Auto Update 2022/08/18 12:17:27

This commit is contained in:
motikan2010-bot 2022-08-18 21:17:27 +09:00
parent ff7d41e00f
commit 705d111ec2
54 changed files with 630 additions and 206 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-17T14:50:53Z",
"updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1477,
"watchers": 1480,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "Experiments related to CVE-2015-3456",
"fork": false,
"created_at": "2015-05-17T20:14:47Z",
"updated_at": "2020-08-18T07:34:43Z",
"updated_at": "2022-08-18T07:17:35Z",
"pushed_at": "2015-05-27T13:58:46Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"forks": 3,
"watchers": 12,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2022-08-12T10:12:07Z",
"updated_at": "2022-08-18T09:58:12Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 330,
"watchers": 329,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-17T14:50:53Z",
"updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1477,
"watchers": 1480,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2022-06-26T22:05:36Z",
"updated_at": "2022-08-18T08:28:09Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 902,
"watchers_count": 902,
"stargazers_count": 903,
"watchers_count": 903,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 410,
"watchers": 902,
"watchers": 903,
"score": 0
},
{
@ -419,10 +419,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2022-08-18T02:07:50Z",
"updated_at": "2022-08-18T08:30:00Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"forks_count": 400,
"allow_forking": true,
"is_template": false,
@ -434,7 +434,7 @@
],
"visibility": "public",
"forks": 400,
"watchers": 629,
"watchers": 630,
"score": 0
},
{

View file

@ -27,6 +27,34 @@
"watchers": 1,
"score": 0
},
{
"id": 95974378,
"name": "CVE-2017-0213",
"full_name": "zcgonvh\/CVE-2017-0213",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
"description": "CVE-2017-0213 for command line",
"fork": false,
"created_at": "2017-07-01T16:07:04Z",
"updated_at": "2022-06-16T11:45:53Z",
"pushed_at": "2017-07-01T16:19:12Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 59,
"score": 0
},
{
"id": 105444160,
"name": "CVE-2017-0213",

View file

@ -1,4 +1,32 @@
[
{
"id": 96219146,
"name": "CVE-2017-3241-POC",
"full_name": "xfei3\/CVE-2017-3241-POC",
"owner": {
"login": "xfei3",
"id": 29874084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29874084?v=4",
"html_url": "https:\/\/github.com\/xfei3"
},
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
"description": "POC for java RMI deserialization vulnerability",
"fork": false,
"created_at": "2017-07-04T13:05:46Z",
"updated_at": "2020-03-29T07:05:46Z",
"pushed_at": "2017-07-19T23:55:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 419955901,
"name": "CVE-2017-3241",

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-17T14:50:53Z",
"updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1477,
"watchers": 1480,
"score": 0
},
{

View file

@ -26,5 +26,33 @@
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 96573883,
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
"description": null,
"fork": false,
"created_at": "2017-07-07T20:21:51Z",
"updated_at": "2017-08-23T09:24:55Z",
"pushed_at": "2017-07-11T15:36:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,32 @@
[
{
"id": 107852472,
"name": "wpUsersScan",
"full_name": "teambugsbunny\/wpUsersScan",
"owner": {
"login": "teambugsbunny",
"id": 32997799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32997799?v=4",
"html_url": "https:\/\/github.com\/teambugsbunny"
},
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
"fork": false,
"created_at": "2017-10-22T09:22:28Z",
"updated_at": "2020-04-06T12:23:41Z",
"pushed_at": "2017-06-11T16:47:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 121831599,
"name": "wpUsersScan",

View file

@ -1068,6 +1068,34 @@
"watchers": 15,
"score": 0
},
{
"id": 98150795,
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"owner": {
"login": "R4v3nBl4ck",
"id": 30399308,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
},
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"description": "Exploit created by: R4v3nBl4ck end Pacman",
"fork": false,
"created_at": "2017-07-24T05:05:28Z",
"updated_at": "2020-07-12T14:06:08Z",
"pushed_at": "2017-07-24T23:55:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"score": 0
},
{
"id": 100141854,
"name": "CVE-2017-5638",
@ -1183,6 +1211,34 @@
"watchers": 0,
"score": 0
},
{
"id": 107489354,
"name": "Apache-Struts",
"full_name": "c002\/Apache-Struts",
"owner": {
"login": "c002",
"id": 26592580,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
"html_url": "https:\/\/github.com\/c002"
},
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
"description": " An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-10-19T02:40:45Z",
"updated_at": "2020-05-17T04:32:06Z",
"pushed_at": "2017-05-28T14:03:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 108805305,
"name": "Common-Vulnerability-and-Exploit",

