Auto Update 2022/06/02 00:16:40

This commit is contained in:
motikan2010-bot 2022-06-02 09:16:40 +09:00
parent 0df8f5f8a4
commit a133cd6408
21 changed files with 386 additions and 123 deletions

View file

@ -1071,10 +1071,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2022-05-12T13:47:15Z",
"updated_at": "2022-06-01T20:19:35Z",
"pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
@ -1088,7 +1088,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Verification tools for CVE-2016-1287",
"fork": false,
"created_at": "2016-09-08T19:43:18Z",
"updated_at": "2020-02-07T20:18:36Z",
"updated_at": "2022-06-01T23:46:17Z",
"pushed_at": "2017-03-15T20:25:40Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -330,5 +330,37 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498394246,
"name": "CVE-2018-16763-FuelCMS-1.4.1-RCE",
"full_name": "p0dalirius\/CVE-2018-16763-FuelCMS-1.4.1-RCE",
"owner": {
"login": "p0dalirius",
"id": 79218792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
"html_url": "https:\/\/github.com\/p0dalirius"
},
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2018-16763-FuelCMS-1.4.1-RCE",
"description": "Exploit to trigger RCE for CVE-2018-16763 on FuelCMS <= 1.4.1 and interactive shell. ",
"fork": false,
"created_at": "2022-05-31T15:31:37Z",
"updated_at": "2022-06-01T21:00:18Z",
"pushed_at": "2022-06-01T20:45:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cms",
"cve-2018-16763",
"exploit",
"fuelcms"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -75,7 +75,7 @@
"fork": false,
"created_at": "2020-05-12T20:39:24Z",
"updated_at": "2020-10-09T06:41:30Z",
"pushed_at": "2022-04-29T14:26:02Z",
"pushed_at": "2022-06-01T19:52:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,

View file

@ -2915,17 +2915,17 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2022-05-16T18:32:30Z",
"updated_at": "2022-06-01T19:19:21Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

File diff suppressed because one or more lines are too long

View file

@ -370,5 +370,32 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 498888915,
"name": "CVE-2019-16759",
"full_name": "trhacknon\/CVE-2019-16759",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-16759",
"description": null,
"fork": false,
"created_at": "2022-06-01T20:28:43Z",
"updated_at": "2022-06-01T20:28:59Z",
"pushed_at": "2022-06-01T20:28:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-01T02:28:58Z",
"updated_at": "2022-06-01T21:12:45Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3336,
"watchers_count": 3336,
"stargazers_count": 3337,
"watchers_count": 3337,
"forks_count": 997,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 997,
"watchers": 3336,
"watchers": 3337,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-06-01T07:04:31Z",
"updated_at": "2022-06-01T19:23:32Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1461,
"watchers_count": 1461,
"stargazers_count": 1462,
"watchers_count": 1462,
"forks_count": 333,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 333,
"watchers": 1461,
"watchers": 1462,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-01T02:28:58Z",
"updated_at": "2022-06-01T21:12:45Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3336,
"watchers_count": 3336,
"stargazers_count": 3337,
"watchers_count": 3337,
"forks_count": 997,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 997,
"watchers": 3336,
"watchers": 3337,
"score": 0
},
{

