Auto Update 2022/07/18 12:18:53

This commit is contained in:
motikan2010-bot 2022-07-18 21:18:53 +09:00
parent ff0cb3c3e7
commit 9be06f40d0
61 changed files with 474 additions and 322 deletions

View file

@ -75,13 +75,13 @@
"pushed_at": "2022-07-08T09:14:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-18T06:04:07Z",
"updated_at": "2022-07-18T06:51:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1422,
"watchers_count": 1422,
"stargazers_count": 1423,
"watchers_count": 1423,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1422,
"watchers": 1423,
"score": 0
},
{

View file

@ -755,6 +755,34 @@
"watchers": 1,
"score": 0
},
{
"id": 24589519,
"name": "RIS",
"full_name": "sch3m4\/RIS",
"owner": {
"login": "sch3m4",
"id": 607081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/607081?v=4",
"html_url": "https:\/\/github.com\/sch3m4"
},
"html_url": "https:\/\/github.com\/sch3m4\/RIS",
"description": "CVE-2014-6271 Remote Interactive Shell - PoC Exploit",
"fork": false,
"created_at": "2014-09-29T10:06:18Z",
"updated_at": "2019-08-13T15:51:47Z",
"pushed_at": "2014-09-29T10:09:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 24595830,
"name": "CVE-2014-6271_Test",

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-18T06:04:07Z",
"updated_at": "2022-07-18T06:51:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1422,
"watchers_count": 1422,
"stargazers_count": 1423,
"watchers_count": 1423,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1422,
"watchers": 1423,
"score": 0
},
{

View file

@ -44,10 +44,10 @@
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
"fork": false,
"created_at": "2020-04-07T00:46:19Z",
"updated_at": "2022-06-10T03:26:43Z",
"updated_at": "2022-07-18T06:29:54Z",
"pushed_at": "2020-04-12T19:46:40Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Demo-ing CVE-2017-1000253 in a container",
"fork": false,
"created_at": "2018-06-18T15:22:01Z",
"updated_at": "2022-04-14T07:29:48Z",
"updated_at": "2022-07-18T11:45:10Z",
"pushed_at": "2017-11-01T07:59:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2022-07-04T16:25:56Z",
"updated_at": "2022-07-18T11:46:53Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 492,
"watchers_count": 492,
"stargazers_count": 491,
"watchers_count": 491,
"forks_count": 197,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 197,
"watchers": 492,
"watchers": 491,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-18T06:04:07Z",
"updated_at": "2022-07-18T06:51:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1422,
"watchers_count": 1422,
"stargazers_count": 1423,
"watchers_count": 1423,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1422,
"watchers": 1423,
"score": 0
},
{

View file

@ -329,10 +329,10 @@
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
"fork": false,
"created_at": "2022-05-31T15:31:37Z",
"updated_at": "2022-07-12T11:49:18Z",
"updated_at": "2022-07-18T09:34:00Z",
"pushed_at": "2022-06-01T20:45:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -345,7 +345,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.",
"fork": false,
"created_at": "2019-01-26T03:41:24Z",
"updated_at": "2022-06-19T14:31:20Z",
"updated_at": "2022-07-18T08:25:41Z",
"pushed_at": "2019-01-26T03:49:09Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 48,
"watchers": 47,
"score": 0
},
{

View file

@ -237,18 +237,18 @@
"description": null,
"fork": false,
"created_at": "2018-04-20T01:24:17Z",
"updated_at": "2019-06-12T09:17:11Z",
"updated_at": "2022-07-18T10:31:35Z",
"pushed_at": "2018-04-20T01:24:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
@ -381,18 +381,18 @@
"description": "Weblogic 反序列化漏洞(CVE-2018-2628)",
"fork": false,
"created_at": "2018-06-05T11:00:40Z",
"updated_at": "2022-07-17T03:57:55Z",
"updated_at": "2022-07-18T10:25:43Z",
"pushed_at": "2019-09-30T01:18:02Z",
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 40,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 95,
"forks": 39,
"watchers": 96,
"score": 0
},
{
@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-18T06:04:07Z",
"updated_at": "2022-07-18T06:51:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1422,
"watchers_count": 1422,
"stargazers_count": 1423,
"watchers_count": 1423,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1422,
"watchers": 1423,
"score": 0
},
{

