Auto Update 2023/03/21 06:28:34

This commit is contained in:
motikan2010-bot 2023-03-21 15:28:34 +09:00
parent 0f00ec6fac
commit 76288cd368
68 changed files with 1258 additions and 231 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 31,
"watchers": 86,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Webkit uxss exploit (CVE-2017-7089)",
"fork": false,
"created_at": "2017-10-03T12:13:43Z",
"updated_at": "2023-02-09T20:48:16Z",
"updated_at": "2023-03-21T03:50:28Z",
"pushed_at": "2017-10-03T12:23:43Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2023-03-16T07:48:53Z",
"updated_at": "2023-03-21T03:07:27Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 108,
"watchers": 335,
"watchers": 336,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability",
"fork": false,
"created_at": "2018-05-19T17:14:49Z",
"updated_at": "2022-11-24T05:18:58Z",
"updated_at": "2023-03-21T04:51:07Z",
"pushed_at": "2018-07-02T14:26:13Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-11517 | mySCADA myPRO v7.0.46 has another vulnerability to discover all projects in the system.",
"fork": false,
"created_at": "2018-05-26T15:49:07Z",
"updated_at": "2022-11-24T05:31:10Z",
"updated_at": "2023-03-21T04:51:06Z",
"pushed_at": "2018-05-28T21:51:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-12031 | LFI in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file, it can lead to sensitive information disclosure, denial of service and code execution.",
"fork": false,
"created_at": "2018-06-06T15:31:29Z",
"updated_at": "2021-03-01T05:17:33Z",
"updated_at": "2023-03-21T04:51:04Z",
"pushed_at": "2018-08-29T10:50:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.",
"fork": false,
"created_at": "2018-11-13T18:47:37Z",
"updated_at": "2022-07-25T15:24:59Z",
"updated_at": "2023-03-21T03:28:32Z",
"pushed_at": "2022-06-26T23:32:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 11,
"score": 0
}
]

View file

@ -245,10 +245,10 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2023-01-13T08:04:08Z",
"updated_at": "2023-03-21T04:54:45Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -257,7 +257,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 143,
"watchers": 144,
"score": 0
},
{
@ -583,10 +583,10 @@
"description": "PHP-FPM Remote Command Execution Exploit",
"fork": false,
"created_at": "2020-11-18T07:25:37Z",
"updated_at": "2021-11-02T20:02:01Z",
"updated_at": "2023-03-21T04:57:09Z",
"pushed_at": "2020-11-20T10:53:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -595,7 +595,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-12460|Reflected XSS in WebPort-v1.19.1 impacts users who open a maliciously crafted link or third-party web page.",
"fork": false,
"created_at": "2019-05-23T10:27:49Z",
"updated_at": "2022-11-24T11:10:13Z",
"updated_at": "2023-03-21T04:50:21Z",
"pushed_at": "2019-05-30T16:21:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2023-03-16T17:59:45Z",
"updated_at": "2023-03-21T02:43:56Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 322,
"watchers": 323,
"score": 0
}
]

View file

@ -47,7 +47,7 @@
"stargazers_count": 3697,
"watchers_count": 3697,
"has_discussions": false,
"forks_count": 1065,
"forks_count": 1066,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -73,7 +73,7 @@
"webshell"
],
"visibility": "public",
"forks": 1065,
"forks": 1066,
"watchers": 3697,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
"fork": false,
"created_at": "2019-01-10T14:36:55Z",
"updated_at": "2022-11-24T11:09:36Z",
"updated_at": "2023-03-21T04:50:22Z",
"pushed_at": "2019-01-11T07:45:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -100,10 +100,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2023-03-13T16:18:45Z",
"updated_at": "2023-03-21T02:33:58Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 634,
"watchers_count": 634,
"stargazers_count": 633,
"watchers_count": 633,
"has_discussions": false,
"forks_count": 205,
"allow_forking": true,
@ -114,7 +114,7 @@
],
"visibility": "public",
"forks": 205,
"watchers": 634,
"watchers": 633,
"score": 0
},
{
@ -1369,10 +1369,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2023-03-18T08:18:47Z",
"updated_at": "2023-03-21T01:10:02Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 484,
"watchers_count": 484,
"stargazers_count": 485,
"watchers_count": 485,
"has_discussions": false,
"forks_count": 157,
"allow_forking": true,
@ -1387,7 +1387,7 @@
],
"visibility": "public",
"forks": 157,
"watchers": 484,
"watchers": 485,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 3697,
"watchers_count": 3697,
"has_discussions": false,
"forks_count": 1065,
"forks_count": 1066,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
"forks": 1065,
"forks": 1066,
"watchers": 3697,
"score": 0
},

