Auto Update 2022/04/28 18:15:50

This commit is contained in:
motikan2010-bot 2022-04-29 03:15:50 +09:00
parent fdcb5931c3
commit 5c510a2e26
37 changed files with 270 additions and 224 deletions

View file

@ -13,17 +13,17 @@
"description": "CVE-2014-4210+Redis未授权访问",
"fork": false,
"created_at": "2017-03-10T02:09:48Z",
"updated_at": "2022-03-10T14:58:17Z",
"updated_at": "2022-04-28T14:00:12Z",
"pushed_at": "2017-03-10T08:35:42Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-03-06T02:27:34Z",
"updated_at": "2022-04-28T15:38:49Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 317,
"watchers": 318,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-03-06T02:27:34Z",
"updated_at": "2022-04-28T15:38:49Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 317,
"watchers": 318,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
"fork": false,
"created_at": "2017-08-21T20:11:11Z",
"updated_at": "2017-08-23T09:18:42Z",
"updated_at": "2022-04-28T13:45:25Z",
"pushed_at": "2017-08-23T09:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -114,12 +114,12 @@
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 19,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 18,
"watchers": 45,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-04-23T04:47:49Z",
"updated_at": "2022-04-28T16:09:59Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1713,
"watchers_count": 1713,
"stargazers_count": 1714,
"watchers_count": 1714,
"forks_count": 262,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 262,
"watchers": 1713,
"watchers": 1714,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2022-02-01T12:44:17Z",
"updated_at": "2022-04-28T12:12:29Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 143,
"watchers": 144,
"score": 0
}
]

View file

@ -175,14 +175,14 @@
{
"id": 374746568,
"name": "bloodit",
"full_name": "0xbrunosergio\/bloodit",
"full_name": "brunosergi0\/bloodit",
"owner": {
"login": "0xbrunosergio",
"login": "brunosergi0",
"id": 65323475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65323475?v=4",
"html_url": "https:\/\/github.com\/0xbrunosergio"
"html_url": "https:\/\/github.com\/brunosergi0"
},
"html_url": "https:\/\/github.com\/0xbrunosergio\/bloodit",
"html_url": "https:\/\/github.com\/brunosergi0\/bloodit",
"description": "Bludit 3.9.2 - Auth Brute Force Mitigation Bypass. CVE-2019-17240",
"fork": false,
"created_at": "2021-06-07T17:22:40Z",

View file

@ -94,17 +94,17 @@
"description": null,
"fork": false,
"created_at": "2019-12-06T08:46:31Z",
"updated_at": "2022-02-22T03:18:34Z",
"updated_at": "2022-04-28T12:16:11Z",
"pushed_at": "2019-12-06T09:18:56Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 88,
"watchers": 89,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
"updated_at": "2022-04-04T15:15:10Z",
"updated_at": "2022-04-28T16:26:12Z",
"pushed_at": "2022-04-04T15:16:08Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 140,
"watchers": 141,
"score": 0
}
]

View file

@ -54,21 +54,21 @@
"score": 0
},
{
"id": 475362491,
"name": "Nfc-CVE-2020-0453",
"full_name": "Trinadh465\/Nfc-CVE-2020-0453",
"id": 486600061,
"name": "packages_apps_Nfc_AOSP10_r33_CVE-2020-0453",
"full_name": "Trinadh465\/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/Nfc-CVE-2020-0453",
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453",
"description": null,
"fork": false,
"created_at": "2022-03-29T09:03:39Z",
"updated_at": "2022-03-29T09:11:23Z",
"pushed_at": "2022-03-29T09:12:32Z",
"created_at": "2022-04-28T13:12:23Z",
"updated_at": "2022-04-28T13:16:53Z",
"pushed_at": "2022-04-28T13:17:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-04-27T14:40:06Z",
"updated_at": "2022-04-28T14:10:43Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1444,
"watchers_count": 1444,
"stargazers_count": 1445,
"watchers_count": 1445,
"forks_count": 329,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 329,
"watchers": 1444,
"watchers": 1445,
"score": 0
},
{

View file

@ -115,17 +115,17 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2022-04-28T11:20:38Z",
"updated_at": "2022-04-28T12:26:25Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 291,
"watchers": 292,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-03-23T16:16:39Z",
"updated_at": "2021-12-05T21:34:44Z",
"pushed_at": "2020-03-23T17:50:39Z",
"pushed_at": "2022-04-28T13:39:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2022-03-02T17:27:19Z",
"updated_at": "2022-04-28T15:06:41Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 125,
"watchers": 126,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2022-03-02T17:27:19Z",
"updated_at": "2022-04-28T15:06:41Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 125,
"watchers": 126,
"score": 0
}
]

