Auto Update 2023/02/28 00:28:32

This commit is contained in:
motikan2010-bot 2023-02-28 09:28:32 +09:00
parent 9a223b1c7e
commit a9e6baa13b
30 changed files with 92 additions and 560 deletions

View file

@ -76,13 +76,13 @@
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 33,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 32,
"watchers": 71,
"score": 0
},

View file

@ -52,10 +52,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2023-02-22T15:55:11Z",
"updated_at": "2023-02-27T21:04:33Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 545,
"watchers_count": 545,
"stargazers_count": 546,
"watchers_count": 546,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 73,
"watchers": 545,
"watchers": 546,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
"fork": false,
"created_at": "2020-04-13T11:34:24Z",
"updated_at": "2023-02-09T08:22:46Z",
"updated_at": "2023-02-27T19:09:29Z",
"pushed_at": "2020-04-12T21:11:16Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 14,
"forks": 23,
"watchers": 15,
"score": 0
},
{
@ -42,7 +42,7 @@
"description": "CVE-2018-19320 LPE Exploit",
"fork": false,
"created_at": "2021-08-19T16:43:52Z",
"updated_at": "2022-11-20T17:00:42Z",
"updated_at": "2023-02-27T19:10:49Z",
"pushed_at": "2021-08-19T16:54:18Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -13,10 +13,10 @@
"description": "PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)",
"fork": false,
"created_at": "2019-03-02T18:31:11Z",
"updated_at": "2023-01-31T23:37:36Z",
"updated_at": "2023-02-27T18:39:34Z",
"pushed_at": "2020-01-15T12:34:10Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -720,13 +720,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 2,
"score": 0
},

View file

@ -183,10 +183,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2022-11-09T18:07:46Z",
"updated_at": "2023-02-27T22:23:57Z",
"pushed_at": "2022-08-07T06:36:30Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -195,7 +195,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -121,35 +121,6 @@
"watchers": 14,
"score": 0
},
{
"id": 277346592,
"name": "CVE-2020-5902",
"full_name": "yassineaboukir\/CVE-2020-5902",
"owner": {
"login": "yassineaboukir",
"id": 9937267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9937267?v=4",
"html_url": "https:\/\/github.com\/yassineaboukir"
},
"html_url": "https:\/\/github.com\/yassineaboukir\/CVE-2020-5902",
"description": "Proof of concept for CVE-2020-5902",
"fork": false,
"created_at": "2020-07-05T17:01:27Z",
"updated_at": "2022-02-19T13:35:53Z",
"pushed_at": "2020-07-06T17:47:17Z",
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 71,
"score": 0
},
{
"id": 277354676,
"name": "CVE-2020-5902-NSE",

View file

@ -335,10 +335,10 @@
"description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution",
"fork": false,
"created_at": "2022-04-16T22:49:47Z",
"updated_at": "2023-02-10T01:12:13Z",
"updated_at": "2023-02-27T19:25:14Z",
"pushed_at": "2022-06-07T23:09:29Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": true,
"forks_count": 2,
"allow_forking": true,
@ -360,7 +360,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 15,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false,
"created_at": "2021-01-21T10:39:42Z",
"updated_at": "2023-02-07T01:56:07Z",
"updated_at": "2023-02-27T19:42:38Z",
"pushed_at": "2022-03-28T05:19:18Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 71,
"watchers": 72,
"score": 0
}
]

