Auto Update 2022/11/21 18:20:17

This commit is contained in:
motikan2010-bot 2022-11-22 03:20:17 +09:00
parent 335961aaf4
commit 8ce5944ef2
39 changed files with 254 additions and 139 deletions

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-11-21T12:02:42Z",
"updated_at": "2022-11-21T12:04:08Z",
"pushed_at": "2022-11-21T12:04:04Z",
"pushed_at": "2022-11-21T12:41:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 6,
"score": 0
}

View file

@ -42,10 +42,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-11-18T07:29:12Z",
"updated_at": "2022-11-21T12:34:05Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 322,
"watchers": 323,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-11-18T07:29:12Z",
"updated_at": "2022-11-21T12:34:05Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 322,
"watchers": 323,
"score": 0
}
]

View file

@ -255,10 +255,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2022-11-05T10:18:08Z",
"updated_at": "2022-11-21T14:40:17Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 119,
"allow_forking": true,
@ -271,7 +271,7 @@
],
"visibility": "public",
"forks": 119,
"watchers": 265,
"watchers": 266,
"score": 0
},
{

View file

@ -459,10 +459,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-11-19T12:10:01Z",
"updated_at": "2022-11-21T14:44:13Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 365,
"watchers_count": 365,
"stargazers_count": 366,
"watchers_count": 366,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -471,7 +471,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 365,
"watchers": 366,
"score": 0
},
{

View file

@ -1507,10 +1507,10 @@
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
"fork": false,
"created_at": "2018-05-13T16:13:26Z",
"updated_at": "2022-11-21T09:12:33Z",
"updated_at": "2022-11-21T17:30:11Z",
"pushed_at": "2018-05-13T16:14:53Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -1519,7 +1519,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -337,5 +337,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 568897117,
"name": "CVE-2017-9841-",
"full_name": "Jhonsonwannaa\/CVE-2017-9841-",
"owner": {
"login": "Jhonsonwannaa",
"id": 114837630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
},
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2017-9841-",
"description": null,
"fork": false,
"created_at": "2022-11-21T16:36:48Z",
"updated_at": "2022-11-21T16:37:26Z",
"pushed_at": "2022-11-21T16:37:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-8021 Proof-Of-Concept and Exploit ",
"fork": false,
"created_at": "2018-12-02T19:01:17Z",
"updated_at": "2022-08-08T22:31:25Z",
"updated_at": "2022-11-21T14:02:34Z",
"pushed_at": "2018-12-03T21:13:00Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 105,
"watchers": 106,
"score": 0
}
]

View file

@ -71,7 +71,7 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2022-11-09T17:59:56Z",
"updated_at": "2022-11-21T13:18:02Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 405,
"watchers_count": 405,

View file

@ -2935,10 +2935,10 @@
"description": "CVE-2019-0708 (BlueKeep)",
"fork": false,
"created_at": "2019-12-07T10:13:11Z",
"updated_at": "2022-11-15T17:39:53Z",
"updated_at": "2022-11-21T12:35:32Z",
"pushed_at": "2020-07-07T15:28:13Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -2947,7 +2947,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 99,
"watchers": 100,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2022-11-17T15:25:22Z",
"updated_at": "2022-11-21T12:28:18Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 200,
"watchers": 201,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-11-19T12:10:01Z",
"updated_at": "2022-11-21T14:44:13Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 365,
"watchers_count": 365,
"stargazers_count": 366,
"watchers_count": 366,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 365,
"watchers": 366,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"tesla"
],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 4,
"score": 0
},

View file

@ -47,13 +47,13 @@
"stargazers_count": 1517,
"watchers_count": 1517,
"has_discussions": false,
"forks_count": 350,
"forks_count": 349,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 350,
"forks": 349,
"watchers": 1517,
"score": 0
},
@ -100,10 +100,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-11-20T22:37:47Z",
"updated_at": "2022-11-21T15:18:44Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 972,
"watchers_count": 972,
"stargazers_count": 973,
"watchers_count": 973,
"has_discussions": false,
"forks_count": 268,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 268,
"watchers": 972,
"watchers": 973,
"score": 0
},
{

View file

@ -134,7 +134,7 @@
"stargazers_count": 995,
"watchers_count": 995,
"has_discussions": false,
"forks_count": 315,
"forks_count": 316,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -144,7 +144,7 @@
"poc"
],
"visibility": "public",
"forks": 315,
"forks": 316,
"watchers": 995,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2022-11-16T07:24:31Z",
"updated_at": "2022-11-21T13:00:08Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 80,
"watchers": 81,
"score": 0
}
]

