Auto Update 2022/04/02 12:14:39

This commit is contained in:
motikan2010-bot 2022-04-02 21:14:39 +09:00
parent 45c2f69254
commit 73b19b5979
46 changed files with 406 additions and 272 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-04-01T14:56:34Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"springshell"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 16,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team",
"fork": false,
"created_at": "2014-05-22T19:14:54Z",
"updated_at": "2022-01-19T18:00:51Z",
"updated_at": "2022-04-02T10:35:53Z",
"pushed_at": "2017-01-23T20:14:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -98,10 +98,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2022-02-27T04:13:27Z",
"updated_at": "2022-04-02T10:08:46Z",
"pushed_at": "2020-07-21T09:46:40Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 211,
"watchers": 212,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-02T04:25:34Z",
"updated_at": "2022-04-02T08:22:56Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 1312,
"watchers": 1313,
"score": 0
},
{

View file

@ -1630,5 +1630,36 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 476981161,
"name": "CVE-2014-6271",
"full_name": "akr3ch\/CVE-2014-6271",
"owner": {
"login": "akr3ch",
"id": 97300177,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300177?v=4",
"html_url": "https:\/\/github.com\/akr3ch"
},
"html_url": "https:\/\/github.com\/akr3ch\/CVE-2014-6271",
"description": "ShellShock interactive-shell exploit",
"fork": false,
"created_at": "2022-04-02T07:30:31Z",
"updated_at": "2022-04-02T07:33:11Z",
"pushed_at": "2022-04-02T07:31:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2014-6271",
"shellshock",
"shellshock-vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-02T04:25:34Z",
"updated_at": "2022-04-02T08:22:56Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 1312,
"watchers": 1313,
"score": 0
},
{

View file

@ -137,5 +137,32 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 476996538,
"name": "ActiveMQ_Crack",
"full_name": "YutuSec\/ActiveMQ_Crack",
"owner": {
"login": "YutuSec",
"id": 41934714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41934714?v=4",
"html_url": "https:\/\/github.com\/YutuSec"
},
"html_url": "https:\/\/github.com\/YutuSec\/ActiveMQ_Crack",
"description": "ActiveMQ系列漏洞探测利用工具包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞CVE-2016-3088支持批量探测利用。",
"fork": false,
"created_at": "2022-04-02T08:40:10Z",
"updated_at": "2022-04-02T08:46:24Z",
"pushed_at": "2022-04-02T08:55:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-02T04:25:34Z",
"updated_at": "2022-04-02T08:22:56Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 1312,
"watchers": 1313,
"score": 0
},
{

View file

@ -87,12 +87,12 @@
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 177,
"forks_count": 178,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 177,
"forks": 178,
"watchers": 486,
"score": 0
},

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-02T04:25:34Z",
"updated_at": "2022-04-02T08:22:56Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 1312,
"watchers": 1313,
"score": 0
},
{

View file

@ -2834,17 +2834,17 @@
"description": "CVE-2019-0708 (BlueKeep)",
"fork": false,
"created_at": "2019-12-07T10:13:11Z",
"updated_at": "2022-03-13T08:18:59Z",
"updated_at": "2022-04-02T10:26:21Z",
"pushed_at": "2020-07-07T15:28:13Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 97,
"watchers": 98,
"score": 0
},
{
@ -3036,33 +3036,6 @@
"watchers": 0,
"score": 0
},
{
"id": 324765199,
"name": "CVE-2019-0708",
"full_name": "sinlee1\/CVE-2019-0708",
"owner": {
"login": "sinlee1",
"id": 29684167,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29684167?v=4",
"html_url": "https:\/\/github.com\/sinlee1"
},
"html_url": "https:\/\/github.com\/sinlee1\/CVE-2019-0708",
"description": null,
"fork": false,
"created_at": "2020-12-27T13:15:20Z",
"updated_at": "2020-12-27T13:17:33Z",
"pushed_at": "2020-12-27T13:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 330872202,
"name": "CVE-2019-0708-EXP-Windows",