View file

@ -177,10 +177,10 @@
"description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T21:25:09Z",
"updated_at": "2020-10-22T21:12:06Z",
"updated_at": "2023-03-21T04:55:12Z",
"pushed_at": "2020-10-22T21:12:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -189,7 +189,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -34,5 +34,34 @@
"forks": 2,
"watchers": 7,
"score": 0
},
{
"id": 616797867,
"name": "OPENSSL_1.1.11g_G3_CVE-2020-1971",
"full_name": "nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2020-1971",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2020-1971",
"description": null,
"fork": false,
"created_at": "2023-03-21T05:13:37Z",
"updated_at": "2023-03-21T05:17:36Z",
"pushed_at": "2023-03-21T05:18:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
"fork": false,
"created_at": "2020-09-16T23:35:22Z",
"updated_at": "2023-03-16T02:49:59Z",
"updated_at": "2023-03-21T03:33:44Z",
"pushed_at": "2020-09-23T14:52:06Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 63,
"watchers": 62,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-30T03:40:15Z",
"updated_at": "2022-04-30T03:42:14Z",
"updated_at": "2023-03-21T01:13:01Z",
"pushed_at": "2022-04-30T03:42:36Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -42,10 +42,10 @@
"description": "cve-2021-22986 f5 rce 漏洞批量检测 poc",
"fork": false,
"created_at": "2021-03-19T18:50:22Z",
"updated_at": "2022-11-09T18:11:37Z",
"updated_at": "2023-03-21T02:36:10Z",
"pushed_at": "2021-03-27T10:02:59Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-01T16:45:42Z",
"updated_at": "2022-11-30T15:46:39Z",
"updated_at": "2023-03-21T01:38:52Z",
"pushed_at": "2021-03-02T07:45:20Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -455,10 +455,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-03-13T01:51:21Z",
"updated_at": "2023-03-21T03:20:16Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 861,
"watchers_count": 861,
"stargazers_count": 862,
"watchers_count": 862,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -467,7 +467,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 861,
"watchers": 862,
"score": 0
},
{

View file

@ -269,6 +269,35 @@
"watchers": 1,
"score": 0
},
{
"id": 390233864,
"name": "CVE-2021-3560",
"full_name": "BizarreLove\/CVE-2021-3560",
"owner": {
"login": "BizarreLove",
"id": 41328139,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41328139?v=4",
"html_url": "https:\/\/github.com\/BizarreLove"
},
"html_url": "https:\/\/github.com\/BizarreLove\/CVE-2021-3560",
"description": "NYCY_homework_&_meeting",
"fork": false,
"created_at": "2021-07-28T06:05:46Z",
"updated_at": "2021-07-29T08:24:46Z",
"pushed_at": "2021-07-29T08:24:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 391043530,
"name": "CVE-2021-3560",

View file

@ -42,10 +42,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2023-03-20T06:26:59Z",
"updated_at": "2023-03-21T01:55:27Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 173,
"watchers": 174,
"score": 0
},
{

View file

@ -1,36 +0,0 @@
[
{
"id": 404648473,
"name": "CVE-2021-37850",
"full_name": "p1atdev\/CVE-2021-37850",
"owner": {
"login": "p1atdev",
"id": 60182057,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60182057?v=4",
"html_url": "https:\/\/github.com\/p1atdev"
},
"html_url": "https:\/\/github.com\/p1atdev\/CVE-2021-37850",
"description": "ESET Endpoint for macOS DoS Vulnerability",
"fork": false,
"created_at": "2021-09-09T08:42:52Z",
"updated_at": "2022-08-17T13:46:40Z",
"pushed_at": "2021-10-05T13:02:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"dos",
"eset",
"exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2064,10 +2064,10 @@
"description": "CVE-2021-4034简单优化以应对没有安装gcc和make的目标环境",
"fork": false,
"created_at": "2022-01-28T02:54:38Z",
"updated_at": "2023-01-31T14:34:51Z",
"updated_at": "2023-03-21T02:44:19Z",
"pushed_at": "2022-02-09T09:58:59Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -2076,7 +2076,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -101,7 +101,7 @@
"fork": false,
"created_at": "2021-11-06T22:12:35Z",
"updated_at": "2023-01-31T19:22:27Z",
"pushed_at": "2023-03-20T06:01:53Z",
"pushed_at": "2023-03-21T05:59:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -1259,10 +1259,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-03-20T16:13:53Z",
"pushed_at": "2023-03-20T13:03:28Z",
"stargazers_count": 637,
"watchers_count": 637,
"updated_at": "2023-03-21T03:50:29Z",
"pushed_at": "2023-03-21T03:01:52Z",
"stargazers_count": 640,
"watchers_count": 640,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1276,7 +1276,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 637,
"watchers": 640,
"score": 0
},
{

