Auto Update 2022/02/12 12:14:01

This commit is contained in:
motikan2010-bot 2022-02-12 21:14:01 +09:00
parent 070fd34dc5
commit 7b359515f8
24 changed files with 256 additions and 157 deletions

29
2014/CVE-2014-1767.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 458469806,
"name": "CVE-2014-1767-EXP-PAPER",
"full_name": "ExploitCN\/CVE-2014-1767-EXP-PAPER",
"owner": {
"login": "ExploitCN",
"id": 98264245,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4",
"html_url": "https:\/\/github.com\/ExploitCN"
},
"html_url": "https:\/\/github.com\/ExploitCN\/CVE-2014-1767-EXP-PAPER",
"description": "CVE-2014-1767在win7_x64平台的EXP和分析文章",
"fork": false,
"created_at": "2022-02-12T08:57:19Z",
"updated_at": "2022-02-12T09:05:38Z",
"pushed_at": "2022-02-12T09:05:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2021-08-12T14:47:47Z",
"updated_at": "2022-02-12T09:14:27Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 329,
"watchers_count": 329,
"forks_count": 150,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 150,
"watchers": 328,
"watchers": 329,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-02-06T12:31:42Z",
"updated_at": "2022-02-12T07:31:06Z",
"pushed_at": "2022-01-26T10:07:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
"fork": false,
"created_at": "2019-02-07T06:45:27Z",
"updated_at": "2022-01-21T07:50:03Z",
"updated_at": "2022-02-12T06:09:59Z",
"pushed_at": "2020-11-18T03:01:31Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 79,
"watchers": 78,
"score": 0
}
]

View file

@ -99,7 +99,7 @@
"description": "CVE-2019-0708-exploit",
"fork": false,
"created_at": "2019-05-15T02:24:21Z",
"updated_at": "2022-01-30T01:04:07Z",
"updated_at": "2022-02-12T06:21:52Z",
"pushed_at": "2019-05-15T02:26:46Z",
"stargazers_count": 119,
"watchers_count": 119,

