Auto Update 2022/04/18 12:16:15

This commit is contained in:
motikan2010-bot 2022-04-18 21:16:15 +09:00
parent bbe4c703b4
commit 700cccc144
49 changed files with 488 additions and 338 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-04-07T17:05:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "CVE-2017-12149 jboss反序列化 可回显",
"fork": false,
"created_at": "2017-11-28T02:52:47Z",
"updated_at": "2022-04-08T01:37:39Z",
"updated_at": "2022-04-18T07:20:26Z",
"pushed_at": "2019-03-13T08:57:50Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-13T19:44:19Z",
"updated_at": "2022-04-13T19:45:07Z",
"updated_at": "2022-04-18T10:56:11Z",
"pushed_at": "2022-04-13T19:46:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2022-04-14T21:37:45Z",
"updated_at": "2022-04-18T10:06:33Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 117,
"watchers": 118,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-04-15T13:08:36Z",
"updated_at": "2022-04-18T08:37:21Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 538,
"watchers_count": 538,
"forks_count": 122,
"stargazers_count": 539,
"watchers_count": 539,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
"topics": [
@ -62,8 +62,8 @@
"xss"
],
"visibility": "public",
"forks": 122,
"watchers": 538,
"forks": 121,
"watchers": 539,
"score": 0
}
]

View file

@ -553,5 +553,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 482821096,
"name": "CVE-2019-15107",
"full_name": "f0rkr\/CVE-2019-15107",
"owner": {
"login": "f0rkr",
"id": 39636110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39636110?v=4",
"html_url": "https:\/\/github.com\/f0rkr"
},
"html_url": "https:\/\/github.com\/f0rkr\/CVE-2019-15107",
"description": "CVE-2019-15107",
"fork": false,
"created_at": "2022-04-18T11:25:42Z",
"updated_at": "2022-04-18T11:25:42Z",
"pushed_at": "2022-04-18T11:25:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2022-04-12T06:13:46Z",
"updated_at": "2022-04-18T09:33:07Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 618,
"watchers_count": 618,
"stargazers_count": 619,
"watchers_count": 619,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 156,
"watchers": 618,
"watchers": 619,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-04-05T22:54:44Z",
"updated_at": "2022-04-18T09:33:39Z",
"pushed_at": "2022-03-17T12:24:02Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 86,
"watchers": 87,
"score": 0
},
{

View file

@ -25,5 +25,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 482826360,
"name": "packages_apps_Settings_AOSP10_r33_CVE-2020-0219",
"full_name": "Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2020-0219",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/packages_apps_Settings_AOSP10_r33_CVE-2020-0219",
"description": null,
"fork": false,
"created_at": "2022-04-18T11:45:18Z",
"updated_at": "2022-04-18T11:48:23Z",
"pushed_at": "2022-04-18T11:48:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2022-04-15T08:07:00Z",
"updated_at": "2022-04-18T08:13:43Z",
"pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 294,
"watchers_count": 294,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 294,
"watchers": 293,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-04-17T10:14:17Z",
"updated_at": "2022-04-18T11:35:15Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 915,
"watchers_count": 915,
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 257,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 257,
"watchers": 915,
"watchers": 916,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "S2-061 的payload以及对应简单的PoC\/Exp",
"fork": false,
"created_at": "2020-12-10T17:42:37Z",
"updated_at": "2022-04-15T12:00:35Z",
"updated_at": "2022-04-18T06:16:06Z",
"pushed_at": "2020-12-18T00:57:50Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
"fork": false,
"created_at": "2021-01-14T10:49:40Z",
"updated_at": "2022-04-12T06:14:41Z",
"updated_at": "2022-04-18T11:38:43Z",
"pushed_at": "2021-01-15T16:25:19Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 83,
"watchers": 84,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2022-03-17T05:12:18Z",
"updated_at": "2022-04-18T09:28:27Z",
"pushed_at": "2022-04-08T15:39:42Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 49,
"watchers": 51,
"score": 0
}
]

