Auto Update 2022/07/28 12:27:57

This commit is contained in:
motikan2010-bot 2022-07-28 21:27:58 +09:00
parent 8eb006c032
commit a78ab5cb98
42 changed files with 350 additions and 177 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2022-06-13T17:25:44Z",
"updated_at": "2022-07-28T08:46:36Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 108,
"watchers": 341,
"watchers": 342,
"score": 0
},
{

View file

@ -110,5 +110,33 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 518825284,
"name": "CVE-2012-1823",
"full_name": "theykillmeslowly\/CVE-2012-1823",
"owner": {
"login": "theykillmeslowly",
"id": 108249965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4",
"html_url": "https:\/\/github.com\/theykillmeslowly"
},
"html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2012-1823",
"description": "PHP CGI Argument Injection RCE",
"fork": false,
"created_at": "2022-07-28T11:51:03Z",
"updated_at": "2022-07-28T11:52:34Z",
"pushed_at": "2022-07-28T11:52:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
"fork": false,
"created_at": "2014-09-20T08:24:15Z",
"updated_at": "2022-05-18T08:32:47Z",
"updated_at": "2022-07-28T07:00:45Z",
"pushed_at": "2014-10-25T10:45:32Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 44,
"watchers": 43,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "Android attempt at PoC CVE-2016-8655",
"fork": false,
"created_at": "2016-12-17T19:14:01Z",
"updated_at": "2020-10-12T10:06:42Z",
"updated_at": "2022-07-28T08:49:02Z",
"pushed_at": "2017-07-01T01:41:31Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -130,10 +130,10 @@
"description": "Scan\/Exploit Blueborne CVE-2017-0785",
"fork": false,
"created_at": "2017-10-04T20:41:12Z",
"updated_at": "2022-04-25T06:00:11Z",
"updated_at": "2022-07-28T11:11:02Z",
"pushed_at": "2018-02-28T07:04:05Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 32,
"watchers": 31,
"score": 0
},
{

View file

@ -1,4 +1,37 @@
[
{
"id": 116768537,
"name": "exploit-cve-2017-5715",
"full_name": "opsxcq\/exploit-cve-2017-5715",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
"description": "Spectre exploit",
"fork": false,
"created_at": "2018-01-09T05:06:12Z",
"updated_at": "2022-07-28T11:11:03Z",
"pushed_at": "2018-01-09T22:27:25Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"intelbug",
"memory-leak",
"spectre"
],
"visibility": "public",
"forks": 19,
"watchers": 52,
"score": 0
},
{
"id": 117425769,
"name": "meltdown-spectre-bios-list",

View file

@ -439,10 +439,10 @@
"description": "SambaCry exploit (CVE-2017-7494) ",
"fork": false,
"created_at": "2022-05-07T11:42:40Z",
"updated_at": "2022-07-27T15:52:22Z",
"updated_at": "2022-07-28T09:20:51Z",
"pushed_at": "2022-07-21T14:45:06Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -450,7 +450,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "CVE-2017-7529_PoC",
"fork": false,
"created_at": "2018-06-20T15:16:10Z",
"updated_at": "2022-07-19T03:16:08Z",
"updated_at": "2022-07-28T06:20:34Z",
"pushed_at": "2018-06-20T15:16:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "POC for CVE-2018-1273",
"fork": false,
"created_at": "2018-04-17T13:41:00Z",
"updated_at": "2022-07-01T01:56:05Z",
"updated_at": "2022-07-28T09:24:17Z",
"pushed_at": "2018-06-05T15:07:18Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -56,7 +56,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2018-12-11T16:06:39Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 9,
"score": 0
},
@ -107,13 +107,13 @@
"pushed_at": "2021-06-30T08:27:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 1,
"score": 0
},

View file

@ -121,13 +121,13 @@
"pushed_at": "2021-03-08T11:46:49Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 26,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 25,
"watchers": 26,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"telethon"
],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 58,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-21T09:14:28Z",
"updated_at": "2022-04-18T19:30:41Z",
"updated_at": "2022-07-28T10:48:57Z",
"pushed_at": "2021-06-10T07:24:54Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -41,10 +41,10 @@
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-24T15:44:29Z",
"updated_at": "2022-07-26T10:33:32Z",
"updated_at": "2022-07-28T10:46:28Z",
"pushed_at": "2020-05-24T16:28:46Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@ -55,7 +55,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "QNAP N-Day (Probably not CVE-2020-2509)",
"fork": false,
"created_at": "2022-07-27T19:58:40Z",
"updated_at": "2022-07-27T20:55:06Z",
"updated_at": "2022-07-28T10:52:56Z",
"pushed_at": "2022-07-27T20:53:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -178,10 +178,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2022-06-25T03:46:52Z",
"updated_at": "2022-07-28T07:25:00Z",
"pushed_at": "2020-05-17T12:07:01Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -189,7 +189,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -102,10 +102,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2022-07-24T17:48:23Z",
"updated_at": "2022-07-28T06:38:43Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 414,
"watchers_count": 414,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
@ -113,7 +113,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 412,
"watchers": 414,
"score": 0
},
{