View file

@ -125,18 +125,18 @@
"description": "可以直接反弹shell",
"fork": false,
"created_at": "2018-07-26T07:16:38Z",
"updated_at": "2022-06-13T07:35:43Z",
"updated_at": "2022-07-18T10:28:32Z",
"pushed_at": "2018-07-26T07:50:15Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 14,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 44,
"forks": 13,
"watchers": 45,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2022-07-08T11:25:39Z",
"updated_at": "2022-07-18T06:31:08Z",
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 165,
"watchers": 166,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2018-09-11T04:40:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-8174 - VBScript memory corruption exploit.",
"fork": false,
"created_at": "2018-05-22T21:50:32Z",
"updated_at": "2022-06-14T13:06:11Z",
"updated_at": "2022-07-18T08:25:41Z",
"pushed_at": "2018-05-23T20:43:58Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 168,
"watchers": 167,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Apache Solr DataImport Handler RCE",
"fork": false,
"created_at": "2019-08-09T06:27:39Z",
"updated_at": "2022-07-14T01:42:34Z",
"updated_at": "2022-07-18T11:50:41Z",
"pushed_at": "2019-08-12T02:23:38Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -1766,18 +1766,18 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2022-07-18T01:12:23Z",
"updated_at": "2022-07-18T10:13:53Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1110,
"watchers_count": 1110,
"forks_count": 356,
"stargazers_count": 1111,
"watchers_count": 1111,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 356,
"watchers": 1110,
"forks": 355,
"watchers": 1111,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2022-07-17T19:06:06Z",
"updated_at": "2022-07-18T06:27:47Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 288,
"watchers": 289,
"score": 0
},
{

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-18T04:33:20Z",
"updated_at": "2022-07-18T08:51:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3433,
"watchers_count": 3433,
"forks_count": 1021,
"stargazers_count": 3434,
"watchers_count": 3434,
"forks_count": 1020,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell"
],
"visibility": "public",
"forks": 1021,
"watchers": 3433,
"forks": 1020,
"watchers": 3434,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-18T06:04:07Z",
"updated_at": "2022-07-18T06:51:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1422,
"watchers_count": 1422,
"stargazers_count": 1423,
"watchers_count": 1423,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1422,
"watchers": 1423,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.",
"fork": false,
"created_at": "2020-12-01T13:49:26Z",
"updated_at": "2022-06-15T19:58:20Z",
"updated_at": "2022-07-18T08:29:54Z",
"pushed_at": "2020-12-07T00:12:21Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 31,
"watchers": 32,
"score": 0
},
{
@ -47,10 +47,10 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2022-06-25T09:40:30Z",
"updated_at": "2022-07-18T08:29:51Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2022-07-15T09:27:13Z",
"updated_at": "2022-07-18T07:01:19Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 594,
"watchers_count": 594,
"stargazers_count": 593,
"watchers_count": 593,
"forks_count": 160,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 160,
"watchers": 594,
"watchers": 593,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2022-07-03T15:31:25Z",
"updated_at": "2022-07-18T07:20:27Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 616,
"watchers_count": 616,
"stargazers_count": 617,
"watchers_count": 617,
"forks_count": 203,
"allow_forking": true,
"is_template": false,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 203,
"watchers": 616,
"watchers": 617,
"score": 0
},
{
@ -1054,10 +1054,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2022-07-13T02:42:57Z",
"updated_at": "2022-07-18T07:17:08Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1204,
"watchers_count": 1204,
"stargazers_count": 1205,
"watchers_count": 1205,
"forks_count": 373,
"allow_forking": true,
"is_template": false,
@ -1071,7 +1071,7 @@
],
"visibility": "public",
"forks": 373,
"watchers": 1204,
"watchers": 1205,
"score": 0
},
{
@ -1638,18 +1638,18 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2022-07-11T13:16:54Z",
"updated_at": "2022-07-18T10:05:59Z",
"pushed_at": "2022-03-30T14:02:04Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 44,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 182,
"forks": 43,
"watchers": 183,
"score": 0
},
{
@ -1783,10 +1783,10 @@
"description": null,
"fork": false,
"created_at": "2020-09-17T01:48:37Z",
"updated_at": "2022-06-10T04:53:58Z",
"updated_at": "2022-07-18T09:27:36Z",
"pushed_at": "2020-09-17T01:55:48Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -1794,7 +1794,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2022-06-18T00:42:35Z",
"updated_at": "2022-07-18T07:16:18Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 384,
"watchers_count": 384,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 385,
"watchers": 384,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2022-07-12T11:50:07Z",
"updated_at": "2022-07-18T09:34:18Z",
"pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -164,13 +164,13 @@
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 439,
"watchers_count": 439,
"forks_count": 127,
"forks_count": 128,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 127,
"forks": 128,
"watchers": 439,
"score": 0
},
@ -1428,10 +1428,10 @@
"description": "Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.",
"fork": false,
"created_at": "2021-06-23T12:23:48Z",
"updated_at": "2022-07-09T12:44:04Z",
"updated_at": "2022-07-18T09:53:08Z",
"pushed_at": "2022-04-09T12:01:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -1448,7 +1448,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -1633,10 +1633,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2022-06-23T07:18:17Z",
"updated_at": "2022-07-04T13:52:48Z",
"updated_at": "2022-07-18T08:43:42Z",
"pushed_at": "2022-07-05T09:50:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1644,7 +1644,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-18T04:33:20Z",
"updated_at": "2022-07-18T08:51:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3433,
"watchers_count": 3433,
"forks_count": 1021,
"stargazers_count": 3434,
"watchers_count": 3434,
"forks_count": 1020,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell"
],
"visibility": "public",
"forks": 1021,
"watchers": 3433,
"forks": 1020,
"watchers": 3434,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2022-07-10T22:30:41Z",
"updated_at": "2022-07-18T11:37:15Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 330,
"watchers": 331,
"score": 0
}
]