29
2021/CVE-2021-0319.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 482789876,
"name": "frameworks_base_AOSP10_r33_CVE-2021-0319",
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0319",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0319",
"description": null,
"fork": false,
"created_at": "2022-04-18T09:31:22Z",
"updated_at": "2022-04-18T09:36:22Z",
"pushed_at": "2022-04-18T09:35:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-01T14:11:58Z",
"updated_at": "2022-04-01T14:16:52Z",
"updated_at": "2022-04-18T09:32:07Z",
"pushed_at": "2022-04-01T14:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2022-04-15T05:45:49Z",
"updated_at": "2022-04-15T05:45:49Z",
"pushed_at": "2022-04-15T05:45:50Z",
"updated_at": "2022-04-18T10:44:56Z",
"pushed_at": "2022-04-18T10:45:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

29
2021/CVE-2021-0478.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 482818616,
"name": "frameworks_base_AOSP10_r33_CVE-2021-0478",
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0478",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0478",
"description": null,
"fork": false,
"created_at": "2022-04-18T11:16:45Z",
"updated_at": "2022-04-18T11:23:22Z",
"pushed_at": "2022-04-18T11:22:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-0705.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 482745572,
"name": "frameworks_base_AOSP10_r33_CVE-2021-0705",
"full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0705",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0705",
"description": null,
"fork": false,
"created_at": "2022-04-18T06:51:16Z",
"updated_at": "2022-04-18T07:06:25Z",
"pushed_at": "2022-04-18T07:06:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 42,
"score": 0
}

View file

@ -57,17 +57,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2022-04-17T16:38:11Z",
"updated_at": "2022-04-18T09:49:38Z",
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 117,
"watchers": 118,
"score": 0
},
{

View file

@ -236,17 +236,17 @@
"description": "GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated) cve-2021-22205",
"fork": false,
"created_at": "2022-04-18T04:56:18Z",
"updated_at": "2022-04-18T04:57:35Z",
"updated_at": "2022-04-18T07:41:30Z",
"pushed_at": "2022-04-18T04:56:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -287,17 +287,17 @@
"description": "Laravel RCE (CVE-2021-3129)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
"updated_at": "2022-04-18T05:12:47Z",
"updated_at": "2022-04-18T09:54:17Z",
"pushed_at": "2022-04-16T17:28:47Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2022-04-18T02:30:05Z",
"updated_at": "2022-04-18T09:14:48Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 40,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 78,
"forks": 44,
"watchers": 86,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
"fork": false,
"created_at": "2022-04-15T04:23:44Z",
"updated_at": "2022-04-17T05:59:48Z",
"updated_at": "2022-04-18T07:04:06Z",
"pushed_at": "2022-04-15T08:52:11Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -94,17 +94,17 @@
"description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用",
"fork": false,
"created_at": "2022-04-15T11:30:26Z",
"updated_at": "2022-04-18T06:09:05Z",
"updated_at": "2022-04-18T06:42:53Z",
"pushed_at": "2022-04-15T15:25:08Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 10,
"forks": 11,
"watchers": 11,
"score": 0
},
{
@ -148,17 +148,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-18T05:28:52Z",
"updated_at": "2022-04-18T05:30:09Z",
"pushed_at": "2022-04-18T05:31:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"updated_at": "2022-04-18T06:16:47Z",
"pushed_at": "2022-04-18T08:26:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -130,17 +130,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-04-14T08:03:44Z",
"updated_at": "2022-04-18T09:42:15Z",
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 39,
"watchers": 40,
"score": 0
},
{
@ -292,10 +292,10 @@
"description": "f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation",
"fork": false,
"created_at": "2022-02-13T10:12:51Z",
"updated_at": "2022-02-14T02:08:54Z",
"updated_at": "2022-04-18T09:39:38Z",
"pushed_at": "2022-02-13T11:16:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -309,7 +309,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -1,31 +1,4 @@
[
{
"id": 428966283,
"name": "CVE-2021-37580",
"full_name": "rabbitsafe\/CVE-2021-37580",
"owner": {
"login": "rabbitsafe",
"id": 33046073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
"html_url": "https:\/\/github.com\/rabbitsafe"
},
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-37580",
"description": null,
"fork": false,
"created_at": "2021-11-17T08:33:25Z",
"updated_at": "2022-01-08T10:58:31Z",
"pushed_at": "2021-11-18T04:41:44Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 429055913,
"name": "CVE-2021-37580",

