Auto Update 2022/06/30 18:19:29

This commit is contained in:
motikan2010-bot 2022-07-01 03:19:29 +09:00
parent 6571ed43d7
commit c279a321a9
36 changed files with 216 additions and 425 deletions

View file

@ -41,10 +41,10 @@
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
"fork": false,
"created_at": "2016-03-23T10:41:00Z",
"updated_at": "2022-04-25T02:34:31Z",
"updated_at": "2022-06-30T14:08:26Z",
"pushed_at": "2016-03-23T12:05:38Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -46,10 +46,10 @@
"description": "CVE-2017-13089",
"fork": false,
"created_at": "2017-11-15T08:22:58Z",
"updated_at": "2021-08-11T23:40:17Z",
"updated_at": "2022-06-30T12:41:00Z",
"pushed_at": "2017-11-15T08:36:12Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 56,
"watchers": 55,
"score": 0
}
]

View file

@ -1,30 +0,0 @@
[
{
"id": 140411928,
"name": "CVE-2018-12463",
"full_name": "alt3kx\/CVE-2018-12463",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
"fork": false,
"created_at": "2018-07-10T09:51:40Z",
"updated_at": "2021-10-08T04:36:54Z",
"pushed_at": "2022-04-07T19:09:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0
}
]

View file

@ -189,8 +189,8 @@
"description": "CVE-2018-16763 but without errors",
"fork": false,
"created_at": "2021-09-22T07:02:52Z",
"updated_at": "2022-03-05T20:57:30Z",
"pushed_at": "2021-09-26T11:22:53Z",
"updated_at": "2022-06-30T16:46:54Z",
"pushed_at": "2022-06-30T16:46:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -423,34 +423,6 @@
"watchers": 0,
"score": 0
},
{
"id": 139417715,
"name": "CVE-2018-2628",
"full_name": "likescam\/CVE-2018-2628",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-2628",
"description": null,
"fork": false,
"created_at": "2018-07-02T09:00:34Z",
"updated_at": "2019-05-26T06:58:12Z",
"pushed_at": "2018-07-02T09:00:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 147341225,
"name": "WebLogic-RCE-exploit",

View file

@ -76,10 +76,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2022-06-20T02:32:42Z",
"updated_at": "2022-06-30T13:41:27Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 525,
"watchers_count": 525,
"stargazers_count": 526,
"watchers_count": 526,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
@ -97,7 +97,7 @@
],
"visibility": "public",
"forks": 172,
"watchers": 525,
"watchers": 526,
"score": 0
},
{
@ -494,34 +494,6 @@
"watchers": 0,
"score": 0
},
{
"id": 140643631,
"name": "CVE-2018-7600",
"full_name": "happynote3966\/CVE-2018-7600",
"owner": {
"login": "happynote3966",
"id": 19719330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
"html_url": "https:\/\/github.com\/happynote3966"
},
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7600",
"description": null,
"fork": false,
"created_at": "2018-07-12T01:12:44Z",
"updated_at": "2018-07-17T03:24:11Z",
"pushed_at": "2018-07-17T03:24:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 151199861,
"name": "CVE-2018-7600-Drupal-RCE",

View file

@ -27,34 +27,6 @@
"watchers": 5,
"score": 0
},
{
"id": 140663638,
"name": "CVE-2018-7602",
"full_name": "happynote3966\/CVE-2018-7602",
"owner": {
"login": "happynote3966",
"id": 19719330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19719330?v=4",
"html_url": "https:\/\/github.com\/happynote3966"
},
"html_url": "https:\/\/github.com\/happynote3966\/CVE-2018-7602",
"description": null,
"fork": false,
"created_at": "2018-07-12T05:08:14Z",
"updated_at": "2018-07-17T02:57:18Z",
"pushed_at": "2018-07-17T02:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 155205612,
"name": "CVE-2018-7602",

View file

@ -111,34 +111,6 @@
"watchers": 1,
"score": 0
},
{
"id": 140478620,
"name": "cve-2018-8174_analysis",
"full_name": "piotrflorczyk\/cve-2018-8174_analysis",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2018-8174_analysis",
"description": "Analysis of VBS exploit CVE-2018-8174",
"fork": false,
"created_at": "2018-07-10T19:31:25Z",
"updated_at": "2021-12-15T14:34:28Z",
"pushed_at": "2018-07-12T08:35:13Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 20,
"score": 0
},
{
"id": 147615569,
"name": "CVE-2018-8174-msf",

