Auto Update 2022/05/25 18:20:00

This commit is contained in:
motikan2010-bot 2022-05-26 03:20:00 +09:00
parent 146d4a9463
commit c3b8edbc20
28 changed files with 353 additions and 82 deletions

View file

@ -364,17 +364,17 @@
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-09T15:59:14Z",
"updated_at": "2022-04-16T09:09:27Z",
"updated_at": "2022-05-25T17:46:28Z",
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 82,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 145,
"forks": 83,
"watchers": 146,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)",
"fork": false,
"created_at": "2016-05-03T16:47:32Z",
"updated_at": "2022-05-25T05:49:14Z",
"updated_at": "2022-05-25T17:46:36Z",
"pushed_at": "2019-03-10T02:18:00Z",
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 59,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 180,
"forks": 60,
"watchers": 181,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2022-05-24T15:56:42Z",
"updated_at": "2022-05-25T16:24:21Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 133,
"watchers_count": 133,

View file

@ -13,17 +13,17 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2022-05-02T00:18:55Z",
"updated_at": "2022-05-25T17:45:20Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 370,
"watchers_count": 370,
"forks_count": 136,
"stargazers_count": 371,
"watchers_count": 371,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 136,
"watchers": 370,
"forks": 137,
"watchers": 371,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit",
"fork": false,
"created_at": "2018-11-09T14:10:20Z",
"updated_at": "2021-08-05T03:48:22Z",
"updated_at": "2022-05-25T15:42:05Z",
"pushed_at": "2018-11-09T14:42:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"forks": 6,
"watchers": 9,
"score": 0
},
{

View file

@ -2861,17 +2861,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2022-05-25T11:57:52Z",
"updated_at": "2022-05-25T14:06:49Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 69,
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 282,
"forks": 71,
"watchers": 284,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
"fork": false,
"created_at": "2018-01-09T13:53:57Z",
"updated_at": "2022-05-24T15:56:42Z",
"updated_at": "2022-05-25T16:24:21Z",
"pushed_at": "2020-08-22T06:15:54Z",
"stargazers_count": 133,
"watchers_count": 133,

View file

@ -13,17 +13,17 @@
"description": "PoC of CVE-2021-30731",
"fork": false,
"created_at": "2022-04-13T06:13:24Z",
"updated_at": "2022-04-14T18:10:08Z",
"updated_at": "2022-05-25T16:09:08Z",
"pushed_at": "2022-04-13T18:57:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2022-05-20T17:47:53Z",
"updated_at": "2022-05-25T14:27:10Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 213,
"watchers": 214,
"score": 0
},
{

View file

@ -188,12 +188,12 @@
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 79,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-05-25T06:16:09Z",
"updated_at": "2022-05-25T16:04:42Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 97,
"watchers": 98,
"score": 0
}
]

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-05-24T04:46:24Z",
"updated_at": "2022-05-25T15:02:13Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"forks_count": 451,
"stargazers_count": 1536,
"watchers_count": 1536,
"forks_count": 452,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 451,
"watchers": 1535,
"forks": 452,
"watchers": 1536,
"score": 0
},
{
@ -266,17 +266,17 @@
"description": "PoC for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T02:02:25Z",
"updated_at": "2022-05-24T13:03:53Z",
"updated_at": "2022-05-25T15:15:01Z",
"pushed_at": "2022-01-26T02:27:53Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 39,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 48,
"forks": 40,
"watchers": 49,
"score": 0
},
{

