mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/03/09 06:14:55
This commit is contained in:
parent
22cde13571
commit
a9ec3ebfbf
44 changed files with 486 additions and 355 deletions
|
@ -44,12 +44,12 @@
|
||||||
"pushed_at": "2016-06-30T15:32:42Z",
|
"pushed_at": "2016-06-30T15:32:42Z",
|
||||||
"stargazers_count": 317,
|
"stargazers_count": 317,
|
||||||
"watchers_count": 317,
|
"watchers_count": 317,
|
||||||
"forks_count": 111,
|
"forks_count": 112,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 111,
|
"forks": 112,
|
||||||
"watchers": 317,
|
"watchers": 317,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -44,12 +44,12 @@
|
||||||
"pushed_at": "2016-06-30T15:32:42Z",
|
"pushed_at": "2016-06-30T15:32:42Z",
|
||||||
"stargazers_count": 317,
|
"stargazers_count": 317,
|
||||||
"watchers_count": 317,
|
"watchers_count": 317,
|
||||||
"forks_count": 111,
|
"forks_count": 112,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 111,
|
"forks": 112,
|
||||||
"watchers": 317,
|
"watchers": 317,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -67,17 +67,17 @@
|
||||||
"description": "一个针对shiro反序列化漏洞(CVE-2016-4437)的快速利用工具\/A simple tool targeted at shiro framework attacks with ysoserial.",
|
"description": "一个针对shiro反序列化漏洞(CVE-2016-4437)的快速利用工具\/A simple tool targeted at shiro framework attacks with ysoserial.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-23T16:29:59Z",
|
"created_at": "2021-12-23T16:29:59Z",
|
||||||
"updated_at": "2022-02-10T06:22:47Z",
|
"updated_at": "2022-03-09T00:48:51Z",
|
||||||
"pushed_at": "2022-01-01T11:08:42Z",
|
"pushed_at": "2022-01-01T11:08:42Z",
|
||||||
"stargazers_count": 10,
|
"stargazers_count": 11,
|
||||||
"watchers_count": 10,
|
"watchers_count": 11,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 10,
|
"watchers": 11,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -67,17 +67,17 @@
|
||||||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-10-21T11:19:21Z",
|
"created_at": "2016-10-21T11:19:21Z",
|
||||||
"updated_at": "2022-03-08T15:45:01Z",
|
"updated_at": "2022-03-09T05:35:24Z",
|
||||||
"pushed_at": "2021-02-03T16:03:40Z",
|
"pushed_at": "2021-02-03T16:03:40Z",
|
||||||
"stargazers_count": 895,
|
"stargazers_count": 896,
|
||||||
"watchers_count": 895,
|
"watchers_count": 896,
|
||||||
"forks_count": 410,
|
"forks_count": 410,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 410,
|
"forks": 410,
|
||||||
"watchers": 895,
|
"watchers": 896,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1065,17 +1065,17 @@
|
||||||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:36:50Z",
|
"created_at": "2022-03-07T18:36:50Z",
|
||||||
"updated_at": "2022-03-08T18:07:01Z",
|
"updated_at": "2022-03-09T05:51:08Z",
|
||||||
"pushed_at": "2022-03-07T19:25:58Z",
|
"pushed_at": "2022-03-09T05:27:59Z",
|
||||||
"stargazers_count": 60,
|
"stargazers_count": 74,
|
||||||
"watchers_count": 60,
|
"watchers_count": 74,
|
||||||
"forks_count": 20,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 20,
|
"forks": 24,
|
||||||
"watchers": 60,
|
"watchers": 74,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
|
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-13T11:34:24Z",
|
"created_at": "2020-04-13T11:34:24Z",
|
||||||
"updated_at": "2022-02-22T05:27:06Z",
|
"updated_at": "2022-03-09T03:22:28Z",
|
||||||
"pushed_at": "2020-04-12T21:11:16Z",
|
"pushed_at": "2020-04-12T21:11:16Z",
|
||||||
"stargazers_count": 10,
|
"stargazers_count": 11,
|
||||||
"watchers_count": 10,
|
"watchers_count": 11,
|
||||||
"forks_count": 15,
|
"forks_count": 16,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 15,
|
"forks": 16,
|
||||||
"watchers": 10,
|
"watchers": 11,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,10 +40,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-03-08T04:35:19Z",
|
"updated_at": "2022-03-09T05:42:02Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3197,
|
"stargazers_count": 3198,
|
||||||
"watchers_count": 3197,
|
"watchers_count": 3198,
|
||||||
"forks_count": 949,
|
"forks_count": 949,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -70,7 +70,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 949,
|
"forks": 949,
|
||||||
"watchers": 3197,
|
"watchers": 3198,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-02-12T06:02:06Z",
|
"created_at": "2019-02-12T06:02:06Z",
|
||||||
"updated_at": "2022-02-15T06:42:04Z",
|
"updated_at": "2022-03-09T02:21:01Z",
|
||||||
"pushed_at": "2019-05-09T21:34:26Z",
|
"pushed_at": "2019-05-09T21:34:26Z",
|
||||||
"stargazers_count": 615,
|
"stargazers_count": 616,
|
||||||
"watchers_count": 615,
|
"watchers_count": 616,
|
||||||
"forks_count": 154,
|
"forks_count": 154,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -27,7 +27,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 154,
|
"forks": 154,
|
||||||
"watchers": 615,
|
"watchers": 616,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "Test tool for CVE-2020-1472",
|
"description": "Test tool for CVE-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-08T08:58:37Z",
|
"created_at": "2020-09-08T08:58:37Z",
|
||||||
"updated_at": "2022-03-07T07:57:01Z",
|
"updated_at": "2022-03-09T02:34:29Z",
|
||||||
"pushed_at": "2021-12-08T10:31:54Z",
|
"pushed_at": "2021-12-08T10:31:54Z",
|
||||||
"stargazers_count": 1428,
|
"stargazers_count": 1429,
|
||||||
"watchers_count": 1428,
|
"watchers_count": 1429,
|
||||||
"forks_count": 321,
|
"forks_count": 321,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 321,
|
"forks": 321,
|
||||||
"watchers": 1428,
|
"watchers": 1429,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -94,17 +94,17 @@
|
||||||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-14T16:56:51Z",
|
"created_at": "2020-09-14T16:56:51Z",
|
||||||
"updated_at": "2022-03-08T23:44:21Z",
|
"updated_at": "2022-03-09T02:34:27Z",
|
||||||
"pushed_at": "2020-11-03T09:45:24Z",
|
"pushed_at": "2020-11-03T09:45:24Z",
|
||||||
"stargazers_count": 905,
|
"stargazers_count": 906,
|
||||||
"watchers_count": 905,
|
"watchers_count": 906,
|
||||||
"forks_count": 247,
|
"forks_count": 247,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 247,
|
"forks": 247,
|
||||||
"watchers": 905,
|
"watchers": 906,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-03-08T04:35:19Z",
|
"updated_at": "2022-03-09T05:42:02Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3197,
|
"stargazers_count": 3198,
|
||||||