View file

@ -269,13 +269,13 @@
"pushed_at": "2021-02-10T00:01:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2022-07-21T03:05:23Z",
"updated_at": "2022-07-28T12:15:35Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 89,
"watchers": 90,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2022-07-27T07:13:28Z",
"updated_at": "2022-07-28T09:56:34Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -1884,10 +1884,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-07-27T21:08:09Z",
"updated_at": "2022-07-28T11:56:00Z",
"pushed_at": "2022-04-19T12:33:32Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -1895,7 +1895,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 291,
"watchers": 292,
"score": 0
},
{

View file

@ -328,5 +328,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 518780226,
"name": "CVE-2021-42013",
"full_name": "theykillmeslowly\/CVE-2021-42013",
"owner": {
"login": "theykillmeslowly",
"id": 108249965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108249965?v=4",
"html_url": "https:\/\/github.com\/theykillmeslowly"
},
"html_url": "https:\/\/github.com\/theykillmeslowly\/CVE-2021-42013",
"description": "Apache 2.4.49-50 Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-07-28T09:21:50Z",
"updated_at": "2022-07-28T09:24:11Z",
"pushed_at": "2022-07-28T09:53:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-07-27T11:38:11Z",
"updated_at": "2022-07-28T08:08:07Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 827,
"watchers_count": 827,
"stargazers_count": 828,
"watchers_count": 828,
"forks_count": 176,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 176,
"watchers": 827,
"watchers": 828,
"score": 0
},
{
@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-07-27T03:12:46Z",
"updated_at": "2022-07-28T08:08:01Z",
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 367,
"watchers_count": 367,
"stargazers_count": 368,
"watchers_count": 368,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 367,
"watchers": 368,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Prestashop >= 1.7.5.0 < 1.7.8.2 - SQL injection",
"fork": false,
"created_at": "2022-01-28T00:26:40Z",
"updated_at": "2022-04-24T07:24:34Z",
"updated_at": "2022-07-28T09:56:20Z",
"pushed_at": "2022-01-28T00:27:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -675,10 +675,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-07-26T12:20:59Z",
"updated_at": "2022-07-28T09:59:10Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 460,
"watchers_count": 460,
"stargazers_count": 461,
"watchers_count": 461,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
@ -691,7 +691,7 @@
],
"visibility": "public",
"forks": 95,
"watchers": 460,
"watchers": 461,
"score": 0
},
{
@ -2580,34 +2580,6 @@
"watchers": 0,
"score": 0
},
{
"id": 438003225,
"name": "log4j-test",
"full_name": "strawhatasif\/log4j-test",
"owner": {
"login": "strawhatasif",
"id": 10750101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
"html_url": "https:\/\/github.com\/strawhatasif"
},
"html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
"description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
"fork": false,
"created_at": "2021-12-13T19:43:01Z",
"updated_at": "2021-12-13T20:26:40Z",
"pushed_at": "2021-12-13T20:26:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438012376,
"name": "nmap-log4shell",
@ -8536,7 +8508,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-07-13T00:54:21Z",
"pushed_at": "2022-07-27T14:19:04Z",
"pushed_at": "2022-07-28T09:48:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 59,
"score": 0
},

View file

@ -129,13 +129,13 @@
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 956,
"watchers_count": 956,
"forks_count": 207,
"forks_count": 208,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 207,
"forks": 208,
"watchers": 956,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-12T14:34:48Z",
"updated_at": "2022-07-13T05:56:52Z",
"updated_at": "2022-07-28T10:14:20Z",
"pushed_at": "2022-07-12T14:42:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