View file

@ -340,10 +340,10 @@
"description": null,
"fork": false,
"created_at": "2020-10-17T13:52:08Z",
"updated_at": "2021-11-15T06:46:32Z",
"updated_at": "2022-07-18T09:15:16Z",
"pushed_at": "2020-10-17T13:52:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -351,7 +351,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2022-06-16T11:16:07Z",
"updated_at": "2022-07-18T08:25:42Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 132,
"watchers": 131,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-07-18T06:04:07Z",
"updated_at": "2022-07-18T06:51:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1422,
"watchers_count": 1422,
"stargazers_count": 1423,
"watchers_count": 1423,
"forks_count": 298,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 298,
"watchers": 1422,
"watchers": 1423,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "ThinkAdmin CVE-2020-25540 POC",
"fork": false,
"created_at": "2022-03-09T13:08:31Z",
"updated_at": "2022-03-12T03:50:25Z",
"updated_at": "2022-07-18T11:36:45Z",
"pushed_at": "2022-03-09T13:10:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.",
"fork": false,
"created_at": "2020-12-01T13:49:26Z",
"updated_at": "2022-06-15T19:58:20Z",
"updated_at": "2022-07-18T08:29:54Z",
"pushed_at": "2020-12-07T00:12:21Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 31,
"watchers": 32,
"score": 0
},
{
@ -47,10 +47,10 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2022-06-25T09:40:30Z",
"updated_at": "2022-07-18T08:29:51Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

30
2021/CVE-2021-20138.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 515147295,
"name": "frameworks_base_AOSP10_r33_CVE-2021-20138",
"full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-20138",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-20138",
"description": null,
"fork": false,
"created_at": "2022-07-18T11:01:39Z",
"updated_at": "2022-07-18T11:20:13Z",
"pushed_at": "2022-07-18T11:34:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "VMware vCenter Server任意文件上传漏洞 \/ Code By:Jun_sheng",
"fork": false,
"created_at": "2021-10-27T08:36:21Z",
"updated_at": "2022-07-18T03:28:31Z",
"updated_at": "2022-07-18T07:48:24Z",
"pushed_at": "2022-07-08T09:17:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2022-07-17T06:40:59Z",
"updated_at": "2022-07-18T10:50:11Z",
"pushed_at": "2022-07-01T00:33:57Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -55,7 +55,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -384,10 +384,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2022-07-07T12:20:02Z",
"updated_at": "2022-07-18T11:41:52Z",
"pushed_at": "2022-04-14T11:51:18Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 429,
"watchers_count": 429,
"forks_count": 120,
"allow_forking": true,
"is_template": false,
@ -395,7 +395,7 @@
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 430,
"watchers": 429,
"score": 0
},
{