View file

@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-03-20T10:25:12Z",
"updated_at": "2023-03-21T01:47:23Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 382,
"watchers_count": 382,
"stargazers_count": 383,
"watchers_count": 383,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 382,
"watchers": 383,
"score": 0
},
{
@ -1865,6 +1865,64 @@
"watchers": 4,
"score": 0
},
{
"id": 510629189,
"name": "dirtypipe-ebpf_detection",
"full_name": "airbus-cert\/dirtypipe-ebpf_detection",
"owner": {
"login": "airbus-cert",
"id": 26453405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
"html_url": "https:\/\/github.com\/airbus-cert"
},
"html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection",
"description": "An eBPF detection program for CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T07:20:59Z",
"updated_at": "2023-01-16T18:05:15Z",
"pushed_at": "2022-07-05T14:25:46Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 21,
"score": 0
},
{
"id": 510867863,
"name": "Dirty-Pipe",
"full_name": "edr1412\/Dirty-Pipe",
"owner": {
"login": "edr1412",
"id": 40953911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
"html_url": "https:\/\/github.com\/edr1412"
},
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
"description": "exp of CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T19:22:50Z",
"updated_at": "2023-01-31T12:51:32Z",
"pushed_at": "2022-07-05T19:23:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 520138171,
"name": "CVE-2022-0847-DirtyPipe-Exploits",
@ -2328,5 +2386,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 614960637,
"name": "CVE-2022-0847",
"full_name": "4bhishek0\/CVE-2022-0847",
"owner": {
"login": "4bhishek0",
"id": 105487073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105487073?v=4",
"html_url": "https:\/\/github.com\/4bhishek0"
},
"html_url": "https:\/\/github.com\/4bhishek0\/CVE-2022-0847",
"description": null,
"fork": false,
"created_at": "2023-03-16T17:00:31Z",
"updated_at": "2023-03-21T05:16:23Z",
"pushed_at": "2023-03-16T17:02:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1592,6 +1592,68 @@
"watchers": 3,
"score": 0
},
{
"id": 509548569,
"name": "CVE-2022-1388_refresh",
"full_name": "Luchoane\/CVE-2022-1388_refresh",
"owner": {
"login": "Luchoane",
"id": 40374879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
"html_url": "https:\/\/github.com\/Luchoane"
},
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
"fork": false,
"created_at": "2022-07-01T18:08:50Z",
"updated_at": "2022-07-07T19:22:09Z",
"pushed_at": "2022-07-01T20:04:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510239425,
"name": "CVE-2022-1388",
"full_name": "jbharucha05\/CVE-2022-1388",
"owner": {
"login": "jbharucha05",
"id": 13020621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
"html_url": "https:\/\/github.com\/jbharucha05"
},
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
"description": "CVE-2022-1388, bypassing iControl REST authentication",
"fork": false,
"created_at": "2022-07-04T06:31:56Z",
"updated_at": "2022-07-04T07:08:22Z",
"pushed_at": "2022-07-04T10:37:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"f5-big-ip-icontrol-rest-rce",
"f5-bigip"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 557286411,
"name": "CVE-2022-1388",

31
2022/CVE-2022-20124.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510660359,
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"description": null,
"fork": false,
"created_at": "2022-07-05T08:59:44Z",
"updated_at": "2022-07-05T09:52:45Z",
"pushed_at": "2022-07-05T09:52:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2022/CVE-2022-20130.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 509461641,
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"description": null,
"fork": false,
"created_at": "2022-07-01T13:16:14Z",
"updated_at": "2022-07-01T13:25:04Z",
"pushed_at": "2022-07-01T13:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2022/CVE-2022-20135.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510684846,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"description": null,
"fork": false,
"created_at": "2022-07-05T10:15:49Z",
"updated_at": "2022-07-05T10:42:21Z",
"pushed_at": "2022-07-05T10:41:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,33 @@
[
{
"id": 510346412,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"description": null,
"fork": false,
"created_at": "2022-07-04T12:16:05Z",
"updated_at": "2022-07-04T13:19:53Z",
"pushed_at": "2022-07-04T12:21:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 529215266,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",

