Auto Update 2022/03/11 12:14:28

This commit is contained in:
motikan2010-bot 2022-03-11 21:14:28 +09:00
parent dec4638eb3
commit 80bd20debc
39 changed files with 317 additions and 219 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-03-05T21:52:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -33,7 +33,7 @@
"vulnerable-server"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -67,7 +67,7 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2022-03-10T02:59:56Z",
"updated_at": "2022-03-11T10:15:39Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 897,
"watchers_count": 897,
@ -1065,17 +1065,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-11T04:35:59Z",
"updated_at": "2022-03-11T11:47:04Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 36,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 116,
"forks": 37,
"watchers": 123,
"score": 0
}
]

View file

@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-03-11T05:48:10Z",
"updated_at": "2022-03-11T11:08:22Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 320,
"watchers_count": 320,
"stargazers_count": 321,
"watchers_count": 321,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 320,
"watchers": 321,
"score": 0
},
{

29
2018/CVE-2018-1263.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 468735837,
"name": "CVE-2018-1263-Demo",
"full_name": "sakib570\/CVE-2018-1263-Demo",
"owner": {
"login": "sakib570",
"id": 6813201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6813201?v=4",
"html_url": "https:\/\/github.com\/sakib570"
},
"html_url": "https:\/\/github.com\/sakib570\/CVE-2018-1263-Demo",
"description": null,
"fork": false,
"created_at": "2022-03-11T12:07:16Z",
"updated_at": "2022-03-11T12:07:16Z",
"pushed_at": "2022-03-11T12:07:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2018-10-26T17:54:54Z",
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 105,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2018-11-06T10:10:31Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"poc"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 18,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2022-02-13T00:28:55Z",
"updated_at": "2022-03-11T06:35:26Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 473,
"watchers_count": 473,
"stargazers_count": 474,
"watchers_count": 474,
"forks_count": 205,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 205,
"watchers": 473,
"watchers": 474,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-03-05T16:43:16Z",
"updated_at": "2022-03-11T06:50:16Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1701,
"watchers_count": 1701,
"stargazers_count": 1702,
"watchers_count": 1702,
"forks_count": 255,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 255,
"watchers": 1701,
"watchers": 1702,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-03-11T05:48:10Z",
"updated_at": "2022-03-11T11:08:22Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 320,
"watchers_count": 320,
"stargazers_count": 321,
"watchers_count": 321,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 320,
"watchers": 321,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 609,
"watchers_count": 609,
"forks_count": 158,
"forks_count": 159,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 158,
"forks": 159,
"watchers": 609,
"score": 0
},

View file

@ -1366,17 +1366,17 @@
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
"fork": false,
"created_at": "2020-04-22T09:09:02Z",
"updated_at": "2021-11-19T02:08:12Z",
"updated_at": "2022-03-11T09:59:14Z",
"pushed_at": "2020-06-05T16:21:55Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 12,
"watchers": 11,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2022-03-07T07:55:18Z",
"updated_at": "2022-03-11T07:37:57Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 303,
"watchers_count": 303,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 302,
"watchers": 303,
"score": 0
},
{

