Auto Update 2022/10/06 12:17:32

This commit is contained in:
motikan2010-bot 2022-10-06 21:17:32 +09:00
parent f1e756dfec
commit 9e830cbfb8
35 changed files with 246 additions and 123 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-10-05T22:25:53Z",
"updated_at": "2022-10-06T08:17:47Z",
"pushed_at": "2022-10-05T22:45:58Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 111,
"watchers": 112,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2018-07-12T00:17:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -17,13 +17,13 @@
"pushed_at": "2018-02-16T16:30:00Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 17,
"score": 0
}

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-10-05T04:51:13Z",
"updated_at": "2022-10-06T08:29:25Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1516,
"watchers": 1517,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-08-30T03:30:02Z",
"updated_at": "2022-10-06T08:10:15Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 322,
"watchers": 323,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-10-05T04:51:13Z",
"updated_at": "2022-10-06T08:29:25Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1516,
"watchers": 1517,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "FFMPEG heap overflow exploit CVE-2016-10190",
"fork": false,
"created_at": "2022-05-07T06:51:05Z",
"updated_at": "2022-05-07T06:54:17Z",
"updated_at": "2022-10-06T09:31:23Z",
"pushed_at": "2022-05-07T06:56:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-08-30T03:30:02Z",
"updated_at": "2022-10-06T08:10:15Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 322,
"watchers": 323,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-10-05T04:51:13Z",
"updated_at": "2022-10-06T08:29:25Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1516,
"watchers": 1517,
"score": 0
},
{

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-10-05T04:51:13Z",
"updated_at": "2022-10-06T08:29:25Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1516,
"watchers": 1517,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
"fork": false,
"created_at": "2019-09-04T13:06:02Z",
"updated_at": "2022-09-19T08:11:01Z",
"updated_at": "2022-10-06T08:01:56Z",
"pushed_at": "2022-02-11T00:00:44Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 125,
"watchers": 126,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2022-09-27T02:51:27Z",
"updated_at": "2022-10-06T11:10:45Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 294,
"watchers_count": 294,
"stargazers_count": 295,
"watchers_count": 295,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 294,
"watchers": 295,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-10-05T04:51:13Z",
"updated_at": "2022-10-06T08:29:25Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1516,
"watchers": 1517,
"score": 0
}
]

View file

@ -192,13 +192,13 @@
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 340,
"watchers_count": 340,
"forks_count": 90,
"forks_count": 91,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 90,
"forks": 91,
"watchers": 340,
"score": 0
},

View file

@ -627,10 +627,10 @@
"description": "CVE-2020-0796 - Working PoC - 20200313",
"fork": false,
"created_at": "2020-03-13T08:34:31Z",
"updated_at": "2022-04-28T11:52:56Z",
"updated_at": "2022-10-06T10:55:55Z",
"pushed_at": "2020-03-13T08:35:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -638,7 +638,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 6,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2022-09-23T00:50:01Z",
"updated_at": "2022-10-06T12:02:18Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 338,
"watchers_count": 338,
"stargazers_count": 339,
"watchers_count": 339,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 338,
"watchers": 339,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-10-05T04:51:13Z",
"updated_at": "2022-10-06T08:29:25Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1516,
"watchers": 1517,
"score": 0
},
{

View file

@ -766,21 +766,28 @@
"html_url": "https:\/\/github.com\/Schira4396"
},
"html_url": "https:\/\/github.com\/Schira4396\/VcenterKiller",
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005提供一键上传webshell命令执行或者上传公钥使用SSH连接",
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-10-06T06:06:12Z",
"pushed_at": "2022-10-06T03:44:53Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 8,
"updated_at": "2022-10-06T11:45:19Z",
"pushed_at": "2022-10-06T09:44:33Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"go",
"golang",
"log4j",
"log4shell",
"scan",
"vcenter"
],
"visibility": "public",
"forks": 8,
"watchers": 46,
"forks": 9,
"watchers": 61,
"score": 0
}
]

