Auto Update 2022/05/19 18:18:04

This commit is contained in:
motikan2010-bot 2022-05-20 03:18:04 +09:00
parent 5a868c79a4
commit 9be72ffe65
40 changed files with 271 additions and 267 deletions

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-19T01:28:36Z",
"updated_at": "2022-05-19T14:30:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1361,
"watchers_count": 1361,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1360,
"watchers": 1361,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-19T01:28:36Z",
"updated_at": "2022-05-19T14:30:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1361,
"watchers_count": 1361,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1360,
"watchers": 1361,
"score": 0
},
{

View file

@ -1058,14 +1058,14 @@
{
"id": 467215742,
"name": "CVE-2022-0847",
"full_name": "imfiver\/CVE-2022-0847",
"full_name": "r1is\/CVE-2022-0847",
"owner": {
"login": "imfiver",
"login": "r1is",
"id": 21257485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21257485?v=4",
"html_url": "https:\/\/github.com\/imfiver"
"html_url": "https:\/\/github.com\/r1is"
},
"html_url": "https:\/\/github.com\/imfiver\/CVE-2022-0847",
"html_url": "https:\/\/github.com\/r1is\/CVE-2022-0847",
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
@ -1206,17 +1206,17 @@
"description": "The Repository contains documents that explains the explotation of CVE-2016-5195",
"fork": false,
"created_at": "2022-05-18T10:51:23Z",
"updated_at": "2022-05-18T10:51:23Z",
"updated_at": "2022-05-19T17:50:11Z",
"pushed_at": "2022-05-18T10:54:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
"fork": false,
"created_at": "2016-09-16T07:34:50Z",
"updated_at": "2022-04-11T00:32:01Z",
"updated_at": "2022-05-19T14:33:31Z",
"pushed_at": "2016-09-18T06:55:38Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 83,
"watchers": 82,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2018-09-03T03:11:24Z",
"updated_at": "2022-01-28T22:37:16Z",
"updated_at": "2022-05-19T15:49:08Z",
"pushed_at": "2021-05-18T16:24:42Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-19T01:28:36Z",
"updated_at": "2022-05-19T14:30:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1361,
"watchers_count": 1361,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1360,
"watchers": 1361,
"score": 0
},
{

View file

@ -202,17 +202,17 @@
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
"fork": false,
"created_at": "2021-01-19T07:12:10Z",
"updated_at": "2021-11-08T18:25:30Z",
"updated_at": "2022-05-19T15:41:06Z",
"pushed_at": "2021-01-19T07:17:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2018-14714 PoC RCE",
"fork": false,
"created_at": "2022-04-20T20:12:36Z",
"updated_at": "2022-05-08T14:34:12Z",
"updated_at": "2022-05-19T14:41:20Z",
"pushed_at": "2022-04-20T20:13:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-19T01:28:36Z",
"updated_at": "2022-05-19T14:30:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1361,
"watchers_count": 1361,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1360,
"watchers": 1361,
"score": 0
},
{

