Auto Update 2022/06/19 18:15:49

This commit is contained in:
motikan2010-bot 2022-06-20 03:15:49 +09:00
parent 9ad8b752a3
commit a79545dbfa
36 changed files with 167 additions and 130 deletions

View file

@ -121,17 +121,17 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2022-06-02T15:08:13Z",
"updated_at": "2022-06-19T12:09:09Z",
"pushed_at": "2021-09-28T16:14:13Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 22,
"watchers": 21,
"score": 0
},
{

View file

@ -98,10 +98,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2022-06-03T05:17:08Z",
"updated_at": "2022-06-19T17:20:38Z",
"pushed_at": "2020-07-21T09:46:40Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 212,
"watchers": 211,
"score": 0
}
]

View file

@ -216,12 +216,12 @@
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 410,
"watchers_count": 410,
"forks_count": 146,
"forks_count": 147,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 146,
"forks": 147,
"watchers": 410,
"score": 0
},

View file

@ -98,7 +98,7 @@
"pushed_at": "2018-09-04T21:35:36Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 23,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [
@ -111,7 +111,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 23,
"forks": 22,
"watchers": 35,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
"fork": false,
"created_at": "2022-05-26T01:13:42Z",
"updated_at": "2022-06-18T19:29:43Z",
"updated_at": "2022-06-19T13:51:26Z",
"pushed_at": "2022-05-26T19:14:20Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "M1 Band Smart Watch Bluetooth Low Energy Exploit python script (CVE-2018-11631)",
"fork": false,
"created_at": "2018-05-31T17:46:59Z",
"updated_at": "2021-12-15T14:34:14Z",
"updated_at": "2022-06-19T12:34:35Z",
"pushed_at": "2018-07-27T10:28:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -137,11 +137,11 @@
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2022-06-14T13:06:14Z",
"updated_at": "2022-06-19T14:46:35Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 101,
"stargazers_count": 299,
"watchers_count": 299,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [
@ -153,8 +153,8 @@
"struts-pwn"
],
"visibility": "public",
"forks": 101,
"watchers": 300,
"forks": 100,
"watchers": 299,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.",
"fork": false,
"created_at": "2019-01-26T03:41:24Z",
"updated_at": "2021-12-15T14:35:35Z",
"updated_at": "2022-06-19T14:31:20Z",
"pushed_at": "2019-01-26T03:49:09Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2020-12-08T15:39:24Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 44,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2022-06-10T10:40:58Z",
"updated_at": "2022-06-19T13:45:24Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 291,
"watchers_count": 291,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 90,
"watchers": 291,
"watchers": 292,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3371,
"watchers_count": 3371,
"forks_count": 1006,
"forks_count": 1007,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,7 +69,7 @@
"webshell"
],
"visibility": "public",
"forks": 1006,
"forks": 1007,
"watchers": 3371,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2022-06-12T15:49:08Z",
"updated_at": "2022-06-19T13:26:21Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 71,
"watchers": 72,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 68,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 68,
"forks": 69,
"watchers": 203,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-12-08T15:39:24Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 44,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3371,
"watchers_count": 3371,
"forks_count": 1006,
"forks_count": 1007,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,7 +42,7 @@
"webshell"
],
"visibility": "public",
"forks": 1006,
"forks": 1007,
"watchers": 3371,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
"fork": false,
"created_at": "2020-01-28T23:27:20Z",
"updated_at": "2022-02-09T21:23:32Z",
"updated_at": "2022-06-19T17:30:37Z",
"pushed_at": "2022-02-09T21:23:29Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 73,
"watchers": 72,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
"fork": false,
"created_at": "2022-01-17T21:35:19Z",
"updated_at": "2022-04-10T21:07:53Z",
"updated_at": "2022-06-19T17:30:40Z",
"pushed_at": "2022-03-16T02:58:42Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 16,
"watchers": 15,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-06-15T19:58:47Z",
"updated_at": "2022-06-19T14:52:32Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1569,
"watchers_count": 1569,
"stargazers_count": 1568,
"watchers_count": 1568,
"forks_count": 565,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 565,
"watchers": 1569,
"watchers": 1568,
"score": 0
},
{

View file

@ -426,12 +426,12 @@
"pushed_at": "2021-03-09T16:56:09Z",
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 59,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"forks": 60,
"watchers": 90,
"score": 0
},