View file

@ -202,6 +202,35 @@
"watchers": 0,
"score": 0
},
{
"id": 510875629,
"name": "CVE-2022-21449-I2P-TLS-POC",
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"owner": {
"login": "PyterSmithDarkGhost",
"id": 106814901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
},
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"description": null,
"fork": false,
"created_at": "2022-07-05T19:51:39Z",
"updated_at": "2022-09-01T23:29:48Z",
"pushed_at": "2022-07-05T19:52:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 519281774,
"name": "CVE-2022-21449-showcase",

View file

@ -18,7 +18,7 @@
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"windows-boot"
],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 190,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "Webkit (Safari) - Exploit",
"fork": false,
"created_at": "2022-08-04T07:11:39Z",
"updated_at": "2022-12-20T14:21:05Z",
"updated_at": "2023-03-21T03:58:19Z",
"pushed_at": "2022-08-09T13:43:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -637,6 +637,64 @@
"watchers": 0,
"score": 0
},
{
"id": 524471767,
"name": "CVE-2022-22954",
"full_name": "amit-pathak009\/CVE-2022-22954",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:04Z",
"updated_at": "2022-06-02T01:44:19Z",
"pushed_at": "2022-06-02T01:44:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 524471940,
"name": "CVE-2022-22954-PoC",
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:39Z",
"updated_at": "2022-06-01T22:41:09Z",
"pushed_at": "2022-06-01T22:41:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 545257457,
"name": "VcenterKiller",

View file

@ -226,10 +226,10 @@
"description": "Spring Cloud Function Vulnerable Application \/ CVE-2022-22963",
"fork": false,
"created_at": "2022-03-31T14:32:14Z",
"updated_at": "2023-03-16T13:37:38Z",
"updated_at": "2023-03-21T04:20:29Z",
"pushed_at": "2022-04-01T12:51:25Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -238,7 +238,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -557,7 +557,7 @@
"description": "CVE-2022-22963 RCE PoC in python",
"fork": false,
"created_at": "2023-03-13T13:28:55Z",
"updated_at": "2023-03-15T03:50:03Z",
"updated_at": "2023-03-21T04:42:34Z",
"pushed_at": "2023-03-14T15:23:12Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -600,5 +600,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 616814586,
"name": "CVE-2022-22963",
"full_name": "Mustafa1986\/CVE-2022-22963",
"owner": {
"login": "Mustafa1986",
"id": 27927358,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4",
"html_url": "https:\/\/github.com\/Mustafa1986"
},
"html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2022-22963",
"description": null,
"fork": false,
"created_at": "2023-03-21T06:14:35Z",
"updated_at": "2023-03-21T06:16:01Z",
"pushed_at": "2023-03-21T06:15:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1896,6 +1896,35 @@
"watchers": 71,
"score": 0
},
{
"id": 510562121,
"name": "CVE-2022-22965",
"full_name": "trhacknon\/CVE-2022-22965",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-07-05T02:30:29Z",
"updated_at": "2022-09-27T23:19:26Z",
"pushed_at": "2022-07-05T02:32:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 510569312,
"name": "Spring4Shell-CVE-2022-22965",
@ -2055,10 +2084,10 @@
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具基于JavaFx开发图形化操作更简单提高效率。",
"fork": false,
"created_at": "2022-12-28T04:50:16Z",
"updated_at": "2023-03-13T16:46:00Z",
"updated_at": "2023-03-21T06:19:31Z",
"pushed_at": "2022-12-29T03:32:45Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -2067,7 +2096,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 41,
"watchers": 48,
"score": 0
},
{

39
2022/CVE-2022-24342.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 509870464,
"name": "CVE-2022-24342",
"full_name": "yuriisanin\/CVE-2022-24342",
"owner": {
"login": "yuriisanin",
"id": 11749007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
"html_url": "https:\/\/github.com\/yuriisanin"
},
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342",
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
"fork": false,
"created_at": "2022-07-02T22:04:29Z",
"updated_at": "2023-02-12T21:01:11Z",
"pushed_at": "2022-07-05T17:31:35Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"csrf",
"cve",
"cve-2022-24342",
"exploit",
"jetbrains",
"teamcity",
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 34,
"score": 0
}
]