View file

@ -1004,10 +1004,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-09-29T14:38:51Z",
"updated_at": "2022-10-06T11:07:51Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 540,
"watchers_count": 540,
"forks_count": 147,
"allow_forking": true,
"is_template": false,
@ -1015,7 +1015,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 539,
"watchers": 540,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-3317",
"fork": false,
"created_at": "2021-04-09T07:36:46Z",
"updated_at": "2021-10-24T06:20:59Z",
"updated_at": "2022-10-06T10:56:01Z",
"pushed_at": "2021-04-09T07:37:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -1479,10 +1479,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-10-03T09:31:20Z",
"updated_at": "2022-10-06T11:21:44Z",
"pushed_at": "2022-09-11T03:55:38Z",
"stargazers_count": 3055,
"watchers_count": 3055,
"stargazers_count": 3056,
"watchers_count": 3056,
"forks_count": 726,
"allow_forking": true,
"is_template": false,
@ -1490,7 +1490,7 @@
"topics": [],
"visibility": "public",
"forks": 726,
"watchers": 3055,
"watchers": 3056,
"score": 0
},
{
@ -4374,7 +4374,7 @@
"fork": false,
"created_at": "2021-12-17T18:45:19Z",
"updated_at": "2022-03-14T08:27:22Z",
"pushed_at": "2022-10-05T19:02:34Z",
"pushed_at": "2022-10-06T06:50:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
@ -6125,10 +6125,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2022-10-03T19:22:14Z",
"updated_at": "2022-10-06T06:48:49Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -6141,7 +6141,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0918",
"fork": false,
"created_at": "2022-05-10T03:50:18Z",
"updated_at": "2022-08-19T17:53:34Z",
"updated_at": "2022-10-06T06:46:52Z",
"pushed_at": "2022-05-13T17:28:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -384,13 +384,13 @@
"pushed_at": "2022-04-26T04:26:00Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 55,
"score": 0
},

View file

@ -213,13 +213,13 @@
"pushed_at": "2022-02-23T16:37:13Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 6,
"watchers": 6,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-10-02T16:53:52Z",
"updated_at": "2022-10-06T10:56:08Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 502,
"watchers_count": 502,
"stargazers_count": 501,
"watchers_count": 501,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 502,
"watchers": 501,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-09-26T04:52:12Z",
"updated_at": "2022-09-28T15:02:24Z",
"updated_at": "2022-10-06T11:29:57Z",
"pushed_at": "2022-09-26T05:23:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1999,5 +1999,33 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 546628423,
"name": "Follina-attack-CVE-2022-30190-",
"full_name": "Imeneallouche\/Follina-attack-CVE-2022-30190-",
"owner": {
"login": "Imeneallouche",
"id": 89279264,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89279264?v=4",
"html_url": "https:\/\/github.com\/Imeneallouche"
},
"html_url": "https:\/\/github.com\/Imeneallouche\/Follina-attack-CVE-2022-30190-",
"description": "this is a demo attack of FOLLINA exploit , a vulnerability that has been discovered in May 2022 and stood unpatched until June 2022",
"fork": false,
"created_at": "2022-10-06T11:41:43Z",
"updated_at": "2022-10-06T11:41:43Z",
"pushed_at": "2022-10-06T11:44:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "A POC of CVE-2022-30206",
"fork": false,
"created_at": "2022-09-26T19:38:24Z",
"updated_at": "2022-09-27T10:55:22Z",
"updated_at": "2022-10-06T12:01:02Z",
"pushed_at": "2022-09-26T19:42:57Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-09-30T16:43:28Z",
"updated_at": "2022-10-05T21:56:04Z",
"updated_at": "2022-10-06T08:33:14Z",
"pushed_at": "2022-10-01T09:43:20Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -73,13 +73,13 @@
"pushed_at": "2022-09-24T20:52:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 11,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2022-10-05T12:36:54Z",
"updated_at": "2022-10-06T10:28:00Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 178,
"watchers_count": 178,