View file

@ -2861,17 +2861,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2022-05-18T05:30:24Z",
"updated_at": "2022-05-19T14:21:03Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 262,
"watchers_count": 262,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 261,
"watchers": 262,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2022-05-13T14:35:59Z",
"updated_at": "2022-05-19T14:36:41Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 284,
"watchers_count": 284,
"stargazers_count": 283,
"watchers_count": 283,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 284,
"watchers": 283,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-05-19T08:10:24Z",
"updated_at": "2022-05-19T14:37:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3319,
"watchers_count": 3319,
"stargazers_count": 3318,
"watchers_count": 3318,
"forks_count": 997,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 997,
"watchers": 3319,
"watchers": 3318,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Heap buffer overflow in GNOME gThumb and Linux Mint Pix",
"fork": false,
"created_at": "2020-01-03T01:39:03Z",
"updated_at": "2020-03-14T14:17:48Z",
"updated_at": "2022-05-19T15:29:12Z",
"pushed_at": "2020-01-25T18:36:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-19T01:28:36Z",
"updated_at": "2022-05-19T14:30:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1361,
"watchers_count": 1361,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1360,
"watchers": 1361,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-05-17T14:05:41Z",
"updated_at": "2022-05-19T18:05:13Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 929,
"watchers_count": 929,
"stargazers_count": 930,
"watchers_count": 930,
"forks_count": 261,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 261,
"watchers": 929,
"watchers": 930,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-05-19T08:10:24Z",
"updated_at": "2022-05-19T14:37:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3319,
"watchers_count": 3319,
"stargazers_count": 3318,
"watchers_count": 3318,
"forks_count": 997,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 997,
"watchers": 3319,
"watchers": 3318,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-19T01:28:36Z",
"updated_at": "2022-05-19T14:30:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1360,
"watchers_count": 1360,
"stargazers_count": 1361,
"watchers_count": 1361,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 295,
"watchers": 1360,
"watchers": 1361,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2020-36109 PoC causing DoS",
"fork": false,
"created_at": "2022-04-20T20:07:51Z",
"updated_at": "2022-05-08T14:34:14Z",
"updated_at": "2022-05-19T14:41:20Z",
"pushed_at": "2022-04-20T20:10:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -73,17 +73,17 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2022-05-09T09:42:31Z",
"updated_at": "2022-05-19T14:37:57Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 363,
"watchers_count": 363,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 364,
"watchers": 363,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.",
"fork": false,
"created_at": "2020-07-09T06:56:07Z",
"updated_at": "2021-11-23T07:30:05Z",
"updated_at": "2022-05-19T16:13:48Z",
"pushed_at": "2020-07-22T12:34:47Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 38,
"watchers": 39,
"score": 0
},
{

View file

@ -1025,17 +1025,17 @@
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
"fork": false,
"created_at": "2021-03-29T21:10:34Z",
"updated_at": "2022-05-17T07:41:50Z",
"updated_at": "2022-05-19T15:18:41Z",
"pushed_at": "2021-03-31T11:57:38Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 214,
"watchers": 213,
"score": 0
},
{
@ -1052,17 +1052,17 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2022-05-12T11:27:43Z",
"updated_at": "2022-05-19T15:18:32Z",
"pushed_at": "2021-11-16T04:00:14Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 133,
"watchers": 132,
"score": 0
},
{

View file

@ -184,17 +184,17 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2022-05-14T01:48:00Z",
"updated_at": "2022-05-19T13:49:37Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -1120,17 +1120,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-26T16:43:18Z",
"updated_at": "2022-03-11T05:41:30Z",
"updated_at": "2022-05-19T12:30:15Z",
"pushed_at": "2022-01-26T16:51:02Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-05-12T00:50:07Z",
"updated_at": "2022-05-19T13:46:27Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1411,
"watchers_count": 1411,
"forks_count": 463,
"stargazers_count": 1412,
"watchers_count": 1412,
"forks_count": 464,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 463,
"watchers": 1411,
"forks": 464,
"watchers": 1412,
"score": 0
},
{

View file

@ -26,33 +26,6 @@
"watchers": 0,
"score": 0
},
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-04-16T04:07:08Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 271,
"score": 0
},
{
"id": 435840491,
"name": "CVE-2021-43798-Grafana-POC",

