Auto Update 2022/09/01 00:16:54

This commit is contained in:
motikan2010-bot 2022-09-01 09:16:54 +09:00
parent 781805edd0
commit a802f68386
30 changed files with 98 additions and 473 deletions

File diff suppressed because one or more lines are too long

View file

@ -69,10 +69,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2022-08-26T13:10:30Z",
"updated_at": "2022-08-31T19:54:06Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 903,
"watchers_count": 903,
"stargazers_count": 904,
"watchers_count": 904,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 410,
"watchers": 903,
"watchers": 904,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "jenkins CVE-2017-1000353 POC",
"fork": false,
"created_at": "2019-04-12T13:24:26Z",
"updated_at": "2022-06-27T03:34:44Z",
"updated_at": "2022-08-31T23:02:43Z",
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2022-08-08T18:04:34Z",
"updated_at": "2022-08-31T20:25:00Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -1,30 +0,0 @@
[
{
"id": 140411928,
"name": "CVE-2018-12463",
"full_name": "alt3kx\/CVE-2018-12463",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
"fork": false,
"created_at": "2018-07-10T09:51:40Z",
"updated_at": "2021-10-08T04:36:54Z",
"pushed_at": "2022-04-07T19:09:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0
}
]

View file

@ -1,30 +0,0 @@
[
{
"id": 141165293,
"name": "prestashop-exploits",
"full_name": "ambionics\/prestashop-exploits",
"owner": {
"login": "ambionics",
"id": 29630660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
"html_url": "https:\/\/github.com\/ambionics"
},
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
"fork": false,
"created_at": "2018-07-16T16:33:41Z",
"updated_at": "2022-06-20T03:15:38Z",
"pushed_at": "2018-07-17T09:02:34Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 49,
"score": 0
}
]

View file

@ -423,34 +423,6 @@
"watchers": 0,
"score": 0
},
{
"id": 139417715,
"name": "CVE-2018-2628",
"full_name": "likescam\/CVE-2018-2628",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-2628",
"description": null,
"fork": false,
"created_at": "2018-07-02T09:00:34Z",
"updated_at": "2019-05-26T06:58:12Z",
"pushed_at": "2018-07-02T09:00:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 147341225,
"name": "WebLogic-RCE-exploit",

View file

@ -1,60 +1,4 @@
[
{
"id": 141531715,
"name": "CVE-2018-2893",
"full_name": "sry309\/CVE-2018-2893",
"owner": {
"login": "sry309",
"id": 15671013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15671013?v=4",
"html_url": "https:\/\/github.com\/sry309"
},
"html_url": "https:\/\/github.com\/sry309\/CVE-2018-2893",
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-07-19T06:06:10Z",
"updated_at": "2022-01-28T05:45:12Z",
"pushed_at": "2018-07-19T05:59:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 2,
"score": 0
},
{
"id": 141534186,
"name": "CVE-2018-2893",
"full_name": "ryanInf\/CVE-2018-2893",
"owner": {
"login": "ryanInf",
"id": 19621374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19621374?v=4",
"html_url": "https:\/\/github.com\/ryanInf"
},
"html_url": "https:\/\/github.com\/ryanInf\/CVE-2018-2893",
"description": "CVE-2018-2893 PoC",
"fork": false,
"created_at": "2018-07-19T06:28:12Z",
"updated_at": "2022-07-25T02:34:20Z",
"pushed_at": "2018-07-19T06:12:51Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 30,
"score": 0
},
{
"id": 141678694,
"name": "CVE-2018-2893",