"watchers_count": 3197,
|
"watchers_count": 3198,
|
||||||
"forks_count": 949,
|
"forks_count": 949,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -43,7 +43,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 949,
|
"forks": 949,
|
||||||
"watchers": 3197,
|
"watchers": 3198,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -94,17 +94,17 @@
|
||||||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-02-20T21:00:15Z",
|
"created_at": "2020-02-20T21:00:15Z",
|
||||||
"updated_at": "2022-03-07T11:43:38Z",
|
"updated_at": "2022-03-09T00:50:44Z",
|
||||||
"pushed_at": "2021-11-26T07:40:35Z",
|
"pushed_at": "2021-11-26T07:40:35Z",
|
||||||
"stargazers_count": 248,
|
"stargazers_count": 249,
|
||||||
"watchers_count": 248,
|
"watchers_count": 249,
|
||||||
"forks_count": 100,
|
"forks_count": 100,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 100,
|
"forks": 100,
|
||||||
"watchers": 248,
|
"watchers": 249,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-07-31T13:00:15Z",
|
"created_at": "2021-07-31T13:00:15Z",
|
||||||
"updated_at": "2022-01-27T04:10:26Z",
|
"updated_at": "2022-01-27T04:10:26Z",
|
||||||
"pushed_at": "2021-07-31T13:03:50Z",
|
"pushed_at": "2022-03-09T02:57:14Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "PoC of SQL Injection vul(CVE-2020-9483,Apache SkyWalking)",
|
"description": "PoC of SQL Injection vul(CVE-2020-9483,Apache SkyWalking)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-07-19T06:50:17Z",
|
"created_at": "2021-07-19T06:50:17Z",
|
||||||
"updated_at": "2021-10-29T02:37:46Z",
|
"updated_at": "2022-03-09T02:42:51Z",
|
||||||
"pushed_at": "2021-07-19T07:01:19Z",
|
"pushed_at": "2021-07-19T07:01:19Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-05-25T17:14:38Z",
|
"created_at": "2021-05-25T17:14:38Z",
|
||||||
"updated_at": "2022-03-08T23:59:16Z",
|
"updated_at": "2022-03-09T03:06:38Z",
|
||||||
"pushed_at": "2021-07-09T19:38:41Z",
|
"pushed_at": "2021-07-09T19:38:41Z",
|
||||||
"stargazers_count": 70,
|
"stargazers_count": 71,
|
||||||
"watchers_count": 70,
|
"watchers_count": 71,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 70,
|
"watchers": 71,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -128,17 +128,17 @@
|
||||||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-06-03T09:59:21Z",
|
"created_at": "2021-06-03T09:59:21Z",
|
||||||
"updated_at": "2022-03-08T10:40:00Z",
|
"updated_at": "2022-03-09T05:56:27Z",
|
||||||
"pushed_at": "2021-06-09T10:13:56Z",
|
"pushed_at": "2021-06-09T10:13:56Z",
|
||||||
"stargazers_count": 323,
|
"stargazers_count": 324,
|
||||||
"watchers_count": 323,
|
"watchers_count": 324,
|
||||||
"forks_count": 72,
|
"forks_count": 72,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 72,
|
"forks": 72,
|
||||||
"watchers": 323,
|
"watchers": 324,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -44,12 +44,12 @@
|
||||||
"pushed_at": "2021-10-27T09:23:11Z",
|
"pushed_at": "2021-10-27T09:23:11Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -121,10 +121,10 @@
|
||||||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-29T04:30:45Z",
|
"created_at": "2021-10-29T04:30:45Z",
|
||||||
"updated_at": "2022-03-04T09:27:05Z",
|
"updated_at": "2022-03-09T03:19:02Z",
|
||||||
"pushed_at": "2021-11-06T05:20:30Z",
|
"pushed_at": "2021-11-06T05:20:30Z",
|
||||||
"stargazers_count": 147,
|
"stargazers_count": 148,
|
||||||
"watchers_count": 147,
|
"watchers_count": 148,
|
||||||
"forks_count": 65,
|
"forks_count": 65,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -133,7 +133,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 65,
|
"forks": 65,
|
||||||
"watchers": 147,
|
"watchers": 148,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -204,10 +204,10 @@
|
||||||
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
|
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-31T04:15:30Z",
|
"created_at": "2021-10-31T04:15:30Z",
|
||||||
"updated_at": "2022-02-27T19:20:35Z",
|
"updated_at": "2022-03-09T03:13:19Z",
|
||||||
"pushed_at": "2021-11-04T12:49:58Z",
|
"pushed_at": "2021-11-04T12:49:58Z",
|
||||||
"stargazers_count": 25,
|
"stargazers_count": 26,
|
||||||
"watchers_count": 25,
|
"watchers_count": 26,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -216,7 +216,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 25,
|
"watchers": 26,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,12 +17,12 @@
|
||||||
"pushed_at": "2021-12-03T22:09:31Z",
|
"pushed_at": "2021-12-03T22:09:31Z",
|
||||||
"stargazers_count": 264,
|
"stargazers_count": 264,
|
||||||
"watchers_count": 264,
|
"watchers_count": 264,
|
||||||
"forks_count": 66,
|
"forks_count": 67,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 66,
|
"forks": 67,
|
||||||
"watchers": 264,
|
"watchers": 264,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -94,17 +94,17 @@
|
||||||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-01T12:41:03Z",
|
"created_at": "2022-03-01T12:41:03Z",
|
||||||
"updated_at": "2022-03-08T21:43:50Z",
|
"updated_at": "2022-03-09T01:22:01Z",
|
||||||
"pushed_at": "2022-03-01T16:11:31Z",
|
"pushed_at": "2022-03-01T16:11:31Z",
|
||||||
"stargazers_count": 205,
|
"stargazers_count": 206,
|
||||||
"watchers_count": 205,
|
"watchers_count": 206,
|
||||||
"forks_count": 34,
|
"forks_count": 34,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 34,
|
"forks": 34,
|
||||||
"watchers": 205,
|
"watchers": 206,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -265,7 +265,7 @@
|
||||||
"description": "CVE-2022-21907: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
|
"description": "CVE-2022-21907: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:56:52Z",
|
"created_at": "2022-03-07T18:56:52Z",
|
||||||
"updated_at": "2022-03-08T13:20:20Z",
|
"updated_at": "2022-03-09T00:31:46Z",
|
||||||
"pushed_at": "2022-03-07T19:47:48Z",
|
"pushed_at": "2022-03-07T19:47:48Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-06-24T18:50:17Z",
|
"created_at": "2021-06-24T18:50:17Z",
|
||||||
"updated_at": "2022-03-08T23:24:03Z",
|
"updated_at": "2022-03-09T02:57:19Z",
|
||||||
"pushed_at": "2021-08-25T19:26:21Z",
|
"pushed_at": "2021-08-25T19:26:21Z",
|
||||||
"stargazers_count": 220,
|
"stargazers_count": 224,
|
||||||
"watchers_count": 220,
|
"watchers_count": 224,
|
||||||
"forks_count": 44,
|
"forks_count": 45,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 44,
|
"forks": 45,
|
||||||
"watchers": 220,
|