View file

@ -412,17 +412,17 @@
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
"fork": false,
"created_at": "2022-04-29T18:57:30Z",
"updated_at": "2022-06-01T13:47:13Z",
"updated_at": "2022-06-01T19:07:47Z",
"pushed_at": "2022-05-02T07:49:01Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 85,
"watchers": 86,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
"fork": false,
"created_at": "2022-03-15T18:14:46Z",
"updated_at": "2022-05-19T03:05:47Z",
"updated_at": "2022-06-01T21:34:42Z",
"pushed_at": "2022-03-16T18:01:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -875,19 +875,19 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-06-01T02:27:15Z",
"updated_at": "2022-06-01T19:45:31Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 518,
"watchers_count": 518,
"forks_count": 102,
"stargazers_count": 519,
"watchers_count": 519,
"forks_count": 103,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
"forks": 102,
"watchers": 518,
"forks": 103,
"watchers": 519,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-06-01T07:23:44Z",
"updated_at": "2022-06-01T19:10:16Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1421,
"watchers_count": 1421,
"forks_count": 468,
"stargazers_count": 1422,
"watchers_count": 1422,
"forks_count": 469,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 468,
"watchers": 1421,
"forks": 469,
"watchers": 1422,
"score": 0
},
{
@ -40,10 +40,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2022-06-01T14:43:49Z",
"pushed_at": "2022-05-31T12:26:19Z",
"stargazers_count": 643,
"watchers_count": 643,
"updated_at": "2022-06-01T22:57:29Z",
"pushed_at": "2022-06-01T21:10:46Z",
"stargazers_count": 647,
"watchers_count": 647,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 145,
"watchers": 643,
"watchers": 647,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2022-05-16T15:39:19Z",
"updated_at": "2022-06-01T22:04:06Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-05-23T18:50:28Z",
"updated_at": "2022-06-01T19:20:33Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1094,
"watchers_count": 1094,
"stargazers_count": 1095,
"watchers_count": 1095,
"forks_count": 287,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 287,
"watchers": 1094,
"watchers": 1095,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 498603505,
"name": "cve-2022-193372",
"full_name": "Ran-Xing\/cve-2022-193372",
"owner": {
"login": "Ran-Xing",
"id": 73819467,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73819467?v=4",
"html_url": "https:\/\/github.com\/Ran-Xing"
},
"html_url": "https:\/\/github.com\/Ran-Xing\/cve-2022-193372",
"description": null,
"fork": false,
"created_at": "2022-06-01T05:32:09Z",
"updated_at": "2022-06-01T05:32:09Z",
"pushed_at": "2022-06-01T05:32:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2022-02-17T03:59:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 11,
"score": 0
},