View file

@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-05-18T16:16:59Z",
"updated_at": "2022-05-19T14:39:50Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 366,
"watchers_count": 366,
"stargazers_count": 365,
"watchers_count": 365,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 366,
"watchers": 365,
"score": 0
},
{
@ -367,14 +367,14 @@
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 984,
"watchers_count": 984,
"forks_count": 437,
"forks_count": 438,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 437,
"forks": 438,
"watchers": 984,
"score": 0
},
@ -810,7 +810,7 @@
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 759,
"watchers_count": 759,
"forks_count": 124,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
"topics": [
@ -835,7 +835,7 @@
"writeups"
],
"visibility": "public",
"forks": 124,
"forks": 125,
"watchers": 759,
"score": 0
},
@ -853,10 +853,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-05-18T17:57:48Z",
"updated_at": "2022-05-19T17:42:29Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1361,
"watchers_count": 1361,
"stargazers_count": 1362,
"watchers_count": 1362,
"forks_count": 374,
"allow_forking": true,
"is_template": false,
@ -868,7 +868,7 @@
],
"visibility": "public",
"forks": 374,
"watchers": 1361,
"watchers": 1362,
"score": 0
},
{
@ -2538,17 +2538,17 @@
"description": "Python script that sends CVE-2021-44228 log4j payload requests to url list",
"fork": false,
"created_at": "2021-12-12T13:28:31Z",
"updated_at": "2022-04-21T04:40:38Z",
"updated_at": "2022-05-19T14:39:51Z",
"pushed_at": "2021-12-12T13:39:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 8,
"watchers": 7,
"score": 0
},
{
@ -9124,7 +9124,7 @@
"fork": false,
"created_at": "2021-12-24T20:00:12Z",
"updated_at": "2022-01-06T13:31:29Z",
"pushed_at": "2022-04-21T17:43:56Z",
"pushed_at": "2022-05-19T17:26:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -10705,5 +10705,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 494091356,
"name": "CVE-2021-44228",
"full_name": "caiquebaracho\/CVE-2021-44228",
"owner": {
"login": "caiquebaracho",
"id": 88408311,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88408311?v=4",
"html_url": "https:\/\/github.com\/caiquebaracho"
},
"html_url": "https:\/\/github.com\/caiquebaracho\/CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2022-05-19T13:49:40Z",
"updated_at": "2022-05-19T14:30:24Z",
"pushed_at": "2022-05-19T14:29:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-25T23:58:17Z",
"updated_at": "2022-05-18T18:53:10Z",
"updated_at": "2022-05-19T14:41:08Z",
"pushed_at": "2022-01-26T00:18:26Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -83,14 +83,14 @@
{
"id": 467215742,
"name": "CVE-2022-0847",
"full_name": "imfiver\/CVE-2022-0847",
"full_name": "r1is\/CVE-2022-0847",
"owner": {
"login": "imfiver",
"login": "r1is",
"id": 21257485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21257485?v=4",
"html_url": "https:\/\/github.com\/imfiver"
"html_url": "https:\/\/github.com\/r1is"
},
"html_url": "https:\/\/github.com\/imfiver\/CVE-2022-0847",
"html_url": "https:\/\/github.com\/r1is\/CVE-2022-0847",
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
@ -1095,17 +1095,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-05-19T10:59:57Z",
"updated_at": "2022-05-19T13:43:28Z",
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 266,
"watchers_count": 266,
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 266,
"watchers": 267,
"score": 0
},
{
@ -1672,5 +1672,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 493093053,
"name": "DirtyPipe-CVE-2022-0847",
"full_name": "VinuKalana\/DirtyPipe-CVE-2022-0847",
"owner": {
"login": "VinuKalana",
"id": 87648107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87648107?v=4",
"html_url": "https:\/\/github.com\/VinuKalana"
},
"html_url": "https:\/\/github.com\/VinuKalana\/DirtyPipe-CVE-2022-0847",
"description": "This repository is developed to analysis and understand DirtyPipe exploit CVE-2022-0847",
"fork": false,
"created_at": "2022-05-17T04:23:34Z",
"updated_at": "2022-05-19T16:10:19Z",
"pushed_at": "2022-05-19T16:06:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -256,17 +256,17 @@
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2022-05-17T21:29:18Z",
"updated_at": "2022-05-19T16:07:08Z",
"pushed_at": "2022-05-16T07:19:04Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 21,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 38,
"forks": 22,
"watchers": 39,
"score": 0
},
{

View file

@ -71,12 +71,12 @@
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 43,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 42,
"watchers": 156,
"score": 0
},

View file

@ -195,17 +195,17 @@
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2022-05-12T14:34:15Z",
"updated_at": "2022-05-19T14:21:30Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -1226,5 +1226,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 494117439,
"name": "CVE-2022-22947_EXP",
"full_name": "anansec\/CVE-2022-22947_EXP",
"owner": {
"login": "anansec",
"id": 54608694,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54608694?v=4",
"html_url": "https:\/\/github.com\/anansec"
},
"html_url": "https:\/\/github.com\/anansec\/CVE-2022-22947_EXP",
"description": "一个可单独、批量验证的脚本也可以反弹shell",
"fork": false,
"created_at": "2022-05-19T14:58:45Z",
"updated_at": "2022-05-19T16:40:56Z",
"pushed_at": "2022-05-19T16:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-05-17T00:05:20Z",
"updated_at": "2022-05-19T15:14:42Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 258,
"watchers": 257,
"score": 0
},
{

