Auto Update 2022/03/24 18:15:06

This commit is contained in:
motikan2010-bot 2022-03-25 03:15:06 +09:00
parent 988387ac73
commit 7541769022
42 changed files with 192 additions and 192 deletions

View file

@ -150,11 +150,11 @@
"html_url": "https:\/\/github.com\/PrestaDZ"
},
"html_url": "https:\/\/github.com\/PrestaDZ\/vsftpd-2.3.4",
"description": "Simple python script to exploit Vsftpd 2.3.4 Backdoor Command Execution (CVE-2011-2523)",
"description": "Simple python script to exploit VsFTPd 2.3.4 Backdoor Command Execution (CVE-2011-2523)",
"fork": false,
"created_at": "2022-03-15T13:39:19Z",
"updated_at": "2022-03-15T13:44:22Z",
"pushed_at": "2022-03-15T17:05:12Z",
"updated_at": "2022-03-24T17:49:15Z",
"pushed_at": "2022-03-24T17:52:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -321,12 +321,12 @@
"pushed_at": "2017-11-27T01:50:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-02-08T15:55:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2022-03-01T14:11:50Z",
"updated_at": "2022-03-24T14:40:17Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 213,
"watchers": 214,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)",
"fork": false,
"created_at": "2020-01-27T12:27:53Z",
"updated_at": "2021-07-22T16:04:10Z",
"updated_at": "2022-03-24T17:53:22Z",
"pushed_at": "2020-01-27T12:32:04Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 39,
"watchers": 40,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2022-03-20T20:43:56Z",
"updated_at": "2022-03-24T12:23:03Z",
"pushed_at": "2022-01-17T19:45:41Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 156,
"watchers": 157,
"score": 0
},
{

View file

@ -286,8 +286,8 @@
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.",
"fork": false,
"created_at": "2022-03-24T12:06:55Z",
"updated_at": "2022-03-24T12:06:55Z",
"pushed_at": "2022-03-24T12:06:55Z",
"updated_at": "2022-03-24T12:25:16Z",
"pushed_at": "2022-03-24T12:25:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2020-15257 in containerd.",
"fork": false,
"created_at": "2020-12-07T08:47:09Z",
"updated_at": "2022-03-14T15:13:14Z",
"updated_at": "2022-03-24T14:36:57Z",
"pushed_at": "2021-01-12T09:46:50Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-01-03T21:44:29Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [
@ -35,7 +35,7 @@
"urls"
],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 49,
"score": 0
}

View file

@ -98,10 +98,10 @@
"description": "CVE-2020-8597 in RM2100",
"fork": false,
"created_at": "2021-01-24T15:28:00Z",
"updated_at": "2021-09-24T07:09:36Z",
"updated_at": "2022-03-24T14:13:01Z",
"pushed_at": "2021-01-24T15:46:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -111,7 +111,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1541,
"watchers_count": 1541,
"forks_count": 559,
"forks_count": 560,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 559,
"forks": 560,
"watchers": 1541,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2022-03-13T02:28:30Z",
"updated_at": "2022-03-24T15:43:18Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 373,
"watchers_count": 373,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 372,
"watchers": 373,
"score": 0
},
{

View file

@ -399,7 +399,7 @@
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
@ -411,7 +411,7 @@
"security"
],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 128,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
"fork": false,
"created_at": "2022-03-15T18:14:46Z",
"updated_at": "2022-03-20T14:28:13Z",
"updated_at": "2022-03-24T17:39:47Z",
"pushed_at": "2022-03-16T18:01:04Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -879,14 +879,14 @@
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 464,
"watchers_count": 464,
"forks_count": 85,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
"forks": 85,
"forks": 86,
"watchers": 464,
"score": 0
},

View file

@ -504,10 +504,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2022-03-22T13:09:20Z",
"updated_at": "2022-03-24T13:32:22Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@ -523,7 +523,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 49,
"watchers": 50,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-03-22T09:59:19Z",
"updated_at": "2022-03-24T17:10:40Z",
"pushed_at": "2022-03-16T13:59:31Z",
"stargazers_count": 284,
"watchers_count": 284,
"stargazers_count": 285,
"watchers_count": 285,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 284,
"watchers": 285,
"score": 0
},
{

