ -100,7 +100,7 @@
],
"visibility": "public",
"forks": 172,
"watchers": 536,
"watchers": 535,
"score": 0
},
{

View file

@ -3051,10 +3051,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2022-10-05T16:32:03Z",
"updated_at": "2022-11-12T14:47:09Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -3063,7 +3063,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 90,
"watchers": 91,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-10T01:35:26Z",
"updated_at": "2022-11-12T16:46:49Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3596,
"watchers_count": 3596,
"stargazers_count": 3597,
"watchers_count": 3597,
"has_discussions": false,
"forks_count": 1043,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1043,
"watchers": 3596,
"watchers": 3597,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"zimbra"
],
"visibility": "public",
"forks": 15,
"forks": 14,
"watchers": 21,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2022-11-12T11:47:35Z",
"updated_at": "2022-11-12T13:55:53Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 216,
"watchers_count": 216,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 214,
"watchers": 216,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-10T01:35:26Z",
"updated_at": "2022-11-12T16:46:49Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3596,
"watchers_count": 3596,
"stargazers_count": 3597,
"watchers_count": 3597,
"has_discussions": false,
"forks_count": 1043,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1043,
"watchers": 3596,
"watchers": 3597,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2022-07-21T16:26:09Z",
"updated_at": "2022-11-12T14:28:32Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 8,
"watchers": 25,
"forks": 9,
"watchers": 26,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-11-11T19:09:22Z",
"updated_at": "2022-11-12T14:47:40Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1628,
"watchers_count": 1628,
"stargazers_count": 1629,
"watchers_count": 1629,
"has_discussions": false,
"forks_count": 581,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 581,
"watchers": 1628,
"watchers": 1629,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2022-11-09T18:11:24Z",
"updated_at": "2022-11-12T12:58:13Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 391,
"watchers_count": 391,
"stargazers_count": 390,
"watchers_count": 390,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 391,
"watchers": 390,
"score": 0
},
{

View file

@ -173,10 +173,10 @@
"description": "Dell Driver EoP (CVE-2021-21551)",
"fork": false,
"created_at": "2021-09-03T01:47:03Z",
"updated_at": "2022-10-19T01:55:12Z",
"updated_at": "2022-11-12T14:41:58Z",
"pushed_at": "2022-02-24T10:13:45Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2022-11-09T18:11:56Z",
"updated_at": "2022-11-12T14:06:01Z",
"pushed_at": "2021-10-04T01:13:54Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 23,
"forks": 9,
"watchers": 24,
"score": 0
},
{

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-11-12T10:00:59Z",
"updated_at": "2022-11-12T15:03:24Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1695,
"watchers_count": 1695,
"stargazers_count": 1696,
"watchers_count": 1696,
"has_discussions": false,
"forks_count": 487,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 487,
"watchers": 1695,
"watchers": 1696,
"score": 0
},
{
@ -1268,13 +1268,13 @@
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 85,
"score": 0
},

View file

@ -1220,13 +1220,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 6,
"score": 0
},

View file

@ -75,10 +75,10 @@
"description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50",
"fork": false,
"created_at": "2021-10-27T14:29:10Z",
"updated_at": "2022-08-29T22:56:28Z",
"updated_at": "2022-11-12T14:16:14Z",
"pushed_at": "2022-08-13T04:48:54Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -87,7 +87,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2022-03-29T19:03:38Z",
"updated_at": "2022-11-09T18:15:37Z",
"updated_at": "2022-11-12T13:55:19Z",
"pushed_at": "2022-03-29T20:47:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -197,7 +197,7 @@
"stargazers_count": 1025,
"watchers_count": 1025,
"has_discussions": false,
"forks_count": 464,
"forks_count": 465,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -205,7 +205,7 @@
"log4shell"
],
"visibility": "public",
"forks": 464,
"forks": 465,
"watchers": 1025,
"score": 0
},
@ -291,10 +291,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-11-11T22:39:54Z",
"updated_at": "2022-11-12T14:39:58Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 859,
"watchers_count": 859,
"stargazers_count": 860,
"watchers_count": 860,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
@ -323,7 +323,7 @@
],
"visibility": "public",
"forks": 134,
"watchers": 859,
"watchers": 860,
"score": 0
},
{
@ -1920,10 +1920,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-11-09T18:14:45Z",
"updated_at": "2022-11-12T14:40:59Z",
"pushed_at": "2022-04-24T08:56:47Z",
"stargazers_count": 358,
"watchers_count": 358,
"stargazers_count": 359,
"watchers_count": 359,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -1938,7 +1938,7 @@
],
"visibility": "public",
"forks": 49,
"watchers": 358,
"watchers": 359,
"score": 0
},
{
@ -5466,10 +5466,10 @@
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
"fork": false,
"created_at": "2022-01-05T22:25:42Z",
"updated_at": "2022-11-10T17:13:48Z",
"updated_at": "2022-11-12T17:54:05Z",
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -5478,7 +5478,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 5,
"watchers": 11,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
"updated_at": "2022-11-09T18:15:32Z",
"updated_at": "2022-11-12T14:47:25Z",
"pushed_at": "2022-04-03T15:07:31Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 181,
"watchers": 182,
"score": 0
},
{

