Auto Update 2022/02/25 12:14:31

This commit is contained in:
motikan2010-bot 2022-02-25 21:14:31 +09:00
parent c0589bdfa6
commit b5f80aaf4b
45 changed files with 355 additions and 222 deletions

View file

@ -13,7 +13,7 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-02-24T01:56:09Z",
"updated_at": "2022-02-25T10:50:52Z",
"pushed_at": "2022-02-03T14:20:13Z",
"stargazers_count": 92,
"watchers_count": 92,

View file

@ -13,17 +13,17 @@
"description": "CVE-2013-3660的x64 win7平台EXP源代码成功率100%。",
"fork": false,
"created_at": "2022-01-29T02:14:26Z",
"updated_at": "2022-01-29T02:16:04Z",
"updated_at": "2022-02-25T10:34:43Z",
"pushed_at": "2022-02-07T12:18:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 190,
"forks_count": 191,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,7 +25,7 @@
"cve-2015-1701"
],
"visibility": "public",
"forks": 190,
"forks": 191,
"watchers": 277,
"score": 0
}

View file

@ -212,17 +212,17 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2022-02-16T10:04:52Z",
"updated_at": "2022-02-25T11:03:54Z",
"pushed_at": "2017-02-27T18:56:12Z",
"stargazers_count": 395,
"watchers_count": 395,
"forks_count": 141,
"stargazers_count": 396,
"watchers_count": 396,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 395,
"forks": 142,
"watchers": 396,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Supervisord远程命令执行漏洞脚本",
"fork": false,
"created_at": "2020-12-22T09:08:49Z",
"updated_at": "2021-01-18T02:14:56Z",
"updated_at": "2022-02-25T08:09:29Z",
"pushed_at": "2020-12-22T09:12:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2022-02-12T03:50:05Z",
"updated_at": "2022-02-25T09:16:41Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 519,
"watchers_count": 519,
"stargazers_count": 520,
"watchers_count": 520,
"forks_count": 261,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 261,
"watchers": 519,
"watchers": 520,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-05-23T17:39:09Z",
"updated_at": "2021-07-01T13:42:45Z",
"updated_at": "2022-02-25T08:52:42Z",
"pushed_at": "2021-07-01T13:42:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -110,17 +110,17 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2022-02-24T10:14:33Z",
"updated_at": "2022-02-25T10:05:34Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 36,
"watchers": 37,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-02-23T02:24:54Z",
"updated_at": "2022-02-25T12:04:59Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 487,
"watchers_count": 487,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 485,
"watchers": 487,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2022-01-26T15:46:45Z",
"updated_at": "2022-02-25T09:10:16Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 327,
"watchers_count": 327,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 328,
"watchers": 327,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-02-23T02:31:08Z",
"updated_at": "2022-02-25T08:55:07Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1699,
"watchers_count": 1699,
"stargazers_count": 1700,
"watchers_count": 1700,
"forks_count": 254,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 254,
"watchers": 1699,
"watchers": 1700,
"score": 0
},
{

View file

@ -141,7 +141,7 @@
"pushed_at": "2021-03-18T09:45:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -153,7 +153,7 @@
"rce"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-09-01T11:35:43Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 31,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-02-24T15:17:33Z",
"updated_at": "2022-02-25T07:19:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3179,
"watchers_count": 3179,
"stargazers_count": 3180,
"watchers_count": 3180,
"forks_count": 946,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 946,
"watchers": 3179,
"watchers": 3180,
"score": 0
},
{

View file

@ -204,10 +204,10 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2021-12-28T03:30:59Z",
"updated_at": "2022-02-25T08:40:54Z",
"pushed_at": "2020-08-08T12:54:09Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -219,7 +219,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "BlueFrag experiments",
"fork": false,
"created_at": "2020-02-12T22:00:35Z",
"updated_at": "2022-01-24T15:41:35Z",
"updated_at": "2022-02-25T07:34:54Z",
"pushed_at": "2020-05-16T18:06:43Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 43,
"watchers": 44,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "poc for cve-2020-0022",
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2021-12-16T13:29:35Z",
"updated_at": "2022-02-25T07:34:27Z",
"pushed_at": "2020-07-16T06:51:16Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 59,
"watchers": 60,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-02-14T11:55:52Z",
"updated_at": "2022-02-25T09:31:00Z",
"pushed_at": "2022-02-22T07:48:41Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