View file

@ -83,6 +83,34 @@
"watchers": 3,
"score": 0
},
{
"id": 98579784,
"name": "amt_auth_bypass_poc",
"full_name": "embedi\/amt_auth_bypass_poc",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi"
},
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2022-03-06T01:51:18Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 53,
"score": 0
},
{
"id": 385968702,
"name": "CVE-2017-5689-Checker",

58
2017/CVE-2017-7047.json Normal file
View file

@ -0,0 +1,58 @@
[
{
"id": 99396176,
"name": "Triple_Fetch-Kernel-Creds",
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
"owner": {
"login": "JosephShenton",
"id": 12966231,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12966231?v=4",
"html_url": "https:\/\/github.com\/JosephShenton"
},
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
"fork": false,
"created_at": "2017-08-05T03:23:13Z",
"updated_at": "2020-08-25T15:10:04Z",
"pushed_at": "2017-08-05T09:21:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"score": 0
},
{
"id": 99915573,
"name": "Triple_fetch",
"full_name": "q1f3\/Triple_fetch",
"owner": {
"login": "q1f3",
"id": 9603950,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9603950?v=4",
"html_url": "https:\/\/github.com\/q1f3"
},
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
"fork": false,
"created_at": "2017-08-10T11:24:47Z",
"updated_at": "2020-04-07T05:58:43Z",
"pushed_at": "2017-08-03T23:47:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -368,6 +368,34 @@
"watchers": 12,
"score": 0
},
{
"id": 201442014,
"name": "CVE-2017-7269",
"full_name": "ThanHuuTuan\/CVE-2017-7269",
"owner": {
"login": "ThanHuuTuan",
"id": 32167814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
"html_url": "https:\/\/github.com\/ThanHuuTuan"
},
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
"description": null,
"fork": false,
"created_at": "2019-08-09T10:01:50Z",
"updated_at": "2019-08-09T10:01:53Z",
"pushed_at": "2017-04-04T17:20:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 386542444,
"name": "CVE-2017-7269",

View file

@ -1,4 +1,32 @@
[
{
"id": 97701175,
"name": "CVE-2017-7529",
"full_name": "liusec\/CVE-2017-7529",
"owner": {
"login": "liusec",
"id": 13982415,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
"html_url": "https:\/\/github.com\/liusec"
},
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
"description": null,
"fork": false,
"created_at": "2017-07-19T09:55:42Z",
"updated_at": "2022-05-13T08:51:10Z",
"pushed_at": "2017-07-21T06:29:35Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 14,
"score": 0
},
{
"id": 138050203,
"name": "CVE-2017-7529_PoC",

View file

@ -1,4 +1,60 @@
[
{
"id": 96536969,
"name": "s2-048",
"full_name": "IanSmith123\/s2-048",
"owner": {
"login": "IanSmith123",
"id": 19611084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19611084?v=4",
"html_url": "https:\/\/github.com\/IanSmith123"
},
"html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
"description": "Apache struts struts 2 048, CVE-2017-9791.",
"fork": false,
"created_at": "2017-07-07T12:35:55Z",
"updated_at": "2017-07-07T14:05:07Z",
"pushed_at": "2017-07-07T17:10:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 96565902,
"name": "Struts2-048",
"full_name": "dragoneeg\/Struts2-048",
"owner": {
"login": "dragoneeg",
"id": 4232461,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4232461?v=4",
"html_url": "https:\/\/github.com\/dragoneeg"
},
"html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
"description": "CVE-2017-9791",
"fork": false,
"created_at": "2017-07-07T18:27:31Z",
"updated_at": "2022-07-06T23:36:24Z",
"pushed_at": "2017-07-08T02:08:36Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 27,
"score": 0
},
{
"id": 104592299,
"name": "CVE-2017-9791",

View file

@ -653,7 +653,7 @@
"description": null,
"fork": false,
"created_at": "2021-12-14T15:48:11Z",
"updated_at": "2022-02-21T04:07:24Z",
"updated_at": "2022-08-18T08:33:31Z",
"pushed_at": "2021-12-16T12:28:44Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-17T14:50:53Z",
"updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1477,
"watchers": 1480,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2022-08-16T07:56:41Z",
"updated_at": "2022-08-18T08:48:14Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 456,
"watchers_count": 456,
"stargazers_count": 457,
"watchers_count": 457,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 456,
"watchers": 457,
"score": 0
},
{