"watchers": 224,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,11 +13,11 @@
|
||||||
"description": "CVE-2021-3707 , CVE-2021-3708",
|
"description": "CVE-2021-3707 , CVE-2021-3708",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-05-29T12:24:04Z",
|
"created_at": "2021-05-29T12:24:04Z",
|
||||||
"updated_at": "2022-02-03T15:16:23Z",
|
"updated_at": "2022-03-09T03:28:28Z",
|
||||||
"pushed_at": "2022-01-21T17:30:09Z",
|
"pushed_at": "2022-01-21T17:30:09Z",
|
||||||
"stargazers_count": 14,
|
"stargazers_count": 15,
|
||||||
"watchers_count": 14,
|
"watchers_count": 15,
|
||||||
"forks_count": 5,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -25,8 +25,8 @@
|
||||||
"cve-2021-3708"
|
"cve-2021-3708"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 5,
|
"forks": 6,
|
||||||
"watchers": 14,
|
"watchers": 15,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -187,10 +187,10 @@
|
||||||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-26T00:56:36Z",
|
"created_at": "2022-01-26T00:56:36Z",
|
||||||
"updated_at": "2022-03-08T23:40:22Z",
|
"updated_at": "2022-03-09T04:29:35Z",
|
||||||
"pushed_at": "2022-02-12T05:22:58Z",
|
"pushed_at": "2022-02-12T05:22:58Z",
|
||||||
"stargazers_count": 806,
|
"stargazers_count": 807,
|
||||||
"watchers_count": 806,
|
"watchers_count": 807,
|
||||||
"forks_count": 263,
|
"forks_count": 263,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -201,7 +201,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 263,
|
"forks": 263,
|
||||||
"watchers": 806,
|
"watchers": 807,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -276,12 +276,12 @@
|
||||||
"pushed_at": "2022-01-27T15:13:51Z",
|
"pushed_at": "2022-01-27T15:13:51Z",
|
||||||
"stargazers_count": 78,
|
"stargazers_count": 78,
|
||||||
"watchers_count": 78,
|
"watchers_count": 78,
|
||||||
"forks_count": 29,
|
"forks_count": 30,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 29,
|
"forks": 30,
|
||||||
"watchers": 78,
|
"watchers": 78,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -908,10 +908,10 @@
|
||||||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-26T14:26:10Z",
|
"created_at": "2022-01-26T14:26:10Z",
|
||||||
"updated_at": "2022-03-08T07:39:02Z",
|
"updated_at": "2022-03-09T05:59:39Z",
|
||||||
"pushed_at": "2022-01-27T20:09:24Z",
|
"pushed_at": "2022-01-27T20:09:24Z",
|
||||||
"stargazers_count": 453,
|
"stargazers_count": 454,
|
||||||
"watchers_count": 453,
|
"watchers_count": 454,
|
||||||
"forks_count": 81,
|
"forks_count": 81,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -920,7 +920,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 81,
|
"forks": 81,
|
||||||
"watchers": 453,
|
"watchers": 454,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1049,12 +1049,12 @@
|
||||||
"pushed_at": "2022-01-28T00:38:03Z",
|
"pushed_at": "2022-01-28T00:38:03Z",
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 21,
|
||||||
"watchers_count": 21,
|
"watchers_count": 21,
|
||||||
"forks_count": 3,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 4,
|
||||||
"watchers": 21,
|
"watchers": 21,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -1261,10 +1261,10 @@
|
||||||
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-26T18:01:26Z",
|
"created_at": "2022-01-26T18:01:26Z",
|
||||||
"updated_at": "2022-03-08T22:59:37Z",
|
"updated_at": "2022-03-09T02:58:20Z",
|
||||||
"pushed_at": "2022-02-07T15:42:00Z",
|
"pushed_at": "2022-02-07T15:42:00Z",
|
||||||
"stargazers_count": 35,
|
"stargazers_count": 36,
|
||||||
"watchers_count": 35,
|
"watchers_count": 36,
|
||||||
"forks_count": 6,
|
"forks_count": 6,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -1287,7 +1287,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 6,
|
||||||
"watchers": 35,
|
"watchers": 36,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -3495,5 +3495,32 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467743719,
|
||||||
|
"name": "CVE-2021-4034-bug-root",
|
||||||
|
"full_name": "bakhtiyarsierad\/CVE-2021-4034-bug-root",
|
||||||
|
"owner": {
|
||||||
|
"login": "bakhtiyarsierad",
|
||||||
|
"id": 7570307,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7570307?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/bakhtiyarsierad"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/bakhtiyarsierad\/CVE-2021-4034-bug-root",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T02:04:07Z",
|
||||||
|
"updated_at": "2022-03-09T02:04:19Z",
|
||||||
|
"pushed_at": "2022-03-09T02:04:16Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1,31 +1,4 @@
|
||||||
[
|
[
|
||||||
{
|
|
||||||
"id": 418310369,
|
|
||||||
"name": "CVE-2021-40438",
|
|
||||||
"full_name": "xiaojiangxl\/CVE-2021-40438",
|
|
||||||
"owner": {
|
|
||||||
"login": "xiaojiangxl",
|
|
||||||
"id": 58814935,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814935?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/xiaojiangxl"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/xiaojiangxl\/CVE-2021-40438",
|
|
||||||
"description": null,
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2021-10-18T02:02:43Z",
|
|
||||||
"updated_at": "2021-11-04T23:44:09Z",
|
|
||||||
"pushed_at": "2021-10-18T02:42:25Z",
|
|
||||||
"stargazers_count": 2,
|
|
||||||
"watchers_count": 2,
|
|
||||||
"forks_count": 2,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 2,
|
|
||||||
"watchers": 2,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 420650239,
|
"id": 420650239,
|
||||||
"name": "CVE-2021-40438",
|
"name": "CVE-2021-40438",
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2021-40444 PoC",
|
"description": "CVE-2021-40444 PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-09-10T16:55:53Z",
|
"created_at": "2021-09-10T16:55:53Z",
|
||||||
"updated_at": "2022-03-07T15:01:01Z",
|
"updated_at": "2022-03-09T05:22:24Z",
|
||||||
"pushed_at": "2021-12-25T18:31:02Z",
|
"pushed_at": "2021-12-25T18:31:02Z",
|
||||||
"stargazers_count": 1380,
|
"stargazers_count": 1381,
|
||||||
"watchers_count": 1380,
|
"watchers_count": 1381,
|
||||||
"forks_count": 452,
|
"forks_count": 453,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 452,
|
"forks": 453,
|
||||||
"watchers": 1380,
|
"watchers": 1381,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -229,17 +229,17 @@
|
||||||
"description": "CVE-2021-40444",
|
"description": "CVE-2021-40444",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-19T08:16:07Z",
|