View file

@ -57,6 +57,35 @@
"watchers": 0,
"score": 0
},
{
"id": 510182546,
"name": "CVE-2022-24706",
"full_name": "superzerosec\/CVE-2022-24706",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706",
"description": "CVE-2022-24706 POC exploit",
"fork": false,
"created_at": "2022-07-04T02:06:27Z",
"updated_at": "2022-07-04T02:06:27Z",
"pushed_at": "2022-07-04T02:06:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 533101052,
"name": "CVE-2022-24706-CouchDB-Exploit",

View file

@ -13,10 +13,10 @@
"description": " Authenticated Remote Code Execution in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
"fork": false,
"created_at": "2023-03-20T04:31:32Z",
"updated_at": "2023-03-20T19:53:26Z",
"updated_at": "2023-03-21T03:15:54Z",
"pushed_at": "2023-03-20T18:07:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
"fork": false,
"created_at": "2023-03-19T20:41:46Z",
"updated_at": "2023-03-20T23:34:15Z",
"updated_at": "2023-03-21T05:04:57Z",
"pushed_at": "2023-03-20T05:02:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 8,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-03-20T13:28:53Z",
"updated_at": "2023-03-21T06:02:42Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 948,
"watchers_count": 948,
"stargazers_count": 947,
"watchers_count": 947,
"has_discussions": true,
"forks_count": 165,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 948,
"watchers": 947,
"score": 0
},
{
@ -1280,6 +1280,35 @@
"watchers": 0,
"score": 0
},
{
"id": 510402169,
"name": "TryHackMe-Atlassian-CVE-2022-26134",
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"owner": {
"login": "r1skkam",
"id": 58542375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
"html_url": "https:\/\/github.com\/r1skkam"
},
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
"fork": false,
"created_at": "2022-07-04T15:00:21Z",
"updated_at": "2022-07-19T02:30:51Z",
"pushed_at": "2022-07-04T16:49:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510586350,
"name": "CVE-2022-26134",
@ -1314,6 +1343,44 @@
"watchers": 10,
"score": 0
},
{
"id": 510624422,
"name": "CVE-2022-26134",
"full_name": "Debajyoti0-0\/CVE-2022-26134",
"owner": {
"login": "Debajyoti0-0",
"id": 79437050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
"html_url": "https:\/\/github.com\/Debajyoti0-0"
},
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-07-05T07:04:50Z",
"updated_at": "2022-07-10T08:52:10Z",
"pushed_at": "2022-07-05T09:40:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"atlassian-confluence",
"cve-2022-26134",
"infosec",
"ognl-injection-vulnerability",
"payload",
"python",
"rce",
"unauthenticated"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 510946912,
"name": "cve-2022-26134",

31
2022/CVE-2022-26763.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 509675215,
"name": "PCICrash",
"full_name": "zhuowei\/PCICrash",
"owner": {
"login": "zhuowei",
"id": 704768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
"html_url": "https:\/\/github.com\/zhuowei"
},
"html_url": "https:\/\/github.com\/zhuowei\/PCICrash",
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-09-15T17:20:03Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 36,
"score": 0
}
]

31
2022/CVE-2022-26766.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 509675427,
"name": "CoreTrustDemo",
"full_name": "zhuowei\/CoreTrustDemo",
"owner": {
"login": "zhuowei",
"id": 704768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
"html_url": "https:\/\/github.com\/zhuowei"
},
"html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo",
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
"fork": false,
"created_at": "2022-07-02T06:16:33Z",
"updated_at": "2023-02-26T02:08:22Z",
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 74,
"score": 0
}
]

View file

@ -28,6 +28,35 @@
"watchers": 38,
"score": 0
},
{
"id": 509605278,
"name": "manageengine-auditad-cve-2022-28219",
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
"owner": {
"login": "rbowes-r7",
"id": 104588115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
"html_url": "https:\/\/github.com\/rbowes-r7"
},
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
"description": null,
"fork": false,
"created_at": "2022-07-01T22:40:46Z",
"updated_at": "2022-07-19T13:50:08Z",
"pushed_at": "2022-07-05T22:13:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 518384320,
"name": "CVE-2022-28219-Like",

