Auto Update 2022/06/22 18:19:07

This commit is contained in:
motikan2010-bot 2022-06-23 03:19:07 +09:00
parent 75fe5ed03a
commit 561135b8e3
57 changed files with 243 additions and 275 deletions

View file

@ -13,7 +13,7 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-06-22T01:44:09Z",
"updated_at": "2022-06-22T14:52:06Z",
"pushed_at": "2022-05-27T13:00:42Z",
"stargazers_count": 101,
"watchers_count": 101,

View file

@ -13,10 +13,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2022-06-20T08:11:23Z",
"updated_at": "2022-06-22T12:25:21Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
"updated_at": "2022-06-16T09:00:19Z",
"updated_at": "2022-06-22T14:03:31Z",
"pushed_at": "2021-11-18T11:07:54Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -44,7 +44,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 297,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,7 +70,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 297,
"forks": 296,
"watchers": 1398,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 297,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,7 +43,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 297,
"forks": 296,
"watchers": 1398,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-06-22T07:47:08Z",
"updated_at": "2022-06-22T12:43:58Z",
"pushed_at": "2022-06-20T13:23:23Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -405,10 +405,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2022-06-21T08:05:20Z",
"updated_at": "2022-06-22T13:22:53Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 614,
"watchers_count": 614,
"stargazers_count": 615,
"watchers_count": 615,
"forks_count": 394,
"allow_forking": true,
"is_template": false,
@ -419,7 +419,7 @@
],
"visibility": "public",
"forks": 394,
"watchers": 614,
"watchers": 615,
"score": 0
},
{

View file

@ -71,12 +71,12 @@
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 676,
"watchers_count": 676,
"forks_count": 291,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 291,
"forks": 290,
"watchers": 676,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "Proof of Concept Exploit for PrimeFaces 5.x EL Injection (CVE-2017-1000486)",
"fork": false,
"created_at": "2018-10-17T22:47:30Z",
"updated_at": "2022-06-13T09:39:59Z",
"updated_at": "2022-06-22T16:31:40Z",
"pushed_at": "2022-06-13T09:39:57Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 297,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,7 +70,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 297,
"forks": 296,
"watchers": 1398,
"score": 0
},

View file

@ -424,17 +424,17 @@
"description": "SambaCry exploit (CVE-2017-7494) ",
"fork": false,
"created_at": "2022-05-07T11:42:40Z",
"updated_at": "2022-06-21T14:52:32Z",
"updated_at": "2022-06-22T12:47:28Z",
"pushed_at": "2022-05-08T09:02:36Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13",
"fork": false,
"created_at": "2019-03-08T20:06:15Z",
"updated_at": "2022-04-20T13:34:40Z",
"updated_at": "2022-06-22T14:31:18Z",
"pushed_at": "2019-10-26T13:28:34Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 60,
"watchers": 59,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate",
"fork": false,
"created_at": "2018-11-13T13:40:10Z",
"updated_at": "2022-02-26T22:49:44Z",
"updated_at": "2022-06-22T13:49:25Z",
"pushed_at": "2018-11-14T02:40:24Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -534,7 +534,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 297,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"topics": [
@ -560,7 +560,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 297,
"forks": 296,
"watchers": 1398,
"score": 0
},

View file

@ -202,17 +202,17 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2022-05-27T13:52:26Z",
"updated_at": "2022-06-22T14:31:20Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 143,
"watchers": 142,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2021-12-15T14:37:03Z",
"updated_at": "2022-06-22T14:31:19Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 54,
"watchers": 53,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2022-06-19T02:24:48Z",
"updated_at": "2022-06-22T13:42:51Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 99,
"watchers": 100,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [
@ -53,7 +53,7 @@
"cve-2021-36749"
],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 81,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
"fork": false,
"created_at": "2019-09-10T15:57:36Z",
"updated_at": "2022-06-22T10:29:29Z",
"updated_at": "2022-06-22T13:04:06Z",
"pushed_at": "2019-09-13T20:05:43Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 154,
"watchers": 156,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2022-06-17T16:55:09Z",
"updated_at": "2022-06-22T14:36:58Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 551,
"watchers_count": 551,
"stargazers_count": 552,
"watchers_count": 552,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 130,
"watchers": 551,
"watchers": 552,
"score": 0
},
{
@ -126,10 +126,10 @@
"description": "Citrix ADC Remote Code Execution",
"fork": false,
"created_at": "2020-01-11T03:10:12Z",
"updated_at": "2022-04-07T05:14:19Z",
"updated_at": "2022-06-22T14:31:21Z",
"pushed_at": "2020-01-11T14:03:52Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -139,7 +139,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 82,
"watchers": 81,
"score": 0
},
{