View file

@ -153,10 +153,10 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2022-02-19T13:58:14Z",
"updated_at": "2022-02-25T07:53:12Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 874,
"watchers_count": 874,
"stargazers_count": 875,
"watchers_count": 875,
"forks_count": 224,
"allow_forking": true,
"is_template": false,
@ -165,7 +165,7 @@
],
"visibility": "public",
"forks": 224,
"watchers": 874,
"watchers": 875,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 78,
"forks_count": 79,
"allow_forking": true,
"is_template": false,
"topics": [
@ -52,7 +52,7 @@
"cve-2020-0610"
],
"visibility": "public",
"forks": 78,
"forks": 79,
"watchers": 250,
"score": 0
},

View file

@ -45,17 +45,17 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
"updated_at": "2021-12-23T08:09:53Z",
"updated_at": "2022-02-25T12:08:11Z",
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 23,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 58,
"forks": 24,
"watchers": 59,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-02-24T15:17:33Z",
"updated_at": "2022-02-25T07:19:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3179,
"watchers_count": 3179,
"stargazers_count": 3180,
"watchers_count": 3180,
"forks_count": 946,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 946,
"watchers": 3179,
"watchers": 3180,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-02-24T15:38:11Z",
"updated_at": "2022-02-24T16:41:42Z",
"pushed_at": "2022-02-24T16:14:21Z",
"pushed_at": "2022-02-25T11:14:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -364,10 +364,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2022-02-11T20:22:34Z",
"updated_at": "2022-02-25T08:22:30Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 92,
"allow_forking": true,
"is_template": false,
@ -380,7 +380,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 233,
"watchers": 234,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2022-02-25T03:33:41Z",
"updated_at": "2022-02-25T08:19:33Z",
"pushed_at": "2022-01-29T10:15:02Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"watchers": 31,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
"fork": false,
"created_at": "2022-02-18T14:19:58Z",
"updated_at": "2022-02-24T20:35:26Z",
"updated_at": "2022-02-25T06:22:51Z",
"pushed_at": "2022-02-19T13:52:32Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 135,
"watchers": 136,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-26T14:18:13Z",
"updated_at": "2022-01-07T09:15:23Z",
"updated_at": "2022-02-25T10:16:28Z",
"pushed_at": "2021-02-27T09:57:00Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2022-02-16T05:58:21Z",
"updated_at": "2022-02-25T09:34:08Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 101,
"watchers": 102,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2021-32099",
"fork": false,
"created_at": "2022-01-12T11:48:34Z",
"updated_at": "2022-02-21T10:48:21Z",
"updated_at": "2022-02-25T10:09:51Z",
"pushed_at": "2022-01-12T11:49:20Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -1,31 +1,4 @@
[
{
"id": 416174012,
"name": "CVE-2021-34486",
"full_name": "KaLendsi\/CVE-2021-34486",
"owner": {
"login": "KaLendsi",
"id": 68001644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
"html_url": "https:\/\/github.com\/KaLendsi"
},
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-34486",
"description": "Windows Etw LPE",
"fork": false,
"created_at": "2021-10-12T03:50:44Z",
"updated_at": "2022-02-23T23:18:16Z",
"pushed_at": "2021-10-12T05:52:00Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 34,
"score": 0
},
{
"id": 421793459,
"name": "CVE-2021-34486-exp",