View file

@ -554,6 +554,64 @@
"watchers": 4,
"score": 0
},
{
"id": 524474931,
"name": "CVE-2022-29464",
"full_name": "amit-pathak009\/CVE-2022-29464",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:14:43Z",
"updated_at": "2022-05-19T21:24:13Z",
"pushed_at": "2022-05-19T21:24:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 524475053,
"name": "CVE-2022-29464-mass",
"full_name": "amit-pathak009\/CVE-2022-29464-mass",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:15:18Z",
"updated_at": "2023-01-11T06:21:01Z",
"pushed_at": "2022-05-29T19:16:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 540011346,
"name": "CVE-2022-29464",

View file

@ -27,5 +27,34 @@
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 509388193,
"name": "CVE-2022-29885",
"full_name": "iveresk\/CVE-2022-29885",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885",
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
"fork": false,
"created_at": "2022-07-01T09:02:10Z",
"updated_at": "2023-01-24T17:20:21Z",
"pushed_at": "2022-07-05T06:23:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,33 @@
[
{
"id": 510563141,
"name": "CVE-2022-30333-PoC",
"full_name": "TheL1ghtVn\/CVE-2022-30333-PoC",
"owner": {
"login": "TheL1ghtVn",
"id": 89027345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4",
"html_url": "https:\/\/github.com\/TheL1ghtVn"
},
"html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC",
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
"updated_at": "2022-11-19T19:17:38Z",
"pushed_at": "2022-07-05T02:58:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 514420724,
"name": "unrar-cve-2022-30333-poc",

31
2022/CVE-2022-30594.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510304709,
"name": "linux-4.19.72_CVE-2022-30594",
"full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594",
"description": null,
"fork": false,
"created_at": "2022-07-04T10:01:05Z",
"updated_at": "2023-03-08T01:26:26Z",
"pushed_at": "2022-07-04T10:18:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

31
2022/CVE-2022-30887.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510479826,
"name": "CVE-2022-30887",
"full_name": "MuallimNaci\/CVE-2022-30887",
"owner": {
"login": "MuallimNaci",
"id": 87265009,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4",
"html_url": "https:\/\/github.com\/MuallimNaci"
},
"html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887",
"description": null,
"fork": false,
"created_at": "2022-07-04T19:24:56Z",
"updated_at": "2022-12-08T03:15:35Z",
"pushed_at": "2022-07-04T19:30:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

31
2022/CVE-2022-30929.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 511398695,
"name": "CVE-2022-30929",
"full_name": "nanaao\/CVE-2022-30929",
"owner": {
"login": "nanaao",
"id": 77666853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
"html_url": "https:\/\/github.com\/nanaao"
},
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929",
"description": "CVE-2022-30929 POC",
"fork": false,
"created_at": "2022-07-07T05:44:56Z",
"updated_at": "2023-01-31T12:52:11Z",
"pushed_at": "2022-07-04T06:19:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 368,
"watchers_count": 368,
"has_discussions": false,
"forks_count": 67,
"forks_count": 68,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 67,
"forks": 68,
"watchers": 368,
"score": 0
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 107,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"spookyssl"
],
"visibility": "public",
"forks": 107,
"forks": 108,
"watchers": 531,
"score": 0
},

View file

@ -282,10 +282,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-03-14T08:24:24Z",
"updated_at": "2023-03-21T01:16:37Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
@ -294,7 +294,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 314,
"watchers": 315,
"score": 0
},
{

View file

@ -609,10 +609,10 @@
"description": "一键枚举所有用户名以及写入SSH公钥",
"fork": false,
"created_at": "2023-02-27T18:05:34Z",
"updated_at": "2023-03-01T01:51:12Z",
"updated_at": "2023-03-21T04:01:30Z",
"pushed_at": "2023-02-27T18:10:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -621,7 +621,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -46,19 +46,19 @@
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
"fork": false,
"created_at": "2023-02-23T10:04:58Z",
"updated_at": "2023-03-17T16:17:11Z",
"updated_at": "2023-03-21T05:37:33Z",
"pushed_at": "2023-03-14T08:41:51Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 50,
"forks": 17,
"watchers": 54,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 215,
"score": 0
},
@ -190,10 +190,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2023-03-20T11:50:52Z",
"updated_at": "2023-03-21T06:06:29Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -202,7 +202,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 117,
"watchers": 118,
"score": 0
},
{