View file

@ -196,10 +196,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2023-02-27T08:57:47Z",
"updated_at": "2023-02-27T19:57:54Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -208,7 +208,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 99,
"watchers": 100,
"score": 0
},
{
@ -551,10 +551,10 @@
"description": "Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation",
"fork": false,
"created_at": "2022-05-02T23:56:31Z",
"updated_at": "2023-02-10T01:15:05Z",
"updated_at": "2023-02-27T21:58:29Z",
"pushed_at": "2022-06-26T16:26:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -574,7 +574,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-02-27T03:11:51Z",
"updated_at": "2023-02-27T23:34:22Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1749,
"watchers_count": 1749,
"stargazers_count": 1750,
"watchers_count": 1750,
"has_discussions": false,
"forks_count": 505,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 505,
"watchers": 1749,
"watchers": 1750,
"score": 0
},
{
@ -3974,14 +3974,14 @@
{
"id": 479489237,
"name": "CVE-2021-4034",
"full_name": "ArkAngeL43\/CVE-2021-4034",
"full_name": "TotallyNotAHaxxer\/CVE-2021-4034",
"owner": {
"login": "ArkAngeL43",
"login": "TotallyNotAHaxxer",
"id": 87203697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4",
"html_url": "https:\/\/github.com\/ArkAngeL43"
"html_url": "https:\/\/github.com\/TotallyNotAHaxxer"
},
"html_url": "https:\/\/github.com\/ArkAngeL43\/CVE-2021-4034",
"html_url": "https:\/\/github.com\/TotallyNotAHaxxer\/CVE-2021-4034",
"description": "POC for the priv esc exploit in PKEXEC [ CVE -2021-4034 ] ( needs fixing, not the best) Converted into go",
"fork": false,
"created_at": "2022-04-08T17:55:53Z",

View file

@ -860,10 +860,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-02-21T05:12:05Z",
"updated_at": "2023-02-27T18:53:06Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 877,
"watchers_count": 877,
"stargazers_count": 878,
"watchers_count": 878,
"has_discussions": false,
"forks_count": 136,
"allow_forking": true,
@ -892,7 +892,7 @@
],
"visibility": "public",
"forks": 136,
"watchers": 877,
"watchers": 878,
"score": 0
},
{
@ -8697,14 +8697,14 @@
{
"id": 440009725,
"name": "f-for-java",
"full_name": "ArkAngeL43\/f-for-java",
"full_name": "TotallyNotAHaxxer\/f-for-java",
"owner": {
"login": "ArkAngeL43",
"login": "TotallyNotAHaxxer",
"id": 87203697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87203697?v=4",
"html_url": "https:\/\/github.com\/ArkAngeL43"
"html_url": "https:\/\/github.com\/TotallyNotAHaxxer"
},
"html_url": "https:\/\/github.com\/ArkAngeL43\/f-for-java",
"html_url": "https:\/\/github.com\/TotallyNotAHaxxer\/f-for-java",
"description": "a project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD",
"fork": false,
"created_at": "2021-12-20T01:31:06Z",

View file

@ -1,31 +0,0 @@
[
{
"id": 450128440,
"name": "CVE-2022-0219",
"full_name": "Haxatron\/CVE-2022-0219",
"owner": {
"login": "Haxatron",
"id": 76475453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
"html_url": "https:\/\/github.com\/Haxatron"
},
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
"description": null,
"fork": false,
"created_at": "2022-01-20T14:24:45Z",
"updated_at": "2022-01-20T14:24:45Z",
"pushed_at": "2022-01-20T14:35:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,62 +0,0 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2023-01-28T03:56:57Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 451918204,
"name": "CVE-2022-21371",
"full_name": "Mr-xn\/CVE-2022-21371",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-21371",
"description": "Oracle WebLogic Server 12.1.3.0.0 \/ 12.2.1.3.0 \/ 12.2.1.4.0 \/ 14.1.1.0.0 Local File Inclusion",
"fork": false,
"created_at": "2022-01-25T14:50:29Z",
"updated_at": "2022-11-22T02:30:33Z",
"pushed_at": "2022-01-25T14:52:21Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 26,
"score": 0
},
{
"id": 528880899,
"name": "Oracle-WebLogic-CVE-2022-21371",