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-04-16T16:37:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
}

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-04-18T02:05:44Z",
"updated_at": "2022-04-18T09:58:14Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1470,
"watchers_count": 1470,
"forks_count": 430,
"stargazers_count": 1473,
"watchers_count": 1473,
"forks_count": 431,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 430,
"watchers": 1470,
"forks": 431,
"watchers": 1473,
"score": 0
},
{
@ -1228,10 +1228,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
"updated_at": "2022-03-28T20:01:58Z",
"updated_at": "2022-04-18T08:29:36Z",
"pushed_at": "2022-02-07T15:42:00Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -1254,7 +1254,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 46,
"watchers": 47,
"score": 0
},
{
@ -1788,17 +1788,17 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-04-17T15:22:09Z",
"updated_at": "2022-04-18T11:11:24Z",
"pushed_at": "2022-04-09T08:06:43Z",
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 30,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 232,
"forks": 31,
"watchers": 235,
"score": 0
},
{
@ -2251,17 +2251,17 @@
"description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
"fork": false,
"created_at": "2022-01-28T15:16:44Z",
"updated_at": "2022-03-31T04:30:51Z",
"updated_at": "2022-04-18T06:30:50Z",
"pushed_at": "2022-01-28T15:17:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-04-16T21:40:26Z",
"updated_at": "2022-04-18T08:50:37Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1391,
"watchers_count": 1391,
"stargazers_count": 1392,
"watchers_count": 1392,
"forks_count": 455,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 455,
"watchers": 1391,
"watchers": 1392,
"score": 0
},
{

View file

@ -120,33 +120,6 @@
"watchers": 0,
"score": 0
},
{
"id": 427815832,
"name": "POC-CVE-2021-41773",
"full_name": "kubota\/POC-CVE-2021-41773",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota"
},
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T02:02:45Z",
"updated_at": "2021-11-16T20:42:27Z",
"pushed_at": "2021-11-16T20:42:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 438514241,
"name": "MASS_CVE-2021-41773",

View file

@ -84,33 +84,6 @@
"watchers": 3,
"score": 0
},
{
"id": 427958357,
"name": "CVE-2021-42013-ApacheRCE",
"full_name": "xMohamed0\/CVE-2021-42013-ApacheRCE",
"owner": {
"login": "xMohamed0",
"id": 94008154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94008154?v=4",
"html_url": "https:\/\/github.com\/xMohamed0"
},
"html_url": "https:\/\/github.com\/xMohamed0\/CVE-2021-42013-ApacheRCE",
"description": null,
"fork": false,
"created_at": "2021-11-14T14:58:26Z",
"updated_at": "2021-11-14T14:59:00Z",
"pushed_at": "2021-11-14T14:58:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 439885699,
"name": "CVE-2021-42013",