View file

@ -268,17 +268,17 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false,
"created_at": "2021-02-05T06:23:28Z",
"updated_at": "2021-02-05T13:12:05Z",
"updated_at": "2022-06-22T18:12:13Z",
"pushed_at": "2021-02-05T13:12:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -179,7 +179,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 297,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"topics": [
@ -205,7 +205,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 297,
"forks": 296,
"watchers": 1398,
"score": 0
}

View file

@ -94,17 +94,17 @@
"description": null,
"fork": false,
"created_at": "2019-12-06T08:46:31Z",
"updated_at": "2022-04-28T12:16:11Z",
"updated_at": "2022-06-22T14:31:21Z",
"pushed_at": "2019-12-06T09:18:56Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 89,
"watchers": 88,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-09-11T17:17:03Z",
"updated_at": "2019-09-11T17:38:24Z",
"pushed_at": "2022-02-12T13:43:06Z",
"pushed_at": "2022-06-22T16:26:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Info about CVE-2020-0674",
"fork": false,
"created_at": "2020-01-23T12:30:51Z",
"updated_at": "2021-12-15T14:38:10Z",
"updated_at": "2022-06-22T14:31:21Z",
"pushed_at": "2020-01-23T12:54:24Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 17,
"watchers": 16,
"score": 0
},
{

View file

@ -96,10 +96,10 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2022-05-16T02:24:40Z",
"updated_at": "2022-06-22T14:31:22Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@ -111,7 +111,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 145,
"watchers": 144,
"score": 0
},
{

View file

@ -1022,7 +1022,7 @@
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 374,
"forks_count": 375,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1033,7 +1033,7 @@
"smbghost"
],
"visibility": "public",
"forks": 374,
"forks": 375,
"watchers": 1199,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager role to RCE.",
"fork": false,
"created_at": "2021-04-28T19:46:55Z",
"updated_at": "2021-12-03T03:56:31Z",
"updated_at": "2022-06-22T18:00:08Z",
"pushed_at": "2021-12-03T03:56:29Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -53,7 +53,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1470,
"watchers_count": 1470,
"forks_count": 334,
"forks_count": 333,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 334,
"forks": 333,
"watchers": 1470,
"score": 0
},
@ -98,12 +98,12 @@
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 933,
"watchers_count": 933,
"forks_count": 264,
"forks_count": 263,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 264,
"forks": 263,
"watchers": 933,
"score": 0
},

View file

@ -45,17 +45,17 @@
"description": "CVE-2020-15227 exploit",
"fork": false,
"created_at": "2020-10-10T02:38:15Z",
"updated_at": "2022-01-09T09:07:04Z",
"updated_at": "2022-06-22T14:31:23Z",
"pushed_at": "2020-10-09T16:39:54Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 19,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
"fork": false,
"created_at": "2020-07-29T19:02:29Z",
"updated_at": "2022-06-21T17:57:02Z",
"updated_at": "2022-06-22T12:21:24Z",
"pushed_at": "2020-11-11T19:48:38Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 23,
"watchers": 22,
"score": 0
}
]

View file

@ -368,7 +368,7 @@
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 95,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
"topics": [
@ -379,7 +379,7 @@
"ghostcat"
],
"visibility": "public",
"forks": 95,
"forks": 96,
"watchers": 251,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-1958 PoC",
"fork": false,
"created_at": "2020-04-11T13:31:02Z",
"updated_at": "2021-12-15T14:38:54Z",
"updated_at": "2022-06-22T14:31:22Z",
"pushed_at": "2020-04-11T14:52:36Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 26,
"watchers": 25,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 297,
"forks_count": 296,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,7 +43,7 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 297,
"forks": 296,
"watchers": 1398,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2022-06-19T10:58:24Z",
"updated_at": "2022-06-22T14:31:22Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 162,
"watchers": 161,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-8597",
"fork": false,
"created_at": "2020-02-24T08:37:50Z",
"updated_at": "2021-12-15T14:38:25Z",
"updated_at": "2022-06-22T14:31:22Z",
"pushed_at": "2020-03-10T19:01:21Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 68,
"watchers": 67,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-21T15:58:25Z",
"updated_at": "2022-06-21T07:39:21Z",
"updated_at": "2022-06-22T14:31:22Z",
"pushed_at": "2020-02-21T16:03:28Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 75,
"watchers": 74,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-24T07:43:12Z",
"updated_at": "2021-12-10T01:33:46Z",
"updated_at": "2022-06-22T13:10:32Z",
"pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 8,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 34,
"forks": 7,
"watchers": 33,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2022-05-14T14:37:42Z",
"updated_at": "2022-06-22T14:31:23Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 214,
"watchers": 213,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-9547FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-03-02T13:37:21Z",
"updated_at": "2022-02-27T16:26:25Z",
"updated_at": "2022-06-22T13:10:30Z",
"pushed_at": "2020-03-02T14:18:24Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 23,
"watchers": 22,
"score": 0
}
]