View file

@ -1,35 +0,0 @@
[
{
"id": 450374545,
"name": "cve-2022-21658",
"full_name": "sagittarius-a\/cve-2022-21658",
"owner": {
"login": "sagittarius-a",
"id": 8809698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
"html_url": "https:\/\/github.com\/sagittarius-a"
},
"html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
"description": "POC for cve-2022-21658",
"fork": false,
"created_at": "2022-01-21T06:09:16Z",
"updated_at": "2022-01-21T06:10:05Z",
"pushed_at": "2022-01-21T06:09:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21658",
"poc",
"rust"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 446296593,
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"owner": {
"login": "UzJu",
"id": 50813806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
"html_url": "https:\/\/github.com\/UzJu"
},
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"description": "CVE-2022-21660",
"fork": false,
"created_at": "2022-01-10T05:50:35Z",
"updated_at": "2022-11-23T06:27:03Z",
"pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 26,
"score": 0
},
{
"id": 462232980,
"name": "CVE-2022-21660",

View file

@ -1,33 +1,4 @@
[
{
"id": 449096712,
"name": "CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
"full_name": "TAPESH-TEAM\/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
"owner": {
"login": "TAPESH-TEAM",
"id": 83407483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83407483?v=4",
"html_url": "https:\/\/github.com\/TAPESH-TEAM"
},
"html_url": "https:\/\/github.com\/TAPESH-TEAM\/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
"description": "WordPress Core 5.8.2 - 'WP_Query' SQL Injection",
"fork": false,
"created_at": "2022-01-18T01:05:04Z",
"updated_at": "2022-11-06T06:30:31Z",
"pushed_at": "2022-01-18T01:19:45Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"score": 0
},
{
"id": 458502807,
"name": "wordpress-CVE-2022-21661",

View file

@ -77,64 +77,6 @@
"watchers": 26,
"score": 0
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2023-01-12T11:43:26Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 101,
"watchers": 365,
"score": 0
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
@ -171,35 +113,6 @@
"watchers": 73,
"score": 0
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2023-01-14T13:43:20Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 18,
"score": 0
},
{
"id": 477659433,
"name": "CVE-2022-21907",

View file

@ -1,31 +0,0 @@
[
{
"id": 450430110,
"name": "CVE-2022-22296",
"full_name": "vlakhani28\/CVE-2022-22296",
"owner": {
"login": "vlakhani28",
"id": 42069316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
"html_url": "https:\/\/github.com\/vlakhani28"
},
"html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
"description": "All Details about CVE-2022-22296",
"fork": false,
"created_at": "2022-01-21T09:29:21Z",
"updated_at": "2022-10-02T03:41:44Z",
"pushed_at": "2022-01-21T09:45:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 450827017,
"name": "CVE-2022-23046",
"full_name": "jcarabantes\/CVE-2022-23046",
"owner": {
"login": "jcarabantes",
"id": 9590425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9590425?v=4",
"html_url": "https:\/\/github.com\/jcarabantes"
},
"html_url": "https:\/\/github.com\/jcarabantes\/CVE-2022-23046",
"description": null,
"fork": false,
"created_at": "2022-01-22T13:35:40Z",
"updated_at": "2022-02-16T08:00:53Z",
"pushed_at": "2022-01-24T17:29:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 459366538,
"name": "CVE-2022-23046",