View file

@ -303,17 +303,17 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2022-02-27T11:07:58Z",
"updated_at": "2022-03-11T08:39:16Z",
"pushed_at": "2020-12-01T05:08:41Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-36188 &&Jackson-databind RCE",
"fork": false,
"created_at": "2021-01-11T06:29:38Z",
"updated_at": "2022-01-09T23:42:39Z",
"updated_at": "2022-03-11T08:06:41Z",
"pushed_at": "2021-01-11T06:29:59Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -207,17 +207,17 @@
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
"fork": false,
"created_at": "2021-11-26T17:28:56Z",
"updated_at": "2021-12-28T12:54:32Z",
"updated_at": "2022-03-11T10:24:30Z",
"pushed_at": "2022-01-20T18:36:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2022-03-10T03:08:51Z",
"updated_at": "2022-03-11T07:54:55Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 369,
"watchers_count": 369,
"forks_count": 112,
"stargazers_count": 371,
"watchers_count": 371,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 369,
"forks": 113,
"watchers": 371,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2022-02-21T02:58:06Z",
"updated_at": "2022-03-11T11:54:11Z",
"pushed_at": "2022-01-16T04:17:08Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 191,
"watchers": 192,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-04-22T14:04:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2021-12-29T15:00:00Z",
"updated_at": "2022-02-18T08:21:56Z",
"pushed_at": "2022-02-18T08:22:36Z",
"pushed_at": "2022-03-11T10:44:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-03-11T02:04:45Z",
"updated_at": "2022-03-11T10:18:20Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1398,
"watchers_count": 1398,
"forks_count": 407,
"stargazers_count": 1400,
"watchers_count": 1400,
"forks_count": 408,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 407,
"watchers": 1398,
"forks": 408,
"watchers": 1400,
"score": 0
},
{
@ -1822,7 +1822,7 @@
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-03-08T20:48:21Z",
"pushed_at": "2022-03-04T14:44:49Z",
"pushed_at": "2022-03-11T09:49:22Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-03-09T06:55:38Z",
"updated_at": "2022-03-11T10:26:21Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1382,
"watchers_count": 1382,
"stargazers_count": 1383,
"watchers_count": 1383,
"forks_count": 453,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 453,
"watchers": 1382,
"watchers": 1383,
"score": 0
},
{

View file

@ -300,5 +300,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 468638331,
"name": "CVE-2021-41277",
"full_name": "Chen-ling-afk\/CVE-2021-41277",
"owner": {
"login": "Chen-ling-afk",
"id": 76235286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76235286?v=4",
"html_url": "https:\/\/github.com\/Chen-ling-afk"
},
"html_url": "https:\/\/github.com\/Chen-ling-afk\/CVE-2021-41277",
"description": "MetaBase 任意文件读取",
"fork": false,
"created_at": "2022-03-11T06:39:38Z",
"updated_at": "2022-03-11T07:35:31Z",
"pushed_at": "2022-03-11T07:48:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 411250558,
"name": "CVE-2021-41822",
"full_name": "badboycxcc\/CVE-2021-41822",
"owner": {
"login": "badboycxcc",
"id": 72059221,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72059221?v=4",
"html_url": "https:\/\/github.com\/badboycxcc"
},
"html_url": "https:\/\/github.com\/badboycxcc\/CVE-2021-41822",
"description": "个人CVE",
"fork": false,
"created_at": "2021-09-28T11:17:41Z",
"updated_at": "2021-11-03T03:53:59Z",
"pushed_at": "2021-10-20T10:15:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -354,17 +354,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-03-11T03:52:23Z",
"updated_at": "2022-03-11T09:51:44Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 32,
"watchers": 31,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Windows Common Log File System Driver POC",
"fork": false,
"created_at": "2021-12-21T01:51:41Z",
"updated_at": "2022-03-10T03:09:07Z",
"updated_at": "2022-03-11T07:33:01Z",
"pushed_at": "2021-12-21T06:57:06Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 23,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 76,
"forks": 25,
"watchers": 77,
"score": 0
}
]

