Auto Update 2023/01/08 18:29:08

This commit is contained in:
motikan2010-bot 2023-01-09 03:29:08 +09:00
parent d0cc5cc583
commit 90608a1599
28 changed files with 133 additions and 103 deletions

View file

@ -13,10 +13,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2022-12-09T06:53:33Z",
"updated_at": "2023-01-08T15:36:00Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 55,
"watchers": 56,
"score": 0
}
]

View file

@ -438,7 +438,7 @@
"stargazers_count": 698,
"watchers_count": 698,
"has_discussions": false,
"forks_count": 415,
"forks_count": 416,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -448,7 +448,7 @@
"exploit"
],
"visibility": "public",
"forks": 415,
"forks": 416,
"watchers": 698,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-01-06T06:19:15Z",
"updated_at": "2023-01-08T15:16:59Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3652,
"watchers_count": 3652,
"stargazers_count": 3653,
"watchers_count": 3653,
"has_discussions": false,
"forks_count": 1051,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1051,
"watchers": 3652,
"watchers": 3653,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 30,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"forks": 29,
"watchers": 173,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2023-01-05T16:19:36Z",
"updated_at": "2023-01-08T13:06:03Z",
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 662,
"watchers_count": 662,
"stargazers_count": 663,
"watchers_count": 663,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 662,
"watchers": 663,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-03-16T16:55:18Z",
"updated_at": "2022-04-03T03:13:00Z",
"pushed_at": "2022-04-03T03:13:45Z",
"pushed_at": "2023-01-08T17:11:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-01-06T06:19:15Z",
"updated_at": "2023-01-08T15:16:59Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3652,
"watchers_count": 3652,
"stargazers_count": 3653,
"watchers_count": 3653,
"has_discussions": false,
"forks_count": 1051,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1051,
"watchers": 3652,
"watchers": 3653,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2023-01-08T05:15:07Z",
"updated_at": "2023-01-08T17:17:43Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 309,
"watchers_count": 309,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -133,7 +133,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 308,
"watchers": 309,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 1648,
"watchers_count": 1648,
"has_discussions": false,
"forks_count": 582,
"forks_count": 583,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 582,
"forks": 583,
"watchers": 1648,
"score": 0
},

View file

@ -778,10 +778,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-01-08T11:15:50Z",
"updated_at": "2023-01-08T14:24:01Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 801,
"watchers_count": 801,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -797,7 +797,7 @@
],
"visibility": "public",
"forks": 87,
"watchers": 800,
"watchers": 801,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-01-03T21:19:42Z",
"updated_at": "2022-08-24T20:48:06Z",
"updated_at": "2023-01-08T15:44:11Z",
"pushed_at": "2022-05-24T07:48:39Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2022-11-25T12:38:02Z",
"updated_at": "2023-01-08T15:44:59Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 228,
"watchers": 229,
"score": 0
},
{

View file

@ -493,10 +493,10 @@
"description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)",
"fork": false,
"created_at": "2022-04-30T05:53:45Z",
"updated_at": "2022-11-19T21:34:32Z",
"updated_at": "2023-01-08T13:49:55Z",
"pushed_at": "2022-05-02T07:49:12Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -505,7 +505,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 3,
"score": 0
}

View file

@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-01-08T09:57:02Z",
"updated_at": "2023-01-08T14:41:08Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 712,
"watchers_count": 712,
"stargazers_count": 713,
"watchers_count": 713,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 147,
"watchers": 712,
"watchers": 713,
"score": 0
},
{

View file

@ -3614,10 +3614,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-01-06T05:58:41Z",
"updated_at": "2023-01-08T15:28:19Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3159,
"watchers_count": 3159,
"stargazers_count": 3158,
"watchers_count": 3158,
"has_discussions": true,
"forks_count": 739,
"allow_forking": true,
@ -3626,7 +3626,7 @@
"topics": [],
"visibility": "public",
"forks": 739,
"watchers": 3159,
"watchers": 3158,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2023-01-04T09:55:52Z",
"updated_at": "2023-01-08T14:04:01Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1003,
"watchers_count": 1003,
"stargazers_count": 1004,
"watchers_count": 1004,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1003,
"watchers": 1004,
"score": 0
},
{