View file

@ -1,33 +0,0 @@
[
{
"id": 450360735,
"name": "CVE-2022-RCE",
"full_name": "AlphabugX\/CVE-2022-RCE",
"owner": {
"login": "AlphabugX",
"id": 27001865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/AlphabugX"
},
"html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
"fork": false,
"created_at": "2022-01-21T05:07:59Z",
"updated_at": "2022-11-05T22:58:02Z",
"pushed_at": "2022-01-21T05:21:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -168,7 +168,7 @@
"description": "Exploit for CVE-202225765 (pdfkit) - Command Injection",
"fork": false,
"created_at": "2023-02-10T00:50:35Z",
"updated_at": "2023-02-25T03:21:02Z",
"updated_at": "2023-02-27T21:55:11Z",
"pushed_at": "2023-02-24T22:43:55Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2023-02-16T19:39:14Z",
"updated_at": "2023-02-27T21:42:35Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 530,
"watchers_count": 530,
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 108,
"watchers": 530,
"watchers": 531,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
"fork": false,
"created_at": "2023-01-13T21:27:03Z",
"updated_at": "2023-02-11T03:45:12Z",
"updated_at": "2023-02-27T18:49:00Z",
"pushed_at": "2023-01-20T10:31:58Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-26T02:33:54Z",
"updated_at": "2023-02-27T15:48:03Z",
"updated_at": "2023-02-27T19:31:54Z",
"pushed_at": "2023-02-26T22:38:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2023-02-27T16:59:02Z",
"updated_at": "2023-02-27T23:19:24Z",
"pushed_at": "2023-02-27T04:51:20Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 167,
"watchers": 168,
"score": 0
},
{
@ -81,10 +81,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-02-13T06:11:40Z",
"updated_at": "2023-02-17T18:26:15Z",
"updated_at": "2023-02-27T19:09:35Z",
"pushed_at": "2023-02-13T09:03:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-02-27T17:45:39Z",
"updated_at": "2023-02-27T23:40:58Z",
"pushed_at": "2023-02-27T01:41:18Z",
"stargazers_count": 306,
"watchers_count": 306,
"stargazers_count": 313,
"watchers_count": 313,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 306,
"watchers": 313,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-02-27T17:46:20Z",
"updated_at": "2023-02-28T00:27:27Z",
"pushed_at": "2023-02-24T15:39:38Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 48,
"watchers": 50,
"score": 0
}
]