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-04-02T00:08:50Z",
"updated_at": "2022-04-02T08:09:31Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1711,
"watchers_count": 1711,
"stargazers_count": 1712,
"watchers_count": 1712,
"forks_count": 261,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 261,
"watchers": 1711,
"watchers": 1712,
"score": 0
},
{

View file

@ -75,10 +75,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2022-03-14T01:35:47Z",
"updated_at": "2022-04-02T09:19:46Z",
"pushed_at": "2020-05-05T23:34:04Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -97,7 +97,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-02T03:53:13Z",
"updated_at": "2022-04-02T06:26:52Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3236,
"watchers_count": 3236,
"stargazers_count": 3237,
"watchers_count": 3237,
"forks_count": 957,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 957,
"watchers": 3236,
"watchers": 3237,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2022-03-07T20:30:34Z",
"updated_at": "2022-04-02T07:52:11Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 368,
"watchers_count": 368,
"stargazers_count": 369,
"watchers_count": 369,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 368,
"watchers": 369,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-02T04:25:34Z",
"updated_at": "2022-04-02T08:22:56Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 1312,
"watchers": 1313,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-02-02T15:46:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 7,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2022-03-14T01:35:47Z",
"updated_at": "2022-04-02T09:19:46Z",
"pushed_at": "2020-05-05T23:34:04Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-03-31T07:03:22Z",
"updated_at": "2022-04-02T11:07:11Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1435,
"watchers_count": 1435,
"stargazers_count": 1436,
"watchers_count": 1436,
"forks_count": 327,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 327,
"watchers": 1435,
"watchers": 1436,
"score": 0
},
{
@ -398,17 +398,17 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2022-03-13T03:57:13Z",
"updated_at": "2022-04-02T06:27:28Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 74,
"watchers": 75,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-02T03:53:13Z",
"updated_at": "2022-04-02T06:26:52Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3236,
"watchers_count": 3236,
"stargazers_count": 3237,
"watchers_count": 3237,
"forks_count": 957,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 957,
"watchers": 3236,
"watchers": 3237,
"score": 0
},
{
@ -303,17 +303,17 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2022-04-01T08:34:50Z",
"updated_at": "2022-04-02T07:26:35Z",
"pushed_at": "2022-03-29T02:08:45Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 28,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 115,
"forks": 29,
"watchers": 116,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-04-01T15:38:51Z",
"updated_at": "2022-04-02T11:53:21Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 934,
"watchers_count": 934,
"forks_count": 294,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 294,
"watchers": 933,
"watchers": 934,
"score": 0
}
]

View file

@ -364,10 +364,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2022-03-27T02:41:23Z",
"updated_at": "2022-04-02T09:00:45Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
@ -380,7 +380,7 @@
],
"visibility": "public",
"forks": 95,
"watchers": 241,
"watchers": 242,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-02T04:25:34Z",
"updated_at": "2022-04-02T08:22:56Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1312,
"watchers_count": 1312,
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 1312,
"watchers": 1313,
"score": 0
},
{

View file

@ -235,7 +235,7 @@
"fork": false,
"created_at": "2022-02-07T10:59:36Z",
"updated_at": "2022-02-07T12:49:21Z",
"pushed_at": "2022-04-01T22:38:24Z",
"pushed_at": "2022-04-02T08:55:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-04-01T15:38:51Z",
"updated_at": "2022-04-02T11:53:21Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 934,
"watchers_count": 934,
"forks_count": 294,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 294,
"watchers": 933,
"watchers": 934,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-05-10T02:08:26Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 17,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2022-04-01T08:28:46Z",
"updated_at": "2022-04-02T07:06:25Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 234,
"watchers": 235,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
"fork": false,
"created_at": "2022-03-14T05:03:54Z",
"updated_at": "2022-03-25T06:26:31Z",
"updated_at": "2022-04-02T08:57:13Z",
"pushed_at": "2022-03-14T05:07:01Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"watchers": 32,
"score": 0
}
]