View file

@ -1,30 +0,0 @@
[
{
"id": 144541015,
"name": "CVE-2018-8208",
"full_name": "kaisaryousuf\/CVE-2018-8208",
"owner": {
"login": "kaisaryousuf",
"id": 27071719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27071719?v=4",
"html_url": "https:\/\/github.com\/kaisaryousuf"
},
"html_url": "https:\/\/github.com\/kaisaryousuf\/CVE-2018-8208",
"description": null,
"fork": false,
"created_at": "2018-08-13T06:56:11Z",
"updated_at": "2018-11-12T16:22:38Z",
"pushed_at": "2018-06-21T15:06:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -3216,10 +3216,10 @@
"description": "this is a local scanner for cve-2019-0708",
"fork": false,
"created_at": "2021-03-25T07:05:38Z",
"updated_at": "2021-09-26T14:22:50Z",
"updated_at": "2022-06-30T13:50:49Z",
"pushed_at": "2021-03-25T07:12:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -3235,7 +3235,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 3,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2022-06-15T19:57:27Z",
"updated_at": "2022-06-30T17:29:38Z",
"pushed_at": "2022-01-17T19:45:41Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 159,
"watchers": 160,
"score": 0
},
{

View file

@ -632,20 +632,20 @@
},
{
"id": 502654937,
"name": "Webmin-RCE",
"full_name": "NullBrunk\/Webmin-RCE",
"name": "CVE-2019-15107",
"full_name": "NullBrunk\/CVE-2019-15107",
"owner": {
"login": "NullBrunk",
"id": 106782577,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106782577?v=4",
"html_url": "https:\/\/github.com\/NullBrunk"
},
"html_url": "https:\/\/github.com\/NullBrunk\/Webmin-RCE",
"html_url": "https:\/\/github.com\/NullBrunk\/CVE-2019-15107",
"description": "Python3 code to exploit CVE-2019-15107 and CVE-2019-15231 ",
"fork": false,
"created_at": "2022-06-12T15:31:38Z",
"updated_at": "2022-06-12T16:49:43Z",
"pushed_at": "2022-06-12T16:41:15Z",
"updated_at": "2022-06-30T13:38:44Z",
"pushed_at": "2022-06-30T13:30:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -657,8 +657,6 @@
"cve-2019-15231",
"exploit",
"rce",
"root",
"web-pentest",
"webmin"
],
"visibility": "public",

View file

@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
"fork": false,
"created_at": "2019-09-10T15:57:36Z",
"updated_at": "2022-06-22T13:04:06Z",
"updated_at": "2022-06-30T17:44:26Z",
"pushed_at": "2019-09-13T20:05:43Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 156,
"watchers": 155,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-29T02:36:08Z",
"updated_at": "2022-06-30T15:06:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3393,
"watchers_count": 3393,
"stargazers_count": 3394,
"watchers_count": 3394,
"forks_count": 1012,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1012,
"watchers": 3393,
"watchers": 3394,
"score": 0
},
{

View file

@ -101,7 +101,7 @@
"pushed_at": "2020-10-01T08:40:07Z",
"stargazers_count": 170,
"watchers_count": 170,
"forks_count": 74,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -112,7 +112,7 @@
"ssti"
],
"visibility": "public",
"forks": 74,
"forks": 75,
"watchers": 170,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-29T02:36:08Z",
"updated_at": "2022-06-30T15:06:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3393,
"watchers_count": 3393,
"stargazers_count": 3394,
"watchers_count": 3394,
"forks_count": 1012,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1012,
"watchers": 3393,
"watchers": 3394,
"score": 0
},
{
@ -201,10 +201,10 @@
"description": "CVE-2020-14882 EXP 回显",
"fork": false,
"created_at": "2020-10-29T15:44:23Z",
"updated_at": "2022-01-18T23:43:08Z",
"updated_at": "2022-06-30T14:50:48Z",
"pushed_at": "2020-11-09T09:55:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)",
"fork": false,
"created_at": "2020-11-12T11:59:47Z",
"updated_at": "2020-11-17T18:02:04Z",
"updated_at": "2022-06-30T18:12:56Z",
"pushed_at": "2020-11-16T10:31:51Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 6,
"score": 0
}
]