"created_at": "2021-12-19T08:16:07Z",
|
||||||
"updated_at": "2022-03-05T06:35:54Z",
|
"updated_at": "2022-03-09T03:25:39Z",
|
||||||
"pushed_at": "2021-12-19T08:27:33Z",
|
"pushed_at": "2021-12-19T08:27:33Z",
|
||||||
"stargazers_count": 56,
|
"stargazers_count": 57,
|
||||||
"watchers_count": 56,
|
"watchers_count": 57,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 56,
|
"watchers": 57,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-02T19:07:37Z",
|
"created_at": "2022-03-02T19:07:37Z",
|
||||||
"updated_at": "2022-03-09T00:07:03Z",
|
"updated_at": "2022-03-09T05:12:26Z",
|
||||||
"pushed_at": "2022-03-08T15:37:34Z",
|
"pushed_at": "2022-03-08T15:37:34Z",
|
||||||
"stargazers_count": 15,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 15,
|
"watchers_count": 32,
|
||||||
"forks_count": 3,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 8,
|
||||||
"watchers": 15,
|
"watchers": 32,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -228,45 +228,6 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"id": 418481558,
|
|
||||||
"name": "CVE-2021-41773_42013",
|
|
||||||
"full_name": "vulf\/CVE-2021-41773_42013",
|
|
||||||
"owner": {
|
|
||||||
"login": "vulf",
|
|
||||||
"id": 37404408,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37404408?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/vulf"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/vulf\/CVE-2021-41773_42013",
|
|
||||||
"description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2021-10-18T12:01:58Z",
|
|
||||||
"updated_at": "2021-12-10T06:09:44Z",
|
|
||||||
"pushed_at": "2021-10-18T12:47:56Z",
|
|
||||||
"stargazers_count": 1,
|
|
||||||
"watchers_count": 1,
|
|
||||||
"forks_count": 2,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"topics": [
|
|
||||||
"apache",
|
|
||||||
"cve",
|
|
||||||
"cve-2021-41773",
|
|
||||||
"cve-2021-42013",
|
|
||||||
"httpd",
|
|
||||||
"lfi",
|
|
||||||
"penetration-testing",
|
|
||||||
"rce",
|
|
||||||
"security",
|
|
||||||
"vulnerable",
|
|
||||||
"web"
|
|
||||||
],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 2,
|
|
||||||
"watchers": 1,
|
|
||||||
"score": 0
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": 419143683,
|
"id": 419143683,
|
||||||
"name": "CVE-2021-41773",
|
"name": "CVE-2021-41773",
|
||||||
|
|
|
@ -358,12 +358,12 @@
|
||||||
"pushed_at": "2022-03-04T10:49:00Z",
|
"pushed_at": "2022-03-04T10:49:00Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 31,
|
||||||
"watchers_count": 31,
|
"watchers_count": 31,
|
||||||
"forks_count": 7,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 8,
|
||||||
"watchers": 31,
|
"watchers": 31,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-03T17:11:54Z",
|
"created_at": "2022-01-03T17:11:54Z",
|
||||||
"updated_at": "2022-01-07T09:35:44Z",
|
"updated_at": "2022-03-09T03:11:08Z",
|
||||||
"pushed_at": "2022-01-03T14:15:40Z",
|
"pushed_at": "2022-01-03T14:15:40Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"forks_count": 6,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 7,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -417,10 +417,10 @@
|
||||||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T12:38:20Z",
|
"created_at": "2021-12-10T12:38:20Z",
|
||||||
"updated_at": "2022-03-07T10:46:18Z",
|
"updated_at": "2022-03-09T02:15:22Z",
|
||||||
"pushed_at": "2022-02-24T12:04:51Z",
|
"pushed_at": "2022-02-24T12:04:51Z",
|
||||||
"stargazers_count": 958,
|
"stargazers_count": 959,
|
||||||
"watchers_count": 958,
|
"watchers_count": 959,
|
||||||
"forks_count": 399,
|
"forks_count": 399,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -429,7 +429,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 399,
|
"forks": 399,
|
||||||
"watchers": 958,
|
"watchers": 959,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -907,11 +907,11 @@
|
||||||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T23:19:28Z",
|
"created_at": "2021-12-10T23:19:28Z",
|
||||||
"updated_at": "2022-03-07T06:51:11Z",
|
"updated_at": "2022-03-09T05:58:20Z",
|
||||||
"pushed_at": "2022-01-22T14:55:02Z",
|
"pushed_at": "2022-01-22T14:55:02Z",
|
||||||
"stargazers_count": 1265,
|
"stargazers_count": 1266,
|
||||||
"watchers_count": 1265,
|
"watchers_count": 1266,
|
||||||
"forks_count": 344,
|
"forks_count": 346,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -921,8 +921,8 @@
|
||||||
"security"
|
"security"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 344,
|
"forks": 346,
|
||||||
"watchers": 1265,
|
"watchers": 1266,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -3548,17 +3548,17 @@
|
||||||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-13T03:57:50Z",
|
"created_at": "2021-12-13T03:57:50Z",
|
||||||
"updated_at": "2022-03-08T11:27:00Z",
|
"updated_at": "2022-03-09T05:46:38Z",
|
||||||
"pushed_at": "2022-02-06T03:18:29Z",
|
"pushed_at": "2022-02-06T03:18:29Z",
|
||||||
"stargazers_count": 2770,
|
"stargazers_count": 2771,
|
||||||
"watchers_count": 2770,
|
"watchers_count": 2771,
|
||||||
"forks_count": 674,
|
"forks_count": 674,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 674,
|
"forks": 674,
|
||||||
"watchers": 2770,
|
"watchers": 2771,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -10703,5 +10703,32 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467749739,
|
||||||
|
"name": "log4shellwithlog4j2_13_3",
|
||||||
|
"full_name": "paulvkitor\/log4shellwithlog4j2_13_3",
|
||||||
|
"owner": {
|
||||||
|
"login": "paulvkitor",
|
||||||
|
"id": 101220344,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101220344?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/paulvkitor"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/paulvkitor\/log4shellwithlog4j2_13_3",
|
||||||
|
"description": "Springboot web application accepts a name get parameter and logs its value to log4j2. Vulnerable to CVE-2021-44228.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T02:29:58Z",
|
||||||
|
"updated_at": "2022-03-09T04:11:03Z",
|
||||||
|
"pushed_at": "2022-03-09T04:11:00Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2022-0185",
|
"description": "CVE-2022-0185",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-19T06:19:38Z",
|
"created_at": "2022-01-19T06:19:38Z",
|
||||||
"updated_at": "2022-03-08T09:05:14Z",
|
"updated_at": "2022-03-09T05:40:10Z",
|
||||||
"pushed_at": "2022-01-25T17:00:16Z",
|
"pushed_at": "2022-01-25T17:00:16Z",
|
||||||