View file

@ -40,10 +40,10 @@
"description": "CVE-2021-3560 Local PrivEsc Exploit",
"fork": false,
"created_at": "2021-06-11T14:28:43Z",
"updated_at": "2022-02-24T00:28:51Z",
"updated_at": "2022-02-25T07:03:00Z",
"pushed_at": "2021-06-12T17:48:38Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -56,7 +56,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 78,
"watchers": 77,
"score": 0
},
{
@ -73,10 +73,10 @@
"description": "a reliable C based exploit for CVE-2021-3560.",
"fork": false,
"created_at": "2021-06-12T05:22:35Z",
"updated_at": "2022-02-24T14:30:32Z",
"updated_at": "2022-02-25T07:03:01Z",
"pushed_at": "2021-06-23T11:07:32Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -86,7 +86,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 30,
"watchers": 29,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2022-02-22T10:40:03Z",
"updated_at": "2022-02-25T10:21:36Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -106,7 +106,7 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-02-25T03:48:32Z",
"updated_at": "2022-02-25T10:09:14Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1352,
"watchers_count": 1352,
@ -556,12 +556,12 @@
"pushed_at": "2022-01-27T06:23:02Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 37,
"score": 0
},
@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-02-24T07:58:05Z",
"updated_at": "2022-02-25T07:42:53Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 435,
"watchers_count": 435,
"stargazers_count": 436,
"watchers_count": 436,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 75,
"watchers": 435,
"watchers": 436,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-02-23T08:49:06Z",
"updated_at": "2022-02-25T08:50:18Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 257,
"watchers": 258,
"score": 0
},
{

View file

@ -793,5 +793,32 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 463472397,
"name": "GrafanaDirInclusion",
"full_name": "Jroo1053\/GrafanaDirInclusion",
"owner": {
"login": "Jroo1053",
"id": 38885991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38885991?v=4",
"html_url": "https:\/\/github.com\/Jroo1053"
},
"html_url": "https:\/\/github.com\/Jroo1053\/GrafanaDirInclusion",
"description": "Script to demonstrate the Grafana directory traversal exploit (CVE-2021-43798).",
"fork": false,
"created_at": "2022-02-25T09:26:40Z",
"updated_at": "2022-02-25T11:19:39Z",
"pushed_at": "2022-02-25T10:56:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -907,11 +907,11 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-02-24T23:08:49Z",
"updated_at": "2022-02-25T10:33:09Z",
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1256,
"watchers_count": 1256,
"forks_count": 335,
"stargazers_count": 1259,
"watchers_count": 1259,
"forks_count": 336,
"allow_forking": true,
"is_template": false,
"topics": [
@ -921,8 +921,8 @@
"security"
],
"visibility": "public",
"forks": 335,
"watchers": 1256,
"forks": 336,
"watchers": 1259,
"score": 0
},
{
@ -1348,17 +1348,17 @@
"description": "A Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads",
"fork": false,
"created_at": "2021-12-11T10:19:01Z",
"updated_at": "2022-01-11T10:22:31Z",
"updated_at": "2022-02-25T10:36:15Z",
"pushed_at": "2021-12-11T10:19:51Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -1894,7 +1894,7 @@
"pushed_at": "2022-01-17T19:47:41Z",
"stargazers_count": 613,
"watchers_count": 613,
"forks_count": 99,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1911,7 +1911,7 @@
"vulnerability-scanner"
],
"visibility": "public",
"forks": 99,
"forks": 98,
"watchers": 613,
"score": 0
},
@ -3544,17 +3544,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-02-25T02:55:44Z",
"updated_at": "2022-02-25T12:02:36Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2753,
"watchers_count": 2753,
"stargazers_count": 2756,
"watchers_count": 2756,
"forks_count": 668,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 668,
"watchers": 2753,
"watchers": 2756,
"score": 0
},
{
@ -9703,11 +9703,11 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2022-02-25T06:07:49Z",
"updated_at": "2022-02-25T11:52:27Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 21,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
@ -9717,8 +9717,8 @@
"vmsa-2021-0028"
],
"visibility": "public",
"forks": 21,
"watchers": 77,
"forks": 23,
"watchers": 80,
"score": 0
},
{
@ -9909,7 +9909,7 @@
"fork": false,
"created_at": "2022-01-04T03:37:03Z",
"updated_at": "2022-02-25T00:10:31Z",
"pushed_at": "2022-02-25T00:58:52Z",
"pushed_at": "2022-02-25T08:52:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
@ -10043,17 +10043,17 @@
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
"fork": false,
"created_at": "2022-01-05T22:25:42Z",
"updated_at": "2022-02-25T04:59:49Z",
"updated_at": "2022-02-25T10:04:45Z",
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 64,
"watchers": 69,
"score": 0
},
{
@ -10627,7 +10627,7 @@
"fork": false,
"created_at": "2022-02-16T01:13:08Z",
"updated_at": "2022-02-16T01:21:29Z",
"pushed_at": "2022-02-22T15:57:32Z",
"pushed_at": "2022-02-25T11:52:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Environment with vulnerable kernel for exploitation of CVE-2021-44733",
"fork": false,
"created_at": "2021-12-23T17:45:35Z",
"updated_at": "2022-01-24T18:06:07Z",
"updated_at": "2022-02-25T09:03:38Z",
"pushed_at": "2021-12-28T07:57:13Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 11,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 56,
"forks": 12,
"watchers": 57,
"score": 0
}
]