30
2022/CVE-2022-2022.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 430706849,
"name": "pxplan",
"full_name": "GREENHAT7\/pxplan",
"owner": {
"login": "GREENHAT7",
"id": 94844022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94844022?v=4",
"html_url": "https:\/\/github.com\/GREENHAT7"
},
"html_url": "https:\/\/github.com\/GREENHAT7\/pxplan",
"description": "CVE-2022-2022",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2022-07-28T12:23:44Z",
"pushed_at": "2022-07-27T07:01:33Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 70,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
"updated_at": "2022-07-14T12:13:25Z",
"updated_at": "2022-07-28T06:47:19Z",
"pushed_at": "2022-02-21T08:58:22Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -547,10 +547,10 @@
"description": "Spring Cloud Gateway远程代码执行漏洞POC基于命令执行的基础上增加了反弹shell操作",
"fork": false,
"created_at": "2022-03-07T07:24:13Z",
"updated_at": "2022-05-20T10:11:30Z",
"updated_at": "2022-07-28T06:28:47Z",
"pushed_at": "2022-03-09T05:43:23Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -558,7 +558,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -520,18 +520,18 @@
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
"fork": false,
"created_at": "2022-06-01T19:33:32Z",
"updated_at": "2022-06-26T09:49:47Z",
"updated_at": "2022-07-28T09:26:29Z",
"pushed_at": "2022-06-01T23:50:18Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 20,
"forks": 4,
"watchers": 21,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-07-14T14:55:24Z",
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 93,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"tomcat"
],
"visibility": "public",
"forks": 93,
"forks": 94,
"watchers": 289,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-07-28T05:08:27Z",
"pushed_at": "2022-07-28T02:55:10Z",
"stargazers_count": 541,
"watchers_count": 541,
"updated_at": "2022-07-28T10:31:16Z",
"pushed_at": "2022-07-28T11:12:35Z",
"stargazers_count": 544,
"watchers_count": 544,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 97,
"watchers": 541,
"watchers": 544,
"score": 0
},
{
@ -214,7 +214,7 @@
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 68,
"forks_count": 70,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -232,7 +232,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 68,
"forks": 70,
"watchers": 250,
"score": 0
},

View file

@ -88,5 +88,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 518788417,
"name": "Confluence-Question-CVE-2022-26138-",
"full_name": "Vulnmachines\/Confluence-Question-CVE-2022-26138-",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/Confluence-Question-CVE-2022-26138-",
"description": "Atlassian Confluence Server and Data Center: CVE-2022-26138",
"fork": false,
"created_at": "2022-07-28T09:48:21Z",
"updated_at": "2022-07-28T09:48:21Z",
"pushed_at": "2022-07-28T09:59:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -329,7 +329,7 @@
"pushed_at": "2022-05-22T14:08:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -342,7 +342,7 @@
"windows"
],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 16,
"score": 0
},
@ -640,18 +640,18 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2022-07-28T06:19:25Z",
"updated_at": "2022-07-28T12:29:21Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 11,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 61,
"forks": 17,
"watchers": 109,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-07-27T07:13:27Z",
"updated_at": "2022-07-28T12:05:42Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 369,
"watchers_count": 369,
"stargazers_count": 370,
"watchers_count": 370,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 369,
"watchers": 370,
"score": 0
}
]

View file

@ -426,7 +426,7 @@
"fork": false,
"created_at": "2022-06-01T11:37:08Z",
"updated_at": "2022-07-25T16:16:05Z",
"pushed_at": "2022-06-07T08:35:35Z",
"pushed_at": "2022-07-28T10:56:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,

View file

@ -13,10 +13,10 @@
"description": "Major Security Vulnerability on PrestaShop Websites - CVE-2022-31101",
"fork": false,
"created_at": "2022-07-24T21:50:13Z",
"updated_at": "2022-07-28T00:19:21Z",
"updated_at": "2022-07-28T12:17:23Z",
"pushed_at": "2022-07-27T10:03:54Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
"updated_at": "2022-07-28T02:31:28Z",
"updated_at": "2022-07-28T10:13:29Z",
"pushed_at": "2022-07-25T21:24:15Z",
"stargazers_count": 169,
"watchers_count": 169,
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 169,
"watchers": 170,
"score": 0
},
{