"stargazers_count": 303,
|
"stargazers_count": 305,
|
||||||
"watchers_count": 303,
|
"watchers_count": 305,
|
||||||
"forks_count": 39,
|
"forks_count": 40,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 39,
|
"forks": 40,
|
||||||
"watchers": 303,
|
"watchers": 305,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -94,17 +94,17 @@
|
||||||
"description": "CVE-2022-0185 POC and Docker and Analysis write up",
|
"description": "CVE-2022-0185 POC and Docker and Analysis write up",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-18T09:27:34Z",
|
"created_at": "2022-02-18T09:27:34Z",
|
||||||
"updated_at": "2022-03-08T14:23:31Z",
|
"updated_at": "2022-03-09T02:04:33Z",
|
||||||
"pushed_at": "2022-03-08T14:24:45Z",
|
"pushed_at": "2022-03-08T14:24:45Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
|
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-28T01:25:26Z",
|
"created_at": "2022-02-28T01:25:26Z",
|
||||||
"updated_at": "2022-03-08T13:19:19Z",
|
"updated_at": "2022-03-09T03:13:15Z",
|
||||||
"pushed_at": "2022-03-09T00:09:46Z",
|
"pushed_at": "2022-03-09T00:09:46Z",
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 29,
|
||||||
"watchers_count": 26,
|
"watchers_count": 29,
|
||||||
"forks_count": 6,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 8,
|
||||||
"watchers": 26,
|
"watchers": 29,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
|
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-06T00:03:31Z",
|
"created_at": "2022-03-06T00:03:31Z",
|
||||||
"updated_at": "2022-03-08T22:45:50Z",
|
"updated_at": "2022-03-09T05:56:43Z",
|
||||||
"pushed_at": "2022-03-06T07:01:15Z",
|
"pushed_at": "2022-03-06T07:01:15Z",
|
||||||
"stargazers_count": 43,
|
"stargazers_count": 53,
|
||||||
"watchers_count": 43,
|
"watchers_count": 53,
|
||||||
"forks_count": 18,
|
"forks_count": 18,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -28,7 +28,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 18,
|
||||||
"watchers": 43,
|
"watchers": 53,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "CVE-2022-0847",
|
"description": "CVE-2022-0847",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T15:50:18Z",
|
"created_at": "2022-03-07T15:50:18Z",
|
||||||
"updated_at": "2022-03-08T19:27:01Z",
|
"updated_at": "2022-03-09T05:59:57Z",
|
||||||
"pushed_at": "2022-03-07T15:52:23Z",
|
"pushed_at": "2022-03-07T15:52:23Z",
|
||||||
"stargazers_count": 37,
|
"stargazers_count": 40,
|
||||||
"watchers_count": 37,
|
"watchers_count": 40,
|
||||||
"forks_count": 17,
|
"forks_count": 20,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 17,
|
"forks": 20,
|
||||||
"watchers": 37,
|
"watchers": 40,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -67,17 +67,17 @@
|
||||||
"description": "Vulnerability in the Linux kernel since 5.8",
|
"description": "Vulnerability in the Linux kernel since 5.8",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T17:51:02Z",
|
"created_at": "2022-03-07T17:51:02Z",
|
||||||
"updated_at": "2022-03-08T21:32:56Z",
|
"updated_at": "2022-03-09T00:50:58Z",
|
||||||
"pushed_at": "2022-03-07T17:59:12Z",
|
"pushed_at": "2022-03-07T17:59:12Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -94,17 +94,17 @@
|
||||||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:36:50Z",
|
"created_at": "2022-03-07T18:36:50Z",
|
||||||
"updated_at": "2022-03-08T18:07:01Z",
|
"updated_at": "2022-03-09T06:14:32Z",
|
||||||
"pushed_at": "2022-03-07T19:25:58Z",
|
"pushed_at": "2022-03-09T05:27:59Z",
|
||||||
"stargazers_count": 60,
|
"stargazers_count": 75,
|
||||||
"watchers_count": 60,
|
"watchers_count": 75,
|
||||||
"forks_count": 20,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 20,
|
"forks": 24,
|
||||||
"watchers": 60,
|
"watchers": 75,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -121,17 +121,17 @@
|
||||||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:55:20Z",
|
"created_at": "2022-03-07T18:55:20Z",
|
||||||
"updated_at": "2022-03-08T23:59:33Z",
|
"updated_at": "2022-03-09T06:13:01Z",
|
||||||
"pushed_at": "2022-03-08T06:20:05Z",
|
"pushed_at": "2022-03-08T06:20:05Z",
|
||||||
"stargazers_count": 364,
|
"stargazers_count": 431,
|
||||||
"watchers_count": 364,
|
"watchers_count": 431,
|
||||||
"forks_count": 91,
|
"forks_count": 99,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 91,
|
"forks": 99,
|
||||||
"watchers": 364,
|
"watchers": 431,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -229,17 +229,17 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-08T03:56:03Z",
|
"created_at": "2022-03-08T03:56:03Z",
|
||||||
"updated_at": "2022-03-08T18:21:02Z",
|
"updated_at": "2022-03-09T01:22:58Z",
|
||||||
"pushed_at": "2022-03-08T09:31:57Z",
|
"pushed_at": "2022-03-08T09:31:57Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -283,17 +283,17 @@
|
||||||
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
|
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-08T09:10:51Z",
|
"created_at": "2022-03-08T09:10:51Z",
|
||||||
"updated_at": "2022-03-08T10:22:21Z",
|
"updated_at": "2022-03-09T06:05:02Z",
|
||||||
"pushed_at": "2022-03-08T09:14:25Z",
|
"pushed_at": "2022-03-08T09:14:25Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 1,
|
"watchers_count": 6,
|
||||||
"forks_count": 0,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 2,
|
||||||
"watchers": 1,
|
"watchers": 6,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -337,17 +337,17 @@
|
||||||
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
"description": "CVE-2022-0847 DirtyPipe Exploit.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-08T11:49:40Z",
|
"created_at": "2022-03-08T11:49:40Z",
|
||||||
"updated_at": "2022-03-08T16:34:30Z",
|
"updated_at": "2022-03-09T05:27:28Z",
|
||||||
"pushed_at": "2022-03-08T11:52:22Z",
|
"pushed_at": "2022-03-08T11:52:22Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 2,
|
"watchers_count": 4,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 2,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -391,17 +391,17 @@
|
||||||
"description": "The Dirty Pipe Vulnerability",
|
"description": "The Dirty Pipe Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-08T13:48:55Z",
|
"created_at": "2022-03-08T13:48:55Z",
|
||||||
"updated_at": "2022-03-08T22:17:14Z",
|
"updated_at": "2022-03-09T05:24:47Z",
|
||||||
"pushed_at": "2022-03-08T13:54:08Z",
|
"pushed_at": "2022-03-08T13:54:08Z",
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 10,