30
2021/CVE-2021-36955.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 515072694,
"name": "CVE-2021-36955-EXP",
"full_name": "JiaJinRong12138\/CVE-2021-36955-EXP",
"owner": {
"login": "JiaJinRong12138",
"id": 45488822,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45488822?v=4",
"html_url": "https:\/\/github.com\/JiaJinRong12138"
},
"html_url": "https:\/\/github.com\/JiaJinRong12138\/CVE-2021-36955-EXP",
"description": "CVE-2021-36955",
"fork": false,
"created_at": "2022-07-18T07:08:56Z",
"updated_at": "2022-07-18T07:12:50Z",
"pushed_at": "2022-07-18T07:12:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-07-12T14:22:33Z",
"updated_at": "2022-07-18T10:59:23Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 138,
"watchers_count": 138,

View file

@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-07-18T04:55:20Z",
"updated_at": "2022-07-18T11:00:37Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1609,
"watchers_count": 1609,
"stargazers_count": 1610,
"watchers_count": 1610,
"forks_count": 472,
"allow_forking": true,
"is_template": false,
@ -86,7 +86,7 @@
"topics": [],
"visibility": "public",
"forks": 472,
"watchers": 1609,
"watchers": 1610,
"score": 0
},
{
@ -163,7 +163,7 @@
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 884,
"watchers_count": 884,
"forks_count": 287,
"forks_count": 288,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -173,7 +173,7 @@
"poc"
],
"visibility": "public",
"forks": 287,
"forks": 288,
"watchers": 884,
"score": 0
},
@ -275,10 +275,10 @@
"description": "PoC for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T02:02:25Z",
"updated_at": "2022-07-10T12:26:09Z",
"updated_at": "2022-07-18T07:45:05Z",
"pushed_at": "2022-01-26T02:27:53Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
@ -286,7 +286,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 54,
"watchers": 55,
"score": 0
},
{

View file

@ -737,10 +737,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-07-18T03:25:34Z",
"updated_at": "2022-07-18T08:41:17Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 435,
"watchers_count": 435,
"stargazers_count": 437,
"watchers_count": 437,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -753,7 +753,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 435,
"watchers": 437,
"score": 0
},
{
@ -2169,34 +2169,6 @@
"watchers": 1,
"score": 0
},
{
"id": 437795998,
"name": "Log4j-CVE-2021-44228",
"full_name": "JiuBanSec\/Log4j-CVE-2021-44228",
"owner": {
"login": "JiuBanSec",
"id": 57030243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57030243?v=4",
"html_url": "https:\/\/github.com\/JiuBanSec"
},
"html_url": "https:\/\/github.com\/JiuBanSec\/Log4j-CVE-2021-44228",
"description": "Log4j Remote Code Injection (Apache Log4j 2.x < 2.15.0-rc2)",
"fork": false,
"created_at": "2021-12-13T08:40:13Z",
"updated_at": "2021-12-13T10:29:05Z",
"pushed_at": "2021-12-13T12:01:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437797086,
"name": "Log4Shell-CVE-2021-44228-ENV",
@ -2309,34 +2281,6 @@
"watchers": 0,
"score": 0
},
{
"id": 437838249,
"name": "log4jScan",
"full_name": "sinakeshmiri\/log4jScan",
"owner": {
"login": "sinakeshmiri",
"id": 72389059,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72389059?v=4",
"html_url": "https:\/\/github.com\/sinakeshmiri"
},
"html_url": "https:\/\/github.com\/sinakeshmiri\/log4jScan",
"description": "simple python scanner to check if your network is vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T10:59:50Z",
"updated_at": "2021-12-16T15:08:45Z",
"pushed_at": "2021-12-13T12:16:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 437840280,
"name": "Log4J-Scanner",

