Auto Update 2023/08/07 00:26:48

This commit is contained in:
motikan2010-bot 2023-08-07 09:26:48 +09:00
parent f97854ee5f
commit 5f675187bb
62 changed files with 388 additions and 153 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-04T05:20:58Z",
"updated_at": "2023-08-06T20:10:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1754,
"watchers_count": 1754,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1755,
"watchers": 1754,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-04T05:20:58Z",
"updated_at": "2023-08-06T20:10:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1754,
"watchers_count": 1754,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1755,
"watchers": 1754,
"score": 0,
"subscribers_count": 34
},

View file

@ -601,10 +601,10 @@
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
"fork": false,
"created_at": "2017-01-20T05:28:04Z",
"updated_at": "2023-07-28T01:06:52Z",
"updated_at": "2023-08-06T19:57:21Z",
"pushed_at": "2017-01-27T10:04:07Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 258,
"watchers_count": 258,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -613,7 +613,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 257,
"watchers": 258,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "jenkins CVE-2017-1000353 POC",
"fork": false,
"created_at": "2019-04-12T13:24:26Z",
"updated_at": "2023-04-02T08:39:44Z",
"updated_at": "2023-08-06T20:58:33Z",
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-04T05:20:58Z",
"updated_at": "2023-08-06T20:10:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1754,
"watchers_count": 1754,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1755,
"watchers": 1754,
"score": 0,
"subscribers_count": 34
},

View file

@ -53,10 +53,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2023-07-25T14:08:56Z",
"updated_at": "2023-08-06T19:03:21Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 542,
"watchers_count": 542,
"stargazers_count": 543,
"watchers_count": 543,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 542,
"watchers": 543,
"score": 0,
"subscribers_count": 47
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 490,
"watchers_count": 490,
"has_discussions": false,
"forks_count": 474,
"forks_count": 473,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 474,
"forks": 473,
"watchers": 490,
"score": 0,
"subscribers_count": 58

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2023-07-26T17:30:41Z",
"updated_at": "2023-08-06T20:29:09Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 4
},

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-04T05:20:58Z",
"updated_at": "2023-08-06T20:10:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1754,
"watchers_count": 1754,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1755,
"watchers": 1754,
"score": 0,
"subscribers_count": 34
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-04T05:20:58Z",
"updated_at": "2023-08-06T20:10:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1754,
"watchers_count": 1754,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1755,
"watchers": 1754,
"score": 0,
"subscribers_count": 34
}

View file

@ -253,10 +253,10 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2023-08-04T05:20:36Z",
"updated_at": "2023-08-06T19:29:23Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 184,
"watchers": 185,
"score": 0,
"subscribers_count": 8
},

View file

@ -27,6 +27,6 @@
"forks": 57,
"watchers": 336,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
}
]

View file

@ -124,7 +124,7 @@
"forks": 65,
"watchers": 145,
"score": 0,
"subscribers_count": 9
"subscribers_count": 10
},
{
"id": 243640997,

View file

@ -27,7 +27,7 @@
"forks": 173,
"watchers": 687,
"score": 0,
"subscribers_count": 17
"subscribers_count": 18
},
{
"id": 320526580,

View file

@ -743,7 +743,7 @@
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 247218948,
@ -1368,7 +1368,7 @@
"forks": 22,
"watchers": 78,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 253927600,
@ -1704,7 +1704,7 @@
"forks": 48,
"watchers": 231,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 271468541,
@ -1859,7 +1859,7 @@
"forks": 21,
"watchers": 63,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 299197060,

View file

@ -31,7 +31,7 @@
"forks": 48,
"watchers": 146,
"score": 0,
"subscribers_count": 12
"subscribers_count": 13
},
{
"id": 277048370,

View file

@ -44,7 +44,7 @@
"forks": 29,
"watchers": 158,
"score": 0,
"subscribers_count": 9
"subscribers_count": 10
},
{
"id": 279670211,