29
2021/CVE-2021-24507.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486599533,
"name": "CVE-2021-24507",
"full_name": "RandomRobbieBF\/CVE-2021-24507",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24507",
"description": "Astra Pro Addon < 3.5.2 - Unauthenticated SQL Injection - CVE-2021-24507",
"fork": false,
"created_at": "2022-04-28T13:10:55Z",
"updated_at": "2022-04-28T13:11:23Z",
"pushed_at": "2022-04-28T13:11:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-30937.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486636223,
"name": "ExploiteameEsta",
"full_name": "realrodri\/ExploiteameEsta",
"owner": {
"login": "realrodri",
"id": 40494400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40494400?v=4",
"html_url": "https:\/\/github.com\/realrodri"
},
"html_url": "https:\/\/github.com\/realrodri\/ExploiteameEsta",
"description": "CVE-2021-30937 vulnerability checking app",
"fork": false,
"created_at": "2022-04-28T14:50:00Z",
"updated_at": "2022-04-28T14:52:37Z",
"pushed_at": "2022-04-28T18:00:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -125,12 +125,12 @@
"pushed_at": "2022-04-22T05:24:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0
},

View file

@ -184,17 +184,17 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2022-04-28T07:26:51Z",
"updated_at": "2022-04-28T12:48:11Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -154,10 +154,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-04-26T18:21:06Z",
"updated_at": "2022-04-28T14:57:19Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 842,
"watchers_count": 842,
"stargazers_count": 844,
"watchers_count": 844,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -168,7 +168,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 842,
"watchers": 844,
"score": 0
},
{
@ -875,10 +875,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-04-27T15:55:07Z",
"updated_at": "2022-04-28T14:50:38Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 92,
"allow_forking": true,
"is_template": false,
@ -887,7 +887,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 493,
"watchers": 494,
"score": 0
},
{
@ -3950,8 +3950,8 @@
"description": "My research about CVE-2021-4034",
"fork": false,
"created_at": "2022-04-24T14:52:55Z",
"updated_at": "2022-04-24T15:19:33Z",
"pushed_at": "2022-04-26T00:45:19Z",
"updated_at": "2022-04-28T17:00:09Z",
"pushed_at": "2022-04-28T17:08:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -80,33 +80,6 @@
"watchers": 1,
"score": 0
},
{
"id": 486343778,
"name": "CVE-2021-40444_PoC",
"full_name": "QwertyStack\/CVE-2021-40444_PoC",
"owner": {
"login": "QwertyStack",
"id": 73184752,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73184752?v=4",
"html_url": "https:\/\/github.com\/QwertyStack"
},
"html_url": "https:\/\/github.com\/QwertyStack\/CVE-2021-40444_PoC",
"description": null,
"fork": false,
"created_at": "2022-04-27T20:38:22Z",
"updated_at": "2022-04-27T20:43:08Z",
"pushed_at": "2022-04-27T20:38:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 486415935,
"name": "CVE-2021-40444",

View file

@ -40,17 +40,17 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2022-04-28T07:02:30Z",
"updated_at": "2022-04-28T14:47:20Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -107,37 +107,6 @@
"watchers": 12,
"score": 0
},
{
"id": 435877595,
"name": "CVE-2021-43798",
"full_name": "Mr-xn\/CVE-2021-43798",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-07T12:47:58Z",
"updated_at": "2022-04-11T04:08:51Z",
"pushed_at": "2021-12-07T16:27:56Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"grafana",
"vulnerability"
],
"visibility": "public",
"forks": 8,
"watchers": 29,
"score": 0
},
{
"id": 435904073,
"name": "CVE-2021-43798-Grafana-Exp",