View file

@ -1,20 +1,20 @@
[
{
"id": 517931760,
"name": "lblfixer_cve_2022_31181",
"full_name": "drkbcn\/lblfixer_cve_2022_31181",
"name": "lblfixer_cve_2022_36408",
"full_name": "drkbcn\/lblfixer_cve_2022_36408",
"owner": {
"login": "drkbcn",
"id": 2090227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2090227?v=4",
"html_url": "https:\/\/github.com\/drkbcn"
},
"html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve_2022_31181",
"description": "Module for PrestaShop 1.6.1.X\/1.7.X to fix CVE-2022-31181 vulnerability (Chain SQL Injection)",
"html_url": "https:\/\/github.com\/drkbcn\/lblfixer_cve_2022_36408",
"description": "Module for PrestaShop 1.6.1.X\/1.7.X to fix CVE-2022-36408 \/ CVE-2022-31181 vulnerability (Chain SQL Injection)",
"fork": false,
"created_at": "2022-07-26T05:55:53Z",
"updated_at": "2022-07-27T06:58:05Z",
"pushed_at": "2022-07-27T06:42:32Z",
"updated_at": "2022-07-28T07:07:11Z",
"pushed_at": "2022-07-28T07:14:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

30
2022/CVE-2022-36946.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 518816810,
"name": "CVE-2022-36946",
"full_name": "Pwnzer0tt1\/CVE-2022-36946",
"owner": {
"login": "Pwnzer0tt1",
"id": 107208935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107208935?v=4",
"html_url": "https:\/\/github.com\/Pwnzer0tt1"
},
"html_url": "https:\/\/github.com\/Pwnzer0tt1\/CVE-2022-36946",
"description": null,
"fork": false,
"created_at": "2022-07-28T11:22:13Z",
"updated_at": "2022-07-28T11:50:57Z",
"pushed_at": "2022-07-28T11:22:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -460,6 +460,14 @@ The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (ev
### CVE-2022-1972
- [randorisec/CVE-2022-1972-infoleak-PoC](https://github.com/randorisec/CVE-2022-1972-infoleak-PoC)
### CVE-2022-2022 (2022-06-07)
<code>
Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.7.
</code>
- [GREENHAT7/pxplan](https://github.com/GREENHAT7/pxplan)
### CVE-2022-2097 (2022-07-05)
<code>
@ -1799,6 +1807,7 @@ The Atlassian Questions For Confluence app for Confluence Server and Data Center
- [alcaparra/CVE-2022-26138](https://github.com/alcaparra/CVE-2022-26138)
- [1mxml/CVE-2022-26138](https://github.com/1mxml/CVE-2022-26138)
- [Daro1967/CVE-2022-26138-RCE](https://github.com/Daro1967/CVE-2022-26138-RCE)
- [Vulnmachines/Confluence-Question-CVE-2022-26138-](https://github.com/Vulnmachines/Confluence-Question-CVE-2022-26138-)
### CVE-2022-26155 (2022-02-28)
@ -2650,9 +2659,6 @@ mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an
- [ly1g3/Mailcow-CVE-2022-31138](https://github.com/ly1g3/Mailcow-CVE-2022-31138)
### CVE-2022-31181
- [drkbcn/lblfixer_cve_2022_31181](https://github.com/drkbcn/lblfixer_cve_2022_31181)
### CVE-2022-31245 (2022-05-20)
<code>
@ -2935,6 +2941,22 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
- [AngeloPioAmirante/CVE-2022-35899](https://github.com/AngeloPioAmirante/CVE-2022-35899)
### CVE-2022-36408 (2022-07-22)
<code>
PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.7 allows remote attackers to execute arbitrary code, aka a &quot;previously unknown vulnerability chain&quot; related to SQL injection and MySQL Smarty cache storage injection, as exploited in the wild in July 2022.
</code>
- [drkbcn/lblfixer_cve_2022_36408](https://github.com/drkbcn/lblfixer_cve_2022_36408)
### CVE-2022-36946 (2022-07-27)
<code>
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-&gt;len.
</code>
- [Pwnzer0tt1/CVE-2022-36946](https://github.com/Pwnzer0tt1/CVE-2022-36946)
## 2021
### CVE-2021-0302 (2021-02-10)
@ -6332,6 +6354,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013)
- [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013)
- [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013)
- [theykillmeslowly/CVE-2021-42013](https://github.com/theykillmeslowly/CVE-2021-42013)
### CVE-2021-42056 (2022-06-24)
@ -6857,7 +6880,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [rodfer0x80/log4j2-prosecutor](https://github.com/rodfer0x80/log4j2-prosecutor)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
@ -20948,6 +20970,7 @@ Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletio
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
</code>
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
@ -26245,6 +26268,7 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured
- [tardummy01/oscp_scripts-1](https://github.com/tardummy01/oscp_scripts-1)
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
- [theykillmeslowly/CVE-2012-1823](https://github.com/theykillmeslowly/CVE-2012-1823)
### CVE-2012-1870 (2012-07-10)