View file

@ -287,7 +287,7 @@
"fork": false,
"created_at": "2023-03-20T22:54:18Z",
"updated_at": "2023-03-20T23:57:27Z",
"pushed_at": "2023-03-20T23:31:38Z",
"pushed_at": "2023-03-21T04:56:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -158,10 +158,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-03T21:46:37Z",
"updated_at": "2023-03-20T05:53:55Z",
"updated_at": "2023-03-21T02:32:37Z",
"pushed_at": "2023-01-19T08:04:02Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 53,
"watchers": 54,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2023-03-20T10:23:36Z",
"updated_at": "2023-03-21T04:41:18Z",
"pushed_at": "2023-02-16T13:49:47Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 138,
"watchers": 139,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-03-20T20:14:54Z",
"updated_at": "2023-03-21T03:34:04Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

31
2023/CVE-2023-0286.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 616793748,
"name": "OPENSSL_1.1.11g_G3_CVE-2023-0286",
"full_name": "nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2023-0286",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/OPENSSL_1.1.11g_G3_CVE-2023-0286",
"description": null,
"fork": false,
"created_at": "2023-03-21T04:57:37Z",
"updated_at": "2023-03-21T05:08:08Z",
"pushed_at": "2023-03-21T05:08:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-20T22:51:34Z",
"updated_at": "2023-03-21T05:51:17Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 315,
"watchers": 317,
"score": 0
},
{
@ -122,5 +122,34 @@
"forks": 1,
"watchers": 11,
"score": 0
},
{
"id": 616747050,
"name": "Windows_AFD_LPE_CVE-2023-21768",
"full_name": "HKxiaoli\/Windows_AFD_LPE_CVE-2023-21768",
"owner": {
"login": "HKxiaoli",
"id": 65068574,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65068574?v=4",
"html_url": "https:\/\/github.com\/HKxiaoli"
},
"html_url": "https:\/\/github.com\/HKxiaoli\/Windows_AFD_LPE_CVE-2023-21768",
"description": "Windows 11 System Permission Elevation",
"fork": false,
"created_at": "2023-03-21T01:58:40Z",
"updated_at": "2023-03-21T02:28:18Z",
"pushed_at": "2023-03-21T02:31:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "OpenEMR < 7.0.0 Arbitrary File Read",
"fork": false,
"created_at": "2023-02-23T18:14:05Z",
"updated_at": "2023-03-17T15:35:37Z",
"updated_at": "2023-03-21T04:41:20Z",
"pushed_at": "2023-02-23T18:15:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-21T00:18:35Z",
"updated_at": "2023-03-21T03:01:05Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 123,
"watchers": 125,
"score": 0
},
{
@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-03-21T00:18:00Z",
"updated_at": "2023-03-21T04:41:50Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 212,
"watchers": 215,
"score": 0
},
{
@ -371,10 +371,10 @@
"description": "Simple CVE-2023-23397 poc with sending of the payload by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-03-21T00:22:14Z",
"updated_at": "2023-03-21T03:18:05Z",
"pushed_at": "2023-03-20T16:55:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -383,7 +383,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2023-03-20T23:40:35Z",
"updated_at": "2023-03-21T06:26:59Z",
"pushed_at": "2023-03-20T12:51:29Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 1,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"forks": 4,
"watchers": 29,
"score": 0
}
]