View file

@ -121,5 +121,32 @@
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 458501569,
"name": "Jenkins_CVE-2019-1003000",
"full_name": "purple-WL\/Jenkins_CVE-2019-1003000",
"owner": {
"login": "purple-WL",
"id": 63894044,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4",
"html_url": "https:\/\/github.com\/purple-WL"
},
"html_url": "https:\/\/github.com\/purple-WL\/Jenkins_CVE-2019-1003000",
"description": null,
"fork": false,
"created_at": "2022-02-12T11:26:07Z",
"updated_at": "2022-02-12T11:27:23Z",
"pushed_at": "2022-02-12T11:27:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-10T19:03:53Z",
"updated_at": "2022-02-11T21:17:09Z",
"updated_at": "2022-02-12T08:00:55Z",
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 13,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-02-06T12:31:42Z",
"updated_at": "2022-02-12T07:31:06Z",
"pushed_at": "2022-01-26T10:07:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
"fork": false,
"created_at": "2020-01-10T13:41:28Z",
"updated_at": "2021-12-15T14:38:03Z",
"updated_at": "2022-02-12T11:51:07Z",
"pushed_at": "2020-01-10T13:42:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 14,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "InfluxDB CVE-2019-20933 vulnerability exploit",
"fork": false,
"created_at": "2021-04-28T16:25:31Z",
"updated_at": "2022-02-04T02:08:02Z",
"updated_at": "2022-02-12T12:06:49Z",
"pushed_at": "2021-11-12T13:02:41Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2022-02-02T14:55:24Z",
"updated_at": "2022-02-12T10:23:29Z",
"pushed_at": "2021-03-17T11:29:58Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 107,
"watchers": 108,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2022-02-12T01:16:12Z",
"updated_at": "2022-02-12T11:54:32Z",
"pushed_at": "2020-03-09T05:25:05Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 154,
"watchers": 155,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE",
"fork": false,
"created_at": "2022-02-10T21:52:24Z",
"updated_at": "2022-02-11T20:53:21Z",
"updated_at": "2022-02-12T06:34:09Z",
"pushed_at": "2022-02-11T17:20:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -684,10 +684,10 @@
"description": "CVE-2021-21972 ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
"fork": false,
"created_at": "2021-10-03T23:03:11Z",
"updated_at": "2021-11-09T11:30:14Z",
"updated_at": "2022-02-12T11:51:32Z",
"pushed_at": "2021-10-16T13:48:00Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -699,7 +699,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 6,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-03-31T02:39:02Z",
"updated_at": "2021-12-15T14:41:46Z",
"updated_at": "2022-02-12T11:51:28Z",
"pushed_at": "2021-06-11T03:53:22Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -104,17 +104,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-02-11T20:24:03Z",
"updated_at": "2022-02-12T11:31:14Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1251,
"watchers_count": 1251,
"stargazers_count": 1256,
"watchers_count": 1256,
"forks_count": 365,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 365,
"watchers": 1251,
"watchers": 1256,
"score": 0
},
{
@ -185,11 +185,11 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-02-11T21:39:57Z",
"updated_at": "2022-02-12T10:08:20Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 241,
"stargazers_count": 744,
"watchers_count": 744,
"forks_count": 242,
"allow_forking": true,
"is_template": false,
"topics": [
@ -198,8 +198,8 @@
"poc"
],
"visibility": "public",
"forks": 241,
"watchers": 740,
"forks": 242,
"watchers": 744,
"score": 0
},
{
@ -631,10 +631,10 @@
"description": "A python3 and bash PoC for CVE-2021-4034 by Kim Schulz",
"fork": false,
"created_at": "2022-01-26T08:43:15Z",
"updated_at": "2022-02-10T01:57:40Z",
"updated_at": "2022-02-12T08:24:24Z",
"pushed_at": "2022-01-27T10:40:14Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -646,7 +646,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -906,19 +906,19 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-02-12T01:46:47Z",
"updated_at": "2022-02-12T08:49:41Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 413,
"watchers_count": 413,
"forks_count": 70,
"stargazers_count": 412,
"watchers_count": 412,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
"forks": 70,
"watchers": 413,
"forks": 71,
"watchers": 412,
"score": 0
},
{
@ -2336,17 +2336,17 @@
"description": "Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!",
"fork": false,
"created_at": "2022-01-28T18:12:54Z",
"updated_at": "2022-02-10T08:02:51Z",
"updated_at": "2022-02-12T09:19:36Z",
"pushed_at": "2022-01-28T18:22:53Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -2969,5 +2969,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 458439369,
"name": "CVE-2021-4034",
"full_name": "an0n7os\/CVE-2021-4034",
"owner": {
"login": "an0n7os",
"id": 67602602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67602602?v=4",
"html_url": "https:\/\/github.com\/an0n7os"
},
"html_url": "https:\/\/github.com\/an0n7os\/CVE-2021-4034",
"description": null,
"fork": false,
"created_at": "2022-02-12T06:20:49Z",
"updated_at": "2022-02-12T06:26:41Z",
"pushed_at": "2022-02-12T06:26:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1363,
"watchers_count": 1363,
"forks_count": 448,
"forks_count": 449,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 448,
"forks": 449,
"watchers": 1363,
"score": 0
},

View file

@ -93,33 +93,6 @@
"watchers": 16,
"score": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",
"full_name": "blasty\/CVE-2021-41773",
"owner": {
"login": "blasty",
"id": 101374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
"html_url": "https:\/\/github.com\/blasty"
},
"html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773",
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
"updated_at": "2022-02-08T07:55:00Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 203,
"score": 0
},
{
"id": 414159388,
"name": "CVE-2021-41773",
@ -451,33 +424,6 @@
"watchers": 24,
"score": 0
},
{
"id": 414674481,
"name": "Poc-CVE-2021-41773",
"full_name": "LetouRaphael\/Poc-CVE-2021-41773",
"owner": {
"login": "LetouRaphael",
"id": 48223543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48223543?v=4",
"html_url": "https:\/\/github.com\/LetouRaphael"
},
"html_url": "https:\/\/github.com\/LetouRaphael\/Poc-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-07T16:19:45Z",
"updated_at": "2021-10-08T01:15:42Z",
"pushed_at": "2021-10-07T16:48:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 414764740,
"name": "CVE-2021-41773",