View file

@ -130,17 +130,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-04-01T10:16:21Z",
"updated_at": "2022-04-02T11:47:53Z",
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 36,
"watchers": 37,
"score": 0
},
{
@ -188,12 +188,12 @@
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 57,
"score": 0
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-01T18:07:42Z",
"updated_at": "2022-04-01T18:47:44Z",
"pushed_at": "2022-04-01T22:20:15Z",
"pushed_at": "2022-04-02T11:58:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -3784,7 +3784,7 @@
"fork": false,
"created_at": "2022-04-01T19:51:18Z",
"updated_at": "2022-04-01T20:22:13Z",
"pushed_at": "2022-04-01T20:56:05Z",
"pushed_at": "2022-04-02T08:10:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 exploits in powershell",
"fork": false,
"created_at": "2022-04-01T09:10:14Z",
"updated_at": "2022-04-02T04:43:26Z",
"pushed_at": "2022-04-01T18:04:15Z",
"stargazers_count": 21,
"watchers_count": 21,
"updated_at": "2022-04-02T08:33:31Z",
"pushed_at": "2022-04-02T07:12:17Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -421,14 +421,14 @@
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 972,
"watchers_count": 972,
"forks_count": 431,
"forks_count": 432,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 431,
"forks": 432,
"watchers": 972,
"score": 0
},
@ -9619,10 +9619,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2022-04-01T17:12:15Z",
"updated_at": "2022-04-02T06:37:59Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -9634,7 +9634,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 86,
"watchers": 87,
"score": 0
},
{

View file

@ -179,7 +179,7 @@
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [
@ -187,7 +187,7 @@
"cve-2021-45232"
],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 67,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-03-29T13:11:59Z",
"updated_at": "2022-04-02T06:40:15Z",
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -368,12 +368,12 @@
"pushed_at": "2022-03-08T13:15:35Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 18,
"score": 0
},
@ -1101,17 +1101,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-04-01T14:01:17Z",
"updated_at": "2022-04-02T08:39:09Z",
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 194,
"watchers": 195,
"score": 0
},
{
@ -1342,14 +1342,14 @@
{
"id": 470957000,
"name": "CVE-2022-0847_DirtyPipe_Exploits",
"full_name": "LP-H4cmilo\/CVE-2022-0847_DirtyPipe_Exploits",
"full_name": "logm1lo\/CVE-2022-0847_DirtyPipe_Exploits",
"owner": {
"login": "LP-H4cmilo",
"login": "logm1lo",
"id": 55241926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55241926?v=4",
"html_url": "https:\/\/github.com\/LP-H4cmilo"
"html_url": "https:\/\/github.com\/logm1lo"
},
"html_url": "https:\/\/github.com\/LP-H4cmilo\/CVE-2022-0847_DirtyPipe_Exploits",
"html_url": "https:\/\/github.com\/logm1lo\/CVE-2022-0847_DirtyPipe_Exploits",
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-17T11:01:48Z",

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2022-04-02T04:07:16Z",
"updated_at": "2022-04-02T07:18:13Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 422,
"watchers_count": 422,
"stargazers_count": 424,
"watchers_count": 424,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 422,
"watchers": 424,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
"fork": false,
"created_at": "2022-04-02T03:27:11Z",
"updated_at": "2022-04-02T05:23:54Z",
"updated_at": "2022-04-02T11:10:20Z",
"pushed_at": "2022-04-02T05:23:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 5,
"watchers": 14,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-04-01T03:55:33Z",
"updated_at": "2022-04-02T09:56:09Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 551,
"watchers_count": 551,
"forks_count": 109,
"stargazers_count": 552,
"watchers_count": 552,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 109,
"watchers": 551,
"forks": 108,
"watchers": 552,
"score": 0
}
]