View file

@ -134,10 +134,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-02-22T23:31:31Z",
"pushed_at": "2022-01-18T14:58:44Z",
"stargazers_count": 49,
"watchers_count": 49,
"updated_at": "2022-02-25T11:08:29Z",
"pushed_at": "2022-02-25T11:05:11Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -151,7 +151,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 49,
"watchers": 50,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-02-24T13:44:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "cve-2022-23131 exp",
"fork": false,
"created_at": "2022-02-18T08:38:53Z",
"updated_at": "2022-02-25T04:01:35Z",
"updated_at": "2022-02-25T06:39:08Z",
"pushed_at": "2022-02-21T04:27:48Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 73,
"watchers": 74,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false,
"created_at": "2022-02-18T11:51:47Z",
"updated_at": "2022-02-25T01:46:23Z",
"updated_at": "2022-02-25T08:38:43Z",
"pushed_at": "2022-02-24T15:02:12Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 27,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 69,
"forks": 28,
"watchers": 71,
"score": 0
},
{
@ -175,17 +175,17 @@
"description": "cve-2022-23131",
"fork": false,
"created_at": "2022-02-22T01:39:52Z",
"updated_at": "2022-02-24T11:15:31Z",
"updated_at": "2022-02-25T07:49:03Z",
"pushed_at": "2022-02-22T01:45:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2022-02-24T08:10:46Z",
"updated_at": "2022-02-24T11:47:56Z",
"updated_at": "2022-02-25T06:42:32Z",
"pushed_at": "2022-02-24T11:50:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-24086 about Magento RCE ",
"fork": false,
"created_at": "2022-02-20T13:52:31Z",
"updated_at": "2022-02-24T19:27:51Z",
"updated_at": "2022-02-25T09:40:01Z",
"pushed_at": "2022-02-22T14:02:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