View file

@ -1313,17 +1313,17 @@
"description": "CVE-2022-22965 pocsuite3 POC",
"fork": false,
"created_at": "2022-04-07T02:30:26Z",
"updated_at": "2022-05-17T07:37:17Z",
"updated_at": "2022-05-19T13:49:16Z",
"pushed_at": "2022-04-07T02:31:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 493907714,
"name": "CVE-2022-24500",
"full_name": "rkxxz\/CVE-2022-24500",
"owner": {
"login": "rkxxz",
"id": 103990991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103990991?v=4",
"html_url": "https:\/\/github.com\/rkxxz"
},
"html_url": "https:\/\/github.com\/rkxxz\/CVE-2022-24500",
"description": "CVE-2022-24500 RCE Exploit SMB Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-05-19T03:32:12Z",
"updated_at": "2022-05-19T11:55:36Z",
"pushed_at": "2022-05-19T03:34:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 18,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-05-19T01:16:01Z",
"updated_at": "2022-05-19T11:41:22Z",
"updated_at": "2022-05-19T17:34:05Z",
"pushed_at": "2022-05-19T01:17:07Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 20,
"watchers": 23,
"score": 0
}
]

View file

@ -100,12 +100,12 @@
"pushed_at": "2022-04-14T08:23:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0
},
@ -291,10 +291,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-01T13:19:10Z",
"updated_at": "2022-05-19T11:19:39Z",
"updated_at": "2022-05-19T17:16:51Z",
"pushed_at": "2022-05-19T01:23:00Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -303,7 +303,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 21,
"watchers": 23,
"score": 0
},
{
@ -393,32 +393,5 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 493908248,
"name": "CVE-2022-26809",
"full_name": "rkxxz\/CVE-2022-26809",
"owner": {
"login": "rkxxz",
"id": 103990991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103990991?v=4",
"html_url": "https:\/\/github.com\/rkxxz"
},
"html_url": "https:\/\/github.com\/rkxxz\/CVE-2022-26809",
"description": "CVE-2022-26809 RCE Exploit Remote Code Execution",
"fork": false,
"created_at": "2022-05-19T03:35:02Z",
"updated_at": "2022-05-19T12:01:50Z",
"pushed_at": "2022-05-19T03:42:33Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 72,
"score": 0
}
]

View file

@ -17,14 +17,14 @@
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-29464"
],
"visibility": "public",
"forks": 63,
"forks": 64,
"watchers": 275,
"score": 0
},
@ -324,14 +324,22 @@
"description": "A bots loader for CVE-2022-29464 with multithreading",
"fork": false,
"created_at": "2022-05-15T08:51:16Z",
"updated_at": "2022-05-15T13:34:44Z",
"updated_at": "2022-05-19T12:49:14Z",
"pushed_at": "2022-05-15T10:27:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"botnet",
"cve-2022-29464",
"loader",
"rce",
"wso2-vuln",
"wso2exploit",
"wso2rce"
],
"visibility": "public",
"forks": 1,
"watchers": 2,

View file

@ -272,12 +272,12 @@
"pushed_at": "2022-05-19T11:29:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
},