|
||||||
"watchers_count": 7,
|
"watchers_count": 10,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 7,
|
"watchers": 10,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -565,5 +565,142 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467741460,
|
||||||
|
"name": "CVE-2022-0847_DirtyPipeExploit",
|
||||||
|
"full_name": "dadhee\/CVE-2022-0847_DirtyPipeExploit",
|
||||||
|
"owner": {
|
||||||
|
"login": "dadhee",
|
||||||
|
"id": 37909237,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37909237?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/dadhee"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/dadhee\/CVE-2022-0847_DirtyPipeExploit",
|
||||||
|
"description": "A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T01:55:04Z",
|
||||||
|
"updated_at": "2022-03-09T02:01:30Z",
|
||||||
|
"pushed_at": "2022-03-09T02:01:28Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467753868,
|
||||||
|
"name": "CVE-2022-0847-DirtyPipe",
|
||||||
|
"full_name": "Greetdawn\/CVE-2022-0847-DirtyPipe",
|
||||||
|
"owner": {
|
||||||
|
"login": "Greetdawn",
|
||||||
|
"id": 28551913,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28551913?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Greetdawn"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Greetdawn\/CVE-2022-0847-DirtyPipe",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T02:47:06Z",
|
||||||
|
"updated_at": "2022-03-09T02:52:32Z",
|
||||||
|
"pushed_at": "2022-03-09T02:54:31Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467753881,
|
||||||
|
"name": "CVE-2022-0847",
|
||||||
|
"full_name": "Al1ex\/CVE-2022-0847",
|
||||||
|
"owner": {
|
||||||
|
"login": "Al1ex",
|
||||||
|
"id": 38161463,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Al1ex"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-0847",
|
||||||
|
"description": "CVE-2022-0847",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T02:47:08Z",
|
||||||
|
"updated_at": "2022-03-09T04:03:00Z",
|
||||||
|
"pushed_at": "2022-03-09T02:47:32Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"forks_count": 2,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [
|
||||||
|
"cve-2022-0847"
|
||||||
|
],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 2,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467779512,
|
||||||
|
"name": "Dirtypipe-exploit",
|
||||||
|
"full_name": "MRNIKO1\/Dirtypipe-exploit",
|
||||||
|
"owner": {
|
||||||
|
"login": "MRNIKO1",
|
||||||
|
"id": 72093135,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72093135?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/MRNIKO1"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/MRNIKO1\/Dirtypipe-exploit",
|
||||||
|
"description": "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T04:42:59Z",
|
||||||
|
"updated_at": "2022-03-09T04:42:59Z",
|
||||||
|
"pushed_at": "2022-03-09T04:43:00Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467788339,
|
||||||
|
"name": "CVE-2022-0847-DirtyPipe-Exploit",
|
||||||
|
"full_name": "Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit",
|
||||||
|
"owner": {
|
||||||
|
"login": "Mustafa1986",
|
||||||
|
"id": 27927358,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Mustafa1986"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-09T05:22:20Z",
|
||||||
|
"updated_at": "2022-03-09T05:34:00Z",
|
||||||
|
"pushed_at": "2022-03-09T06:16:23Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -94,10 +94,10 @@
|
||||||
"description": "lpe poc for cve-2022-21882 ",
|
"description": "lpe poc for cve-2022-21882 ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-07T03:45:36Z",
|
"created_at": "2022-02-07T03:45:36Z",
|
||||||
"updated_at": "2022-02-28T18:57:31Z",
|
"updated_at": "2022-03-09T04:12:04Z",
|
||||||
"pushed_at": "2022-02-07T03:49:37Z",
|
"pushed_at": "2022-02-07T03:49:37Z",
|
||||||
"stargazers_count": 25,
|
"stargazers_count": 26,
|
||||||
"watchers_count": 25,
|
"watchers_count": 26,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -108,7 +108,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 25,
|
"watchers": 26,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -229,7 +229,7 @@
|
||||||
"description": "CVE-2022-21907: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
|
"description": "CVE-2022-21907: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T18:56:52Z",
|
"created_at": "2022-03-07T18:56:52Z",
|
||||||
"updated_at": "2022-03-08T13:20:20Z",
|
"updated_at": "2022-03-09T00:31:46Z",
|
||||||
"pushed_at": "2022-03-07T19:47:48Z",
|
"pushed_at": "2022-03-07T19:47:48Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
|
"description": "PoC for CVE-2022-21974 \"Roaming Security Rights Management Services Remote Code Execution Vulnerability\"",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-26T18:53:56Z",
|
"created_at": "2022-02-26T18:53:56Z",
|
||||||
"updated_at": "2022-03-06T11:11:17Z",
|
"updated_at": "2022-03-09T05:48:19Z",
|
||||||
"pushed_at": "2022-02-26T19:12:12Z",
|
"pushed_at": "2022-02-26T19:12:12Z",
|
||||||
"stargazers_count": 40,
|
"stargazers_count": 42,
|
||||||
"watchers_count": 40,
|
"watchers_count": 42,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 40,
|
"watchers": 42,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2022-22947",
|
"description": "CVE-2022-22947",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-02T11:58:55Z",
|
"created_at": "2022-03-02T11:58:55Z",
|
||||||
"updated_at": "2022-03-08T13:10:28Z",
|
"updated_at": "2022-03-09T06:10:37Z",
|
||||||
"pushed_at": "2022-03-03T14:03:30Z",
|
"pushed_at": "2022-03-03T14:03:30Z",
|
||||||
"stargazers_count": 157,
|
"stargazers_count": 158,
|
||||||
"watchers_count": 157,
|
"watchers_count": 158,
|
||||||
"forks_count": 53,
|
"forks_count": 53,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 53,
|
"forks": 53,
|
||||||
"watchers": 157,
|
"watchers": 158,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -121,17 +121,17 @@
|
||||||
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
|
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-03T13:13:02Z",
|
"created_at": "2022-03-03T13:13:02Z",
|
||||||
"updated_at": "2022-03-08T01:36:14Z",
|
"updated_at": "2022-03-09T03:19:42Z",
|
||||||
"pushed_at": "2022-03-03T14:31:32Z",
|
"pushed_at": "2022-03-03T14:31:32Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -343,12 +343,12 @@
|
||||||
"pushed_at": "2022-03-04T10:49:00Z",