View file

@ -154,7 +154,7 @@
"forks": 66,
"watchers": 353,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 295515909,
@ -184,7 +184,7 @@
"forks": 142,
"watchers": 547,
"score": 0,
"subscribers_count": 13
"subscribers_count": 14
},
{
"id": 295517706,
@ -1731,7 +1731,7 @@
"forks": 10,
"watchers": 83,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 543363896,

View file

@ -47,7 +47,7 @@
"forks": 1085,
"watchers": 3831,
"score": 0,
"subscribers_count": 154
"subscribers_count": 155
},
{
"id": 307998445,
@ -317,7 +317,7 @@
"forks": 38,
"watchers": 140,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 309666360,
@ -377,7 +377,7 @@
"forks": 11,
"watchers": 19,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 310303375,

View file

@ -436,6 +436,6 @@
"forks": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -87,7 +87,7 @@
"forks": 43,
"watchers": 148,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 640111892,

View file

@ -103,10 +103,10 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2023-08-04T05:21:02Z",
"updated_at": "2023-08-06T21:57:25Z",
"pushed_at": "2021-11-26T07:40:35Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 291,
"watchers_count": 291,
"has_discussions": false,
"forks_count": 102,
"allow_forking": true,
@ -115,9 +115,9 @@
"topics": [],
"visibility": "public",
"forks": 102,
"watchers": 290,
"watchers": 291,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 242038197,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-04T05:20:58Z",
"updated_at": "2023-08-06T20:10:23Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1755,
"watchers_count": 1755,
"stargazers_count": 1754,
"watchers_count": 1754,
"has_discussions": false,
"forks_count": 329,
"allow_forking": true,
@ -46,9 +46,9 @@
],
"visibility": "public",
"forks": 329,
"watchers": 1755,
"watchers": 1754,
"score": 0,
"subscribers_count": 33
"subscribers_count": 34
},
{
"id": 234696172,
@ -138,7 +138,7 @@
"forks": 78,
"watchers": 330,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 264347023,
@ -168,7 +168,7 @@
"forks": 27,
"watchers": 86,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 266458849,

View file

@ -1220,7 +1220,7 @@
"forks": 17,
"watchers": 62,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 278872820,

View file

@ -212,6 +212,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -177,7 +177,7 @@
"forks": 11,
"watchers": 16,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 401990251,
@ -237,7 +237,7 @@
"forks": 44,
"watchers": 64,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 402050204,

View file

@ -538,7 +538,7 @@
"forks": 33,
"watchers": 61,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 346840803,
@ -1114,7 +1114,7 @@
"forks": 43,
"watchers": 228,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 357875949,

View file

@ -27,7 +27,7 @@
"forks": 6,
"watchers": 11,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 441593216,

View file

@ -32,7 +32,7 @@
"forks": 138,
"watchers": 824,
"score": 0,
"subscribers_count": 23
"subscribers_count": 24
},
{
"id": 368156601,

View file

@ -998,7 +998,7 @@
"forks": 42,
"watchers": 193,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 338208683,

View file

@ -207,7 +207,7 @@
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 674477369,

View file

@ -93,7 +93,7 @@
"forks": 59,
"watchers": 213,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 382645654,
@ -130,7 +130,7 @@
"forks": 35,
"watchers": 91,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 382894525,
@ -632,7 +632,7 @@
"forks": 17,
"watchers": 76,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 533095208,

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 46,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -523,7 +523,7 @@
"forks": 12,
"watchers": 114,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 487194704,

View file

@ -29,7 +29,7 @@
"forks": 11,
"watchers": 38,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 403602684,

View file

@ -32,7 +32,7 @@
"forks": 37,
"watchers": 195,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 388119730,

View file

@ -31,6 +31,6 @@
"forks": 9,
"watchers": 23,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 25,
"watchers": 157,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
}
]