29
2022/CVE-2022-24124.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 463446054,
"name": "CVE-2022-24124",
"full_name": "ColdFusionX\/CVE-2022-24124",
"owner": {
"login": "ColdFusionX",
"id": 8522240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8522240?v=4",
"html_url": "https:\/\/github.com\/ColdFusionX"
},
"html_url": "https:\/\/github.com\/ColdFusionX\/CVE-2022-24124",
"description": "POC for CVE-2022-24124",
"fork": false,
"created_at": "2022-02-25T07:55:55Z",
"updated_at": "2022-02-25T08:02:23Z",
"pushed_at": "2022-02-25T07:58:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-25018.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 463453899,
"name": "CVE-2022-25018",
"full_name": "MoritzHuppert\/CVE-2022-25018",
"owner": {
"login": "MoritzHuppert",
"id": 35614875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35614875?v=4",
"html_url": "https:\/\/github.com\/MoritzHuppert"
},
"html_url": "https:\/\/github.com\/MoritzHuppert\/CVE-2022-25018",
"description": null,
"fork": false,
"created_at": "2022-02-25T08:23:49Z",
"updated_at": "2022-02-25T08:23:49Z",
"pushed_at": "2022-02-25T09:06:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-25020.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 463454154,
"name": "CVE-2022-25020",
"full_name": "MoritzHuppert\/CVE-2022-25020",
"owner": {
"login": "MoritzHuppert",
"id": 35614875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35614875?v=4",
"html_url": "https:\/\/github.com\/MoritzHuppert"
},
"html_url": "https:\/\/github.com\/MoritzHuppert\/CVE-2022-25020",
"description": null,
"fork": false,
"created_at": "2022-02-25T08:24:44Z",
"updated_at": "2022-02-25T08:24:44Z",
"pushed_at": "2022-02-25T09:06:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-25022.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 463454611,
"name": "CVE-2022-25022",
"full_name": "MoritzHuppert\/CVE-2022-25022",
"owner": {
"login": "MoritzHuppert",
"id": 35614875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35614875?v=4",
"html_url": "https:\/\/github.com\/MoritzHuppert"
},
"html_url": "https:\/\/github.com\/MoritzHuppert\/CVE-2022-25022",
"description": null,
"fork": false,
"created_at": "2022-02-25T08:26:12Z",
"updated_at": "2022-02-25T08:26:12Z",
"pushed_at": "2022-02-25T09:06:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -291,6 +291,14 @@ An attacker can abuse the batch-requests plugin to send requests to bypass the I
- [Mr-xn/CVE-2022-24112](https://github.com/Mr-xn/CVE-2022-24112)
- [Udyz/CVE-2022-24112](https://github.com/Udyz/CVE-2022-24112)
### CVE-2022-24124 (2022-01-29)
<code>
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
</code>
- [ColdFusionX/CVE-2022-24124](https://github.com/ColdFusionX/CVE-2022-24124)
### CVE-2022-24348 (2022-02-04)
<code>
@ -302,6 +310,15 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
### CVE-2022-24693
- [lukejenkins/CVE-2022-24693](https://github.com/lukejenkins/CVE-2022-24693)
### CVE-2022-25018
- [MoritzHuppert/CVE-2022-25018](https://github.com/MoritzHuppert/CVE-2022-25018)
### CVE-2022-25020
- [MoritzHuppert/CVE-2022-25020](https://github.com/MoritzHuppert/CVE-2022-25020)
### CVE-2022-25022
- [MoritzHuppert/CVE-2022-25022](https://github.com/MoritzHuppert/CVE-2022-25022)
### CVE-2022-25257
- [polling-repo-continua/CVE-2022-25257](https://github.com/polling-repo-continua/CVE-2022-25257)
@ -2546,7 +2563,6 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26425, CVE-2021-34487.
</code>
- [KaLendsi/CVE-2021-34486](https://github.com/KaLendsi/CVE-2021-34486)
- [b1tg/CVE-2021-34486-exp](https://github.com/b1tg/CVE-2021-34486-exp)
### CVE-2021-34527 (2021-07-02)
@ -3474,6 +3490,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [rnsss/CVE-2021-43798-poc](https://github.com/rnsss/CVE-2021-43798-poc)
- [rodpwn/CVE-2021-43798-mass_scanner](https://github.com/rodpwn/CVE-2021-43798-mass_scanner)
- [aymenbouferroum/CVE-2021-43798_exploit](https://github.com/aymenbouferroum/CVE-2021-43798_exploit)
- [Jroo1053/GrafanaDirInclusion](https://github.com/Jroo1053/GrafanaDirInclusion)
### CVE-2021-43799 (2022-01-25)