View file

@ -141,7 +141,7 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [Udyz/CVE-2022-0847](https://github.com/Udyz/CVE-2022-0847)
- [bbaranoff/CVE-2022-0847](https://github.com/bbaranoff/CVE-2022-0847)
- [xndpxs/CVE-2022-0847](https://github.com/xndpxs/CVE-2022-0847)
- [imfiver/CVE-2022-0847](https://github.com/imfiver/CVE-2022-0847)
- [r1is/CVE-2022-0847](https://github.com/r1is/CVE-2022-0847)
- [Arinerron/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit)
- [2xYuan/CVE-2022-0847](https://github.com/2xYuan/CVE-2022-0847)
- [crowsec-edtech/Dirty-Pipe](https://github.com/crowsec-edtech/Dirty-Pipe)
@ -199,6 +199,7 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [tufanturhan/CVE-2022-0847-L-nux-PrivEsc](https://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEsc)
- [rexpository/linux-privilege-escalation](https://github.com/rexpository/linux-privilege-escalation)
- [isaiahsimeone/COMP3320-VAPT](https://github.com/isaiahsimeone/COMP3320-VAPT)
- [VinuKalana/DirtyPipe-CVE-2022-0847](https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847)
### CVE-2022-0848 (2022-03-04)
@ -647,6 +648,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
- [twseptian/cve-2022-22947](https://github.com/twseptian/cve-2022-22947)
- [whwlsfb/cve-2022-22947-godzilla-memshell](https://github.com/whwlsfb/cve-2022-22947-godzilla-memshell)
- [0730Nophone/CVE-2022-22947-](https://github.com/0730Nophone/CVE-2022-22947-)
- [anansec/CVE-2022-22947_EXP](https://github.com/anansec/CVE-2022-22947_EXP)
### CVE-2022-22948 (2022-03-29)
@ -774,7 +776,12 @@ In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupport
- [MarcinGadz/spring-rce-poc](https://github.com/MarcinGadz/spring-rce-poc)
### CVE-2022-22976
### CVE-2022-22976 (2022-05-19)
<code>
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.
</code>
- [spring-io/cve-2022-22976-bcrypt-skips-salt](https://github.com/spring-io/cve-2022-22976-bcrypt-skips-salt)
### CVE-2022-23046 (2022-01-19)
@ -1033,14 +1040,6 @@ Windows Network File System Remote Code Execution Vulnerability. This CVE ID is
- [corelight/CVE-2022-24497](https://github.com/corelight/CVE-2022-24497)
### CVE-2022-24500 (2022-04-15)
<code>
Windows SMB Remote Code Execution Vulnerability.
</code>
- [rkxxz/CVE-2022-24500](https://github.com/rkxxz/CVE-2022-24500)
### CVE-2022-24611 (2022-05-17)
<code>
@ -1397,7 +1396,6 @@ Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID i
- [ExploitPwner/CVE-2022-26809-RCE-POC](https://github.com/ExploitPwner/CVE-2022-26809-RCE-POC)
- [seciurdt/CVE-2022-26809-RCE](https://github.com/seciurdt/CVE-2022-26809-RCE)
- [Calvitz/CVE-2022-26809](https://github.com/Calvitz/CVE-2022-26809)
- [rkxxz/CVE-2022-26809](https://github.com/rkxxz/CVE-2022-26809)
### CVE-2022-26923 (2022-05-10)
@ -5171,7 +5169,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
</code>
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
@ -5673,6 +5670,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [r3kind1e/Log4Shell-obfuscated-payloads-generator](https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator)
- [Phineas09/CVE-2021-44228](https://github.com/Phineas09/CVE-2021-44228)
- [kuznyJan1972/CVE-2021-44228-mass](https://github.com/kuznyJan1972/CVE-2021-44228-mass)
- [caiquebaracho/CVE-2021-44228](https://github.com/caiquebaracho/CVE-2021-44228)
### CVE-2021-44229
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
@ -21704,7 +21702,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- [KasunPriyashan/Y2S1-Project-Linux-Exploitaion-using-CVE-2016-5195-Vulnerability](https://github.com/KasunPriyashan/Y2S1-Project-Linux-Exploitaion-using-CVE-2016-5195-Vulnerability)
- [th3-5had0w/DirtyCOW-PoC](https://github.com/th3-5had0w/DirtyCOW-PoC)
- [ellietoulabi/Dirty-Cow](https://github.com/ellietoulabi/Dirty-Cow)
- [imfiver/CVE-2022-0847](https://github.com/imfiver/CVE-2022-0847)
- [r1is/CVE-2022-0847](https://github.com/r1is/CVE-2022-0847)
- [vinspiert/scumjrs](https://github.com/vinspiert/scumjrs)
- [gurpreetsinghsaluja/dirtycow](https://github.com/gurpreetsinghsaluja/dirtycow)
- [ArkAngeL43/CVE-2016-5195](https://github.com/ArkAngeL43/CVE-2016-5195)