View file

@ -93,7 +93,7 @@
"forks": 514,
"watchers": 1840,
"score": 0,
"subscribers_count": 21
"subscribers_count": 22
},
{
"id": 452088979,
@ -277,7 +277,7 @@
"forks": 36,
"watchers": 106,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 452108706,
@ -954,7 +954,7 @@
"forks": 167,
"watchers": 824,
"score": 0,
"subscribers_count": 13
"subscribers_count": 14
},
{
"id": 452311547,
@ -1319,7 +1319,7 @@
"forks": 39,
"watchers": 113,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 452384014,
@ -2146,7 +2146,7 @@
"forks": 18,
"watchers": 70,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 452924557,

View file

@ -237,7 +237,7 @@
"forks": 490,
"watchers": 1488,
"score": 0,
"subscribers_count": 27
"subscribers_count": 28
},
{
"id": 405266779,
@ -327,7 +327,7 @@
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 405599465,
@ -417,7 +417,7 @@
"forks": 48,
"watchers": 168,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 405915598,
@ -544,7 +544,7 @@
"forks": 169,
"watchers": 755,
"score": 0,
"subscribers_count": 18
"subscribers_count": 19
},
{
"id": 407116716,
@ -574,7 +574,7 @@
"forks": 7,
"watchers": 9,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 407245865,
@ -637,7 +637,7 @@
"forks": 22,
"watchers": 99,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 409931314,

View file

@ -29,7 +29,7 @@
"forks": 95,
"watchers": 440,
"score": 0,
"subscribers_count": 12
"subscribers_count": 13
},
{
"id": 419264342,

View file

@ -278,7 +278,7 @@
"forks": 6,
"watchers": 8,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 446249616,

View file

@ -1447,7 +1447,7 @@
"forks": 50,
"watchers": 141,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 415290894,
@ -1721,7 +1721,7 @@
"forks": 5,
"watchers": 8,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 417643516,

View file

@ -27,7 +27,7 @@
"forks": 316,
"watchers": 1241,
"score": 0,
"subscribers_count": 26
"subscribers_count": 27
},
{
"id": 437991499,

View file

@ -87,7 +87,7 @@
"forks": 90,
"watchers": 331,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 435840491,
@ -151,7 +151,7 @@
"forks": 9,
"watchers": 27,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 435904073,
@ -219,7 +219,7 @@
"forks": 36,
"watchers": 223,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 435955349,

View file

@ -117,7 +117,7 @@
"forks": 127,
"watchers": 442,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 436871682,
@ -353,7 +353,7 @@
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 436974241,
@ -374,7 +374,7 @@
"stargazers_count": 1065,
"watchers_count": 1065,
"has_discussions": false,
"forks_count": 500,
"forks_count": 499,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -382,7 +382,7 @@
"log4shell"
],
"visibility": "public",
"forks": 500,
"forks": 499,
"watchers": 1065,
"score": 0,
"subscribers_count": 23
@ -557,7 +557,7 @@
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 437060009,
@ -4273,7 +4273,7 @@
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 437860177,
@ -5610,7 +5610,7 @@
"forks": 54,
"watchers": 368,
"score": 0,
"subscribers_count": 11
"subscribers_count": 12
},
{
"id": 438148080,

View file

@ -117,7 +117,7 @@
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 442640537,

32
2022/CVE-2022-0219.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 450128440,
"name": "CVE-2022-0219",
"full_name": "Haxatron\/CVE-2022-0219",
"owner": {
"login": "Haxatron",
"id": 76475453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
"html_url": "https:\/\/github.com\/Haxatron"
},
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
"description": null,
"fork": false,
"created_at": "2022-01-20T14:24:45Z",
"updated_at": "2022-01-20T14:24:45Z",
"pushed_at": "2022-01-20T14:35:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-0236.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2023-01-28T03:56:57Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2023-08-06T10:30:16Z",
"updated_at": "2023-08-06T22:08:33Z",
"pushed_at": "2023-08-05T20:56:12Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
}

View file

@ -1,4 +1,34 @@
[
{
"id": 446296593,
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"owner": {
"login": "UzJu",
"id": 50813806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
"html_url": "https:\/\/github.com\/UzJu"
},
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"description": "CVE-2022-21660",
"fork": false,
"created_at": "2022-01-10T05:50:35Z",
"updated_at": "2023-08-04T05:22:54Z",
"pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
{
"id": 462232980,
"name": "CVE-2022-21660",