View file

@ -1,29 +0,0 @@
[
{
"id": 428081760,
"name": "CVE-2021-43616",
"full_name": "icatalina\/CVE-2021-43616",
"owner": {
"login": "icatalina",
"id": 4542735,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4542735?v=4",
"html_url": "https:\/\/github.com\/icatalina"
},
"html_url": "https:\/\/github.com\/icatalina\/CVE-2021-43616",
"description": "Repo demonstrating CVE-2021-43616 \/ https:\/\/github.com\/npm\/cli\/issues\/2701",
"fork": false,
"created_at": "2021-11-15T01:06:10Z",
"updated_at": "2022-04-12T02:59:18Z",
"pushed_at": "2021-11-15T01:06:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2022-04-10T14:18:56Z",
"updated_at": "2022-04-18T06:27:18Z",
"pushed_at": "2021-12-15T06:18:15Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -1208,10 +1208,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-04-18T02:38:57Z",
"updated_at": "2022-04-18T07:51:55Z",
"pushed_at": "2022-04-16T04:01:01Z",
"stargazers_count": 297,
"watchers_count": 297,
"stargazers_count": 298,
"watchers_count": 298,
"forks_count": 70,
"allow_forking": true,
"is_template": false,
@ -1223,7 +1223,7 @@
],
"visibility": "public",
"forks": 70,
"watchers": 297,
"watchers": 298,
"score": 0
},
{
@ -10752,5 +10752,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 482785359,
"name": "CVE-2021-44228-Mass-RCE-Log4j",
"full_name": "ExploitPwner\/CVE-2021-44228-Mass-RCE-Log4j",
"owner": {
"login": "ExploitPwner",
"id": 103929208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
"html_url": "https:\/\/github.com\/ExploitPwner"
},
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2021-44228-Mass-RCE-Log4j",
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists. ",
"fork": false,
"created_at": "2022-04-18T09:16:05Z",
"updated_at": "2022-04-18T09:28:12Z",
"pushed_at": "2022-04-18T09:19:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2021/CVE-2021-44255.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 420164946,
"name": "motioneye-authenticated-RCE",
"full_name": "pizza-power\/motioneye-authenticated-RCE",
"owner": {
"login": "pizza-power",
"id": 6135659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
"html_url": "https:\/\/github.com\/pizza-power"
},
"html_url": "https:\/\/github.com\/pizza-power\/motioneye-authenticated-RCE",
"description": "A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. CVE-2021-44255",
"fork": false,
"created_at": "2021-10-22T16:15:08Z",
"updated_at": "2022-04-18T11:39:50Z",
"pushed_at": "2022-02-20T14:55:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,8 +40,35 @@
"description": null,
"fork": false,
"created_at": "2022-04-04T18:09:06Z",
"updated_at": "2022-04-04T18:09:36Z",
"updated_at": "2022-04-18T09:43:17Z",
"pushed_at": "2022-04-07T12:58:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 482761729,
"name": "CVE-2022-0778-POC",
"full_name": "jkakavas\/CVE-2022-0778-POC",
"owner": {
"login": "jkakavas",
"id": 10281256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10281256?v=4",
"html_url": "https:\/\/github.com\/jkakavas"
},
"html_url": "https:\/\/github.com\/jkakavas\/CVE-2022-0778-POC",
"description": null,
"fork": false,
"created_at": "2022-04-18T07:51:18Z",
"updated_at": "2022-04-18T07:51:58Z",
"pushed_at": "2022-04-18T07:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -1628,14 +1628,25 @@
"description": "Scripted Linux Privilege Escalation for the CVE-2022-0847 \"Dirty Pipe\" vulnerability",
"fork": false,
"created_at": "2022-04-17T04:28:24Z",
"updated_at": "2022-04-17T10:02:56Z",
"pushed_at": "2022-04-17T06:56:03Z",
"updated_at": "2022-04-18T07:24:21Z",
"pushed_at": "2022-04-18T10:20:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"cve-2021-3560",
"cve-2022-0847",
"dirtypipe",
"exploit",
"hackthebox",
"infosec",
"privesc",
"privilege-escalation",
"redteam-tools",
"security-tools"
],
"visibility": "public",
"forks": 1,
"watchers": 1,

View file

@ -13,17 +13,17 @@
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2022-04-14T12:51:18Z",
"updated_at": "2022-04-18T06:44:00Z",
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-15T19:37:35Z",
"updated_at": "2022-04-17T23:08:38Z",
"updated_at": "2022-04-18T10:56:20Z",
"pushed_at": "2022-04-16T07:00:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 5,
"score": 0
},
{
@ -40,10 +40,10 @@
"description": "WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC",
"fork": false,
"created_at": "2022-04-17T05:44:45Z",
"updated_at": "2022-04-18T05:58:14Z",
"updated_at": "2022-04-18T10:54:51Z",
"pushed_at": "2022-04-17T05:53:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -56,7 +56,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2022-04-18T06:02:28Z",
"updated_at": "2022-04-18T09:40:39Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 99,
"watchers": 102,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-04-17T02:51:03Z",
"updated_at": "2022-04-18T11:04:27Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 262,
"watchers_count": 262,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 56,
"watchers": 261,
"watchers": 262,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-04-16T07:22:28Z",
"updated_at": "2022-04-18T10:03:37Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 567,
"watchers_count": 567,
"stargazers_count": 568,
"watchers_count": 568,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 567,
"watchers": 568,
"score": 0
}
]