View file

@ -76,10 +76,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2022-08-08T04:14:40Z",
"updated_at": "2022-08-18T09:10:52Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 528,
"watchers_count": 528,
"stargazers_count": 527,
"watchers_count": 527,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@ -97,7 +97,7 @@
],
"visibility": "public",
"forks": 172,
"watchers": 528,
"watchers": 527,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-04-27T12:00:24Z",
"updated_at": "2022-04-08T08:51:57Z",
"updated_at": "2022-08-18T07:51:33Z",
"pushed_at": "2021-04-30T02:27:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:18:54Z",
"updated_at": "2022-02-14T08:03:59Z",
"updated_at": "2022-08-18T07:51:59Z",
"pushed_at": "2021-02-24T13:19:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-17T15:25:12Z",
"updated_at": "2022-08-18T08:41:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3489,
"watchers_count": 3489,
"stargazers_count": 3491,
"watchers_count": 3491,
"forks_count": 1030,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1030,
"watchers": 3489,
"watchers": 3491,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-08-18T02:22:32Z",
"updated_at": "2022-08-18T08:24:29Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 827,
"watchers_count": 827,
"stargazers_count": 828,
"watchers_count": 828,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 827,
"watchers": 828,
"score": 0
},
{
@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-17T14:50:53Z",
"updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1477,
"watchers": 1480,
"score": 0
}
]

View file

@ -153,10 +153,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:17:41Z",
"updated_at": "2022-02-14T08:03:59Z",
"updated_at": "2022-08-18T07:51:48Z",
"pushed_at": "2021-02-24T13:18:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -117,10 +117,10 @@
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
"updated_at": "2022-03-26T02:54:17Z",
"updated_at": "2022-08-18T07:05:31Z",
"pushed_at": "2020-07-19T02:29:33Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -128,7 +128,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -229,10 +229,10 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2022-07-27T07:12:04Z",
"updated_at": "2022-08-18T06:46:01Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 231,
"watchers": 232,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2022-07-18T09:34:18Z",
"updated_at": "2022-08-18T10:46:37Z",
"pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 9,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-17T15:25:12Z",
"updated_at": "2022-08-18T08:41:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3489,
"watchers_count": 3489,
"stargazers_count": 3491,
"watchers_count": 3491,
"forks_count": 1030,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1030,
"watchers": 3489,
"watchers": 3491,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2022-08-17T19:22:33Z",
"updated_at": "2022-08-18T07:54:33Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-17T14:50:53Z",
"updated_at": "2022-08-18T08:21:37Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1480,
"watchers_count": 1480,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1477,
"watchers": 1480,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-01-10T08:23:05Z",
"updated_at": "2022-07-31T07:40:38Z",
"updated_at": "2022-08-18T07:34:20Z",
"pushed_at": "2022-01-26T07:12:05Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-08-18T06:11:39Z",
"updated_at": "2022-08-18T10:23:50Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1595,
"watchers_count": 1595,
"stargazers_count": 1596,
"watchers_count": 1596,
"forks_count": 573,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 573,
"watchers": 1595,
"watchers": 1596,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2022-08-10T03:05:38Z",
"updated_at": "2022-08-18T08:53:01Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 27,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"exiftool"
],
"visibility": "public",
"forks": 27,
"forks": 26,
"watchers": 69,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"forks": 45,
"watchers": 179,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2022-08-17T16:50:59Z",
"updated_at": "2022-08-18T07:40:08Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 816,
"watchers_count": 816,
"stargazers_count": 817,
"watchers_count": 817,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 816,
"watchers": 817,
"score": 0
},
{

View file

@ -163,7 +163,7 @@
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 899,
"watchers_count": 899,
"forks_count": 293,
"forks_count": 294,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -173,7 +173,7 @@
"poc"
],
"visibility": "public",
"forks": 293,
"forks": 294,
"watchers": 899,
"score": 0
},

View file

@ -41,18 +41,18 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2022-08-17T01:16:25Z",
"updated_at": "2022-08-18T09:46:29Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 25,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 45,
"forks": 26,
"watchers": 46,
"score": 0
}
]