View file

@ -79,6 +79,66 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2023-07-28T09:02:24Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 366,
"watchers_count": 366,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 366,
"score": 0,
"subscribers_count": 10
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2023-07-11T22:38:20Z",
"updated_at": "2023-08-06T20:41:07Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 295,
"watchers_count": 295,
"stargazers_count": 296,
"watchers_count": 296,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 295,
"watchers": 296,
"score": 0,
"subscribers_count": 9
},

View file

@ -1451,10 +1451,10 @@
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
"fork": false,
"created_at": "2022-04-07T00:08:16Z",
"updated_at": "2023-07-07T06:50:58Z",
"updated_at": "2023-08-06T21:15:36Z",
"pushed_at": "2022-04-07T23:00:29Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -1463,7 +1463,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 4
},

View file

@ -1185,10 +1185,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)",
"fork": false,
"created_at": "2022-07-05T04:30:42Z",
"updated_at": "2023-08-03T10:10:10Z",
"updated_at": "2023-08-06T23:17:06Z",
"pushed_at": "2022-08-21T04:13:32Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -1202,7 +1202,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 17,
"score": 0,
"subscribers_count": 4

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-08-06T09:00:41Z",
"updated_at": "2023-08-06T22:14:15Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 819,
"watchers_count": 819,
"stargazers_count": 820,
"watchers_count": 820,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 819,
"watchers": 820,
"score": 0,
"subscribers_count": 25
},

View file

@ -173,10 +173,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-08-03T20:51:57Z",
"updated_at": "2023-08-06T22:47:42Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 334,
"watchers_count": 334,
"stargazers_count": 335,
"watchers_count": 335,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 334,
"watchers": 335,
"score": 0,
"subscribers_count": 5
},

View file

@ -346,10 +346,10 @@
"description": "MinIO Information Disclosure Vulnerability scanner by metasploit",
"fork": false,
"created_at": "2023-05-27T14:55:07Z",
"updated_at": "2023-05-27T15:35:58Z",
"updated_at": "2023-08-06T21:43:54Z",
"pushed_at": "2023-05-27T15:35:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -358,7 +358,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}

View file

@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2023-08-06T18:00:15Z",
"updated_at": "2023-08-07T00:03:11Z",
"pushed_at": "2023-08-04T22:36:02Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 72,
"watchers": 77,
"score": 0,
"subscribers_count": 0
},
@ -277,5 +277,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 675439868,
"name": "cve-2023-3519",
"full_name": "rwincey\/cve-2023-3519",
"owner": {
"login": "rwincey",
"id": 5438659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
"html_url": "https:\/\/github.com\/rwincey"
},
"html_url": "https:\/\/github.com\/rwincey\/cve-2023-3519",
"description": null,
"fork": false,
"created_at": "2023-08-06T23:17:18Z",
"updated_at": "2023-08-06T23:19:13Z",
"pushed_at": "2023-08-06T23:19:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/cduram"
},
"html_url": "https:\/\/github.com\/cduram\/CVE-2023-39144",
"description": null,
"description": "Vulnerability in Element55 Maketime",
"fork": false,
"created_at": "2023-07-27T18:32:16Z",
"updated_at": "2023-07-27T18:34:05Z",
"updated_at": "2023-08-06T21:23:17Z",
"pushed_at": "2023-08-06T16:09:06Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -441,6 +441,7 @@
- [SalehLardhi/CVE-2023-3519](https://github.com/SalehLardhi/CVE-2023-3519)
- [KR0N-SECURITY/CVE-2023-3519](https://github.com/KR0N-SECURITY/CVE-2023-3519)
- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
### CVE-2023-3640 (2023-07-24)
@ -2624,6 +2625,21 @@
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
### CVE-2022-0219 (2022-01-20)
<code>Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
</code>
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
### CVE-2022-0236 (2022-01-18)
<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
<code>Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
@ -3787,6 +3803,7 @@
<code>Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
</code>
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@ -3876,6 +3893,8 @@
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)