View file

@ -885,10 +885,10 @@
"description": "Container Excape PoC for CVE-2022-0847 \"DirtyPipe\"",
"fork": false,
"created_at": "2022-03-09T19:38:44Z",
"updated_at": "2022-09-28T04:39:04Z",
"updated_at": "2022-11-12T14:46:51Z",
"pushed_at": "2022-04-20T20:23:36Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -897,7 +897,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2022-11-11T02:25:15Z",
"updated_at": "2022-11-12T14:46:33Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 486,
"watchers_count": 486,
"stargazers_count": 487,
"watchers_count": 487,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 486,
"watchers": 487,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2022-11-09T18:15:40Z",
"updated_at": "2022-11-12T14:45:22Z",
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 171,
"watchers": 172,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-11-09T18:15:16Z",
"updated_at": "2022-11-12T14:47:29Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 236,
"watchers": 237,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-20T10:23:07Z",
"updated_at": "2022-11-09T18:15:45Z",
"updated_at": "2022-11-12T14:40:10Z",
"pushed_at": "2022-04-24T07:07:52Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -149,10 +149,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-11-09T18:15:06Z",
"updated_at": "2022-11-12T14:47:28Z",
"pushed_at": "2022-05-03T10:40:31Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -168,7 +168,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 69,
"watchers": 70,
"score": 0
},
{
@ -214,19 +214,19 @@
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2022-10-15T13:40:22Z",
"updated_at": "2022-11-12T14:40:33Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 124,
"forks": 30,
"watchers": 125,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-11-09T18:15:26Z",
"updated_at": "2022-11-12T14:47:33Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 282,
"watchers": 283,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-02T16:12:56Z",
"updated_at": "2022-10-18T08:47:06Z",
"updated_at": "2022-11-12T14:41:48Z",
"pushed_at": "2022-04-02T16:57:00Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22639: Get a Root Shell on macOS Monterey",
"fork": false,
"created_at": "2022-03-17T06:16:54Z",
"updated_at": "2022-11-09T18:15:33Z",
"updated_at": "2022-11-12T14:44:17Z",
"pushed_at": "2022-04-05T05:11:29Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 112,
"watchers": 113,
"score": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-11-09T18:15:42Z",
"updated_at": "2022-11-12T14:40:54Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 280,
"watchers_count": 280,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 279,
"watchers": 280,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-11-09T18:15:37Z",
"updated_at": "2022-11-12T14:45:56Z",
"pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 102,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 102,
"watchers": 301,
"watchers": 302,
"score": 0
},
{
@ -304,10 +304,10 @@
"description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.",
"fork": false,
"created_at": "2022-03-31T15:01:12Z",
"updated_at": "2022-08-15T05:34:13Z",
"updated_at": "2022-11-12T14:45:21Z",
"pushed_at": "2022-04-06T15:00:14Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -316,7 +316,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 40,
"watchers": 41,
"score": 0
},
{
@ -397,10 +397,10 @@
"description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)",
"fork": false,
"created_at": "2022-03-31T16:58:56Z",
"updated_at": "2022-09-07T02:16:29Z",
"updated_at": "2022-11-12T14:45:46Z",
"pushed_at": "2022-05-27T12:56:40Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -409,7 +409,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 45,
"watchers": 46,
"score": 0
},
{
@ -1376,10 +1376,10 @@
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
"fork": false,
"created_at": "2022-04-07T00:08:16Z",
"updated_at": "2022-11-09T18:15:41Z",
"updated_at": "2022-11-12T14:42:32Z",
"pushed_at": "2022-04-07T23:00:29Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -1388,7 +1388,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-11-09T18:15:56Z",
"updated_at": "2022-11-12T12:42:50Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"has_discussions": false,
"forks_count": 89,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 507,
"watchers": 508,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-23648",
"fork": false,
"created_at": "2022-03-25T19:43:59Z",
"updated_at": "2022-11-01T02:35:43Z",
"updated_at": "2022-11-12T14:46:37Z",
"pushed_at": "2022-03-29T09:55:15Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-24734 PoC",
"fork": false,
"created_at": "2022-05-08T15:20:41Z",
"updated_at": "2022-10-29T19:35:18Z",
"updated_at": "2022-11-12T13:55:16Z",
"pushed_at": "2022-05-08T15:23:46Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 50,
"watchers": 51,
"score": 0
},
{

View file

@ -1323,10 +1323,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
"fork": false,
"created_at": "2022-07-05T04:30:42Z",
"updated_at": "2022-10-29T13:44:19Z",
"updated_at": "2022-11-12T16:59:55Z",
"pushed_at": "2022-08-21T04:13:32Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -1340,7 +1340,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 8,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-11-10T05:15:21Z",
"updated_at": "2022-11-12T14:40:16Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 672,
"watchers_count": 672,
"stargazers_count": 673,
"watchers_count": 673,
"has_discussions": false,
"forks_count": 110,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 672,
"watchers": 673,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-11-11T03:56:19Z",
"updated_at": "2022-11-12T14:40:03Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 76,
"watchers": 321,
"watchers": 322,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
"updated_at": "2022-11-12T10:13:26Z",
"updated_at": "2022-11-12T12:55:40Z",
"pushed_at": "2022-11-09T14:42:56Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 106,
"watchers": 107,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0
}

View file

@ -24054,6 +24054,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4
- [littlebin404/CVE-2017-16995](https://github.com/littlebin404/CVE-2017-16995)
- [Lumindu/CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-](https://github.com/Lumindu/CVE-2017-16995-Linux-Kernel---BPF-Sign-Extension-Local-Privilege-Escalation-)
- [ph4ntonn/CVE-2017-16995](https://github.com/ph4ntonn/CVE-2017-16995)
- [ivilpez/cve-2017-16995.c](https://github.com/ivilpez/cve-2017-16995.c)
### CVE-2017-16997 (2017-12-17)