View file

@ -460,5 +460,59 @@
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 498855865,
"name": "CVE-2022-22954-PoC",
"full_name": "trhacknon\/CVE-2022-22954-PoC",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22954-PoC",
"description": null,
"fork": false,
"created_at": "2022-06-01T18:33:45Z",
"updated_at": "2022-06-01T22:41:09Z",
"pushed_at": "2022-06-01T22:41:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498873517,
"name": "CVE-2022-22954",
"full_name": "Chocapikk\/CVE-2022-22954",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954",
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
"fork": false,
"created_at": "2022-06-01T19:33:32Z",
"updated_at": "2022-06-01T23:50:54Z",
"pushed_at": "2022-06-01T23:50:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2022-06-01T14:32:11Z",
"updated_at": "2022-06-01T21:17:08Z",
"pushed_at": "2022-05-31T19:13:34Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 53,
"watchers": 56,
"score": 0
},
{
@ -48,17 +48,44 @@
"description": "CVE-2022-30190 Follina POC",
"fork": false,
"created_at": "2022-05-31T06:45:25Z",
"updated_at": "2022-06-01T18:13:00Z",
"updated_at": "2022-06-01T23:09:21Z",
"pushed_at": "2022-05-31T09:35:37Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 41,
"watchers": 47,
"score": 0
},
{
"id": 498253545,
"name": "CVE-2022-30190",
"full_name": "2867a0\/CVE-2022-30190",
"owner": {
"login": "2867a0",
"id": 42805417,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42805417?v=4",
"html_url": "https:\/\/github.com\/2867a0"
},
"html_url": "https:\/\/github.com\/2867a0\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-05-31T08:39:09Z",
"updated_at": "2022-06-01T23:05:08Z",
"pushed_at": "2022-05-31T08:43:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
@ -75,17 +102,17 @@
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
"fork": false,
"created_at": "2022-05-31T12:15:18Z",
"updated_at": "2022-06-01T13:30:26Z",
"updated_at": "2022-06-01T19:43:10Z",
"pushed_at": "2022-05-31T12:27:50Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 23,
"watchers": 25,
"score": 0
},
{
@ -102,17 +129,17 @@
"description": "This Repository Talks about the Follina MSDT from Defender Perspective",
"fork": false,
"created_at": "2022-05-31T14:10:11Z",
"updated_at": "2022-06-01T16:40:26Z",
"updated_at": "2022-06-01T19:11:13Z",
"pushed_at": "2022-06-01T14:59:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -210,10 +237,10 @@
"description": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the users rights.",
"fork": false,
"created_at": "2022-05-31T18:00:42Z",
"updated_at": "2022-06-01T16:05:43Z",
"updated_at": "2022-06-01T19:24:42Z",
"pushed_at": "2022-05-31T19:31:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -223,7 +250,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -355,10 +382,10 @@
"description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go",
"fork": false,
"created_at": "2022-06-01T09:02:00Z",
"updated_at": "2022-06-01T13:33:13Z",
"updated_at": "2022-06-01T20:19:42Z",
"pushed_at": "2022-06-01T09:31:58Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -371,7 +398,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 6,
"score": 0
},
{
@ -446,12 +473,12 @@
"pushed_at": "2022-06-01T13:58:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -508,5 +535,145 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498863365,
"name": "CVE-2022-30190-NSIS",
"full_name": "rouben\/CVE-2022-30190-NSIS",
"owner": {
"login": "rouben",
"id": 2985666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2985666?v=4",
"html_url": "https:\/\/github.com\/rouben"
},
"html_url": "https:\/\/github.com\/rouben\/CVE-2022-30190-NSIS",
"description": "An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft",
"fork": false,
"created_at": "2022-06-01T18:58:07Z",
"updated_at": "2022-06-01T22:37:03Z",
"pushed_at": "2022-06-01T22:23:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-30190",
"microsoft",
"msdt",
"nsis"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 498888452,
"name": "Follina-Remediation",
"full_name": "Cosmo121\/Follina-Remediation",
"owner": {
"login": "Cosmo121",
"id": 3526206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4",
"html_url": "https:\/\/github.com\/Cosmo121"
},
"html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation",
"description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)",
"fork": false,
"created_at": "2022-06-01T20:26:56Z",
"updated_at": "2022-06-01T20:28:33Z",
"pushed_at": "2022-06-01T20:29:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498904586,
"name": "CVE-2022-30190",
"full_name": "rayorole\/CVE-2022-30190",
"owner": {
"login": "rayorole",
"id": 87602506,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87602506?v=4",