110
README.md
View file

@ -20,6 +20,14 @@ An issue has been discovered in GitLab affecting all versions starting from 13.7
### CVE-2023-0264
- [twwd/CVE-2023-0264](https://github.com/twwd/CVE-2023-0264)
### CVE-2023-0286 (2023-02-08)
<code>
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
</code>
- [nidhi7598/OPENSSL_1.1.11g_G3_CVE-2023-0286](https://github.com/nidhi7598/OPENSSL_1.1.11g_G3_CVE-2023-0286)
### CVE-2023-0297 (2023-01-13)
<code>
@ -158,6 +166,7 @@ Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerabili
- [cl4ym0re/cve-2023-21768-compiled](https://github.com/cl4ym0re/cve-2023-21768-compiled)
- [SamuelTulach/nullmap](https://github.com/SamuelTulach/nullmap)
- [Malwareman007/CVE-2023-21768](https://github.com/Malwareman007/CVE-2023-21768)
- [HKxiaoli/Windows_AFD_LPE_CVE-2023-21768](https://github.com/HKxiaoli/Windows_AFD_LPE_CVE-2023-21768)
### CVE-2023-21839 (2023-01-17)
@ -697,6 +706,8 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
- [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits)
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
@ -713,6 +724,7 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs)
- [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847)
- [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits)
- [4bhishek0/CVE-2022-0847](https://github.com/4bhishek0/CVE-2022-0847)
### CVE-2022-0848 (2022-03-04)
@ -947,6 +959,8 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
- [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388)
- [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388)
- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh)
- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388)
- [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388)
- [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388)
- [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388)
@ -1337,6 +1351,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007)
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007)
### CVE-2022-20124 (2022-06-15)
<code>
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036
</code>
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
### CVE-2022-20126 (2022-06-15)
<code>
@ -1348,6 +1370,14 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo
### CVE-2022-20128
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
### CVE-2022-20130 (2022-06-15)
<code>
In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979
</code>
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
### CVE-2022-20133 (2022-06-15)
<code>
@ -1356,6 +1386,14 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of
- [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133)
### CVE-2022-20135 (2022-06-15)
<code>
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
</code>
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
### CVE-2022-20138 (2022-06-15)
<code>
@ -1372,6 +1410,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there
In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962
</code>
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142)
### CVE-2022-20186 (2022-06-15)
@ -1562,6 +1601,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
- [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449)
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
- [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449)
@ -2012,6 +2052,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954)
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
@ -2042,6 +2084,7 @@ In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, w
- [charis3306/CVE-2022-22963](https://github.com/charis3306/CVE-2022-22963)
- [lemmyz4n3771/CVE-2022-22963-PoC](https://github.com/lemmyz4n3771/CVE-2022-22963-PoC)
- [J0ey17/CVE-2022-22963_Reverse-Shell-Exploit](https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit)
- [Mustafa1986/CVE-2022-22963](https://github.com/Mustafa1986/CVE-2022-22963)
### CVE-2022-22965 (2022-04-01)
@ -2112,6 +2155,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
- [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell)
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
- [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965)
- [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC)
@ -2497,6 +2541,14 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
### CVE-2022-24342 (2022-02-25)
<code>
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
</code>
- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342)
### CVE-2022-24348 (2022-02-04)
<code>
@ -2615,6 +2667,7 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
- [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit)
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
### CVE-2022-24707 (2022-02-23)
@ -3020,7 +3073,9 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
- [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134)
- [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134)
- [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit)
@ -3146,6 +3201,22 @@ A use after free issue was addressed with improved memory management. This issue
- [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert)
### CVE-2022-26763 (2022-05-26)
<code>
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.
</code>
- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash)
### CVE-2022-26766 (2022-05-26)
<code>
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
</code>
- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo)
### CVE-2022-26809 (2022-04-15)
<code>
@ -3394,6 +3465,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
</code>
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
- [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like)
### CVE-2022-28281 (2022-12-22)
@ -3668,6 +3740,8 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464)
- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass)
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
@ -3774,6 +3848,7 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20
</code>
- [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885)
- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885)
### CVE-2022-29932 (2022-05-11)
@ -3953,6 +4028,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
</code>
- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC)
- [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc)
- [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333)
- [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333)
@ -4063,6 +4139,14 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl
- [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks)
### CVE-2022-30594 (2022-05-12)
<code>
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
</code>
- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594)
### CVE-2022-30600 (2022-05-18)
<code>
@ -4090,6 +4174,22 @@ Gitea before 1.16.7 does not escape git fetch remote.
- [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781)
### CVE-2022-30887 (2022-05-20)
<code>
Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
</code>
- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887)
### CVE-2022-30929 (2022-07-06)
<code>
Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
</code>
- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929)
### CVE-2022-31007 (2022-05-31)
<code>
@ -7485,6 +7585,7 @@ It was found that polkit could be tricked into bypassing the credential checks f
- [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit)
- [AssassinUKG/Polkit-CVE-2021-3560](https://github.com/AssassinUKG/Polkit-CVE-2021-3560)
- [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560)
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
@ -10393,14 +10494,6 @@ A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in
- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833)
### CVE-2021-37850 (2021-11-08)
<code>
ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.
</code>
- [p1atdev/CVE-2021-37850](https://github.com/p1atdev/CVE-2021-37850)
### CVE-2021-37910 (2021-11-11)
<code>
@ -14206,6 +14299,7 @@ The X.509 GeneralName type is a generic type for representing different types of
</code>
- [MBHudson/CVE-2020-1971](https://github.com/MBHudson/CVE-2020-1971)
- [nidhi7598/OPENSSL_1.1.11g_G3_CVE-2020-1971](https://github.com/nidhi7598/OPENSSL_1.1.11g_G3_CVE-2020-1971)
### CVE-2020-2034 (2020-07-08)