View file

@ -417,10 +417,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-03-09T12:49:02Z",
"updated_at": "2022-03-11T09:26:10Z",
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 960,
"watchers_count": 960,
"stargazers_count": 962,
"watchers_count": 962,
"forks_count": 400,
"allow_forking": true,
"is_template": false,
@ -429,7 +429,7 @@
],
"visibility": "public",
"forks": 400,
"watchers": 960,
"watchers": 962,
"score": 0
},
{
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-03-10T20:51:36Z",
"updated_at": "2022-03-11T09:45:18Z",
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1268,
"watchers_count": 1268,
"stargazers_count": 1269,
"watchers_count": 1269,
"forks_count": 346,
"allow_forking": true,
"is_template": false,
@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 346,
"watchers": 1268,
"watchers": 1269,
"score": 0
},
{
@ -10598,7 +10598,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-03-07T10:11:58Z",
"pushed_at": "2022-03-07T10:11:54Z",
"pushed_at": "2022-03-11T11:58:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -79,5 +79,32 @@
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 468660841,
"name": "CVE-2022-0492",
"full_name": "chenaotian\/CVE-2022-0492",
"owner": {
"login": "chenaotian",
"id": 86546351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86546351?v=4",
"html_url": "https:\/\/github.com\/chenaotian"
},
"html_url": "https:\/\/github.com\/chenaotian\/CVE-2022-0492",
"description": "CVE-2022-0492 EXP and Analysis write up",
"fork": false,
"created_at": "2022-03-11T08:02:46Z",
"updated_at": "2022-03-11T08:06:36Z",
"pushed_at": "2022-03-11T09:33:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-11T04:35:59Z",
"updated_at": "2022-03-11T11:47:04Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 36,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 116,
"forks": 37,
"watchers": 123,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-11T06:14:40Z",
"updated_at": "2022-03-11T10:04:16Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 736,
"watchers_count": 736,
"forks_count": 141,
"stargazers_count": 768,
"watchers_count": 768,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 736,
"forks": 145,
"watchers": 768,
"score": 0
},
{
@ -337,17 +337,17 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2022-03-10T22:39:01Z",
"updated_at": "2022-03-11T09:24:27Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -1005,5 +1005,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 468666839,
"name": "DirtyPipePython",
"full_name": "crusoe112\/DirtyPipePython",
"owner": {
"login": "crusoe112",
"id": 6531586,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531586?v=4",
"html_url": "https:\/\/github.com\/crusoe112"
},
"html_url": "https:\/\/github.com\/crusoe112\/DirtyPipePython",
"description": "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell",
"fork": false,
"created_at": "2022-03-11T08:22:56Z",
"updated_at": "2022-03-11T10:59:23Z",
"pushed_at": "2022-03-11T08:31:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-0848.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 468650717,
"name": "CVE-2022-0848",
"full_name": "dskmehra\/CVE-2022-0848",
"owner": {
"login": "dskmehra",
"id": 18103236,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18103236?v=4",
"html_url": "https:\/\/github.com\/dskmehra"
},
"html_url": "https:\/\/github.com\/dskmehra\/CVE-2022-0848",
"description": null,
"fork": false,
"created_at": "2022-03-11T07:26:04Z",
"updated_at": "2022-03-11T07:27:11Z",
"pushed_at": "2022-03-11T07:29:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-10T09:10:56Z",
"updated_at": "2022-03-11T00:31:36Z",
"updated_at": "2022-03-11T08:17:56Z",
"pushed_at": "2022-03-10T09:28:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-03-08T09:16:56Z",
"updated_at": "2022-03-11T11:56:34Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 41,
"stargazers_count": 222,
"watchers_count": 222,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 221,
"forks": 42,
"watchers": 222,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-03-10T18:57:09Z",
"updated_at": "2022-03-11T07:35:21Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 389,
"watchers_count": 389,
"forks_count": 115,
"stargazers_count": 390,
"watchers_count": 390,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 389,
"forks": 116,
"watchers": 390,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2022-02-03T11:25:14Z",
"updated_at": "2022-03-11T01:22:08Z",
"updated_at": "2022-03-11T09:19:10Z",
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 132,
"watchers": 133,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-03-09T11:40:55Z",
"updated_at": "2022-03-11T07:53:51Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 201,
"watchers": 202,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T18:53:56Z",
"updated_at": "2022-03-10T13:59:11Z",
"updated_at": "2022-03-11T09:12:59Z",
"pushed_at": "2022-02-26T19:12:12Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 46,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-09T18:53:59Z",
"updated_at": "2022-03-11T11:42:19Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 485,
"watchers_count": 485,
"forks_count": 91,
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 91,
"watchers": 485,
"forks": 93,
"watchers": 486,
"score": 0
}
]