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-15T06:18:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 11,
"score": 0
},
@ -394,14 +394,14 @@
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 981,
"watchers_count": 981,
"forks_count": 435,
"forks_count": 436,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 435,
"forks": 436,
"watchers": 981,
"score": 0
},
@ -419,10 +419,10 @@
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
"fork": false,
"created_at": "2021-12-10T14:22:49Z",
"updated_at": "2022-03-17T02:06:09Z",
"updated_at": "2022-04-28T15:50:57Z",
"pushed_at": "2021-12-14T15:16:15Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -436,7 +436,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 123,
"watchers": 122,
"score": 0
},
{
@ -833,10 +833,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-04-28T02:29:23Z",
"updated_at": "2022-04-28T14:44:13Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 749,
"watchers_count": 749,
"stargazers_count": 750,
"watchers_count": 750,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
@ -863,7 +863,7 @@
],
"visibility": "public",
"forks": 123,
"watchers": 749,
"watchers": 750,
"score": 0
},
{
@ -884,7 +884,7 @@
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1336,
"watchers_count": 1336,
"forks_count": 366,
"forks_count": 365,
"allow_forking": true,
"is_template": false,
"topics": [
@ -894,7 +894,7 @@
"security"
],
"visibility": "public",
"forks": 366,
"forks": 365,
"watchers": 1336,
"score": 0
},
@ -3465,17 +3465,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-04-28T07:09:53Z",
"updated_at": "2022-04-28T15:50:47Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2844,
"watchers_count": 2844,
"stargazers_count": 2843,
"watchers_count": 2843,
"forks_count": 693,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 693,
"watchers": 2844,
"watchers": 2843,
"score": 0
},
{
@ -5135,7 +5135,7 @@
"pushed_at": "2022-04-24T08:56:47Z",
"stargazers_count": 311,
"watchers_count": 311,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [
@ -5146,7 +5146,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 311,
"score": 0
},
@ -5305,10 +5305,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-04-20T18:38:51Z",
"updated_at": "2022-04-28T15:50:40Z",
"pushed_at": "2022-01-27T16:08:20Z",
"stargazers_count": 414,
"watchers_count": 414,
"stargazers_count": 413,
"watchers_count": 413,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -5324,7 +5324,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 414,
"watchers": 413,
"score": 0
},
{
@ -8514,17 +8514,17 @@
"description": "log4j2 RCE漏洞CVE-2021-44228)内网扫描器可用于在不出网的条件下进行漏洞扫描帮助企业内部快速发现Log4jShell漏洞。",
"fork": false,
"created_at": "2021-12-20T13:41:35Z",
"updated_at": "2022-04-06T08:49:41Z",
"updated_at": "2022-04-28T13:15:05Z",
"pushed_at": "2021-12-21T06:11:58Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 16,
"forks": 5,
"watchers": 17,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-04-28T11:02:49Z",
"updated_at": "2022-04-28T17:47:58Z",
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-04-28T06:34:30Z",
"updated_at": "2022-04-28T15:27:44Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 936,
"watchers_count": 936,
"stargazers_count": 937,
"watchers_count": 937,
"forks_count": 194,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 194,
"watchers": 936,
"watchers": 937,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-12T10:56:10Z",
"updated_at": "2022-04-28T07:31:55Z",
"updated_at": "2022-04-28T14:40:00Z",
"pushed_at": "2022-04-12T10:59:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1214,17 +1214,17 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-04-28T07:36:38Z",
"updated_at": "2022-04-28T16:44:25Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 46,
"watchers": 49,
"score": 0
}
]

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-04-28T11:54:42Z",
"updated_at": "2022-04-28T18:15:11Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 242,
"watchers": 244,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-04-26T10:24:35Z",
"updated_at": "2022-04-28T17:31:37Z",
"pushed_at": "2022-04-07T19:05:54Z",
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 79,
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 80,
"allow_forking": true,
"is_template": false,
"topics": [
@ -31,8 +31,8 @@
"tomcat"
],
"visibility": "public",
"forks": 79,
"watchers": 252,
"forks": 80,
"watchers": 253,
"score": 0
},
{
@ -119,17 +119,17 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-04-28T08:36:56Z",
"updated_at": "2022-04-28T13:02:32Z",
"pushed_at": "2022-04-05T16:02:33Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 186,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 186,
"watchers": 213,
"watchers": 214,
"score": 0
},
{
@ -1618,7 +1618,7 @@
"fork": false,
"created_at": "2022-04-23T09:01:22Z",
"updated_at": "2022-04-28T12:15:48Z",
"pushed_at": "2022-04-26T22:16:08Z",
"pushed_at": "2022-04-28T13:25:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "SXF VPN RCE",
"fork": false,
"created_at": "2022-04-25T10:13:40Z",
"updated_at": "2022-04-27T03:32:45Z",
"updated_at": "2022-04-28T14:28:52Z",
"pushed_at": "2022-04-25T10:26:28Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 43,
"watchers": 44,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2022-02-26T10:29:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},