View file

@ -44,10 +44,10 @@
"description": "CVE-2021-20038 multithreaded Mass Scanner and Exploiter tool. SonicWall SMA-100 Unauth RCE Exploit",
"fork": false,
"created_at": "2022-04-24T02:02:54Z",
"updated_at": "2022-05-10T11:57:23Z",
"updated_at": "2022-06-22T13:24:42Z",
"pushed_at": "2022-05-17T15:48:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -429,12 +429,12 @@
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 826,
"watchers_count": 826,
"forks_count": 237,
"forks_count": 236,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 237,
"forks": 236,
"watchers": 826,
"score": 0
},
@ -1104,17 +1104,17 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2022-05-15T15:40:29Z",
"updated_at": "2022-06-22T13:40:17Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 180,
"watchers": 181,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"cve-2021-36749"
],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 81,
"score": 0
},

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-06-21T12:01:01Z",
"updated_at": "2022-06-22T13:10:25Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1572,
"watchers_count": 1572,
"stargazers_count": 1571,
"watchers_count": 1571,
"forks_count": 455,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 455,
"watchers": 1572,
"watchers": 1571,
"score": 0
},
{

View file

@ -508,10 +508,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-06-15T19:59:08Z",
"updated_at": "2022-06-22T12:53:51Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 783,
"watchers_count": 783,
"stargazers_count": 782,
"watchers_count": 782,
"forks_count": 126,
"allow_forking": true,
"is_template": false,
@ -538,7 +538,7 @@
],
"visibility": "public",
"forks": 126,
"watchers": 783,
"watchers": 782,
"score": 0
},
{
@ -555,10 +555,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-06-22T10:28:57Z",
"updated_at": "2022-06-22T14:43:03Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1408,
"watchers_count": 1408,
"stargazers_count": 1410,
"watchers_count": 1410,
"forks_count": 387,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 387,
"watchers": 1408,
"watchers": 1410,
"score": 0
},
{
@ -2329,12 +2329,12 @@
"pushed_at": "2022-05-17T13:25:17Z",
"stargazers_count": 2921,
"watchers_count": 2921,
"forks_count": 714,
"forks_count": 713,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 714,
"forks": 713,
"watchers": 2921,
"score": 0
},
@ -9519,10 +9519,10 @@
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists. ",
"fork": false,
"created_at": "2022-04-18T09:16:05Z",
"updated_at": "2022-06-03T18:29:53Z",
"updated_at": "2022-06-22T13:16:14Z",
"pushed_at": "2022-06-01T04:27:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -9537,7 +9537,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -903,10 +903,10 @@
"description": "On F5 BIG-IP undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated ",
"fork": false,
"created_at": "2022-05-11T00:15:07Z",
"updated_at": "2022-05-17T15:51:19Z",
"updated_at": "2022-06-22T13:24:19Z",
"pushed_at": "2022-05-17T15:51:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2022-02-12T11:31:26Z",
"updated_at": "2022-05-01T22:00:20Z",
"updated_at": "2022-06-22T16:58:38Z",
"pushed_at": "2022-02-17T03:59:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit",
"fork": false,
"created_at": "2022-05-28T10:46:48Z",
"updated_at": "2022-06-17T06:25:45Z",
"updated_at": "2022-06-22T17:01:00Z",
"pushed_at": "2022-05-28T10:50:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -290,12 +290,12 @@
"pushed_at": "2022-04-12T23:19:41Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 4,
"score": 0
},