View file

@ -42,19 +42,19 @@
"description": null,
"fork": false,
"created_at": "2021-05-21T03:13:58Z",
"updated_at": "2022-11-14T03:33:07Z",
"updated_at": "2022-11-21T13:16:58Z",
"pushed_at": "2021-05-21T03:24:25Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"forks": 5,
"watchers": 14,
"score": 0
},
{
@ -100,10 +100,10 @@
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-05-30T10:15:10Z",
"updated_at": "2022-11-21T11:52:35Z",
"updated_at": "2022-11-21T17:03:46Z",
"pushed_at": "2021-11-16T17:34:11Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -127,7 +127,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -795,10 +795,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-21T09:40:10Z",
"updated_at": "2022-11-21T13:55:27Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -814,7 +814,7 @@
],
"visibility": "public",
"forks": 68,
"watchers": 629,
"watchers": 630,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2022-11-09T18:14:22Z",
"updated_at": "2022-11-21T15:40:50Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 156,
"watchers": 157,
"score": 0
},
{

View file

@ -134,7 +134,7 @@
"stargazers_count": 995,
"watchers_count": 995,
"has_discussions": false,
"forks_count": 315,
"forks_count": 316,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -144,7 +144,7 @@
"poc"
],
"visibility": "public",
"forks": 315,
"forks": 316,
"watchers": 995,
"score": 0
},

View file

@ -71,10 +71,10 @@
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
"fork": false,
"created_at": "2021-03-05T08:22:07Z",
"updated_at": "2022-09-06T16:33:10Z",
"updated_at": "2022-11-21T14:55:27Z",
"pushed_at": "2021-03-16T08:34:14Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 96,
"watchers": 97,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 227,
"watchers_count": 227,
"has_discussions": false,
"forks_count": 66,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 66,
"forks": 65,
"watchers": 227,
"score": 0
},

View file

@ -1039,10 +1039,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-11-21T03:26:52Z",
"updated_at": "2022-11-21T12:35:26Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 550,
"watchers_count": 550,
"stargazers_count": 551,
"watchers_count": 551,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@ -1051,7 +1051,7 @@
"topics": [],
"visibility": "public",
"forks": 152,
"watchers": 550,
"watchers": 551,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
"updated_at": "2022-11-11T02:29:04Z",
"updated_at": "2022-11-21T16:43:23Z",
"pushed_at": "2022-01-16T02:09:46Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 191,
"watchers": 192,
"score": 0
},
{

View file

@ -409,10 +409,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2022-11-02T14:36:48Z",
"updated_at": "2022-11-21T15:34:17Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -430,7 +430,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 57,
"watchers": 58,
"score": 0
},
{
@ -1302,8 +1302,8 @@
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49",
"fork": false,
"created_at": "2022-11-18T12:23:04Z",
"updated_at": "2022-11-21T09:02:13Z",
"pushed_at": "2022-11-18T18:04:17Z",
"updated_at": "2022-11-21T16:25:14Z",
"pushed_at": "2022-11-21T16:20:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -1315,6 +1315,7 @@
"apache",
"cve",
"cve-2021-41773",
"docker",
"http-server",
"lfi",
"vulnerability"

View file

@ -470,8 +470,8 @@
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50",
"fork": false,
"created_at": "2022-11-18T17:53:46Z",
"updated_at": "2022-11-21T09:01:11Z",
"pushed_at": "2022-11-18T18:03:19Z",
"updated_at": "2022-11-21T17:11:21Z",
"pushed_at": "2022-11-21T17:10:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -483,6 +483,7 @@
"apache",
"cve",
"cve-2021-42013",
"docker",
"http-server",
"lfi",
"rce",

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-11-17T07:44:37Z",
"updated_at": "2022-11-21T15:21:26Z",
"pushed_at": "2022-09-01T21:30:25Z",
"stargazers_count": 471,
"watchers_count": 471,
"stargazers_count": 472,
"watchers_count": 472,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 471,
"watchers": 472,
"score": 0
},
{

View file

@ -340,12 +340,12 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-11-21T09:16:10Z",
"updated_at": "2022-11-21T12:38:16Z",
"pushed_at": "2022-09-21T07:49:03Z",
"stargazers_count": 1502,
"watchers_count": 1502,
"stargazers_count": 1503,
"watchers_count": 1503,
"has_discussions": false,
"forks_count": 430,
"forks_count": 431,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -356,8 +356,8 @@
"security"
],
"visibility": "public",
"forks": 430,
"watchers": 1502,
"forks": 431,
"watchers": 1503,
"score": 0
},
{
@ -1178,19 +1178,19 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-11-18T06:11:50Z",
"updated_at": "2022-11-21T13:25:26Z",
"pushed_at": "2022-10-20T15:37:44Z",
"stargazers_count": 3111,
"watchers_count": 3111,
"stargazers_count": 3112,
"watchers_count": 3112,
"has_discussions": true,
"forks_count": 732,
"forks_count": 731,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 732,
"watchers": 3111,
"forks": 731,
"watchers": 3112,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-11-21T11:01:10Z",
"updated_at": "2022-11-21T13:58:54Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 656,
"watchers_count": 656,
"stargazers_count": 657,
"watchers_count": 657,
"has_discussions": false,
"forks_count": 142,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 142,
"watchers": 656,
"watchers": 657,
"score": 0
}
]