View file

@ -123,5 +123,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 586568152,
"name": "CVE-2022-1040",
"full_name": "kevinsmith96\/CVE-2022-1040",
"owner": {
"login": "kevinsmith96",
"id": 113975732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
"html_url": "https:\/\/github.com\/kevinsmith96"
},
"html_url": "https:\/\/github.com\/kevinsmith96\/CVE-2022-1040",
"description": "Sophos EXploit",
"fork": false,
"created_at": "2023-01-08T15:46:00Z",
"updated_at": "2023-01-08T15:46:00Z",
"pushed_at": "2023-01-08T15:48:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -680,10 +680,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-01-08T11:15:50Z",
"updated_at": "2023-01-08T14:24:01Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 801,
"watchers_count": 801,
"has_discussions": false,
"forks_count": 87,
"allow_forking": true,
@ -699,7 +699,7 @@
],
"visibility": "public",
"forks": 87,
"watchers": 800,
"watchers": 801,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2023-01-07T12:45:44Z",
"updated_at": "2023-01-08T18:25:46Z",
"pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 310,
"watchers_count": 310,
"stargazers_count": 311,
"watchers_count": 311,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 103,
"watchers": 310,
"watchers": 311,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "SQL Injection Vulnerability on PhpIPAM v1.4.4",
"fork": false,
"created_at": "2022-02-15T00:00:22Z",
"updated_at": "2022-02-15T07:12:02Z",
"updated_at": "2023-01-08T14:52:29Z",
"pushed_at": "2022-02-15T00:25:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 403,
"watchers_count": 403,
"has_discussions": false,
"forks_count": 54,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"forks": 55,
"watchers": 403,
"score": 0
},

View file

@ -863,13 +863,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Case for CVE-2022-30778",
"fork": false,
"created_at": "2022-05-23T07:04:54Z",
"updated_at": "2022-10-13T20:15:13Z",
"updated_at": "2023-01-08T16:46:42Z",
"pushed_at": "2022-08-23T01:11:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 23,
"score": 0
}
]

View file

@ -134,7 +134,7 @@
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -152,7 +152,7 @@
"ssrf"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 72,
"score": 0
},
@ -233,13 +233,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 28,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-05T17:29:10Z",
"updated_at": "2023-01-08T12:00:26Z",
"updated_at": "2023-01-08T14:25:26Z",
"pushed_at": "2023-01-05T17:40:18Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 58,
"watchers": 60,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-01-08T00:33:43Z",
"updated_at": "2023-01-08T15:54:31Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 220,
"watchers_count": 220,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 217,
"forks": 18,
"watchers": 220,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-01-08T12:33:48Z",
"updated_at": "2023-01-08T15:03:30Z",
"pushed_at": "2023-01-06T06:31:57Z",
"stargazers_count": 580,
"watchers_count": 580,
"stargazers_count": 581,
"watchers_count": 581,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 580,
"watchers": 581,
"score": 0
},
{
@ -158,10 +158,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-04T05:08:20Z",
"updated_at": "2023-01-07T13:58:44Z",
"updated_at": "2023-01-08T14:50:51Z",
"pushed_at": "2023-01-04T05:32:52Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 25,
"watchers": 26,
"score": 0
},
{
@ -187,10 +187,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
"updated_at": "2023-01-08T12:13:59Z",
"updated_at": "2023-01-08T15:10:37Z",
"pushed_at": "2023-01-06T09:22:51Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -201,7 +201,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -338,6 +338,7 @@ An authentication bypass vulnerability in the User Portal and Webadmin allows a
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
- [kevinsmith96/CVE-2022-1040](https://github.com/kevinsmith96/CVE-2022-1040)
### CVE-2022-1051 (2022-05-16)