View file

@ -1764,17 +1764,17 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2022-06-22T07:47:08Z",
"updated_at": "2022-06-22T12:43:58Z",
"pushed_at": "2022-06-20T13:23:23Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "CVE-2022-22980环境",
"fork": false,
"created_at": "2022-06-22T07:39:42Z",
"updated_at": "2022-06-22T10:32:27Z",
"updated_at": "2022-06-22T14:22:40Z",
"pushed_at": "2022-06-22T07:45:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -94,17 +94,17 @@
"description": "CVE-2022-22980 exp demp可作为扫描器靶场",
"fork": false,
"created_at": "2022-06-22T07:51:22Z",
"updated_at": "2022-06-22T10:32:23Z",
"updated_at": "2022-06-22T16:00:11Z",
"pushed_at": "2022-06-22T08:20:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-06-22T09:17:28Z",
"updated_at": "2022-06-22T18:05:08Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 435,
"watchers_count": 435,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 433,
"watchers": 435,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-06-22T09:49:12Z",
"pushed_at": "2022-06-22T01:27:39Z",
"stargazers_count": 80,
"watchers_count": 80,
"updated_at": "2022-06-22T13:40:37Z",
"pushed_at": "2022-06-22T13:58:38Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 80,
"watchers": 81,
"score": 0
},
{
@ -133,10 +133,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2022-06-21T16:35:44Z",
"updated_at": "2022-06-22T17:39:45Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 121,
"watchers": 122,
"score": 0
},
{
@ -191,10 +191,10 @@
"description": "[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
"updated_at": "2022-06-22T09:59:52Z",
"updated_at": "2022-06-22T17:41:22Z",
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 225,
"watchers_count": 225,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 59,
"watchers": 223,
"watchers": 225,
"score": 0
},
{
@ -938,17 +938,17 @@
"description": "CVE-2022-26134",
"fork": false,
"created_at": "2022-06-09T02:11:58Z",
"updated_at": "2022-06-09T05:05:41Z",
"updated_at": "2022-06-22T17:49:52Z",
"pushed_at": "2022-06-09T02:43:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -287,10 +287,10 @@
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-09T16:48:30Z",
"updated_at": "2022-05-19T06:42:06Z",
"updated_at": "2022-06-22T13:22:14Z",
"pushed_at": "2022-05-17T15:53:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -304,7 +304,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -436,17 +436,17 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2022-06-22T05:28:32Z",
"updated_at": "2022-06-22T16:23:46Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-06-18T16:19:39Z",
"updated_at": "2022-06-22T17:41:12Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 670,
"watchers_count": 670,
"stargazers_count": 671,
"watchers_count": 671,
"forks_count": 107,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 670,
"watchers": 671,
"score": 0
},
{

View file

@ -351,10 +351,10 @@
"description": "MSDT 0-Day Mass Exploitation Tool",
"fork": false,
"created_at": "2022-06-01T04:15:25Z",
"updated_at": "2022-06-04T06:43:47Z",
"updated_at": "2022-06-22T13:17:14Z",
"pushed_at": "2022-06-01T04:25:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -368,7 +368,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -780,17 +780,17 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-06-22T07:08:16Z",
"updated_at": "2022-06-22T16:33:25Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 281,
"watchers": 282,
"score": 0
},
{

View file

@ -207,10 +207,10 @@
"description": "Zyxel multithreaded Mass Exploitation tool compatible with URL\/IP lists. ",
"fork": false,
"created_at": "2022-05-17T15:58:19Z",
"updated_at": "2022-05-17T16:16:28Z",
"updated_at": "2022-06-22T13:17:51Z",
"pushed_at": "2022-05-17T16:14:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 506193845,
"name": "CVE-2022-9673",
"full_name": "CVE-2099-2222\/CVE-2022-9673",
"owner": {
"login": "CVE-2099-2222",
"id": 107994738,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107994738?v=4",
"html_url": "https:\/\/github.com\/CVE-2099-2222"
},
"html_url": "https:\/\/github.com\/CVE-2099-2222\/CVE-2022-9673",
"description": "CVE-2022-9673",
"fork": false,
"created_at": "2022-06-22T10:09:42Z",
"updated_at": "2022-06-22T10:13:12Z",
"pushed_at": "2022-06-22T10:15:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -415,9 +415,6 @@ The WPQA Builder WordPress plugin before 5.4 which is a companion to the Discy a
### CVE-2022-2333
- [shirouQwQ/CVE-2022-2333](https://github.com/shirouQwQ/CVE-2022-2333)
### CVE-2022-9673
- [CVE-2099-2222/CVE-2022-9673](https://github.com/CVE-2099-2222/CVE-2022-9673)
### CVE-2022-10086
- [Gaphuang/CVE-2022-10086-TEST-](https://github.com/Gaphuang/CVE-2022-10086-TEST-)