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-04-18T05:36:03Z",
"updated_at": "2022-04-18T10:03:49Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 196,
"watchers": 199,
"score": 0
},
{
@ -151,17 +151,17 @@
"description": "CVE-2022-22954-VMware-RCE批量检测POC",
"fork": false,
"created_at": "2022-04-12T05:48:24Z",
"updated_at": "2022-04-16T02:55:41Z",
"updated_at": "2022-04-18T10:17:05Z",
"pushed_at": "2022-04-12T12:00:26Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -340,17 +340,17 @@
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
"fork": false,
"created_at": "2022-04-13T16:18:56Z",
"updated_at": "2022-04-17T15:36:55Z",
"updated_at": "2022-04-18T08:25:36Z",
"pushed_at": "2022-04-14T13:36:54Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 23,
"forks": 5,
"watchers": 26,
"score": 0
},
{

View file

@ -589,17 +589,17 @@
"description": "批量无损检测CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T07:55:26Z",
"updated_at": "2022-04-08T07:21:07Z",
"updated_at": "2022-04-18T08:27:45Z",
"pushed_at": "2022-04-01T08:44:19Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 25,
"watchers": 26,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "TightVNC Vulnerability.",
"fork": false,
"created_at": "2022-01-26T18:49:43Z",
"updated_at": "2022-04-12T09:18:57Z",
"updated_at": "2022-04-18T09:06:27Z",
"pushed_at": "2022-01-26T18:53:03Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
"fork": false,
"created_at": "2022-04-14T03:41:32Z",
"updated_at": "2022-04-18T04:14:45Z",
"updated_at": "2022-04-18T10:50:13Z",
"pushed_at": "2022-04-18T03:28:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 12,
"score": 0
},
{
@ -123,17 +123,17 @@
"description": "CVE-2022-26809-RCE-EXP",
"fork": false,
"created_at": "2022-04-15T04:13:22Z",
"updated_at": "2022-04-18T03:16:50Z",
"updated_at": "2022-04-18T10:14:47Z",
"pushed_at": "2022-04-15T03:54:36Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 13,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 44,
"forks": 14,
"watchers": 49,
"score": 0
},
{
@ -177,17 +177,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-16T14:09:59Z",
"updated_at": "2022-04-18T04:32:47Z",
"updated_at": "2022-04-18T10:29:13Z",
"pushed_at": "2022-04-18T03:41:05Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"forks": 3,
"watchers": 22,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-04-15T14:20:48Z",
"updated_at": "2022-04-18T07:04:34Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 304,
"watchers_count": 304,
"stargazers_count": 305,
"watchers_count": 305,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 304,
"watchers": 305,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.",
"fork": false,
"created_at": "2022-04-08T02:49:09Z",
"updated_at": "2022-04-18T04:44:13Z",
"updated_at": "2022-04-18T11:04:22Z",
"pushed_at": "2022-04-08T15:21:26Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 10,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,8 +29,8 @@
"webauthn"
],
"visibility": "public",
"forks": 10,
"watchers": 64,
"forks": 11,
"watchers": 66,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-04-18T06:17:26Z",
"updated_at": "2022-04-18T12:17:02Z",
"pushed_at": "2022-04-17T19:08:43Z",
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 35,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 190,
"forks": 43,
"watchers": 250,
"score": 0
}
]