View file

@ -101,10 +101,10 @@
"description": "CVE-2020-8597 in RM2100",
"fork": false,
"created_at": "2021-01-24T15:28:00Z",
"updated_at": "2022-03-24T14:13:01Z",
"updated_at": "2022-06-30T14:10:59Z",
"pushed_at": "2021-01-24T15:46:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -115,7 +115,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-06-29T14:12:02Z",
"updated_at": "2022-06-30T12:27:46Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1572,
"watchers_count": 1572,
"stargazers_count": 1573,
"watchers_count": 1573,
"forks_count": 566,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 566,
"watchers": 1572,
"watchers": 1573,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2022-06-29T19:03:41Z",
"updated_at": "2022-06-30T17:52:46Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 217,
"watchers": 216,
"score": 0
},
{

View file

@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-06-30T09:08:11Z",
"updated_at": "2022-06-30T12:27:38Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1586,
"watchers_count": 1586,
"stargazers_count": 1587,
"watchers_count": 1587,
"forks_count": 457,
"allow_forking": true,
"is_template": false,
@ -86,7 +86,7 @@
"topics": [],
"visibility": "public",
"forks": 457,
"watchers": 1586,
"watchers": 1587,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2022-06-01T22:04:06Z",
"updated_at": "2022-06-30T17:43:18Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 43,
"watchers": 42,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-02-24T06:43:56Z",
"updated_at": "2022-06-30T07:40:51Z",
"updated_at": "2022-06-30T13:58:15Z",
"pushed_at": "2022-03-19T06:32:50Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -250,10 +250,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-06-23T03:25:13Z",
"updated_at": "2022-06-30T14:58:58Z",
"pushed_at": "2022-06-28T17:00:53Z",
"stargazers_count": 991,
"watchers_count": 991,
"stargazers_count": 992,
"watchers_count": 992,
"forks_count": 438,
"allow_forking": true,
"is_template": false,
@ -263,7 +263,7 @@
],
"visibility": "public",
"forks": 438,
"watchers": 991,
"watchers": 992,
"score": 0
},
{

View file

@ -129,13 +129,13 @@
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 953,
"watchers_count": 953,
"forks_count": 206,
"forks_count": 205,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 206,
"forks": 205,
"watchers": 953,
"score": 0
},
@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-06-26T12:14:41Z",
"updated_at": "2022-06-30T13:44:36Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 282,
"watchers": 283,
"score": 0
},
{
@ -1853,5 +1853,33 @@
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 509084736,
"name": "CBDS_CVE-2022-0847_POC",
"full_name": "Asbatel\/CBDS_CVE-2022-0847_POC",
"owner": {
"login": "Asbatel",
"id": 34680708,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34680708?v=4",
"html_url": "https:\/\/github.com\/Asbatel"
},
"html_url": "https:\/\/github.com\/Asbatel\/CBDS_CVE-2022-0847_POC",
"description": null,
"fork": false,
"created_at": "2022-06-30T13:07:55Z",
"updated_at": "2022-06-30T13:41:25Z",
"pushed_at": "2022-06-30T15:05:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -122,10 +122,10 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-06-22T07:53:42Z",
"updated_at": "2022-06-30T15:20:43Z",
"pushed_at": "2022-06-10T17:34:08Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 203,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
"topics": [],
"visibility": "public",
"forks": 203,
"watchers": 255,
"watchers": 256,
"score": 0
},
{
@ -1583,10 +1583,10 @@
"description": "spring4shell | CVE-2022-22965",
"fork": false,
"created_at": "2022-04-12T14:59:42Z",
"updated_at": "2022-06-30T11:17:16Z",
"updated_at": "2022-06-30T16:30:25Z",
"pushed_at": "2022-06-30T10:55:54Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -1601,7 +1601,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-06-30T10:14:56Z",
"updated_at": "2022-06-30T16:02:55Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 457,
"watchers_count": 457,
"stargazers_count": 460,
"watchers_count": 460,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 457,
"watchers": 460,
"score": 0
},
{

View file

@ -1,30 +0,0 @@
[
{
"id": 502432714,
"name": "RCE-CVE-2022-24806",
"full_name": "oturu\/RCE-CVE-2022-24806",
"owner": {
"login": "oturu",
"id": 106835379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
"html_url": "https:\/\/github.com\/oturu"
},
"html_url": "https:\/\/github.com\/oturu\/RCE-CVE-2022-24806",
"description": "CVE-2022-24806 and CVE-2022-24807 are an unauthenticated RCE vulnerability in magento and adobe commerce",
"fork": false,
"created_at": "2022-06-11T18:59:00Z",
"updated_at": "2022-06-25T07:24:51Z",
"pushed_at": "2022-06-12T12:40:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-06-30T08:47:35Z",
"pushed_at": "2022-06-30T07:31:26Z",
"pushed_at": "2022-06-30T14:47:30Z",
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 30,