View file

@ -905,10 +905,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-02-12T03:02:27Z",
"updated_at": "2022-02-12T08:01:04Z",
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 321,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1230,
"watchers": 1231,
"score": 0
},
{
@ -5886,10 +5886,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-02-06T12:31:42Z",
"updated_at": "2022-02-12T07:31:06Z",
"pushed_at": "2022-01-26T10:07:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -5915,7 +5915,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -7985,17 +7985,17 @@
"description": "This project will help to test the Log4j CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-17T20:07:12Z",
"updated_at": "2021-12-29T05:29:26Z",
"updated_at": "2022-02-12T08:17:39Z",
"pushed_at": "2021-12-22T20:17:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -10657,5 +10657,38 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 458500087,
"name": "lol4j-white-box",
"full_name": "hotpotcookie\/lol4j-white-box",
"owner": {
"login": "hotpotcookie",
"id": 68333318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68333318?v=4",
"html_url": "https:\/\/github.com\/hotpotcookie"
},
"html_url": "https:\/\/github.com\/hotpotcookie\/lol4j-white-box",
"description": "Log4j vulnerability testing environment that based on CVE-2021-44228. This environment provide guidance to build the sample infrastructure and the exploit scripts",
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-02-12T11:28:29Z",
"pushed_at": "2022-02-12T11:21:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"ldap-authentication",
"log4j2",
"penetration-testing",
"spring-boot"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-02-12T05:55:28Z",
"updated_at": "2022-02-12T11:45:59Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 124,
"watchers": 130,
"score": 0
},
{

View file

@ -25,5 +25,32 @@
"forks": 2,
"watchers": 6,
"score": 0
},
{
"id": 458502807,
"name": "wordpress-CVE-2022-21661",
"full_name": "purple-WL\/wordpress-CVE-2022-21661",
"owner": {
"login": "purple-WL",
"id": 63894044,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4",
"html_url": "https:\/\/github.com\/purple-WL"
},
"html_url": "https:\/\/github.com\/purple-WL\/wordpress-CVE-2022-21661",
"description": null,
"fork": false,
"created_at": "2022-02-12T11:31:26Z",
"updated_at": "2022-02-12T11:31:26Z",
"pushed_at": "2022-02-12T11:31:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-02-12T06:00:08Z",
"updated_at": "2022-02-12T11:22:47Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 369,
"watchers_count": 369,
"forks_count": 62,
"stargazers_count": 373,
"watchers_count": 373,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 62,
"watchers": 369,
"forks": 63,
"watchers": 373,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-02-06T12:31:42Z",
"updated_at": "2022-02-12T07:31:06Z",
"pushed_at": "2022-01-26T10:07:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -84,6 +84,7 @@ WordPress is a free and open-source content management system written in PHP and
</code>
- [TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection](https://github.com/TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection)
- [purple-WL/wordpress-CVE-2022-21661](https://github.com/purple-WL/wordpress-CVE-2022-21661)
### CVE-2022-21877 (2022-01-11)
@ -804,6 +805,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034)
- [FDlucifer/Pwnkit-go](https://github.com/FDlucifer/Pwnkit-go)
- [fireclasher/pwnkit-CVE-2021-4034-](https://github.com/fireclasher/pwnkit-CVE-2021-4034-)
- [an0n7os/CVE-2021-4034](https://github.com/an0n7os/CVE-2021-4034)
### CVE-2021-4043 (2022-02-04)
@ -2908,7 +2910,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
- [mohwahyudi/cve-2021-41773](https://github.com/mohwahyudi/cve-2021-41773)
- [1nhann/CVE-2021-41773](https://github.com/1nhann/CVE-2021-41773)
@ -2921,7 +2922,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [ComdeyOverflow/CVE-2021-41773](https://github.com/ComdeyOverflow/CVE-2021-41773)
- [shiomiyan/CVE-2021-41773](https://github.com/shiomiyan/CVE-2021-41773)
- [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773)
- [LetouRaphael/Poc-CVE-2021-41773](https://github.com/LetouRaphael/Poc-CVE-2021-41773)
- [Sakura-nee/CVE-2021-41773](https://github.com/Sakura-nee/CVE-2021-41773)
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
- [0xRar/CVE-2021-41773](https://github.com/0xRar/CVE-2021-41773)
@ -3834,6 +3834,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc)
- [y-security/yLog4j](https://github.com/y-security/yLog4j)
- [FeryaelJustice/Log4Shell](https://github.com/FeryaelJustice/Log4Shell)
- [hotpotcookie/lol4j-white-box](https://github.com/hotpotcookie/lol4j-white-box)
### CVE-2021-44270
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
@ -12815,6 +12816,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
- [purple-WL/Jenkins_CVE-2019-1003000](https://github.com/purple-WL/Jenkins_CVE-2019-1003000)
### CVE-2019-1010054 (2019-07-18)
@ -20815,6 +20817,14 @@ Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obta
- [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit)
### CVE-2014-1767 (2014-07-08)
<code>
Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka &quot;Ancillary Function Driver Elevation of Privilege Vulnerability.&quot;
</code>
- [ExploitCN/CVE-2014-1767-EXP-PAPER](https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER)
### CVE-2014-1773 (2014-06-10)
<code>