29
2022/CVE-2022-22639.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 470871002,
"name": "CVE-2022-22639",
"full_name": "jhftss\/CVE-2022-22639",
"owner": {
"login": "jhftss",
"id": 10210124,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10210124?v=4",
"html_url": "https:\/\/github.com\/jhftss"
},
"html_url": "https:\/\/github.com\/jhftss\/CVE-2022-22639",
"description": "Exploitation of CVE-2022-22639",
"fork": false,
"created_at": "2022-03-17T06:16:54Z",
"updated_at": "2022-04-02T11:53:39Z",
"pushed_at": "2022-03-17T13:01:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-22963 PoC ",
"fork": false,
"created_at": "2022-03-30T05:04:24Z",
"updated_at": "2022-04-02T06:02:51Z",
"updated_at": "2022-04-02T11:22:32Z",
"pushed_at": "2022-03-30T06:01:04Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 82,
"watchers": 87,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit",
"fork": false,
"created_at": "2022-03-30T11:36:42Z",
"updated_at": "2022-03-31T01:34:21Z",
"updated_at": "2022-04-02T09:12:27Z",
"pushed_at": "2022-03-30T11:54:22Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 10,
"forks": 7,
"watchers": 11,
"score": 0
},
{
@ -234,11 +234,11 @@
"description": "This includes CVE-2022-22963, a Spring SpEL \/ Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc\/spring-webflux RCE termed \"SpringShell\".",
"fork": false,
"created_at": "2022-03-31T20:19:51Z",
"updated_at": "2022-04-01T08:51:18Z",
"updated_at": "2022-04-02T07:04:29Z",
"pushed_at": "2022-03-31T20:58:54Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [
@ -251,8 +251,8 @@
"springshell"
],
"visibility": "public",
"forks": 6,
"watchers": 10,
"forks": 7,
"watchers": 11,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Spring4Shell Proof Of Concept\/Information CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-04-02T05:46:30Z",
"updated_at": "2022-04-02T12:01:27Z",
"pushed_at": "2022-04-01T15:21:36Z",
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 56,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,8 +28,8 @@
"springshell"
],
"visibility": "public",
"forks": 56,
"watchers": 142,
"forks": 58,
"watchers": 148,
"score": 0
},
{
@ -46,11 +46,11 @@
"description": "CVE-2022-22965 : about spring core rce",
"fork": false,
"created_at": "2022-03-30T14:35:00Z",
"updated_at": "2022-04-02T05:17:58Z",
"updated_at": "2022-04-02T11:20:01Z",
"pushed_at": "2022-04-01T15:34:03Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 11,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [
@ -60,8 +60,8 @@
"spring-security"
],
"visibility": "public",
"forks": 11,
"watchers": 30,
"forks": 13,
"watchers": 33,
"score": 0
},
{
@ -78,11 +78,11 @@
"description": "Spring4Shell - Spring Core RCE - CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T17:05:46Z",
"updated_at": "2022-04-02T05:33:50Z",
"updated_at": "2022-04-02T07:44:26Z",
"pushed_at": "2022-04-01T00:13:55Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 48,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [
@ -98,8 +98,8 @@
"working-example"
],
"visibility": "public",
"forks": 48,
"watchers": 48,
"forks": 49,
"watchers": 51,
"score": 0
},
{
@ -116,17 +116,17 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-04-02T03:17:08Z",
"updated_at": "2022-04-02T12:14:48Z",
"pushed_at": "2022-04-02T01:10:43Z",
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 103,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 108,
"forks": 109,
"watchers": 122,
"score": 0
},
{
@ -147,12 +147,12 @@
"pushed_at": "2022-04-01T12:10:21Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 13,
"score": 0
},
@ -174,7 +174,7 @@
"pushed_at": "2022-04-01T14:56:34Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
@ -184,7 +184,7 @@
"springshell"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 16,
"score": 0
},
@ -202,17 +202,17 @@
"description": "spring框架RCE漏洞 CVE-2022-22965",
"fork": false,
"created_at": "2022-03-31T12:41:29Z",
"updated_at": "2022-04-02T05:39:56Z",
"updated_at": "2022-04-02T09:21:27Z",
"pushed_at": "2022-04-02T03:50:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 7,