View file

@ -339,17 +339,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-03-11T03:52:23Z",
"updated_at": "2022-03-11T09:51:44Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 32,
"watchers": 31,
"score": 0
},
{
@ -447,17 +447,17 @@
"description": "CVE-2022-22947批量检测脚本超时时间不超过2s已更新可反弹shell的EXP欢迎师傅们试用",
"fork": false,
"created_at": "2022-03-04T11:31:00Z",
"updated_at": "2022-03-10T02:31:00Z",
"updated_at": "2022-03-11T08:54:48Z",
"pushed_at": "2022-03-08T09:43:50Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -744,17 +744,17 @@
"description": "CVE-2022-22947 Exploit script",
"fork": false,
"created_at": "2022-03-10T03:51:47Z",
"updated_at": "2022-03-10T08:44:28Z",
"updated_at": "2022-03-11T06:35:31Z",
"pushed_at": "2022-03-10T08:43:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-03-06T17:05:02Z",
"updated_at": "2022-03-07T15:32:26Z",
"pushed_at": "2022-03-10T19:18:41Z",
"pushed_at": "2022-03-11T06:38:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,

View file

@ -52,32 +52,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 468562369,
"name": "CVE-2022-24990-EXP",
"full_name": "VVeakee\/CVE-2022-24990-EXP",
"owner": {
"login": "VVeakee",
"id": 85714114,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85714114?v=4",
"html_url": "https:\/\/github.com\/VVeakee"
},
"html_url": "https:\/\/github.com\/VVeakee\/CVE-2022-24990-EXP",
"description": null,
"fork": false,
"created_at": "2022-03-11T01:06:26Z",
"updated_at": "2022-03-11T01:06:26Z",
"pushed_at": "2022-03-11T01:21:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-03-02T15:29:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"printix"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
}

View file

@ -47,6 +47,7 @@ A vulnerability was found in the Linux kernels cgroup_release_agent_write in
- [PaloAltoNetworks/can-ctr-escape-cve-2022-0492](https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492)
- [SofianeHamlaoui/CVE-2022-0492-Checker](https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker)
- [puckiestyle/CVE-2022-0492](https://github.com/puckiestyle/CVE-2022-0492)
- [chenaotian/CVE-2022-0492](https://github.com/chenaotian/CVE-2022-0492)
### CVE-2022-0529 (2022-02-09)
@ -116,6 +117,15 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [michaelklaan/CVE-2022-0847-Dirty-Pipe](https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe)
- [terabitSec/dirtyPipe-automaticRoot](https://github.com/terabitSec/dirtyPipe-automaticRoot)
- [Greetdawn/CVE-2022-0847-DirtyPipe-](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-)
- [crusoe112/DirtyPipePython](https://github.com/crusoe112/DirtyPipePython)
### CVE-2022-0848 (2022-03-04)
<code>
OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.
</code>
- [dskmehra/CVE-2022-0848](https://github.com/dskmehra/CVE-2022-0848)
### CVE-2022-0853
- [ByteHackr/CVE-2022-0853](https://github.com/ByteHackr/CVE-2022-0853)
@ -480,7 +490,6 @@ ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution v
### CVE-2022-24990
- [Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-](https://github.com/Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-)
- [VVeakee/CVE-2022-24990-POC](https://github.com/VVeakee/CVE-2022-24990-POC)
- [VVeakee/CVE-2022-24990-EXP](https://github.com/VVeakee/CVE-2022-24990-EXP)
### CVE-2022-25018 (2022-02-28)
@ -3266,6 +3275,7 @@ Metabase is an open source data analytics platform. In affected versions a secur
- [zer0yu/CVE-2021-41277](https://github.com/zer0yu/CVE-2021-41277)
- [sasukeourad/CVE-2021-41277_SSRF](https://github.com/sasukeourad/CVE-2021-41277_SSRF)
- [frknktlca/Metabase_Nmap_Script](https://github.com/frknktlca/Metabase_Nmap_Script)
- [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277)
### CVE-2021-41349 (2021-11-09)
@ -3369,9 +3379,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
### CVE-2021-41822
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
### CVE-2021-41962 (2021-12-16)
<code>
@ -13540,6 +13547,14 @@ Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used
- [tafamace/CVE-2018-1259](https://github.com/tafamace/CVE-2018-1259)
### CVE-2018-1263 (2018-05-15)
<code>
Addresses partial fix in CVE-2018-1261. Pivotal spring-integration-zip, versions prior to 1.0.2, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
</code>
- [sakib570/CVE-2018-1263-Demo](https://github.com/sakib570/CVE-2018-1263-Demo)
### CVE-2018-1270 (2018-04-06)
<code>