View file

@ -1868,10 +1868,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-06-29T12:02:13Z",
"updated_at": "2022-06-30T02:19:17Z",
"updated_at": "2022-07-18T08:37:07Z",
"pushed_at": "2022-07-18T05:21:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -1879,7 +1879,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -26,5 +26,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 515158255,
"name": "ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138",
"full_name": "ShaikUsaf\/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138",
"description": null,
"fork": false,
"created_at": "2022-07-18T11:36:28Z",
"updated_at": "2022-07-18T11:38:43Z",
"pushed_at": "2022-07-18T11:39:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-07-15T14:14:46Z",
"updated_at": "2022-07-18T11:39:12Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 235,
"watchers": 234,
"score": 0
},
{

30
2022/CVE-2022-22029.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 515059719,
"name": "CVE-2022-22029-NFS-Server-",
"full_name": "mchoudhary15\/CVE-2022-22029-NFS-Server-",
"owner": {
"login": "mchoudhary15",
"id": 105639627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105639627?v=4",
"html_url": "https:\/\/github.com\/mchoudhary15"
},
"html_url": "https:\/\/github.com\/mchoudhary15\/CVE-2022-22029-NFS-Server-",
"description": null,
"fork": false,
"created_at": "2022-07-18T06:23:53Z",
"updated_at": "2022-07-18T08:21:24Z",
"pushed_at": "2022-07-18T06:28:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -44,10 +44,10 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-07-13T19:46:57Z",
"updated_at": "2022-07-18T08:11:31Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 270,
"watchers": 271,
"score": 0
},
{

View file

@ -122,10 +122,10 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-07-04T07:52:09Z",
"updated_at": "2022-07-18T09:02:47Z",
"pushed_at": "2022-06-10T17:34:08Z",
"stargazers_count": 260,
"watchers_count": 260,
"stargazers_count": 259,
"watchers_count": 259,
"forks_count": 204,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
"topics": [],
"visibility": "public",
"forks": 204,
"watchers": 260,
"watchers": 259,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-24T20:19:55Z",
"updated_at": "2022-07-12T15:21:30Z",
"updated_at": "2022-07-18T08:23:48Z",
"pushed_at": "2022-05-26T16:07:18Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 128,
"watchers": 130,
"score": 0
},
{

30
2022/CVE-2022-23614.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 515132707,
"name": "CVE-2022-23614",
"full_name": "davwwwx\/CVE-2022-23614",
"owner": {
"login": "davwwwx",
"id": 26136505,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26136505?v=4",
"html_url": "https:\/\/github.com\/davwwwx"
},
"html_url": "https:\/\/github.com\/davwwwx\/CVE-2022-23614",
"description": "PoC for CVE-2022-23614 (Twig sort filter code execution)",
"fork": false,
"created_at": "2022-07-18T10:14:50Z",
"updated_at": "2022-07-18T10:14:50Z",
"pushed_at": "2022-07-18T10:14:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Apache CouchDB 3.2.1 - Remote Code Execution (RCE)",
"fork": false,
"created_at": "2022-05-20T04:28:51Z",
"updated_at": "2022-05-31T02:25:10Z",
"updated_at": "2022-07-18T09:30:49Z",
"pushed_at": "2022-05-20T04:32:13Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Fastjson exploit",
"fork": false,
"created_at": "2022-07-09T21:56:10Z",
"updated_at": "2022-07-10T08:45:53Z",
"updated_at": "2022-07-18T12:00:48Z",
"pushed_at": "2022-07-09T22:07:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-07-15T02:05:02Z",
"updated_at": "2022-07-18T06:39:31Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-07-18T05:39:53Z",
"pushed_at": "2022-07-17T10:46:45Z",
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 58,
"updated_at": "2022-07-18T11:53:19Z",
"pushed_at": "2022-07-18T10:00:53Z",
"stargazers_count": 321,
"watchers_count": 321,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"nday"
],
"visibility": "public",
"forks": 58,
"watchers": 293,
"forks": 66,
"watchers": 321,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)",
"fork": false,
"created_at": "2022-06-24T07:55:52Z",
"updated_at": "2022-07-16T13:12:54Z",
"updated_at": "2022-07-18T10:50:05Z",
"pushed_at": "2022-07-05T21:13:44Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-05-17T16:53:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "SQL injection in QuerySet.annotate(), aggregate(), and extra()",
"fork": false,
"created_at": "2022-04-25T08:27:34Z",
"updated_at": "2022-07-06T02:49:01Z",
"updated_at": "2022-07-18T08:26:27Z",
"pushed_at": "2022-04-25T11:18:12Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-07-17T15:29:58Z",
"updated_at": "2022-07-18T08:17:15Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 291,
"watchers": 292,
"score": 0
},
{
@ -75,13 +75,13 @@
"pushed_at": "2022-04-26T08:36:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 2,
"score": 0
},
@ -335,10 +335,10 @@
"description": "A bots loader for CVE-2022-29464 with multithreading",
"fork": false,
"created_at": "2022-05-15T08:51:16Z",
"updated_at": "2022-07-10T14:13:04Z",
"updated_at": "2022-07-18T07:43:46Z",
"pushed_at": "2022-06-17T18:41:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -354,7 +354,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-03-04T12:03:33Z",
"updated_at": "2022-07-18T05:25:12Z",
"pushed_at": "2022-07-13T12:16:08Z",
"pushed_at": "2022-07-18T11:36:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,