"score": 0
},
{
@ -233,12 +233,12 @@
"pushed_at": "2022-04-01T10:58:04Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 15,
"score": 0
},
@ -314,17 +314,17 @@
"description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)",
"fork": false,
"created_at": "2022-03-31T16:58:56Z",
"updated_at": "2022-04-02T02:59:39Z",
"updated_at": "2022-04-02T11:16:14Z",
"pushed_at": "2022-03-31T17:17:31Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 3,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 25,
"forks": 4,
"watchers": 29,
"score": 0
},
{
@ -372,12 +372,12 @@
"pushed_at": "2022-04-01T14:21:55Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 4,
"watchers": 13,
"score": 0
},
@ -449,17 +449,17 @@
"description": "SpringFramework 远程代码执行漏洞CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T04:51:44Z",
"updated_at": "2022-04-01T14:47:01Z",
"updated_at": "2022-04-02T10:36:36Z",
"pushed_at": "2022-04-01T12:08:45Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"forks": 9,
"watchers": 12,
"score": 0
},
{
@ -504,7 +504,7 @@
"fork": false,
"created_at": "2022-04-01T06:50:21Z",
"updated_at": "2022-04-02T02:04:24Z",
"pushed_at": "2022-04-02T01:15:14Z",
"pushed_at": "2022-04-02T07:35:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
@ -530,17 +530,17 @@
"description": "批量无损检测",
"fork": false,
"created_at": "2022-04-01T07:55:26Z",
"updated_at": "2022-04-02T00:58:35Z",
"updated_at": "2022-04-02T06:31:30Z",
"pushed_at": "2022-04-01T08:44:19Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -639,7 +639,7 @@
"fork": false,
"created_at": "2022-04-01T12:18:29Z",
"updated_at": "2022-04-02T02:08:46Z",
"pushed_at": "2022-04-01T12:26:55Z",
"pushed_at": "2022-04-02T09:50:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -665,17 +665,17 @@
"description": "CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T13:46:55Z",
"updated_at": "2022-04-02T02:09:57Z",
"updated_at": "2022-04-02T11:31:12Z",
"pushed_at": "2022-04-01T14:31:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -692,17 +692,44 @@
"description": "CVE-2022-22965 POC",
"fork": false,
"created_at": "2022-04-02T03:17:48Z",
"updated_at": "2022-04-02T03:46:43Z",
"pushed_at": "2022-04-02T03:46:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2022-04-02T11:13:22Z",
"pushed_at": "2022-04-02T08:45:17Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 5,
"score": 0
},
{
"id": 477004407,
"name": "CVE-2022-22965_Spring_Core_RCE",
"full_name": "wjl110\/CVE-2022-22965_Spring_Core_RCE",
"owner": {
"login": "wjl110",
"id": 53851034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53851034?v=4",
"html_url": "https:\/\/github.com\/wjl110"
},
"html_url": "https:\/\/github.com\/wjl110\/CVE-2022-22965_Spring_Core_RCE",
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
"fork": false,
"created_at": "2022-04-02T09:13:54Z",
"updated_at": "2022-04-02T10:14:14Z",
"pushed_at": "2022-04-02T10:14:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-24181.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 472668953,
"name": "CVE-2022-24181",
"full_name": "comrade99\/CVE-2022-24181",
"owner": {
"login": "comrade99",
"id": 101915378,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101915378?v=4",
"html_url": "https:\/\/github.com\/comrade99"
},
"html_url": "https:\/\/github.com\/comrade99\/CVE-2022-24181",
"description": "XSS via Host Header injection and Steal Password Reset Token of another user",
"fork": false,
"created_at": "2022-03-22T08:06:53Z",
"updated_at": "2022-04-02T06:42:38Z",
"pushed_at": "2022-04-02T06:25:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-31T09:59:01Z",
"updated_at": "2022-03-31T16:33:55Z",
"updated_at": "2022-04-02T10:22:37Z",
"pushed_at": "2022-03-31T10:16:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2022-27666",
"fork": false,
"created_at": "2022-03-23T22:54:28Z",
"updated_at": "2022-04-02T06:13:31Z",
"updated_at": "2022-04-02T10:45:35Z",
"pushed_at": "2022-03-28T18:21:00Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 115,
"watchers": 119,
"score": 0
}
]

