Auto Update 2022/07/29 18:18:54

This commit is contained in:
motikan2010-bot 2022-07-30 03:18:54 +09:00
parent 767eb9fa8a
commit a298d81aa8
29 changed files with 201 additions and 157 deletions

View file

@ -223,13 +223,13 @@
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 414,
"watchers_count": 414,
"forks_count": 146,
"forks_count": 147,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 146,
"forks": 147,
"watchers": 414,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2018-09-03T03:11:24Z",
"updated_at": "2022-07-28T19:00:25Z",
"updated_at": "2022-07-29T12:51:31Z",
"pushed_at": "2021-05-18T16:24:42Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-28T00:38:29Z",
"updated_at": "2022-07-29T12:53:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3448,
"watchers_count": 3448,
"forks_count": 1022,
"stargazers_count": 3449,
"watchers_count": 3449,
"forks_count": 1023,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell"
],
"visibility": "public",
"forks": 1022,
"watchers": 3448,
"forks": 1023,
"watchers": 3449,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "macOS Kernel Exploit for CVE-2019-8781. ",
"fork": false,
"created_at": "2019-09-17T17:59:26Z",
"updated_at": "2022-07-28T13:40:48Z",
"updated_at": "2022-07-29T13:40:56Z",
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 291,
"watchers_count": 291,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 290,
"watchers": 291,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2022-07-27T07:11:59Z",
"updated_at": "2022-07-29T13:43:40Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 632,
"watchers_count": 632,
"stargazers_count": 633,
"watchers_count": 633,
"forks_count": 166,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 632,
"watchers": 633,
"score": 0
},
{

View file

@ -1380,10 +1380,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2022-07-23T15:43:12Z",
"updated_at": "2022-07-29T13:48:41Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 465,
"watchers_count": 465,
"stargazers_count": 466,
"watchers_count": 466,
"forks_count": 153,
"allow_forking": true,
"is_template": false,
@ -1397,7 +1397,7 @@
],
"visibility": "public",
"forks": 153,
"watchers": 465,
"watchers": 466,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
"fork": false,
"created_at": "2020-11-10T13:08:21Z",
"updated_at": "2022-07-03T05:49:41Z",
"updated_at": "2022-07-29T12:41:07Z",
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 28,
"watchers": 29,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-28T00:38:29Z",
"updated_at": "2022-07-29T12:53:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3448,
"watchers_count": 3448,
"forks_count": 1022,
"stargazers_count": 3449,
"watchers_count": 3449,
"forks_count": 1023,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell"
],
"visibility": "public",
"forks": 1022,
"watchers": 3448,
"forks": 1023,
"watchers": 3449,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-01-26T01:01:15Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"exploit"
],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 69,
"score": 0
},
@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-07-28T12:41:04Z",
"updated_at": "2022-07-29T14:28:13Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1622,
"watchers_count": 1622,
"stargazers_count": 1621,
"watchers_count": 1621,
"forks_count": 476,
"allow_forking": true,
"is_template": false,
@ -86,7 +86,7 @@
"topics": [],
"visibility": "public",
"forks": 476,
"watchers": 1622,
"watchers": 1621,
"score": 0
},
{
@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-07-29T06:06:37Z",
"updated_at": "2022-07-29T13:49:12Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 573,
"watchers_count": 573,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
@ -919,7 +919,7 @@
],
"visibility": "public",
"forks": 117,
"watchers": 572,
"watchers": 573,
"score": 0
},
{
@ -1884,10 +1884,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-07-28T11:56:00Z",
"updated_at": "2022-07-29T12:19:43Z",
"pushed_at": "2022-04-19T12:33:32Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -1895,7 +1895,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 292,
"watchers": 293,
"score": 0
},
{