View file

@ -772,10 +772,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-07-16T12:32:30Z",
"updated_at": "2022-07-18T10:27:59Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
@ -783,7 +783,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 308,
"watchers": 310,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-30780 - lighttpd remote denial of service",
"fork": false,
"created_at": "2022-05-18T12:01:17Z",
"updated_at": "2022-07-12T11:49:10Z",
"updated_at": "2022-07-18T09:33:58Z",
"pushed_at": "2022-06-16T09:29:27Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -535,6 +535,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there
</code>
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20138](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20138)
- [ShaikUsaf/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138](https://github.com/ShaikUsaf/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138)
### CVE-2022-20142 (2022-06-15)
@ -692,6 +693,14 @@ Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is uniqu
- [ly4k/SpoolFool](https://github.com/ly4k/SpoolFool)
### CVE-2022-22029 (2022-07-12)
<code>
Windows Network File System Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22039.
</code>
- [mchoudhary15/CVE-2022-22029-NFS-Server-](https://github.com/mchoudhary15/CVE-2022-22029-NFS-Server-)
### CVE-2022-22296 (2022-01-24)
<code>
@ -1149,6 +1158,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
### CVE-2022-23614 (2022-02-04)
<code>
Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade.
</code>
- [davwwwx/CVE-2022-23614](https://github.com/davwwwx/CVE-2022-23614)
### CVE-2022-23642 (2022-02-18)
<code>
@ -3994,6 +4011,14 @@ A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_
- [jbaines-r7/badblood](https://github.com/jbaines-r7/badblood)
### CVE-2021-20138 (2021-12-09)
<code>
An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower routers web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.
</code>
- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138)
### CVE-2021-20717 (2021-05-10)
<code>
@ -5743,6 +5768,14 @@ Windows Elevation of Privilege Vulnerability
- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal)
### CVE-2021-36955 (2021-09-15)
<code>
Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36963, CVE-2021-38633.
</code>
- [JiaJinRong12138/CVE-2021-36955-EXP](https://github.com/JiaJinRong12138/CVE-2021-36955-EXP)
### CVE-2021-37740 (2022-04-20)
<code>
@ -6638,12 +6671,10 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
- [avwolferen/Sitecore.Solr-log4j-mitigation](https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation)
- [kek-Sec/log4j-scanner-CVE-2021-44228](https://github.com/kek-Sec/log4j-scanner-CVE-2021-44228)
- [Camphul/log4shell-spring-framework-research](https://github.com/Camphul/log4shell-spring-framework-research)
- [sinakeshmiri/log4jScan](https://github.com/sinakeshmiri/log4jScan)
- [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner)
- [LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228)
- [0xsyr0/Log4Shell](https://github.com/0xsyr0/Log4Shell)
@ -25233,6 +25264,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- [u20024804/bash-4.3-fixed-CVE-2014-6271](https://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271)
- [francisck/shellshock-cgi](https://github.com/francisck/shellshock-cgi)
- [proclnas/ShellShock-CGI-Scan](https://github.com/proclnas/ShellShock-CGI-Scan)
- [sch3m4/RIS](https://github.com/sch3m4/RIS)
- [ryeyao/CVE-2014-6271_Test](https://github.com/ryeyao/CVE-2014-6271_Test)
- [cj1324/CGIShell](https://github.com/cj1324/CGIShell)
- [renanvicente/puppet-shellshock](https://github.com/renanvicente/puppet-shellshock)