Auto Update 2024/01/15 00:33:19

This commit is contained in:
motikan2010-bot 2024-01-15 09:33:19 +09:00
parent ea6cadc81f
commit 8231263a40
27 changed files with 468 additions and 79 deletions

View file

@ -78,7 +78,7 @@
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 110,
"forks_count": 111,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -90,7 +90,7 @@
"sambacry"
],
"visibility": "public",
"forks": 110,
"forks": 111,
"watchers": 365,
"score": 0,
"subscribers_count": 10

View file

@ -163,10 +163,10 @@
"description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.",
"fork": false,
"created_at": "2021-09-06T12:28:05Z",
"updated_at": "2023-04-11T06:06:59Z",
"updated_at": "2024-01-14T22:39:28Z",
"pushed_at": "2021-09-07T13:11:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -2523,6 +2523,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -142,10 +142,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2023-12-18T07:20:39Z",
"updated_at": "2024-01-14T18:47:16Z",
"pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 105,
"watchers": 106,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 65,
"score": 0,
"subscribers_count": 5

View file

@ -5156,6 +5156,44 @@
"score": 0,
"subscribers_count": 8
},
{
"id": 438034703,
"name": "log4shell-tools",
"full_name": "alexbakker\/log4shell-tools",
"owner": {
"login": "alexbakker",
"id": 2387841,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2387841?v=4",
"html_url": "https:\/\/github.com\/alexbakker"
},
"html_url": "https:\/\/github.com\/alexbakker\/log4shell-tools",
"description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
"fork": false,
"created_at": "2021-12-13T21:47:41Z",
"updated_at": "2024-01-14T21:20:04Z",
"pushed_at": "2023-12-20T13:58:44Z",
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"cve-2021-45046",
"dns",
"jndi",
"ldap",
"log4j",
"log4shell"
],
"visibility": "public",
"forks": 14,
"watchers": 81,
"score": 0,
"subscribers_count": 4
},
{
"id": 438043313,
"name": "find-log4j",
@ -12401,7 +12439,7 @@
"fork": false,
"created_at": "2023-12-27T08:49:38Z",
"updated_at": "2023-12-27T22:59:37Z",
"pushed_at": "2023-12-28T23:44:19Z",
"pushed_at": "2024-01-14T23:40:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

32
2022/CVE-2022-0219.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 450128440,
"name": "CVE-2022-0219",
"full_name": "Haxatron\/CVE-2022-0219",
"owner": {
"login": "Haxatron",
"id": 76475453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
"html_url": "https:\/\/github.com\/Haxatron"
},
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
"description": null,
"fork": false,
"created_at": "2022-01-20T14:24:45Z",
"updated_at": "2022-01-20T14:24:45Z",
"pushed_at": "2022-01-20T14:35:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-0236.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2023-01-28T03:56:57Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

36
2022/CVE-2022-21658.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 450374545,
"name": "cve-2022-21658",
"full_name": "sagittarius-a\/cve-2022-21658",
"owner": {
"login": "sagittarius-a",
"id": 8809698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
"html_url": "https:\/\/github.com\/sagittarius-a"
},
"html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
"description": "POC for cve-2022-21658",
"fork": false,
"created_at": "2022-01-21T06:09:16Z",
"updated_at": "2023-10-03T02:34:46Z",
"pushed_at": "2022-01-21T06:09:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21658",
"poc",
"rust"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 446296593,
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"owner": {
"login": "UzJu",
"id": 50813806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
"html_url": "https:\/\/github.com\/UzJu"
},
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"description": "CVE-2022-21660",
"fork": false,
"created_at": "2022-01-10T05:50:35Z",
"updated_at": "2023-08-04T05:22:54Z",
"pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
{
"id": 462232980,
"name": "CVE-2022-21660",

View file

@ -79,6 +79,66 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2024-01-12T14:50:41Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 361,
"score": 0,
"subscribers_count": 10
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
@ -116,6 +176,36 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2024-01-14T06:46:41Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 21,
"score": 0,
"subscribers_count": 2
},
{
"id": 477659433,
"name": "CVE-2022-21907",

32
2022/CVE-2022-22296.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 450430110,
"name": "CVE-2022-22296",
"full_name": "vlakhani28\/CVE-2022-22296",
"owner": {
"login": "vlakhani28",
"id": 42069316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
"html_url": "https:\/\/github.com\/vlakhani28"
},
"html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
"description": "All Details about CVE-2022-22296",
"fork": false,
"created_at": "2022-01-21T09:29:21Z",
"updated_at": "2023-09-28T11:35:14Z",
"pushed_at": "2022-01-21T09:45:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,12 +13,12 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2024-01-13T16:00:28Z",
"updated_at": "2024-01-14T20:09:52Z",
"pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 107,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,8 +33,8 @@
"tomcat"
],
"visibility": "public",
"forks": 107,
"watchers": 340,
"forks": 108,
"watchers": 341,
"score": 0,
"subscribers_count": 18
},

View file

@ -48,6 +48,38 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 450360735,
"name": "CVE-2022-RCE",
"full_name": "AlphabugX\/CVE-2022-RCE",
"owner": {
"login": "AlphabugX",
"id": 27001865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/AlphabugX"
},
"html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
"fork": false,
"created_at": "2022-01-21T05:07:59Z",
"updated_at": "2022-11-05T22:58:02Z",
"pushed_at": "2022-01-21T05:21:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 670307374,
"name": "CVE-2022-23305_POC",