View file

@ -2,19 +2,19 @@
{
"id": 424326946,
"name": "CVE-2021-42662",
"full_name": "TheHackingRabbi\/CVE-2021-42662",
"full_name": "0xDeku\/CVE-2021-42662",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42662",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42662",
"description": "CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. ",
"fork": false,
"created_at": "2021-11-03T17:51:55Z",
"updated_at": "2021-11-06T17:41:08Z",
"pushed_at": "2021-11-06T17:41:05Z",
"pushed_at": "2022-03-24T18:08:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,

View file

@ -2,19 +2,19 @@
{
"id": 424343690,
"name": "CVE-2021-42663",
"full_name": "TheHackingRabbi\/CVE-2021-42663",
"full_name": "0xDeku\/CVE-2021-42663",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42663",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42663",
"description": "CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. ",
"fork": false,
"created_at": "2021-11-03T18:49:28Z",
"updated_at": "2021-11-06T17:42:07Z",
"pushed_at": "2021-11-06T17:42:05Z",
"pushed_at": "2022-03-24T18:09:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -2,19 +2,19 @@
{
"id": 424354876,
"name": "CVE-2021-42664",
"full_name": "TheHackingRabbi\/CVE-2021-42664",
"full_name": "0xDeku\/CVE-2021-42664",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42664",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42664",
"description": " CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.",
"fork": false,
"created_at": "2021-11-03T19:29:57Z",
"updated_at": "2021-11-06T17:43:07Z",
"pushed_at": "2021-11-06T17:43:05Z",
"pushed_at": "2022-03-24T18:09:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424362612,
"name": "CVE-2021-42665",
"full_name": "TheHackingRabbi\/CVE-2021-42665",
"full_name": "0xDeku\/CVE-2021-42665",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42665",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42665",
"description": "CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T19:58:58Z",
"updated_at": "2021-11-06T17:44:14Z",
"pushed_at": "2021-11-06T17:44:12Z",
"pushed_at": "2022-03-24T18:09:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424367205,
"name": "CVE-2021-42666",
"full_name": "TheHackingRabbi\/CVE-2021-42666",
"full_name": "0xDeku\/CVE-2021-42666",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42666",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42666",
"description": "CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T20:14:58Z",
"updated_at": "2021-11-06T17:45:39Z",
"pushed_at": "2021-11-06T17:45:37Z",
"pushed_at": "2022-03-24T18:10:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424371514,
"name": "CVE-2021-42667",
"full_name": "TheHackingRabbi\/CVE-2021-42667",
"full_name": "0xDeku\/CVE-2021-42667",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42667",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42667",
"description": "CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.",
"fork": false,
"created_at": "2021-11-03T20:31:30Z",
"updated_at": "2022-02-14T12:01:54Z",
"pushed_at": "2021-11-06T17:46:34Z",
"pushed_at": "2022-03-24T18:10:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424374708,
"name": "CVE-2021-42668",
"full_name": "TheHackingRabbi\/CVE-2021-42668",
"full_name": "0xDeku\/CVE-2021-42668",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42668",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42668",
"description": "CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T20:43:30Z",
"updated_at": "2021-11-06T17:47:22Z",
"pushed_at": "2021-11-06T17:47:19Z",
"pushed_at": "2022-03-24T18:11:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424376895,
"name": "CVE-2021-42669",
"full_name": "TheHackingRabbi\/CVE-2021-42669",
"full_name": "0xDeku\/CVE-2021-42669",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42669",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42669",
"description": "CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.",
"fork": false,
"created_at": "2021-11-03T20:52:08Z",
"updated_at": "2022-01-10T01:42:29Z",
"pushed_at": "2021-11-06T17:48:02Z",
"pushed_at": "2022-03-24T18:11:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424385119,
"name": "CVE-2021-42670",
"full_name": "TheHackingRabbi\/CVE-2021-42670",
"full_name": "0xDeku\/CVE-2021-42670",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42670",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42670",
"description": "CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T21:25:43Z",
"updated_at": "2021-11-06T17:49:03Z",
"pushed_at": "2021-11-06T17:49:00Z",
"pushed_at": "2022-03-24T18:12:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2,19 +2,19 @@
{
"id": 424387160,
"name": "CVE-2021-42671",
"full_name": "TheHackingRabbi\/CVE-2021-42671",
"full_name": "0xDeku\/CVE-2021-42671",
"owner": {
"login": "TheHackingRabbi",
"login": "0xDeku",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
"html_url": "https:\/\/github.com\/0xDeku"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42671",
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42671",
"description": "CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T21:34:23Z",
"updated_at": "2021-11-06T17:49:42Z",
"pushed_at": "2021-11-06T17:49:40Z",
"pushed_at": "2022-03-24T18:12:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
"fork": false,
"created_at": "2021-12-13T17:26:49Z",
"updated_at": "2022-03-24T09:39:42Z",
"updated_at": "2022-03-24T15:05:45Z",
"pushed_at": "2022-03-16T09:35:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 33,
"watchers": 35,
"score": 0
}
]