View file

@ -238,23 +238,6 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
### CVE-2022-0219 (2022-01-20)
<code>
Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
</code>
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
### CVE-2022-0236 (2022-01-18)
<code>
The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
<code>
@ -1315,7 +1298,6 @@ A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Se
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
</code>
- [Mr-xn/CVE-2022-21371](https://github.com/Mr-xn/CVE-2022-21371)
- [Vulnmachines/Oracle-WebLogic-CVE-2022-21371](https://github.com/Vulnmachines/Oracle-WebLogic-CVE-2022-21371)
### CVE-2022-21449 (2022-04-19)
@ -1343,21 +1325,12 @@ Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracl
- [hieuminhnv/CVE-2022-21587-POC](https://github.com/hieuminhnv/CVE-2022-21587-POC)
- [Zh1z3ven/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/Zh1z3ven/Oracle-E-BS-CVE-2022-21587-Exploit)
### CVE-2022-21658 (2022-01-20)
<code>
Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
</code>
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
### CVE-2022-21660 (2022-02-09)
<code>
Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
</code>
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@ -1366,7 +1339,6 @@ Gin-vue-admin is a backstage management system based on vue and gin. In versions
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
</code>
- [TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection](https://github.com/TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection)
- [purple-WL/wordpress-CVE-2022-21661](https://github.com/purple-WL/wordpress-CVE-2022-21661)
- [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661)
- [PyterSmithDarkGhost/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection-main](https://github.com/PyterSmithDarkGhost/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection-main)
@ -1453,10 +1425,7 @@ HTTP Protocol Stack Remote Code Execution Vulnerability.
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
@ -1522,14 +1491,6 @@ A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allo
- [pwneddr/Sonic_CVE-2022-22274_poc](https://github.com/pwneddr/Sonic_CVE-2022-22274_poc)
### CVE-2022-22296 (2022-01-24)
<code>
Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
</code>
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
### CVE-2022-22536 (2022-02-09)
<code>
@ -1539,7 +1500,12 @@ SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, AB
- [antx-code/CVE-2022-22536](https://github.com/antx-code/CVE-2022-22536)
- [tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536](https://github.com/tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536)
### CVE-2022-22582
### CVE-2022-22582 (2023-02-27)
<code>
A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5, macOS Monterey 12.3. A local user may be able to write arbitrary files.
</code>
- [poizon-box/CVE-2022-22582](https://github.com/poizon-box/CVE-2022-22582)
### CVE-2022-22588 (2022-03-18)
@ -1941,7 +1907,6 @@ A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Qu
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the &quot;subnet&quot; parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
</code>
- [jcarabantes/CVE-2022-23046](https://github.com/jcarabantes/CVE-2022-23046)
- [dnr6419/CVE-2022-23046](https://github.com/dnr6419/CVE-2022-23046)
- [hadrian3689/phpipam_1.4.4](https://github.com/hadrian3689/phpipam_1.4.4)
- [bernauers/CVE-2022-23046](https://github.com/bernauers/CVE-2022-23046)
@ -2014,14 +1979,6 @@ The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10
- [skulkarni-mv/hostapd_mirror](https://github.com/skulkarni-mv/hostapd_mirror)
### CVE-2022-23305 (2022-01-18)
<code>
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
</code>
- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
### CVE-2022-23342 (2022-06-21)
<code>
@ -7313,7 +7270,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [Pajarraco4444/CVE-2021-4034](https://github.com/Pajarraco4444/CVE-2021-4034)
- [jcatala/f_poc_cve-2021-4034](https://github.com/jcatala/f_poc_cve-2021-4034)
- [Nosferatuvjr/PwnKit](https://github.com/Nosferatuvjr/PwnKit)
- [ArkAngeL43/CVE-2021-4034](https://github.com/ArkAngeL43/CVE-2021-4034)
- [TotallyNotAHaxxer/CVE-2021-4034](https://github.com/TotallyNotAHaxxer/CVE-2021-4034)
- [rhin0cer0s/CVE-2021-4034](https://github.com/rhin0cer0s/CVE-2021-4034)
- [0x4ndy/CVE-2021-4034-PoC](https://github.com/0x4ndy/CVE-2021-4034-PoC)
- [antoinenguyen-09/CVE-2021-4034](https://github.com/antoinenguyen-09/CVE-2021-4034)
@ -12096,7 +12053,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [puzzlepeaches/Log4jCenter](https://github.com/puzzlepeaches/Log4jCenter)
- [Labout/log4shell-rmi-poc](https://github.com/Labout/log4shell-rmi-poc)
- [djungeldan/Log4Me](https://github.com/djungeldan/Log4Me)
- [ArkAngeL43/f-for-java](https://github.com/ArkAngeL43/f-for-java)
- [TotallyNotAHaxxer/f-for-java](https://github.com/TotallyNotAHaxxer/f-for-java)
- [spasam/log4j2-exploit](https://github.com/spasam/log4j2-exploit)
- [bumheehan/cve-2021-44228-log4j-test](https://github.com/bumheehan/cve-2021-44228-log4j-test)
- [JagarYousef/log4j-dork-scanner](https://github.com/JagarYousef/log4j-dork-scanner)
@ -14244,7 +14201,6 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
- [aqhmal/CVE-2020-5902-Scanner](https://github.com/aqhmal/CVE-2020-5902-Scanner)
- [jas502n/CVE-2020-5902](https://github.com/jas502n/CVE-2020-5902)
- [ar0dd/CVE-2020-5902](https://github.com/ar0dd/CVE-2020-5902)
- [yassineaboukir/CVE-2020-5902](https://github.com/yassineaboukir/CVE-2020-5902)
- [rwincey/CVE-2020-5902-NSE](https://github.com/rwincey/CVE-2020-5902-NSE)
- [un4gi/CVE-2020-5902](https://github.com/un4gi/CVE-2020-5902)
- [nsflabs/CVE-2020-5902](https://github.com/nsflabs/CVE-2020-5902)