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-46463(Harbor 未授权)",
"fork": false,
"created_at": "2023-01-17T14:58:14Z",
"updated_at": "2024-01-12T02:52:45Z",
"updated_at": "2024-01-15T00:12:58Z",
"pushed_at": "2023-01-19T12:47:21Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 21,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,10 +133,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-03T21:46:37Z",
"updated_at": "2024-01-07T19:37:07Z",
"updated_at": "2024-01-14T23:39:29Z",
"pushed_at": "2023-01-19T08:04:02Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 64,
"watchers": 65,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-01-14T16:43:39Z",
"updated_at": "2024-01-14T18:48:48Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 733,
"watchers_count": 733,
"stargazers_count": 734,
"watchers_count": 734,
"has_discussions": false,
"forks_count": 132,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 132,
"watchers": 733,
"watchers": 734,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,7 +43,7 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-01-14T16:56:25Z",
"updated_at": "2024-01-14T22:08:14Z",
"pushed_at": "2024-01-04T16:03:13Z",
"stargazers_count": 184,
"watchers_count": 184,

View file

@ -13,10 +13,10 @@
"description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.",
"fork": false,
"created_at": "2024-01-14T18:30:11Z",
"updated_at": "2024-01-14T18:31:55Z",
"pushed_at": "2024-01-14T18:31:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2024-01-15T00:09:07Z",
"pushed_at": "2024-01-14T23:43:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,7 +13,7 @@
"description": "Multiple SQL injection vulnerabilities in \/customer_support\/ajax.php?action=save_department in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via id or name.",
"fork": false,
"created_at": "2023-12-16T23:06:25Z",
"updated_at": "2023-12-31T06:03:21Z",
"updated_at": "2024-01-14T20:29:08Z",
"pushed_at": "2023-12-29T23:03:49Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -124,10 +124,10 @@
"description": "This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.",
"fork": false,
"created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-01-14T17:36:23Z",
"updated_at": "2024-01-14T22:22:41Z",
"pushed_at": "2024-01-02T15:43:26Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},
@ -184,10 +184,10 @@
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
"fork": false,
"created_at": "2024-01-06T04:07:07Z",
"updated_at": "2024-01-12T04:30:43Z",
"updated_at": "2024-01-15T00:19:00Z",
"pushed_at": "2024-01-06T10:33:34Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -196,7 +196,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 1
},
@ -214,10 +214,10 @@
"description": "A go-exploit for Apache OFBiz CVE-2023-51467",
"fork": false,
"created_at": "2024-01-09T16:58:06Z",
"updated_at": "2024-01-12T09:15:09Z",
"updated_at": "2024-01-14T21:15:22Z",
"pushed_at": "2024-01-10T21:40:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -230,7 +230,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2024-01-11T12:54:06Z",
"pushed_at": "2023-12-15T18:13:06Z",
"pushed_at": "2024-01-14T22:04:28Z",
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-6875 PoC",
"fork": false,
"created_at": "2024-01-13T15:23:17Z",
"updated_at": "2024-01-14T17:55:39Z",
"updated_at": "2024-01-14T23:00:06Z",
"pushed_at": "2024-01-13T15:26:56Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T10:53:50Z",
"updated_at": "2024-01-14T16:18:07Z",
"updated_at": "2024-01-14T23:00:54Z",
"pushed_at": "2024-01-12T13:56:38Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
@ -106,10 +106,10 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-01-14T17:38:51Z",
"updated_at": "2024-01-14T22:57:01Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 113,
"watchers": 116,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-01-14T14:57:51Z",
"updated_at": "2024-01-14T20:55:57Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "POC Checker for ivanti CVE-2024-21887 Command injcetion",
"fork": false,
"created_at": "2024-01-14T09:25:56Z",
"updated_at": "2024-01-14T09:27:39Z",
"updated_at": "2024-01-14T19:05:36Z",
"pushed_at": "2024-01-14T09:27:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
@ -43,10 +43,10 @@
"description": "Quick scanner for possible vulnerable Ivanti Connect Secure appliances by country using Shodan.",
"fork": false,
"created_at": "2024-01-14T18:30:11Z",
"updated_at": "2024-01-14T18:31:55Z",
"pushed_at": "2024-01-14T18:31:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2024-01-15T00:09:07Z",
"pushed_at": "2024-01-14T23:43:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -6341,6 +6341,21 @@
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
### CVE-2022-0219 (2022-01-20)
<code>Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
</code>
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
### CVE-2022-0236 (2022-01-18)
<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
<code>Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
@ -7625,11 +7640,19 @@
- [rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit)
- [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-)
### CVE-2022-21658 (2022-01-20)
<code>Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
</code>
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
### CVE-2022-21660 (2022-02-09)
<code>Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
</code>
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@ -7721,7 +7744,10 @@
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
@ -7799,6 +7825,13 @@
- [4lucardSec/Sonic_CVE-2022-22274_poc](https://github.com/4lucardSec/Sonic_CVE-2022-22274_poc)
- [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc)
### CVE-2022-22296 (2022-01-24)
<code>Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
</code>
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
### CVE-2022-22536 (2022-02-09)
<code>SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n
@ -8305,6 +8338,7 @@
</code>
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
- [tkomlodi/CVE-2022-23305_POC](https://github.com/tkomlodi/CVE-2022-23305_POC)
### CVE-2022-23342 (2022-06-21)
@ -18508,6 +18542,7 @@
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
- [perryflynn/find-log4j](https://github.com/perryflynn/find-log4j)
- [5l1v3r1/jndiRep](https://github.com/5l1v3r1/jndiRep)
- [alpacamybags118/log4j-cve-2021-44228-sample](https://github.com/alpacamybags118/log4j-cve-2021-44228-sample)