View file

@ -96,6 +96,7 @@ The BN_mod_sqrt() function, which computes a modular square root, contains a bug
- [drago-96/CVE-2022-0778](https://github.com/drago-96/CVE-2022-0778)
- [yywing/cve-2022-0778](https://github.com/yywing/cve-2022-0778)
- [jkakavas/CVE-2022-0778-POC](https://github.com/jkakavas/CVE-2022-0778-POC)
### CVE-2022-0811 (2022-03-16)
@ -1188,6 +1189,14 @@ In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds wr
- [Satheesh575555/system_bt_AOSP_10_r33_CVE-2021-0316](https://github.com/Satheesh575555/system_bt_AOSP_10_r33_CVE-2021-0316)
### CVE-2021-0319 (2021-01-11)
<code>
In checkCallerIsSystemOr of CompanionDeviceManagerService.java, there is a possible way to get a nearby Bluetooth device's MAC address without appropriate permissions due to a permissions bypass. This could lead to local escalation of privilege that grants access to nearby MAC addresses, with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-167244818.
</code>
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319)
### CVE-2021-0325 (2021-02-10)
<code>
@ -1268,6 +1277,14 @@ In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a r
- [nanopathi/system_bt_AOSP10_r33_CVE-2021-0476](https://github.com/nanopathi/system_bt_AOSP10_r33_CVE-2021-0476)
### CVE-2021-0478 (2021-06-21)
<code>
In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797
</code>
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0478](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0478)
### CVE-2021-0506 (2021-06-21)
<code>
@ -1333,6 +1350,14 @@ In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass du
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0688](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0688)
### CVE-2021-0705 (2021-10-22)
<code>
In sanitizeSbn of NotificationManagerService.java, there is a possible way to keep service running in foreground and keep granted permissions due to Bypass of Background Service Restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-185388103
</code>
- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705)
### CVE-2021-0928 (2021-12-15)
<code>
@ -3715,7 +3740,6 @@ Windows Elevation of Privilege Vulnerability
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
</code>
- [rabbitsafe/CVE-2021-37580](https://github.com/rabbitsafe/CVE-2021-37580)
- [fengwenhua/CVE-2021-37580](https://github.com/fengwenhua/CVE-2021-37580)
- [Osyanina/westone-CVE-2021-37580-scanner](https://github.com/Osyanina/westone-CVE-2021-37580-scanner)
- [ZororoZ/CVE-2021-37580](https://github.com/ZororoZ/CVE-2021-37580)
@ -4056,7 +4080,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773)
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
@ -4104,7 +4127,6 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [Vulnmachines/cve-2021-42013](https://github.com/Vulnmachines/cve-2021-42013)
- [twseptian/cve-2021-42013-docker-lab](https://github.com/twseptian/cve-2021-42013-docker-lab)
- [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013)
- [xMohamed0/CVE-2021-42013-ApacheRCE](https://github.com/xMohamed0/CVE-2021-42013-ApacheRCE)
- [awsassets/CVE-2021-42013](https://github.com/awsassets/CVE-2021-42013)
- [asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp](https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp)
- [rnsss/CVE-2021-42013](https://github.com/rnsss/CVE-2021-42013)
@ -4381,14 +4403,6 @@ The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without ve
- [xvnpw/k8s-CVE-2021-43557-poc](https://github.com/xvnpw/k8s-CVE-2021-43557-poc)
### CVE-2021-43616 (2021-11-13)
<code>
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.
</code>
- [icatalina/CVE-2021-43616](https://github.com/icatalina/CVE-2021-43616)
### CVE-2021-43617 (2021-11-14)
<code>
@ -4943,10 +4957,19 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [cryst4lliz3/CVE-2021-44228](https://github.com/cryst4lliz3/CVE-2021-44228)
- [cryst4lliz3/CVE-2021-44228-vuln-app](https://github.com/cryst4lliz3/CVE-2021-44228-vuln-app)
- [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner)
- [ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j)
### CVE-2021-44229
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
### CVE-2021-44255 (2022-01-31)
<code>
Authenticated remote code execution in MotionEye &lt;= 0.42.1 and MotioneEyeOS &lt;= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
</code>
- [pizza-power/motioneye-authenticated-RCE](https://github.com/pizza-power/motioneye-authenticated-RCE)
### CVE-2021-44270
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
@ -5446,6 +5469,7 @@ In onCreate of SliceDeepLinkSpringBoard.java there is a possible insecure Intent
</code>
- [pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219](https://github.com/pazhanivel07/Settings_10-r33_CVE-CVE-2020-0219)
- [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2020-0219)
### CVE-2020-0225 (2020-07-17)
@ -13280,6 +13304,7 @@ An issue was discovered in Webmin &lt;=1.920. The parameter old in password_chan
- [darrenmartyn/CVE-2019-15107](https://github.com/darrenmartyn/CVE-2019-15107)
- [hacknotes/CVE-2019-15107-Exploit](https://github.com/hacknotes/CVE-2019-15107-Exploit)
- [Tuz-Wwsd/CVE-2019-15107_detection](https://github.com/Tuz-Wwsd/CVE-2019-15107_detection)
- [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107)
### CVE-2019-15120 (2019-08-16)