View file

@ -13,10 +13,10 @@
"description": "Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082",
"fork": false,
"created_at": "2022-10-02T08:14:03Z",
"updated_at": "2022-10-05T08:34:47Z",
"updated_at": "2022-10-06T12:06:41Z",
"pushed_at": "2022-10-02T12:16:47Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 19,
"score": 0
}
]

View file

@ -69,10 +69,38 @@
"description": "Code set relating to CVE-2022-41040",
"fork": false,
"created_at": "2022-10-06T01:20:32Z",
"updated_at": "2022-10-06T01:21:58Z",
"updated_at": "2022-10-06T07:25:33Z",
"pushed_at": "2022-10-06T01:27:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 546531008,
"name": "CVE-2022-41040-RCE-POC",
"full_name": "kev-beaumont\/CVE-2022-41040-RCE-POC",
"owner": {
"login": "kev-beaumont",
"id": 115143938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115143938?v=4",
"html_url": "https:\/\/github.com\/kev-beaumont"
},
"html_url": "https:\/\/github.com\/kev-beaumont\/CVE-2022-41040-RCE-POC",
"description": "CVE-2022-41040 aka Proxynotshell",
"fork": false,
"created_at": "2022-10-06T08:18:55Z",
"updated_at": "2022-10-06T08:27:11Z",
"pushed_at": "2022-10-06T08:20:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -80,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -26,5 +26,61 @@
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 546532923,
"name": "CVE-2022-41082-RCE-POC",
"full_name": "kev-beaumont\/CVE-2022-41082-RCE-POC",
"owner": {
"login": "kev-beaumont",
"id": 115143938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115143938?v=4",
"html_url": "https:\/\/github.com\/kev-beaumont"
},
"html_url": "https:\/\/github.com\/kev-beaumont\/CVE-2022-41082-RCE-POC",
"description": "CVE-2022-41082 aka ProxyNotShell",
"fork": false,
"created_at": "2022-10-06T08:22:38Z",
"updated_at": "2022-10-06T08:26:55Z",
"pushed_at": "2022-10-06T08:24:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 546597750,
"name": "CVE-2022-41082-MASS-RCE",
"full_name": "V1rpo\/CVE-2022-41082-MASS-RCE",
"owner": {
"login": "V1rpo",
"id": 115152449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115152449?v=4",
"html_url": "https:\/\/github.com\/V1rpo"
},
"html_url": "https:\/\/github.com\/V1rpo\/CVE-2022-41082-MASS-RCE",
"description": "ProxyNotShell fully automated mass rce",
"fork": false,
"created_at": "2022-10-06T10:34:33Z",
"updated_at": "2022-10-06T11:38:27Z",
"pushed_at": "2022-10-06T11:38:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2857,6 +2857,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
- [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-)
- [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s)
- [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190)
- [Imeneallouche/Follina-attack-CVE-2022-30190-](https://github.com/Imeneallouche/Follina-attack-CVE-2022-30190-)
### CVE-2022-30206 (2022-07-12)
@ -3797,6 +3798,7 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability.
- [numanturle/CVE-2022-41040](https://github.com/numanturle/CVE-2022-41040)
- [r3dcl1ff/CVE-2022-41040](https://github.com/r3dcl1ff/CVE-2022-41040)
- [d3duct1v/CVE-2022-41040](https://github.com/d3duct1v/CVE-2022-41040)
- [kev-beaumont/CVE-2022-41040-RCE-POC](https://github.com/kev-beaumont/CVE-2022-41040-RCE-POC)
### CVE-2022-41082 (2022-10-02)
@ -3805,6 +3807,8 @@ Microsoft Exchange Server Remote Code Execution Vulnerability.
</code>
- [Diverto/nse-exchange](https://github.com/Diverto/nse-exchange)
- [kev-beaumont/CVE-2022-41082-RCE-POC](https://github.com/kev-beaumont/CVE-2022-41082-RCE-POC)
- [V1rpo/CVE-2022-41082-MASS-RCE](https://github.com/V1rpo/CVE-2022-41082-MASS-RCE)
### CVE-2022-41218 (2022-09-21)