View file

@ -210,10 +210,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2022-03-17T09:35:49Z",
"updated_at": "2022-03-24T15:28:36Z",
"pushed_at": "2021-12-09T07:22:26Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 185,
"watchers": 186,
"score": 0
},
{

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-03-24T01:30:51Z",
"updated_at": "2022-03-24T12:37:31Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1275,
"watchers_count": 1275,
"stargazers_count": 1276,
"watchers_count": 1276,
"forks_count": 347,
"allow_forking": true,
"is_template": false,
@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 347,
"watchers": 1275,
"watchers": 1276,
"score": 0
},
{
@ -2419,10 +2419,10 @@
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
"fork": false,
"created_at": "2021-12-12T11:26:42Z",
"updated_at": "2022-02-18T17:26:26Z",
"updated_at": "2022-03-24T15:17:44Z",
"pushed_at": "2021-12-12T17:37:11Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -2437,7 +2437,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 56,
"watchers": 57,
"score": 0
},
{
@ -3548,17 +3548,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-03-24T04:52:17Z",
"updated_at": "2022-03-24T17:21:13Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2793,
"watchers_count": 2793,
"stargazers_count": 2794,
"watchers_count": 2794,
"forks_count": 676,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 676,
"watchers": 2793,
"watchers": 2794,
"score": 0
},
{
@ -6707,17 +6707,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T20:17:41Z",
"updated_at": "2022-01-27T12:49:45Z",
"updated_at": "2022-03-24T14:29:40Z",
"pushed_at": "2022-01-05T16:26:16Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 85,
"watchers": 86,
"score": 0
},
{
@ -9431,7 +9431,7 @@
"fork": false,
"created_at": "2021-12-24T20:00:12Z",
"updated_at": "2022-01-06T13:31:29Z",
"pushed_at": "2022-02-28T17:35:20Z",
"pushed_at": "2022-03-24T17:32:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -175,10 +175,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
"updated_at": "2022-02-14T09:42:04Z",
"updated_at": "2022-03-24T12:19:52Z",
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
@ -188,7 +188,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
"updated_at": "2022-03-24T09:25:14Z",
"updated_at": "2022-03-24T17:01:14Z",
"pushed_at": "2022-03-21T12:12:16Z",
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 34,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 126,
"forks": 35,
"watchers": 127,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-23T12:03:25Z",
"updated_at": "2022-03-24T15:41:03Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 880,
"watchers_count": 880,
"stargazers_count": 881,
"watchers_count": 881,
"forks_count": 181,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 880,
"watchers": 881,
"score": 0
},
{
@ -530,12 +530,12 @@
"pushed_at": "2022-03-18T09:32:30Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 23,
"score": 0
},
@ -1074,17 +1074,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-03-24T09:12:07Z",
"updated_at": "2022-03-24T14:43:52Z",
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 31,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 178,
"forks": 32,
"watchers": 179,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-03-22T04:41:57Z",
"updated_at": "2022-03-24T14:39:46Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 225,
"watchers": 226,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-03-24T02:47:48Z",
"updated_at": "2022-03-24T15:42:06Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 396,
"watchers_count": 396,
"forks_count": 120,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 395,
"watchers": 396,
"score": 0
},
{

View file

@ -141,10 +141,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-03-23T17:01:49Z",
"updated_at": "2022-03-24T14:41:25Z",
"pushed_at": "2022-02-25T11:05:11Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -158,7 +158,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-03-23T09:02:10Z",
"updated_at": "2022-03-24T14:08:50Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 248,
"watchers": 249,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-24T11:52:02Z",
"updated_at": "2022-03-24T18:08:06Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 535,
"watchers_count": 535,
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 105,
"watchers": 535,
"watchers": 537,
"score": 0
}
]