View file

@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-07-28T17:48:37Z",
"updated_at": "2022-07-29T16:22:40Z",
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 369,
"watchers_count": 369,
"stargazers_count": 370,
"watchers_count": 370,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 369,
"watchers": 370,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-07-28T17:48:05Z",
"updated_at": "2022-07-29T15:35:46Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1127,
"watchers_count": 1127,
"stargazers_count": 1126,
"watchers_count": 1126,
"forks_count": 294,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 294,
"watchers": 1127,
"watchers": 1126,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
"fork": false,
"created_at": "2022-01-28T00:26:40Z",
"updated_at": "2022-07-28T09:56:20Z",
"updated_at": "2022-07-29T12:52:32Z",
"pushed_at": "2022-01-28T00:27:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -501,7 +501,7 @@
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 829,
"watchers_count": 829,
"forks_count": 130,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -527,7 +527,7 @@
"writeups"
],
"visibility": "public",
"forks": 130,
"forks": 129,
"watchers": 829,
"score": 0
},
@ -545,10 +545,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-07-27T09:50:26Z",
"updated_at": "2022-07-29T16:40:25Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1434,
"watchers_count": 1434,
"stargazers_count": 1435,
"watchers_count": 1435,
"forks_count": 394,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 394,
"watchers": 1434,
"watchers": 1435,
"score": 0
},
{
@ -1869,10 +1869,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-07-29T11:41:44Z",
"updated_at": "2022-07-29T15:12:08Z",
"pushed_at": "2022-07-20T08:14:48Z",
"stargazers_count": 2994,
"watchers_count": 2994,
"stargazers_count": 2995,
"watchers_count": 2995,
"forks_count": 722,
"allow_forking": true,
"is_template": false,
@ -1880,7 +1880,7 @@
"topics": [],
"visibility": "public",
"forks": 722,
"watchers": 2994,
"watchers": 2995,
"score": 0
},
{
@ -2552,34 +2552,6 @@
"watchers": 8,
"score": 0
},
{
"id": 437995131,
"name": "l4j-info",
"full_name": "ben-smash\/l4j-info",
"owner": {
"login": "ben-smash",
"id": 95368649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
"html_url": "https:\/\/github.com\/ben-smash"
},
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
"description": "Compiling links of value i find regarding CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T19:14:23Z",
"updated_at": "2021-12-13T21:11:09Z",
"pushed_at": "2021-12-13T21:11:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438012376,
"name": "nmap-log4shell",
@ -3260,7 +3232,7 @@
"pushed_at": "2022-01-27T16:08:20Z",
"stargazers_count": 425,
"watchers_count": 425,
"forks_count": 94,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -3275,7 +3247,7 @@
"python"
],
"visibility": "public",
"forks": 94,
"forks": 93,
"watchers": 425,
"score": 0
},

View file

@ -240,10 +240,10 @@
"description": "CVE-2021-45232-RCE-多线程批量漏洞检测",
"fork": false,
"created_at": "2022-01-05T04:13:10Z",
"updated_at": "2022-05-29T08:53:44Z",
"updated_at": "2022-07-29T14:33:32Z",
"pushed_at": "2022-01-13T05:12:49Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -251,7 +251,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 36,
"watchers": 37,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2022-07-27T07:13:26Z",
"updated_at": "2022-07-29T12:49:11Z",
"pushed_at": "2022-03-19T12:01:26Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 272,
"watchers": 273,
"score": 0
}
]

View file

@ -353,7 +353,7 @@
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -362,7 +362,7 @@
"f5-big-ip-icontrol-rest-rce"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 22,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-07-29T12:18:01Z",
"updated_at": "2022-07-29T17:52:02Z",
"pushed_at": "2022-07-27T07:01:33Z",
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 61,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 144,
"forks": 64,
"watchers": 154,
"score": 0
}
]

View file

@ -194,5 +194,33 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 519281774,
"name": "CVE-2022-21449-showcase",
"full_name": "Skipper7718\/CVE-2022-21449-showcase",
"owner": {
"login": "Skipper7718",
"id": 66838226,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66838226?v=4",
"html_url": "https:\/\/github.com\/Skipper7718"
},
"html_url": "https:\/\/github.com\/Skipper7718\/CVE-2022-21449-showcase",
"description": null,
"fork": false,
"created_at": "2022-07-29T16:33:10Z",
"updated_at": "2022-07-29T16:33:26Z",
"pushed_at": "2022-07-29T16:33:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -125,10 +125,10 @@
"description": "WordPress WP_Query SQL Injection POC",
"fork": false,
"created_at": "2022-07-28T13:12:51Z",
"updated_at": "2022-07-29T04:51:07Z",
"updated_at": "2022-07-29T12:42:08Z",
"pushed_at": "2022-07-29T07:42:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -126,13 +126,13 @@
"pushed_at": "2022-06-10T17:34:08Z",
"stargazers_count": 264,
"watchers_count": 264,
"forks_count": 206,
"forks_count": 207,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 206,
"forks": 207,
"watchers": 264,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-07-27T07:13:26Z",
"updated_at": "2022-07-29T15:25:28Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 393,
"watchers_count": 393,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 392,
"watchers": 393,
"score": 0
},
{