View file

@ -157,7 +157,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [githublihaha/DirtyPIPE-CVE-2022-0847](https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847)
- [phuonguno98/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits)
- [MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker](https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker)
- [LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits](https://github.com/LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits)
- [logm1lo/CVE-2022-0847_DirtyPipe_Exploits](https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits)
- [LudovicPatho/CVE-2022-0847](https://github.com/LudovicPatho/CVE-2022-0847)
- [DanaEpp/pwncat_dirtypipe](https://github.com/DanaEpp/pwncat_dirtypipe)
- [tmoneypenny/CVE-2022-0847](https://github.com/tmoneypenny/CVE-2022-0847)
@ -355,6 +355,14 @@ The issue was addressed with improved permissions logic. This issue is fixed in
- [KlinKlinKlin/MSF-screenrecord-on-MacOS](https://github.com/KlinKlinKlin/MSF-screenrecord-on-MacOS)
### CVE-2022-22639 (2022-03-18)
<code>
A logic issue was addressed with improved state management. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. An application may be able to gain elevated privileges.
</code>
- [jhftss/CVE-2022-22639](https://github.com/jhftss/CVE-2022-22639)
### CVE-2022-22828 (2022-01-27)
<code>
@ -515,6 +523,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [Joe1sn/CVE-2022-22965](https://github.com/Joe1sn/CVE-2022-22965)
- [wshon/spring-framework-rce](https://github.com/wshon/spring-framework-rce)
- [Wrin9/CVE-2022-22965](https://github.com/Wrin9/CVE-2022-22965)
- [wjl110/CVE-2022-22965_Spring_Core_RCE](https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE)
### CVE-2022-23046 (2022-01-19)
@ -686,6 +695,14 @@ The matchmaking servers of Bandai Namco FromSoftware Dark Souls III through 2022
- [tremwil/ds3-nrssr-rce](https://github.com/tremwil/ds3-nrssr-rce)
### CVE-2022-24181 (2022-04-01)
<code>
Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System 2.4.8 &gt;= 3.3 allows remote attackers to inject arbitary code via the X-Forwarded-Host Header.
</code>
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
### CVE-2022-24348 (2022-02-04)
<code>
@ -10159,7 +10176,6 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
- [GryllsAaron/CVE-2019-0708-POC](https://github.com/GryllsAaron/CVE-2019-0708-POC)
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
- [Haruster/Haruster-CVE-2019-0708-Exploit](https://github.com/Haruster/Haruster-CVE-2019-0708-Exploit)
- [SurrealSky/CVE20190708SCAN](https://github.com/SurrealSky/CVE20190708SCAN)
@ -20038,6 +20054,7 @@ The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remot
- [cyberaguiar/CVE-2016-3088](https://github.com/cyberaguiar/CVE-2016-3088)
- [vonderchild/CVE-2016-3088](https://github.com/vonderchild/CVE-2016-3088)
- [cl4ym0re/CVE-2016-3088](https://github.com/cl4ym0re/CVE-2016-3088)
- [YutuSec/ActiveMQ_Crack](https://github.com/YutuSec/ActiveMQ_Crack)
### CVE-2016-3113 (2017-08-07)
@ -22366,6 +22383,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
- [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271)
- [0bfxgh0st-secondary/ShellShock](https://github.com/0bfxgh0st-secondary/ShellShock)
- [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271)
### CVE-2014-6287 (2014-10-07)