View file

@ -712,10 +712,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-21T09:40:10Z",
"updated_at": "2022-11-21T13:55:27Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -731,7 +731,7 @@
],
"visibility": "public",
"forks": 68,
"watchers": 629,
"watchers": 630,
"score": 0
},
{

View file

@ -109,13 +109,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 2,
"watchers": 1,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-11-18T20:17:01Z",
"updated_at": "2022-11-21T17:11:32Z",
"pushed_at": "2022-10-27T16:35:08Z",
"stargazers_count": 371,
"watchers_count": 371,
"stargazers_count": 372,
"watchers_count": 372,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 371,
"watchers": 372,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-11-21T05:01:31Z",
"updated_at": "2022-11-21T14:10:20Z",
"pushed_at": "2022-11-06T09:44:23Z",
"stargazers_count": 864,
"watchers_count": 864,
"stargazers_count": 865,
"watchers_count": 865,
"has_discussions": true,
"forks_count": 157,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 157,
"watchers": 864,
"watchers": 865,
"score": 0
},
{

View file

@ -643,5 +643,34 @@
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 568830815,
"name": "CVE-2022-29464-",
"full_name": "Jhonsonwannaa\/CVE-2022-29464-",
"owner": {
"login": "Jhonsonwannaa",
"id": 114837630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
},
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2022-29464-",
"description": null,
"fork": false,
"created_at": "2022-11-21T13:57:53Z",
"updated_at": "2022-11-21T13:58:32Z",
"pushed_at": "2022-11-21T13:58:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 306,
"watchers_count": 306,
"has_discussions": false,
"forks_count": 51,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 51,
"forks": 52,
"watchers": 306,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-11-20T12:51:08Z",
"updated_at": "2022-11-21T15:27:11Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 115,
"watchers": 527,
"watchers": 528,
"score": 0
},
{

View file

@ -935,5 +935,42 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 568929458,
"name": "Text4shell-exploit",
"full_name": "pwnb0y\/Text4shell-exploit",
"owner": {
"login": "pwnb0y",
"id": 96813659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96813659?v=4",
"html_url": "https:\/\/github.com\/pwnb0y"
},
"html_url": "https:\/\/github.com\/pwnb0y\/Text4shell-exploit",
"description": "Python Script to exploit RCE of CVE-2022-42889 ",
"fork": false,
"created_at": "2022-11-21T18:01:28Z",
"updated_at": "2022-11-21T18:21:17Z",
"pushed_at": "2022-11-21T18:17:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-common-text",
"cve-2022-42889",
"cve-2022-42889-expliot",
"java-vulnerability",
"rce",
"text4shell",
"text4shell-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2827,6 +2827,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
### CVE-2022-29548 (2022-04-20)
@ -4148,7 +4149,12 @@ OpenKM 6.3.11 allows stored XSS related to the javascript&amp;colon; substring i
- [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317)
### CVE-2022-40470
### CVE-2022-40470 (2022-11-21)
<code>
Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
</code>
- [RashidKhanPathan/CVE-2022-40470](https://github.com/RashidKhanPathan/CVE-2022-40470)
### CVE-2022-40471 (2022-10-31)
@ -4343,6 +4349,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d
- [sunnyvale-it/CVE-2022-42889-PoC](https://github.com/sunnyvale-it/CVE-2022-42889-PoC)
- [QAInsights/cve-2022-42889-jmeter](https://github.com/QAInsights/cve-2022-42889-jmeter)
- [adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889](https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889)
- [pwnb0y/Text4shell-exploit](https://github.com/pwnb0y/Text4shell-exploit)
### CVE-2022-42899 (2022-10-12)
@ -4360,7 +4367,12 @@ Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via
- [ProxyStaffy/Mediatrix-CVE-2022-43096](https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096)
### CVE-2022-43117
### CVE-2022-43117 (2022-11-21)
<code>
Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Name, Username, Description and Site Feature parameters.
</code>
- [RashidKhanPathan/CVE-2022-43117](https://github.com/RashidKhanPathan/CVE-2022-43117)
### CVE-2022-43144 (2022-11-08)
@ -4382,7 +4394,12 @@ A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers
### CVE-2022-43959
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
### CVE-2022-44830
### CVE-2022-44830 (2022-11-21)
<code>
Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file.
</code>
- [RashidKhanPathan/CVE-2022-44830](https://github.com/RashidKhanPathan/CVE-2022-44830)
@ -23462,6 +23479,7 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem
- [Invertebr4do/cve-2017-9841](https://github.com/Invertebr4do/cve-2017-9841)
- [yoloskr/CVE-2017-9841-Scan](https://github.com/yoloskr/CVE-2017-9841-Scan)
- [mileticluka1/eval-stdin](https://github.com/mileticluka1/eval-stdin)
- [Jhonsonwannaa/CVE-2017-9841-](https://github.com/Jhonsonwannaa/CVE-2017-9841-)
### CVE-2017-9934 (2017-07-17)