View file

@ -254,7 +254,7 @@
"pushed_at": "2022-08-02T13:18:24Z",
"stargazers_count": 1001,
"watchers_count": 1001,
"forks_count": 447,
"forks_count": 448,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -262,7 +262,7 @@
"log4shell"
],
"visibility": "public",
"forks": 447,
"forks": 448,
"watchers": 1001,
"score": 0
},
@ -7218,7 +7218,7 @@
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
"pushed_at": "2022-08-11T15:52:24Z",
"pushed_at": "2022-08-18T09:43:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -8506,34 +8506,6 @@
"watchers": 0,
"score": 0
},
{
"id": 515332940,
"name": "Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
"full_name": "tharindudh\/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
"owner": {
"login": "tharindudh",
"id": 71964544,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
"html_url": "https:\/\/github.com\/tharindudh"
},
"html_url": "https:\/\/github.com\/tharindudh\/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
"description": "Remote Code Execution attacks are one of the most frequent methods employed by cybercriminals to compromise susceptible computers. In the previous year, a serious zero-day vulnerability was identified in Log4j, a java program used by developers for debugging and application modification loggings. This is also a significant vulnerability that affects the so-called Ghidra reverse engineering tool.",
"fork": false,
"created_at": "2022-07-18T20:33:10Z",
"updated_at": "2022-07-18T20:33:10Z",
"pushed_at": "2022-07-18T20:33:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 515475941,
"name": "CVE-2021-44228-Mass-RCE-Log4j",
@ -8654,5 +8626,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 526103436,
"name": "tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
"full_name": "tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
"owner": {
"login": "tharindudh",
"id": 71964544,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71964544?v=4",
"html_url": "https:\/\/github.com\/tharindudh"
},
"html_url": "https:\/\/github.com\/tharindudh\/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2022-08-18T07:27:32Z",
"updated_at": "2022-08-18T07:27:32Z",
"pushed_at": "2022-08-18T07:30:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 33,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 34,
"watchers": 164,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2022-08-18T06:04:41Z",
"updated_at": "2022-08-18T06:04:41Z",
"pushed_at": "2022-08-18T06:04:42Z",
"updated_at": "2022-08-18T06:22:42Z",
"pushed_at": "2022-08-18T06:24:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

30
2022/CVE-2022-20229.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 526095462,
"name": "system_bt_AOSP10_r33_CVE-2022-20229",
"full_name": "ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/system_bt_AOSP10_r33_CVE-2022-20229",
"description": null,
"fork": false,
"created_at": "2022-08-18T07:02:43Z",
"updated_at": "2022-08-18T07:06:27Z",
"pushed_at": "2022-08-18T07:07:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
"fork": false,
"created_at": "2022-08-17T19:05:38Z",
"updated_at": "2022-08-17T19:22:33Z",
"updated_at": "2022-08-18T07:54:33Z",
"pushed_at": "2022-08-17T19:20:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -911,10 +911,10 @@
"description": "CVE-2022-22947_POC_EXP",
"fork": false,
"created_at": "2022-03-17T09:12:51Z",
"updated_at": "2022-08-15T15:42:13Z",
"updated_at": "2022-08-18T06:37:41Z",
"pushed_at": "2022-03-17T09:58:23Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -922,7 +922,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-08-15T15:42:16Z",
"updated_at": "2022-08-18T08:01:03Z",
"pushed_at": "2022-07-14T14:55:24Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 294,
"watchers_count": 294,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 95,
"watchers": 293,
"watchers": 294,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-18T03:03:39Z",
"updated_at": "2022-08-18T06:47:31Z",
"pushed_at": "2022-08-15T07:00:18Z",
"stargazers_count": 666,
"watchers_count": 666,
"stargazers_count": 667,
"watchers_count": 667,
"forks_count": 126,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 126,
"watchers": 666,
"watchers": 667,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "A powershell poc to load and automatically run Certify and Rubeus from memory.",
"fork": false,
"created_at": "2022-08-17T21:13:49Z",
"updated_at": "2022-08-18T02:22:03Z",
"updated_at": "2022-08-18T06:58:11Z",
"pushed_at": "2022-08-17T21:25:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2022-08-18T04:32:58Z",
"updated_at": "2022-08-18T11:18:45Z",
"pushed_at": "2022-08-17T02:33:15Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 15,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 69,
"forks": 17,
"watchers": 79,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Zimbra RCE simple poc",
"fork": false,
"created_at": "2022-08-12T18:35:52Z",
"updated_at": "2022-08-18T06:20:27Z",
"updated_at": "2022-08-18T11:35:42Z",
"pushed_at": "2022-08-13T18:54:58Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 40,
"watchers": 43,
"score": 0
},
{
@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-14T22:22:55Z",
"updated_at": "2022-08-18T05:17:39Z",
"updated_at": "2022-08-18T10:00:03Z",
"pushed_at": "2022-08-14T22:25:03Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-29221 Proof of Concept Code",
"fork": false,
"created_at": "2022-05-25T06:02:23Z",
"updated_at": "2022-08-01T17:34:13Z",
"updated_at": "2022-08-18T10:35:01Z",
"pushed_at": "2022-05-25T07:11:59Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2022-08-15T15:42:26Z",
"updated_at": "2022-08-18T07:34:31Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 133,
"watchers": 134,
"score": 0
},
{
@ -49,10 +49,10 @@
"description": "CVE-2022-30190 Follina POC",
"fork": false,
"created_at": "2022-05-31T06:45:25Z",
"updated_at": "2022-07-25T16:12:48Z",
"updated_at": "2022-08-18T06:59:30Z",
"pushed_at": "2022-05-31T09:35:37Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 91,
"watchers": 92,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
"updated_at": "2022-08-15T15:42:33Z",
"updated_at": "2022-08-18T07:47:02Z",
"pushed_at": "2022-07-05T02:58:30Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-08-18T03:13:11Z",
"updated_at": "2022-08-18T07:11:58Z",
"pushed_at": "2022-08-13T08:14:07Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 144,
"watchers": 145,
"score": 0
}
]