|
"pushed_at": "2022-03-04T10:49:00Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 31,
|
||||||
"watchers_count": 31,
|
"watchers_count": 31,
|
||||||
"forks_count": 7,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 8,
|
||||||
"watchers": 31,
|
"watchers": 31,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -556,7 +556,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T07:24:13Z",
|
"created_at": "2022-03-07T07:24:13Z",
|
||||||
"updated_at": "2022-03-07T08:22:00Z",
|
"updated_at": "2022-03-07T08:22:00Z",
|
||||||
"pushed_at": "2022-03-07T08:22:13Z",
|
"pushed_at": "2022-03-09T05:43:23Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
@ -690,17 +690,17 @@
|
||||||
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
|
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-08T09:32:36Z",
|
"created_at": "2022-03-08T09:32:36Z",
|
||||||
"updated_at": "2022-03-08T09:37:25Z",
|
"updated_at": "2022-03-09T02:11:24Z",
|
||||||
"pushed_at": "2022-03-08T09:36:31Z",
|
"pushed_at": "2022-03-08T09:36:31Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 0,
|
"watchers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "cve-2022-23131 exp",
|
"description": "cve-2022-23131 exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-18T08:38:53Z",
|
"created_at": "2022-02-18T08:38:53Z",
|
||||||
"updated_at": "2022-03-08T01:55:26Z",
|
"updated_at": "2022-03-09T05:42:27Z",
|
||||||
"pushed_at": "2022-02-21T04:27:48Z",
|
"pushed_at": "2022-02-21T04:27:48Z",
|
||||||
"stargazers_count": 78,
|
"stargazers_count": 79,
|
||||||
"watchers_count": 78,
|
"watchers_count": 79,
|
||||||
"forks_count": 31,
|
"forks_count": 31,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 31,
|
"forks": 31,
|
||||||
"watchers": 78,
|
"watchers": 79,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -67,17 +67,17 @@
|
||||||
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
|
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-18T11:51:47Z",
|
"created_at": "2022-02-18T11:51:47Z",
|
||||||
"updated_at": "2022-03-04T02:09:29Z",
|
"updated_at": "2022-03-09T05:43:09Z",
|
||||||
"pushed_at": "2022-02-24T15:02:12Z",
|
"pushed_at": "2022-02-24T15:02:12Z",
|
||||||
"stargazers_count": 82,
|
"stargazers_count": 83,
|
||||||
"watchers_count": 82,
|
"watchers_count": 83,
|
||||||
"forks_count": 33,
|
"forks_count": 33,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 33,
|
"forks": 33,
|
||||||
"watchers": 82,
|
"watchers": 83,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -106,5 +106,32 @@
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 4,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 467604662,
|
||||||
|
"name": "CVE-2022-24112",
|
||||||
|
"full_name": "Mah1ndra\/CVE-2022-24112",
|
||||||
|
"owner": {
|
||||||
|
"login": "Mah1ndra",
|
||||||
|
"id": 32550072,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32550072?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Mah1ndra"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Mah1ndra\/CVE-2022-24112",
|
||||||
|
"description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-03-08T17:08:52Z",
|
||||||
|
"updated_at": "2022-03-09T04:50:30Z",
|
||||||
|
"pushed_at": "2022-03-08T17:12:37Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -1,29 +0,0 @@
|
||||||
[
|
|
||||||
{
|
|
||||||
"id": 467604662,
|
|
||||||
"name": "CVE-2022-244112",
|
|
||||||
"full_name": "Mah1ndra\/CVE-2022-244112",
|
|
||||||
"owner": {
|
|
||||||
"login": "Mah1ndra",
|
|
||||||
"id": 32550072,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32550072?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/Mah1ndra"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/Mah1ndra\/CVE-2022-244112",
|
|
||||||
"description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2022-03-08T17:08:52Z",
|
|
||||||
"updated_at": "2022-03-08T17:10:43Z",
|
|
||||||
"pushed_at": "2022-03-08T17:12:37Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0
|
|
||||||
}
|
|
||||||
]
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2022-24990:TerraMaster TOS 通过 PHP 对象实例化执行未经身份验证的远程命令",
|
"description": "CVE-2022-24990:TerraMaster TOS 通过 PHP 对象实例化执行未经身份验证的远程命令",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-08T01:28:32Z",
|
"created_at": "2022-03-08T01:28:32Z",
|
||||||
"updated_at": "2022-03-08T10:05:14Z",
|
"updated_at": "2022-03-09T01:57:51Z",
|
||||||
"pushed_at": "2022-03-08T01:40:58Z",
|
"pushed_at": "2022-03-08T01:40:58Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2022-25636",
|
"description": "CVE-2022-25636",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-03-07T13:38:41Z",
|
"created_at": "2022-03-07T13:38:41Z",
|
||||||
"updated_at": "2022-03-09T00:03:02Z",
|
"updated_at": "2022-03-09T06:01:28Z",
|
||||||
"pushed_at": "2022-03-07T17:18:19Z",
|
"pushed_at": "2022-03-07T17:18:19Z",
|
||||||
"stargazers_count": 69,
|
"stargazers_count": 101,
|
||||||
"watchers_count": 69,
|
"watchers_count": 101,
|
||||||
"forks_count": 18,
|
"forks_count": 23,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 23,
|
||||||
"watchers": 69,
|
"watchers": 101,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2022-25943",
|
"description": "CVE-2022-25943",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-07-09T23:34:57Z",
|
"created_at": "2021-07-09T23:34:57Z",
|
||||||
"updated_at": "2022-03-08T23:15:04Z",
|
"updated_at": "2022-03-09T03:37:03Z",
|
||||||
"pushed_at": "2022-03-08T13:41:23Z",
|
"pushed_at": "2022-03-08T13:41:23Z",
|
||||||
"stargazers_count": 7,
|
"stargazers_count": 13,
|
||||||
"watchers_count": 7,
|
"watchers_count": 13,
|
||||||
"forks_count": 2,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 5,
|
||||||
"watchers": 7,
|
"watchers": 13,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
20
README.md
20
README.md
|
@ -90,6 +90,11 @@ Improper Access Control to Remote Code Execution in GitHub repository webmin/web
|
||||||
- [mrchucu1/CVE-2022-0847-Docker](https://github.com/mrchucu1/CVE-2022-0847-Docker)
|
- [mrchucu1/CVE-2022-0847-Docker](https://github.com/mrchucu1/CVE-2022-0847-Docker)
|
||||||
- [basharkey/CVE-2022-0847-dirty-pipe-checker](https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker)
|
- [basharkey/CVE-2022-0847-dirty-pipe-checker](https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker)
|
||||||
- [4luc4rdr5290/CVE-2022-0847](https://github.com/4luc4rdr5290/CVE-2022-0847)
|