"html_url": "https:\/\/github.com\/rayorole"
},
"html_url": "https:\/\/github.com\/rayorole\/CVE-2022-30190",
"description": "CVE-2022-30190 or \"Follina\" 0day proof of concept",
"fork": false,
"created_at": "2022-06-01T21:33:18Z",
"updated_at": "2022-06-01T21:36:47Z",
"pushed_at": "2022-06-01T21:36:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498924006,
"name": "2022_PoC-MSDT-Follina-CVE-2022-30190",
"full_name": "ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
"owner": {
"login": "ImproveCybersecurityJaro",
"id": 106711305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106711305?v=4",
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro"
},
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
"description": "Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION.",
"fork": false,
"created_at": "2022-06-01T23:07:26Z",
"updated_at": "2022-06-01T23:07:26Z",
"pushed_at": "2022-06-01T23:30:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498927734,
"name": "CVE-2022-30190",
"full_name": "sudoaza\/CVE-2022-30190",
"owner": {
"login": "sudoaza",
"id": 555365,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/555365?v=4",
"html_url": "https:\/\/github.com\/sudoaza"
},
"html_url": "https:\/\/github.com\/sudoaza\/CVE-2022-30190",
"description": "MS-MSDT Follina CVE-2022-30190 PoC document generator",
"fork": false,
"created_at": "2022-06-01T23:27:14Z",
"updated_at": "2022-06-01T23:30:29Z",
"pushed_at": "2022-06-01T23:30:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -737,6 +737,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [tyleraharrison/VMware-CVE-2022-22954-Command-Injector](https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector)
- [3SsFuck/CVE-2022-22954-POC](https://github.com/3SsFuck/CVE-2022-22954-POC)
- [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954)
- [trhacknon/CVE-2022-22954-PoC](https://github.com/trhacknon/CVE-2022-22954-PoC)
- [Chocapikk/CVE-2022-22954](https://github.com/Chocapikk/CVE-2022-22954)
### CVE-2022-22963 (2022-04-01)
@ -1897,9 +1899,15 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l
- [Le1a/CVE-2022-30040](https://github.com/Le1a/CVE-2022-30040)
### CVE-2022-30190
### CVE-2022-30190 (2022-06-01)
<code>
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
</code>
- [JMousqueton/PoC-CVE-2022-30190](https://github.com/JMousqueton/PoC-CVE-2022-30190)
- [onecloudemoji/CVE-2022-30190](https://github.com/onecloudemoji/CVE-2022-30190)
- [2867a0/CVE-2022-30190](https://github.com/2867a0/CVE-2022-30190)
- [bytecaps/CVE-2022-30190](https://github.com/bytecaps/CVE-2022-30190)
- [archanchoudhury/MSDT_CVE-2022-30190](https://github.com/archanchoudhury/MSDT_CVE-2022-30190)
- [rickhenderson/cve-2022-30190](https://github.com/rickhenderson/cve-2022-30190)
@ -1916,6 +1924,11 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l
- [drgreenthumb93/CVE-2022-30190-follina](https://github.com/drgreenthumb93/CVE-2022-30190-follina)
- [mitespsoc/CVE-2022-30190-POC](https://github.com/mitespsoc/CVE-2022-30190-POC)
- [Vaisakhkm2625/MSDT-0-Day-CVE-2022-30190-Poc](https://github.com/Vaisakhkm2625/MSDT-0-Day-CVE-2022-30190-Poc)
- [rouben/CVE-2022-30190-NSIS](https://github.com/rouben/CVE-2022-30190-NSIS)
- [Cosmo121/Follina-Remediation](https://github.com/Cosmo121/Follina-Remediation)
- [rayorole/CVE-2022-30190](https://github.com/rayorole/CVE-2022-30190)
- [ImproveCybersecurityJaro/2022_PoC-MSDT-Follina-CVE-2022-30190](https://github.com/ImproveCybersecurityJaro/2022_PoC-MSDT-Follina-CVE-2022-30190)
- [sudoaza/CVE-2022-30190](https://github.com/sudoaza/CVE-2022-30190)
### CVE-2022-30292 (2022-05-04)
@ -1997,9 +2010,6 @@ mailcow before 2022-05d allows a remote authenticated user to inject OS commands
- [ly1g3/Mailcow-CVE-2022-31245](https://github.com/ly1g3/Mailcow-CVE-2022-31245)
### CVE-2022-193372
- [Ran-Xing/cve-2022-193372](https://github.com/Ran-Xing/cve-2022-193372)
## 2021
### CVE-2021-0302 (2021-02-10)
@ -14811,6 +14821,7 @@ vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig
- [sunian19/CVE-2019-16759](https://github.com/sunian19/CVE-2019-16759)
- [ludy-dev/vBulletin_Routestring-RCE](https://github.com/ludy-dev/vBulletin_Routestring-RCE)
- [apidotmy/CVE-2019-16759](https://github.com/apidotmy/CVE-2019-16759)
- [trhacknon/CVE-2019-16759](https://github.com/trhacknon/CVE-2019-16759)
### CVE-2019-16784 (2020-01-14)
@ -18277,6 +18288,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
- [k4u5h41/CVE-2018-16763](https://github.com/k4u5h41/CVE-2018-16763)
- [BrunoPincho/cve-2018-16763-rust](https://github.com/BrunoPincho/cve-2018-16763-rust)
- [NaturalT314/CVE-2018-16763](https://github.com/NaturalT314/CVE-2018-16763)
- [p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE)
### CVE-2018-16809 (2019-03-07)