29
2022/CVE-2022-24449.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486592621,
"name": "CVE-2022-24449",
"full_name": "jet-pentest\/CVE-2022-24449",
"owner": {
"login": "jet-pentest",
"id": 71512502,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
"html_url": "https:\/\/github.com\/jet-pentest"
},
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2022-24449",
"description": "Solar Appscreener XXE",
"fork": false,
"created_at": "2022-04-28T12:51:01Z",
"updated_at": "2022-04-28T12:51:01Z",
"pushed_at": "2022-04-28T13:07:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-04-28T09:58:06Z",
"updated_at": "2022-04-28T13:03:45Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 635,
"watchers_count": 635,
"forks_count": 102,
"stargazers_count": 636,
"watchers_count": 636,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 102,
"watchers": 635,
"forks": 101,
"watchers": 636,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-04-28T10:22:31Z",
"updated_at": "2022-04-28T14:30:09Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 51,
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-29464"
],
"visibility": "public",
"forks": 51,
"watchers": 249,
"forks": 52,
"watchers": 251,
"score": 0
},
{

View file

@ -876,6 +876,9 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
- [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2)
### CVE-2022-24449
- [jet-pentest/CVE-2022-24449](https://github.com/jet-pentest/CVE-2022-24449)
### CVE-2022-24483 (2022-04-15)
<code>
@ -2937,6 +2940,14 @@ The All in One SEO Best WordPress SEO Plugin Easily Improve Your SEO Ran
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
### CVE-2021-24507 (2021-08-09)
<code>
The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues
</code>
- [RandomRobbieBF/CVE-2021-24507](https://github.com/RandomRobbieBF/CVE-2021-24507)
### CVE-2021-24750 (2021-12-21)
<code>
@ -3652,6 +3663,14 @@ An integer overflow was addressed with improved input validation. This issue is
- [jeffssh/CVE-2021-30860](https://github.com/jeffssh/CVE-2021-30860)
### CVE-2021-30937 (2021-08-24)
<code>
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges.
</code>
- [realrodri/ExploiteameEsta](https://github.com/realrodri/ExploiteameEsta)
### CVE-2021-30955 (2021-08-24)
<code>
@ -4008,7 +4027,7 @@ Windows Print Spooler Remote Code Execution Vulnerability
### CVE-2021-34600 (2022-01-20)
<code>
Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for authorization of users.
Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.
</code>
- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
@ -4271,7 +4290,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
- [34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit](https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit)
- [MRacumen/CVE-2021-40444](https://github.com/MRacumen/CVE-2021-40444)
- [QwertyStack/CVE-2021-40444_PoC](https://github.com/QwertyStack/CVE-2021-40444_PoC)
- [RedLeavesChilde/CVE-2021-40444](https://github.com/RedLeavesChilde/CVE-2021-40444)
### CVE-2021-40449 (2021-10-12)
@ -4726,7 +4744,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
- [Mr-xn/CVE-2021-43798](https://github.com/Mr-xn/CVE-2021-43798)
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
@ -5979,7 +5996,7 @@ In updateNotification of BeamTransferManager.java, there is a possible permissio
- [pazhanivel07/Nfc_CVE-2020-0453](https://github.com/pazhanivel07/Nfc_CVE-2020-0453)
- [nanopathi/Packages_apps_Nfc_CVE-2020-0453](https://github.com/nanopathi/Packages_apps_Nfc_CVE-2020-0453)
- [Trinadh465/Nfc-CVE-2020-0453](https://github.com/Trinadh465/Nfc-CVE-2020-0453)
- [Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453](https://github.com/Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453)
### CVE-2020-0458 (2020-12-14)
@ -14085,7 +14102,7 @@ bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-
- [0xkasra/CVE-2019-17240](https://github.com/0xkasra/CVE-2019-17240)
- [ColdFusionX/CVE-2019-17240_Bludit-BF-Bypass](https://github.com/ColdFusionX/CVE-2019-17240_Bludit-BF-Bypass)
- [jayngng/bludit-CVE-2019-17240](https://github.com/jayngng/bludit-CVE-2019-17240)
- [0xbrunosergio/bloodit](https://github.com/0xbrunosergio/bloodit)
- [brunosergi0/bloodit](https://github.com/brunosergi0/bloodit)
- [spyx/cve-2019-17240](https://github.com/spyx/cve-2019-17240)
### CVE-2019-17424 (2019-10-22)