View file

@ -815,7 +815,7 @@
"description": "Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection ",
"fork": false,
"created_at": "2022-06-07T11:17:25Z",
"updated_at": "2022-06-30T06:00:56Z",
"updated_at": "2022-07-29T16:55:14Z",
"pushed_at": "2022-07-24T06:12:44Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -325,10 +325,10 @@
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-20T14:26:38Z",
"updated_at": "2022-07-28T01:52:07Z",
"updated_at": "2022-07-29T18:06:46Z",
"pushed_at": "2022-05-22T14:08:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -343,7 +343,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 16,
"watchers": 17,
"score": 0
},
{
@ -500,10 +500,10 @@
"description": "metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445",
"fork": false,
"created_at": "2022-07-04T09:22:09Z",
"updated_at": "2022-07-06T06:05:40Z",
"updated_at": "2022-07-29T13:41:20Z",
"pushed_at": "2022-07-04T09:22:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -511,7 +511,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -640,18 +640,18 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2022-07-29T10:54:16Z",
"updated_at": "2022-07-29T17:06:51Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 49,
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 200,
"forks": 50,
"watchers": 205,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-03-28T18:21:00Z",
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 36,
"watchers": 172,
"score": 0
}

View file

@ -245,10 +245,10 @@
"description": "Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.",
"fork": false,
"created_at": "2022-05-31T18:00:42Z",
"updated_at": "2022-07-25T16:13:07Z",
"updated_at": "2022-07-29T16:12:57Z",
"pushed_at": "2022-06-08T15:18:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -262,7 +262,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -772,10 +772,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-07-29T08:41:24Z",
"updated_at": "2022-07-29T12:48:12Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -783,7 +783,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 321,
"watchers": 322,
"score": 0
},
{

36
2022/CVE-2022-30591.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 509190703,
"name": "QUIC-attacks",
"full_name": "efchatz\/QUIC-attacks",
"owner": {
"login": "efchatz",
"id": 43434138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434138?v=4",
"html_url": "https:\/\/github.com\/efchatz"
},
"html_url": "https:\/\/github.com\/efchatz\/QUIC-attacks",
"description": "Attacks against QUIC (CVE-2022-30591)",
"fork": false,
"created_at": "2022-06-30T18:25:23Z",
"updated_at": "2022-07-29T15:59:30Z",
"pushed_at": "2022-07-12T21:12:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-30591",
"flooding",
"quic",
"slowloris",
"vulnerabilities"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-30929 POC",
"fork": false,
"created_at": "2022-07-04T05:36:18Z",
"updated_at": "2022-07-07T05:44:51Z",
"updated_at": "2022-07-29T18:21:18Z",
"pushed_at": "2022-07-04T06:19:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-07-28T11:22:13Z",
"updated_at": "2022-07-28T19:43:23Z",
"pushed_at": "2022-07-29T08:55:04Z",
"pushed_at": "2022-07-29T13:08:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -624,6 +624,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
### CVE-2022-21658 (2022-01-20)
@ -2595,6 +2596,14 @@ A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W)
- [furkanzengin/CVE-2022-30525](https://github.com/furkanzengin/CVE-2022-30525)
- [ProngedFork/CVE-2022-30525](https://github.com/ProngedFork/CVE-2022-30525)
### CVE-2022-30591 (2022-07-06)
<code>
** DISPUTED ** quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List.
</code>
- [efchatz/QUIC-attacks](https://github.com/efchatz/QUIC-attacks)
### CVE-2022-30594 (2022-05-12)
<code>
@ -6888,7 +6897,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
- [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)