View file

@ -618,6 +618,14 @@ In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read d
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224)
### CVE-2022-20229 (2022-07-13)
<code>
In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184
</code>
- [ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229](https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229)
### CVE-2022-20361 (2022-08-09)
<code>
@ -7389,11 +7397,11 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [jaehnri/CVE-2021-44228](https://github.com/jaehnri/CVE-2021-44228)
- [ra890927/Log4Shell-CVE-2121-44228-Demo](https://github.com/ra890927/Log4Shell-CVE-2121-44228-Demo)
- [bughuntar/log4j-scan](https://github.com/bughuntar/log4j-scan)
- [tharindudh/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
- [cybersecurityresearcher/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/cybersecurityresearcher/CVE-2021-44228-Mass-RCE-Log4j)
- [vidrez/Ethical-Hacking-Report-Log4j](https://github.com/vidrez/Ethical-Hacking-Report-Log4j)
- [vino-theva/CVE-2021-44228](https://github.com/vino-theva/CVE-2021-44228)
- [nemesi-ita/autoL4s](https://github.com/nemesi-ita/autoL4s)
- [tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228](https://github.com/tharindudh/tharindudh-Log4j-Vulnerability-in-Ghidra-tool-CVE-2021-44228)
### CVE-2021-44229
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
@ -20804,6 +20812,7 @@ Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1,
</code>
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
@ -21083,6 +21092,7 @@ An attacker who is able to send and receive messages to an authoritative DNS ser
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
</code>
- [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC)
- [scopion/CVE-2017-3241](https://github.com/scopion/CVE-2017-3241)
### CVE-2017-3248 (2017-01-27)
@ -21135,6 +21145,7 @@ A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code i
### CVE-2017-4490
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
- [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-)
### CVE-2017-4878
- [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples)
@ -21205,6 +21216,7 @@ An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre
wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
</code>
- [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan)
- [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan)
- [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487)
- [patilkr/wp-CVE-2017-5487-exploit](https://github.com/patilkr/wp-CVE-2017-5487-exploit)
@ -21262,10 +21274,12 @@ The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x be
- [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638)
- [sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
- [sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638)
- [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-)
- [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638)
- [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner)
- [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser)
- [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638)
- [c002/Apache-Struts](https://github.com/c002/Apache-Struts)
- [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit)
- [pr0x1ma-byte/cybersecurity-struts2](https://github.com/pr0x1ma-byte/cybersecurity-struts2)
- [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638)
@ -21315,6 +21329,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int
- [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689)
- [robhax/amthoneypot](https://github.com/robhax/amthoneypot)
- [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass)
- [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc)
- [TheWay-hue/CVE-2017-5689-Checker](https://github.com/TheWay-hue/CVE-2017-5689-Checker)
### CVE-2017-5693 (2018-07-31)
@ -21493,6 +21508,15 @@ A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.
- [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038)
### CVE-2017-7047 (2017-07-20)
<code>
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the &quot;libxpc&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
</code>
- [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds)
- [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch)
### CVE-2017-7089 (2017-10-22)
<code>
@ -21554,6 +21578,7 @@ Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in In
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
- [k4u5h41/CVE-2017-7269](https://github.com/k4u5h41/CVE-2017-7269)
### CVE-2017-7374 (2017-03-31)
@ -21622,6 +21647,7 @@ A deserialization flaw was discovered in the jackson-databind, versions before 2
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
</code>
- [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529)
- [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC)
- [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529)
- [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC)
@ -22019,6 +22045,8 @@ OCaml compiler allows attackers to have unspecified impact via unknown vectors,
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
</code>
- [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048)
- [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048)
- [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791)
### CVE-2017-9798 (2017-09-18)