- [4luc4rdr5290/CVE-2022-0847](https://github.com/4luc4rdr5290/CVE-2022-0847)
|
||||||
|
- [dadhee/CVE-2022-0847_DirtyPipeExploit](https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit)
|
||||||
|
- [Greetdawn/CVE-2022-0847-DirtyPipe](https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe)
|
||||||
|
- [Al1ex/CVE-2022-0847](https://github.com/Al1ex/CVE-2022-0847)
|
||||||
|
- [MRNIKO1/Dirtypipe-exploit](https://github.com/MRNIKO1/Dirtypipe-exploit)
|
||||||
|
- [Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit](https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit)
|
||||||
|
|
||||||
### CVE-2022-20699 (2022-02-10)
|
### CVE-2022-20699 (2022-02-10)
|
||||||
|
|
||||||
|
@ -410,6 +415,7 @@ An attacker can abuse the batch-requests plugin to send requests to bypass the I
|
||||||
- [Mr-xn/CVE-2022-24112](https://github.com/Mr-xn/CVE-2022-24112)
|
- [Mr-xn/CVE-2022-24112](https://github.com/Mr-xn/CVE-2022-24112)
|
||||||
- [Udyz/CVE-2022-24112](https://github.com/Udyz/CVE-2022-24112)
|
- [Udyz/CVE-2022-24112](https://github.com/Udyz/CVE-2022-24112)
|
||||||
- [Axx8/CVE-2022-24112](https://github.com/Axx8/CVE-2022-24112)
|
- [Axx8/CVE-2022-24112](https://github.com/Axx8/CVE-2022-24112)
|
||||||
|
- [Mah1ndra/CVE-2022-24112](https://github.com/Mah1ndra/CVE-2022-24112)
|
||||||
|
|
||||||
### CVE-2022-24124 (2022-01-29)
|
### CVE-2022-24124 (2022-01-29)
|
||||||
|
|
||||||
|
@ -543,7 +549,12 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca
|
||||||
|
|
||||||
- [Bonfee/CVE-2022-25636](https://github.com/Bonfee/CVE-2022-25636)
|
- [Bonfee/CVE-2022-25636](https://github.com/Bonfee/CVE-2022-25636)
|
||||||
|
|
||||||
### CVE-2022-25943
|
### CVE-2022-25943 (2022-03-08)
|
||||||
|
|
||||||
|
<code>
|
||||||
|
The installer of WPS Office for Windows versions prior to v11.2.0.10258 fails to configure properly the ACL for the directory where the service program is installed.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [HadiMed/KINGSOFT-WPS-Office-LPE](https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE)
|
- [HadiMed/KINGSOFT-WPS-Office-LPE](https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE)
|
||||||
|
|
||||||
### CVE-2022-26155 (2022-02-28)
|
### CVE-2022-26155 (2022-02-28)
|
||||||
|
@ -586,9 +597,6 @@ The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenti
|
||||||
|
|
||||||
- [p0dalirius/CVE-2022-26159-Ametys-Autocompletion-XML](https://github.com/p0dalirius/CVE-2022-26159-Ametys-Autocompletion-XML)
|
- [p0dalirius/CVE-2022-26159-Ametys-Autocompletion-XML](https://github.com/p0dalirius/CVE-2022-26159-Ametys-Autocompletion-XML)
|
||||||
|
|
||||||
### CVE-2022-244112
|
|
||||||
- [Mah1ndra/CVE-2022-244112](https://github.com/Mah1ndra/CVE-2022-244112)
|
|
||||||
|
|
||||||
|
|
||||||
## 2021
|
## 2021
|
||||||
### CVE-2021-0326 (2021-02-10)
|
### CVE-2021-0326 (2021-02-10)
|
||||||
|
@ -1207,6 +1215,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
||||||
- [PentesterSoham/CVE-2021-4034-exploit](https://github.com/PentesterSoham/CVE-2021-4034-exploit)
|
- [PentesterSoham/CVE-2021-4034-exploit](https://github.com/PentesterSoham/CVE-2021-4034-exploit)
|
||||||
- [T369-Real/pwnkit-pwn](https://github.com/T369-Real/pwnkit-pwn)
|
- [T369-Real/pwnkit-pwn](https://github.com/T369-Real/pwnkit-pwn)
|
||||||
- [GatoGamer1155/CVE-2021-4034](https://github.com/GatoGamer1155/CVE-2021-4034)
|
- [GatoGamer1155/CVE-2021-4034](https://github.com/GatoGamer1155/CVE-2021-4034)
|
||||||
|
- [bakhtiyarsierad/CVE-2021-4034-bug-root](https://github.com/bakhtiyarsierad/CVE-2021-4034-bug-root)
|
||||||
|
|
||||||
### CVE-2021-4043 (2022-02-04)
|
### CVE-2021-4043 (2022-02-04)
|
||||||
|
|
||||||
|
@ -3080,7 +3089,6 @@ An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can
|
||||||
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
|
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [xiaojiangxl/CVE-2021-40438](https://github.com/xiaojiangxl/CVE-2021-40438)
|
|
||||||
- [sixpacksecurity/CVE-2021-40438](https://github.com/sixpacksecurity/CVE-2021-40438)
|
- [sixpacksecurity/CVE-2021-40438](https://github.com/sixpacksecurity/CVE-2021-40438)
|
||||||
- [BabyTeam1024/CVE-2021-40438](https://github.com/BabyTeam1024/CVE-2021-40438)
|
- [BabyTeam1024/CVE-2021-40438](https://github.com/BabyTeam1024/CVE-2021-40438)
|
||||||
- [ericmann/apache-cve-poc](https://github.com/ericmann/apache-cve-poc)
|
- [ericmann/apache-cve-poc](https://github.com/ericmann/apache-cve-poc)
|
||||||
|
@ -3290,7 +3298,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
||||||
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
|
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
|
||||||
- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
|
- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
|
||||||
- [LudovicPatho/CVE-2021-41773](https://github.com/LudovicPatho/CVE-2021-41773)
|
- [LudovicPatho/CVE-2021-41773](https://github.com/LudovicPatho/CVE-2021-41773)
|
||||||
- [vulf/CVE-2021-41773_42013](https://github.com/vulf/CVE-2021-41773_42013)
|
|
||||||
- [cloudbyteelias/CVE-2021-41773](https://github.com/cloudbyteelias/CVE-2021-41773)
|
- [cloudbyteelias/CVE-2021-41773](https://github.com/cloudbyteelias/CVE-2021-41773)
|
||||||
- [qwutony/CVE-2021-41773](https://github.com/qwutony/CVE-2021-41773)
|
- [qwutony/CVE-2021-41773](https://github.com/qwutony/CVE-2021-41773)
|
||||||
- [LayarKacaSiber/CVE-2021-41773](https://github.com/LayarKacaSiber/CVE-2021-41773)
|
- [LayarKacaSiber/CVE-2021-41773](https://github.com/LayarKacaSiber/CVE-2021-41773)
|
||||||
|
@ -4194,6 +4201,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
||||||
- [s-retlaw/l4srs](https://github.com/s-retlaw/l4srs)
|
- [s-retlaw/l4srs](https://github.com/s-retlaw/l4srs)
|
||||||
- [Ananya-0306/Log-4j-scanner](https://github.com/Ananya-0306/Log-4j-scanner)
|
- [Ananya-0306/Log-4j-scanner](https://github.com/Ananya-0306/Log-4j-scanner)
|
||||||
- [micha3lcve/CVE-2021-44228-Mass-RCE](https://github.com/micha3lcve/CVE-2021-44228-Mass-RCE)
|
- [micha3lcve/CVE-2021-44228-Mass-RCE](https://github.com/micha3lcve/CVE-2021-44228-Mass-RCE)
|
||||||
|
- [paulvkitor/log4shellwithlog4j2_13_3](https://github.com/paulvkitor/log4shellwithlog4j2_13_3)
|
||||||
|
|
||||||
### CVE-2021-44270
|
### CVE-2021-44270
|
||||||
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
|
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
|
||||||
|
|
Loading…
Reference in a new issue