View file

@ -131,13 +131,13 @@
"pushed_at": "2022-05-17T15:17:22Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 23,
"score": 0
},
@ -416,10 +416,10 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2022-06-29T23:47:58Z",
"updated_at": "2022-06-30T16:06:40Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -427,7 +427,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

30
2022/CVE-2022-28117.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 478572145,
"name": "CVE-2022-28117",
"full_name": "cheshireca7\/CVE-2022-28117",
"owner": {
"login": "cheshireca7",
"id": 34421496,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34421496?v=4",
"html_url": "https:\/\/github.com\/cheshireca7"
},
"html_url": "https:\/\/github.com\/cheshireca7\/CVE-2022-28117",
"description": "Navigate CMS <= 2.9.4 - Server-Side Request Forgery (Authenticated)",
"fork": false,
"created_at": "2022-04-06T13:27:48Z",
"updated_at": "2022-06-30T12:57:29Z",
"pushed_at": "2022-06-30T12:56:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-06-26T09:03:47Z",
"updated_at": "2022-06-30T16:48:30Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 283,
"watchers": 284,
"score": 0
},
{

30
2022/CVE-2022-29885.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 487163023,
"name": "CVE-2022-29885",
"full_name": "4ra1n\/CVE-2022-29885",
"owner": {
"login": "4ra1n",
"id": 34726933,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34726933?v=4",
"html_url": "https:\/\/github.com\/4ra1n"
},
"html_url": "https:\/\/github.com\/4ra1n\/CVE-2022-29885",
"description": "Apache Tomcat CVE-2022-29885",
"fork": false,
"created_at": "2022-04-30T02:30:00Z",
"updated_at": "2022-06-30T16:30:00Z",
"pushed_at": "2022-06-30T13:46:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,32 +1,4 @@
[
{
"id": 504308544,
"name": "Cve-2022-30136-RCE-POC",
"full_name": "oturu\/Cve-2022-30136-RCE-POC",
"owner": {
"login": "oturu",
"id": 106835379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
"html_url": "https:\/\/github.com\/oturu"
},
"html_url": "https:\/\/github.com\/oturu\/Cve-2022-30136-RCE-POC",
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System",
"fork": false,
"created_at": "2022-06-16T21:16:53Z",
"updated_at": "2022-06-25T07:26:32Z",
"pushed_at": "2022-06-16T21:39:06Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 505100047,
"name": "CVE-2022-30136-MASS-RCE",
@ -54,61 +26,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 507244386,
"name": "Cve-2022-30136-RCE",
"full_name": "oturu\/Cve-2022-30136-RCE",
"owner": {
"login": "oturu",
"id": 106835379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
"html_url": "https:\/\/github.com\/oturu"
},
"html_url": "https:\/\/github.com\/oturu\/Cve-2022-30136-RCE",
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System ",
"fork": false,
"created_at": "2022-06-25T07:28:34Z",
"updated_at": "2022-06-26T06:42:27Z",
"pushed_at": "2022-06-25T07:28:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 507682394,
"name": "CVE-2022-30136-POC",
"full_name": "oturu\/CVE-2022-30136-POC",
"owner": {
"login": "oturu",
"id": 106835379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106835379?v=4",
"html_url": "https:\/\/github.com\/oturu"
},
"html_url": "https:\/\/github.com\/oturu\/CVE-2022-30136-POC",
"description": "CVE-2022-30136 Unauthenticated RCE in Microsoft Windows Network File System ",
"fork": false,
"created_at": "2022-06-26T20:54:02Z",
"updated_at": "2022-06-27T10:23:00Z",
"pushed_at": "2022-06-26T21:01:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Apache Shiro CVE-2022-32532",
"fork": false,
"created_at": "2022-06-28T22:38:30Z",
"updated_at": "2022-06-30T12:00:48Z",
"updated_at": "2022-06-30T18:09:38Z",
"pushed_at": "2022-06-29T16:21:58Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 115,
"watchers": 117,
"score": 0
}
]