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)",
"fork": false,
"created_at": "2022-03-14T06:42:45Z",
"updated_at": "2022-05-13T07:15:37Z",
"updated_at": "2022-06-19T17:16:03Z",
"pushed_at": "2022-03-14T07:58:37Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-06-16T15:27:53Z",
"updated_at": "2022-06-19T12:49:31Z",
"pushed_at": "2022-03-18T16:32:13Z",
"stargazers_count": 808,
"watchers_count": 808,
"stargazers_count": 809,
"watchers_count": 809,
"forks_count": 174,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 174,
"watchers": 808,
"watchers": 809,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-06-18T15:48:00Z",
"updated_at": "2022-06-19T16:54:57Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1101,
"watchers_count": 1101,
"forks_count": 289,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 289,
"watchers": 1101,
"forks": 291,
"watchers": 1104,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-06-18T03:23:45Z",
"updated_at": "2022-06-19T16:56:51Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 372,
"watchers_count": 372,
"stargazers_count": 373,
"watchers_count": 373,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 372,
"watchers": 373,
"score": 0
},
{
@ -555,10 +555,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-06-19T04:23:26Z",
"updated_at": "2022-06-19T15:06:40Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1399,
"watchers_count": 1399,
"stargazers_count": 1400,
"watchers_count": 1400,
"forks_count": 385,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 385,
"watchers": 1399,
"watchers": 1400,
"score": 0
},
{

View file

@ -1095,7 +1095,7 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-06-18T17:55:07Z",
"updated_at": "2022-06-19T13:04:38Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 278,
"watchers_count": 278,

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-04-03T01:36:45Z",
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 154,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": "CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server",
"fork": false,
"created_at": "2022-04-20T20:31:15Z",
"updated_at": "2022-06-15T19:59:20Z",
"updated_at": "2022-06-19T16:46:56Z",
"pushed_at": "2022-04-21T12:04:10Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": null,
"fork": false,
"created_at": "2022-06-18T14:42:04Z",
"updated_at": "2022-06-18T14:49:53Z",
"updated_at": "2022-06-19T15:12:03Z",
"pushed_at": "2022-06-18T15:02:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-06-19T08:10:22Z",
"updated_at": "2022-06-19T17:49:52Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 409,
"watchers_count": 409,
"stargazers_count": 410,
"watchers_count": 410,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 409,
"watchers": 410,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)",
"fork": false,
"created_at": "2021-12-26T04:29:09Z",
"updated_at": "2022-06-15T13:38:49Z",
"updated_at": "2022-06-19T15:45:14Z",
"pushed_at": "2022-03-19T16:24:28Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 38,
"watchers": 39,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-06-16T07:05:19Z",
"updated_at": "2022-06-19T13:37:09Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -190,11 +190,11 @@
"description": "[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
"updated_at": "2022-06-18T09:24:59Z",
"updated_at": "2022-06-19T12:19:37Z",
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 56,
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [
@ -211,8 +211,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 56,
"watchers": 216,
"forks": 57,
"watchers": 215,
"score": 0
},
{
@ -1084,5 +1084,41 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 505123172,
"name": "CVE-2022-26134",
"full_name": "AmoloHT\/CVE-2022-26134",
"owner": {
"login": "AmoloHT",
"id": 106687805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106687805?v=4",
"html_url": "https:\/\/github.com\/AmoloHT"
},
"html_url": "https:\/\/github.com\/AmoloHT\/CVE-2022-26134",
"description": "「💥」CVE-2022-26134 - Confluence Pre-Auth RCE",
"fork": false,
"created_at": "2022-06-19T13:50:22Z",
"updated_at": "2022-06-19T14:15:20Z",
"pushed_at": "2022-06-19T14:08:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"confluence",
"cve",
"cve-2022-26134",
"exploit",
"hacking",
"infosec",
"rce",
"security"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -436,17 +436,17 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2022-06-19T11:48:32Z",
"updated_at": "2022-06-19T17:28:31Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"forks": 5,
"watchers": 23,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Windows Network File System Crash PoC",
"fork": false,
"created_at": "2022-06-17T01:42:55Z",
"updated_at": "2022-06-19T11:44:26Z",
"updated_at": "2022-06-19T17:09:27Z",
"pushed_at": "2022-06-17T01:50:26Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 15,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 30,
"forks": 16,
"watchers": 39,
"score": 0
}
]

View file

@ -41,7 +41,7 @@
"fork": false,
"created_at": "2022-06-19T12:13:41Z",
"updated_at": "2022-06-19T12:13:41Z",
"pushed_at": "2022-06-19T12:13:42Z",
"pushed_at": "2022-06-19T12:26:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -780,17 +780,17 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-06-19T12:01:57Z",
"updated_at": "2022-06-19T17:15:25Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 270,
"watchers": 272,
"score": 0
},
{

View file

@ -1578,6 +1578,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [trhacknon/CVE-2022-26134](https://github.com/trhacknon/CVE-2022-26134)
- [trhacknon/CVE-2022-26134-bis](https://github.com/trhacknon/CVE-2022-26134-bis)
- [Chocapikk/CVE-2022-26134](https://github.com/Chocapikk/CVE-2022-26134)
- [AmoloHT/CVE-2022-26134](https://github.com/AmoloHT/CVE-2022-26134)
### CVE-2022-26155 (2022-02-28)