View file

@ -1,60 +1,4 @@
[
{
"id": 141601079,
"name": "cve-2018-2894",
"full_name": "111ddea\/cve-2018-2894",
"owner": {
"login": "111ddea",
"id": 41444127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4",
"html_url": "https:\/\/github.com\/111ddea"
},
"html_url": "https:\/\/github.com\/111ddea\/cve-2018-2894",
"description": "cve-2018-2894 不同别人的利用方法。",
"fork": false,
"created_at": "2018-07-19T15:50:35Z",
"updated_at": "2021-10-22T07:46:36Z",
"pushed_at": "2018-07-22T08:34:27Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"score": 0
},
{
"id": 141661586,
"name": "CVE-2018-2894",
"full_name": "LandGrey\/CVE-2018-2894",
"owner": {
"login": "LandGrey",
"id": 16769779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16769779?v=4",
"html_url": "https:\/\/github.com\/LandGrey"
},
"html_url": "https:\/\/github.com\/LandGrey\/CVE-2018-2894",
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false,
"created_at": "2018-07-20T03:59:18Z",
"updated_at": "2022-07-22T01:55:17Z",
"pushed_at": "2018-07-20T12:46:50Z",
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 134,
"score": 0
},
{
"id": 151928392,
"name": "CVE-2018-2894",

View file

@ -27,34 +27,6 @@
"watchers": 118,
"score": 0
},
{
"id": 141314432,
"name": "CVE-2018-4121",
"full_name": "likescam\/CVE-2018-4121",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-4121",
"description": null,
"fork": false,
"created_at": "2018-07-17T16:15:29Z",
"updated_at": "2018-07-17T16:15:44Z",
"pushed_at": "2018-07-17T16:15:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 147746670,
"name": "CVE-2018-4121",

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2022-08-26T21:27:37Z",
"updated_at": "2022-08-31T19:31:13Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 458,
"watchers_count": 458,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 459,
"watchers": 458,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2022-08-07T20:53:58Z",
"updated_at": "2022-08-31T21:22:31Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 116,
"watchers": 345,
"watchers": 346,
"score": 0
},
{
@ -494,34 +494,6 @@
"watchers": 0,
"score": 0
},
{
"id": 140643631,
"name": "CVE-2018-7600",
"full_name": "happynote3966\/CVE-2018-7600",
"owner": {
"login": "happynote3966",
"id": 19719330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
"html_url": "https:\/\/github.com\/happynote3966"
},
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7600",
"description": null,
"fork": false,
"created_at": "2018-07-12T01:12:44Z",
"updated_at": "2018-07-17T03:24:11Z",
"pushed_at": "2018-07-17T03:24:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 151199861,
"name": "CVE-2018-7600-Drupal-RCE",

View file

@ -27,34 +27,6 @@
"watchers": 5,
"score": 0
},
{
"id": 140663638,
"name": "CVE-2018-7602",
"full_name": "happynote3966\/CVE-2018-7602",
"owner": {
"login": "happynote3966",
"id": 19719330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
"html_url": "https:\/\/github.com\/happynote3966"
},
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7602",
"description": null,
"fork": false,
"created_at": "2018-07-12T05:08:14Z",
"updated_at": "2018-07-17T02:57:18Z",
"pushed_at": "2018-07-17T02:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 155205612,
"name": "CVE-2018-7602",

View file

@ -111,34 +111,6 @@
"watchers": 1,
"score": 0
},
{
"id": 140478620,
"name": "cve-2018-8174_analysis",
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
"description": "Analysis of VBS exploit CVE-2018-8174",
"fork": false,
"created_at": "2018-07-10T19:31:25Z",
"updated_at": "2022-07-23T07:53:09Z",
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 19,
"score": 0
},
{
"id": 147615569,
"name": "CVE-2018-8174-msf",

View file

@ -1,30 +0,0 @@
[
{
"id": 144541015,
"name": "CVE-2018-8208",
"full_name": "kaisaryousuf\/CVE-2018-8208",
"owner": {
"login": "kaisaryousuf",
"id": 27071719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27071719?v=4",
"html_url": "https:\/\/github.com\/kaisaryousuf"
},
"html_url": "https:\/\/github.com\/kaisaryousuf\/CVE-2018-8208",
"description": null,
"fork": false,
"created_at": "2018-08-13T06:56:11Z",
"updated_at": "2018-11-12T16:22:38Z",
"pushed_at": "2018-06-21T15:06:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -246,10 +246,10 @@
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2021-12-05T21:57:04Z",
"updated_at": "2022-09-01T00:06:29Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -264,7 +264,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-31T04:10:01Z",
"updated_at": "2022-08-31T18:33:35Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3514,
"watchers_count": 3514,
"stargazers_count": 3513,
"watchers_count": 3513,
"forks_count": 1033,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1033,
"watchers": 3514,
"watchers": 3513,
"score": 0
},
{