View file

@ -219,6 +219,7 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
- [Asbatel/CBDS_CVE-2022-0847_POC](https://github.com/Asbatel/CBDS_CVE-2022-0847_POC)
### CVE-2022-0848 (2022-03-04)
@ -1360,9 +1361,6 @@ Parse Server is an open source http web server backend. In versions prior to 4.1
- [tuo4n8/CVE-2022-24760](https://github.com/tuo4n8/CVE-2022-24760)
### CVE-2022-24806
- [oturu/RCE-CVE-2022-24806](https://github.com/oturu/RCE-CVE-2022-24806)
### CVE-2022-24853 (2022-04-14)
<code>
@ -1873,6 +1871,14 @@ An issue in upload.csp of FANTEC GmbH MWiD25-DS Firmware v2.000.030 allows attac
- [code-byter/CVE-2022-28113](https://github.com/code-byter/CVE-2022-28113)
### CVE-2022-28117 (2022-04-28)
<code>
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter.
</code>
- [cheshireca7/CVE-2022-28117](https://github.com/cheshireca7/CVE-2022-28117)
### CVE-2022-28118 (2022-05-02)
<code>
@ -2134,6 +2140,14 @@ An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to
- [keymandll/CVE-2022-29622](https://github.com/keymandll/CVE-2022-29622)
### CVE-2022-29885 (2022-05-12)
<code>
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
</code>
- [4ra1n/CVE-2022-29885](https://github.com/4ra1n/CVE-2022-29885)
### CVE-2022-29932 (2022-05-11)
<code>
@ -2177,10 +2191,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f
Windows Network File System Remote Code Execution Vulnerability.
</code>
- [oturu/Cve-2022-30136-RCE-POC](https://github.com/oturu/Cve-2022-30136-RCE-POC)
- [zir0x00/CVE-2022-30136-MASS-RCE](https://github.com/zir0x00/CVE-2022-30136-MASS-RCE)
- [oturu/Cve-2022-30136-RCE](https://github.com/oturu/Cve-2022-30136-RCE)
- [oturu/CVE-2022-30136-POC](https://github.com/oturu/CVE-2022-30136-POC)
### CVE-2022-30190 (2022-06-01)
@ -15225,7 +15236,7 @@ An issue was discovered in Webmin &lt;=1.920. The parameter old in password_chan
- [Tuz-Wwsd/CVE-2019-15107_detection](https://github.com/Tuz-Wwsd/CVE-2019-15107_detection)
- [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107)
- [trhacknon/CVE-2019-15107](https://github.com/trhacknon/CVE-2019-15107)
- [NullBrunk/Webmin-RCE](https://github.com/NullBrunk/Webmin-RCE)
- [NullBrunk/CVE-2019-15107](https://github.com/NullBrunk/CVE-2019-15107)
- [psw01/CVE-2019-15107_webminRCE](https://github.com/psw01/CVE-2019-15107_webminRCE)
### CVE-2019-15120 (2019-08-16)
@ -16641,7 +16652,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628)
- [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628)
- [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628)
- [likescam/CVE-2018-2628](https://github.com/likescam/CVE-2018-2628)
- [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit)
- [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628)
- [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628)
@ -17501,7 +17511,6 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner)
- [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2)
- [jyo-zi/CVE-2018-7600](https://github.com/jyo-zi/CVE-2018-7600)
- [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600)
- [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE)
- [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600)
- [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600)
@ -17526,7 +17535,6 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
</code>
- [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
- [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
@ -17705,7 +17713,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
- [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP)
- [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174)
- [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174)
- [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis)
- [likescam/CVE-2018-8174-msf](https://github.com/likescam/CVE-2018-8174-msf)
- [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit)
- [ericisnotrealname/CVE-2018-8174_EXP](https://github.com/ericisnotrealname/CVE-2018-8174_EXP)
@ -17717,14 +17724,6 @@ A remote code execution vulnerability exists in the way that the VBScript engine
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
### CVE-2018-8208 (2018-06-14)
<code>
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka &quot;Windows Desktop Bridge Elevation of Privilege Vulnerability.&quot; This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214.
</code>
- [kaisaryousuf/CVE-2018-8208](https://github.com/kaisaryousuf/CVE-2018-8208)
### CVE-2018-8214 (2018-06-14)
<code>
@ -18415,14 +18414,6 @@ LTB (aka LDAP Tool Box) Self Service Password before 1.3 allows a change to a us
- [reversebrain/CVE-2018-12421](https://github.com/reversebrain/CVE-2018-12421)
### CVE-2018-12463 (2018-07-12)
<code>
An XML external entity (XXE) vulnerability in Fortify Software Security Center (SSC), version 17.1, 17.2, 18.1 allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
</code>
- [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463)
### CVE-2018-12533 (2018-06-18)
<code>