View file

@ -98,12 +98,12 @@
"pushed_at": "2022-03-20T06:02:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-03-24T11:35:09Z",
"updated_at": "2022-03-24T15:41:06Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 327,
"watchers_count": 327,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 326,
"watchers": 327,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-03-24T10:30:54Z",
"updated_at": "2022-03-24T18:06:50Z",
"pushed_at": "2022-03-23T15:19:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"forks": 1,
"watchers": 13,
"score": 0
}
]

View file

@ -3709,7 +3709,7 @@ An issue was discovered in the Bidirectional Algorithm in the Unicode Specificat
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
</code>
- [TheHackingRabbi/CVE-2021-42662](https://github.com/TheHackingRabbi/CVE-2021-42662)
- [0xDeku/CVE-2021-42662](https://github.com/0xDeku/CVE-2021-42662)
### CVE-2021-42663 (2021-11-05)
@ -3717,7 +3717,7 @@ A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Onlin
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
</code>
- [TheHackingRabbi/CVE-2021-42663](https://github.com/TheHackingRabbi/CVE-2021-42663)
- [0xDeku/CVE-2021-42663](https://github.com/0xDeku/CVE-2021-42663)
### CVE-2021-42664 (2021-11-05)
@ -3725,7 +3725,7 @@ An HTML injection vulnerability exists in Sourcecodester Online Event Booking an
A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
</code>
- [TheHackingRabbi/CVE-2021-42664](https://github.com/TheHackingRabbi/CVE-2021-42664)
- [0xDeku/CVE-2021-42664](https://github.com/0xDeku/CVE-2021-42664)
### CVE-2021-42665 (2021-11-05)
@ -3733,7 +3733,7 @@ A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engi
An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.
</code>
- [TheHackingRabbi/CVE-2021-42665](https://github.com/TheHackingRabbi/CVE-2021-42665)
- [0xDeku/CVE-2021-42665](https://github.com/0xDeku/CVE-2021-42665)
### CVE-2021-42666 (2021-11-05)
@ -3741,7 +3741,7 @@ An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
</code>
- [TheHackingRabbi/CVE-2021-42666](https://github.com/TheHackingRabbi/CVE-2021-42666)
- [0xDeku/CVE-2021-42666](https://github.com/0xDeku/CVE-2021-42666)
### CVE-2021-42667 (2021-11-05)
@ -3749,7 +3749,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i
A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.
</code>
- [TheHackingRabbi/CVE-2021-42667](https://github.com/TheHackingRabbi/CVE-2021-42667)
- [0xDeku/CVE-2021-42667](https://github.com/0xDeku/CVE-2021-42667)
### CVE-2021-42668 (2021-11-05)
@ -3757,7 +3757,7 @@ A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.
</code>
- [TheHackingRabbi/CVE-2021-42668](https://github.com/TheHackingRabbi/CVE-2021-42668)
- [0xDeku/CVE-2021-42668](https://github.com/0xDeku/CVE-2021-42668)
### CVE-2021-42669 (2021-11-05)
@ -3765,7 +3765,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i
A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing &quot;&lt;?php system($_GET[&quot;cmd&quot;]); ?&gt;&quot; the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.
</code>
- [TheHackingRabbi/CVE-2021-42669](https://github.com/TheHackingRabbi/CVE-2021-42669)
- [0xDeku/CVE-2021-42669](https://github.com/0xDeku/CVE-2021-42669)
### CVE-2021-42670 (2021-11-05)
@ -3773,7 +3773,7 @@ A file upload vulnerability exists in Sourcecodester Engineers Online Portal in
A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
</code>
- [TheHackingRabbi/CVE-2021-42670](https://github.com/TheHackingRabbi/CVE-2021-42670)
- [0xDeku/CVE-2021-42670](https://github.com/0xDeku/CVE-2021-42670)
### CVE-2021-42671 (2021-11-05)
@ -3781,7 +3781,7 @@ A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal i
An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization.
</code>
- [TheHackingRabbi/CVE-2021-42671](https://github.com/TheHackingRabbi/CVE-2021-42671)
- [0xDeku/CVE-2021-42671](https://github.com/0xDeku/CVE-2021-42671)
### CVE-2021-42694 (2021-10-31)