View file

@ -419,10 +419,10 @@
"description": "Automated script for Citrix ADC scanner (CVE-2019-19781) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2020-01-13T07:42:27Z",
"updated_at": "2022-08-19T14:37:27Z",
"updated_at": "2022-09-01T00:06:07Z",
"pushed_at": "2020-01-14T15:53:14Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -1692,10 +1692,10 @@
"description": "CVE-2020-1472 C++",
"fork": false,
"created_at": "2022-08-31T06:01:02Z",
"updated_at": "2022-08-31T16:01:32Z",
"updated_at": "2022-08-31T22:45:05Z",
"pushed_at": "2022-08-31T13:40:11Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -1703,7 +1703,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 31,
"watchers": 34,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-31T04:10:01Z",
"updated_at": "2022-08-31T18:33:35Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3514,
"watchers_count": 3514,
"stargazers_count": 3513,
"watchers_count": 3513,
"forks_count": 1033,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1033,
"watchers": 3514,
"watchers": 3513,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2022-08-22T19:21:35Z",
"updated_at": "2022-08-31T20:47:05Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

View file

@ -1209,34 +1209,6 @@
"watchers": 1,
"score": 0
},
{
"id": 469573760,
"name": "dpipe",
"full_name": "notl0cal\/dpipe",
"owner": {
"login": "notl0cal",
"id": 24575356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24575356?v=4",
"html_url": "https:\/\/github.com\/notl0cal"
},
"html_url": "https:\/\/github.com\/notl0cal\/dpipe",
"description": "CVE-2022-0847 SUID Shell Backdoor",
"fork": false,
"created_at": "2022-03-14T03:58:21Z",
"updated_at": "2022-07-12T06:01:01Z",
"pushed_at": "2022-07-15T14:59:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 469743112,
"name": "CVE-2022-0847-POC",
@ -2077,5 +2049,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 531290655,
"name": "dpipe",
"full_name": "notl0cal\/dpipe",
"owner": {
"login": "notl0cal",
"id": 24575356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24575356?v=4",
"html_url": "https:\/\/github.com\/notl0cal"
},
"html_url": "https:\/\/github.com\/notl0cal\/dpipe",
"description": "Proof-of-concept exploit for the Dirty Pipe vulnerability (CVE-2022-0847)",
"fork": false,
"created_at": "2022-08-31T23:19:28Z",
"updated_at": "2022-08-31T23:24:51Z",
"pushed_at": "2022-08-31T23:25:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -237,10 +237,10 @@
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
"updated_at": "2022-08-31T10:19:22Z",
"updated_at": "2022-08-31T20:03:16Z",
"pushed_at": "2022-05-16T12:40:51Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -248,7 +248,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -42,7 +42,7 @@
"fork": false,
"created_at": "2022-08-25T14:12:33Z",
"updated_at": "2022-08-27T18:41:18Z",
"pushed_at": "2022-08-30T11:58:02Z",
"pushed_at": "2022-08-31T19:59:45Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,

View file

@ -75,7 +75,7 @@
"fork": false,
"created_at": "2022-08-31T16:23:16Z",
"updated_at": "2022-08-31T17:36:05Z",
"pushed_at": "2022-08-31T17:26:39Z",
"pushed_at": "2022-08-31T22:32:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -14,16 +14,16 @@
"fork": false,
"created_at": "2022-08-30T16:38:01Z",
"updated_at": "2022-08-31T09:20:50Z",
"pushed_at": "2022-08-31T18:22:30Z",
"pushed_at": "2022-08-31T19:41:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-25943",
"fork": false,
"created_at": "2021-07-09T23:34:57Z",
"updated_at": "2022-08-10T07:13:31Z",
"updated_at": "2022-08-31T18:22:55Z",
"pushed_at": "2022-03-09T08:26:45Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -182,10 +182,10 @@
"description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection",
"fork": false,
"created_at": "2022-06-03T19:24:30Z",
"updated_at": "2022-06-29T16:13:13Z",
"updated_at": "2022-08-31T18:28:54Z",
"pushed_at": "2022-06-03T19:59:01Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -193,7 +193,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
"updated_at": "2022-08-31T02:45:48Z",
"updated_at": "2022-08-31T20:23:35Z",
"pushed_at": "2022-06-16T12:42:43Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 168,
"watchers": 167,
"score": 0
},
{

View file

@ -207,7 +207,6 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits)
- [sa-infinity8888/Dirty-Pipe-CVE-2022-0847](https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847)
- [realbatuhan/dirtypipetester](https://github.com/realbatuhan/dirtypipetester)
- [notl0cal/dpipe](https://github.com/notl0cal/dpipe)
- [CYB3RK1D/CVE-2022-0847-POC](https://github.com/CYB3RK1D/CVE-2022-0847-POC)
- [breachnix/dirty-pipe-poc](https://github.com/breachnix/dirty-pipe-poc)
- [Shotokhan/cve_2022_0847_shellcode](https://github.com/Shotokhan/cve_2022_0847_shellcode)
@ -237,6 +236,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
- [irwx777/CVE-2022-0847](https://github.com/irwx777/CVE-2022-0847)
- [notl0cal/dpipe](https://github.com/notl0cal/dpipe)
### CVE-2022-0848 (2022-03-04)
@ -17783,7 +17783,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628)
- [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628)
- [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628)
- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628)
- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit)
- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628)
- [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628)
@ -17825,8 +17824,6 @@ Vulnerability in the Oracle Access Manager component of Oracle Fusion Middleware
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
</code>
- [sry309/CVE-2018-2893](https://github.com/sry309/CVE-2018-2893)
- [ryanInf/CVE-2018-2893](https://github.com/ryanInf/CVE-2018-2893)
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
@ -17839,8 +17836,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). Supported versions that are affected are 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
</code>
- [111ddea/cve-2018-2894](https://github.com/111ddea/cve-2018-2894)
- [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894)
- [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894)
- [k8gege/PyLadon](https://github.com/k8gege/PyLadon)
@ -18000,7 +17995,6 @@ An issue was discovered in certain Apple products. iOS before 11.3 is affected.
</code>
- [FSecureLABS/CVE-2018-4121](https://github.com/FSecureLABS/CVE-2018-4121)
- [likescam/CVE-2018-4121](https://github.com/likescam/CVE-2018-4121)
- [jezzus/CVE-2018-4121](https://github.com/jezzus/CVE-2018-4121)
### CVE-2018-4124 (2018-04-03)
@ -18644,7 +18638,6 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner)
- [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2)
- [jyo-zi/CVE-2018-7600](https://github.com/jyo-zi/CVE-2018-7600)
- [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600)
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600)
@ -18669,7 +18662,6 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
</code>
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
@ -18848,7 +18840,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
- [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP)
- [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174)
- [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174)
- [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis)
- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf)
- [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit)
- [ericisnotrealname/CVE-2018-8174_EXP](https://github.com/ericisnotrealname/CVE-2018-8174_EXP)
@ -18860,14 +18851,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
### CVE-2018-8208 (2018-06-14)
<code>
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka &quot;Windows Desktop Bridge Elevation of Privilege Vulnerability.&quot; This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214.
</code>
- [kaisaryousuf/CVE-2018-8208](https://github.com/kaisaryousuf/CVE-2018-8208)
### CVE-2018-8214 (2018-06-14)
<code>
@ -19567,14 +19550,6 @@ LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a us
- [reversebrain/CVE-2018-12421](https://github.com/reversebrain/CVE-2018-12421)
### CVE-2018-12463 (2018-07-12)
<code>
An XML external entity (XXE) vulnerability in Fortify Software Security Center (SSC), version 17.1, 17.2, 18.1 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
</code>
- [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463)
### CVE-2018-12533 (2018-06-18)
<code>
@ -19699,14 +19674,6 @@ An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.
- [shinecome/zip](https://github.com/shinecome/zip)
### CVE-2018-13784 (2018-07-09)
<code>
PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php.
</code>
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
### CVE-2018-13797 (2018-07-10)
<code>