View file

@ -799,11 +799,11 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-05-25T03:44:32Z",
"updated_at": "2022-05-25T17:45:16Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1366,
"watchers_count": 1366,
"forks_count": 375,
"stargazers_count": 1367,
"watchers_count": 1367,
"forks_count": 376,
"allow_forking": true,
"is_template": false,
"topics": [
@ -813,8 +813,8 @@
"security"
],
"visibility": "public",
"forks": 375,
"watchers": 1366,
"forks": 376,
"watchers": 1367,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-05-25T10:47:04Z",
"updated_at": "2022-05-25T10:50:30Z",
"pushed_at": "2022-05-25T11:43:08Z",
"pushed_at": "2022-05-25T13:43:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -314,12 +314,12 @@
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 200,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-05-18T18:27:36Z",
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 86,
"forks_count": 87,
"allow_forking": true,
"is_template": false,
"topics": [
@ -31,7 +31,7 @@
"tomcat"
],
"visibility": "public",
"forks": 86,
"forks": 87,
"watchers": 272,
"score": 0
},
@ -724,17 +724,17 @@
"description": "Spring Framework RCE via Data Binding on JDK 9+ \/ spring4shell \/ CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T13:35:01Z",
"updated_at": "2022-04-06T08:35:57Z",
"updated_at": "2022-05-25T16:18:06Z",
"pushed_at": "2022-04-04T01:16:41Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

29
2022/CVE-2022-23270.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 490686432,
"name": "CVE-2022-23270-PPTP",
"full_name": "corelight\/CVE-2022-23270-PPTP",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2022-23270-PPTP",
"description": "A Zeek package to detect CVE-2022-23270, a PPTP vulnerability in Windows.",
"fork": false,
"created_at": "2022-05-10T12:27:26Z",
"updated_at": "2022-05-25T17:17:27Z",
"pushed_at": "2022-05-11T18:45:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-05-19T01:16:01Z",
"updated_at": "2022-05-23T14:46:38Z",
"updated_at": "2022-05-25T16:07:12Z",
"pushed_at": "2022-05-19T01:17:07Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

29
2022/CVE-2022-26937.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 491231577,
"name": "CVE-2022-26937",
"full_name": "corelight\/CVE-2022-26937",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2022-26937",
"description": "A Zeek package to detect CVE-2022-26937, a vulnerability in the Network Lock Manager (NLM) protocol in Windows MFS server.",
"fork": false,
"created_at": "2022-05-11T18:36:45Z",
"updated_at": "2022-05-25T17:18:29Z",
"pushed_at": "2022-05-17T16:53:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-29337.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 496233349,
"name": "CVE-2022-29337",
"full_name": "exploitwritter\/CVE-2022-29337",
"owner": {
"login": "exploitwritter",
"id": 47488127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47488127?v=4",
"html_url": "https:\/\/github.com\/exploitwritter"
},
"html_url": "https:\/\/github.com\/exploitwritter\/CVE-2022-29337",
"description": "C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary commands via a crafted HTTP request.",
"fork": false,
"created_at": "2022-05-25T13:02:34Z",
"updated_at": "2022-05-25T17:30:40Z",
"pushed_at": "2022-05-25T13:05:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "CVE-2022-29359 - School Application System Stored Cross-Site Scripting",
"fork": false,
"created_at": "2022-04-12T17:30:18Z",
"updated_at": "2022-05-25T10:26:33Z",
"updated_at": "2022-05-25T12:58:51Z",
"pushed_at": "2022-04-12T17:51:24Z",
"stargazers_count": 0,
"watchers_count": 0,

29
2022/CVE-2022-30510.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 496310557,
"name": "CVE-2022-30510",
"full_name": "bigzooooz\/CVE-2022-30510",
"owner": {
"login": "bigzooooz",
"id": 7108710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
"html_url": "https:\/\/github.com\/bigzooooz"
},
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30510",
"description": "School Dormitory Management System 1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2022-05-25T16:32:18Z",
"updated_at": "2022-05-25T16:32:18Z",
"pushed_at": "2022-05-25T16:32:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-30511.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 496311392,
"name": "CVE-2022-30511",
"full_name": "bigzooooz\/CVE-2022-30511",
"owner": {
"login": "bigzooooz",
"id": 7108710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
"html_url": "https:\/\/github.com\/bigzooooz"
},
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30511",
"description": "School Dormitory Management System 1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2022-05-25T16:35:06Z",
"updated_at": "2022-05-25T16:35:06Z",
"pushed_at": "2022-05-25T16:35:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-30512.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 496307836,
"name": "CVE-2022-30512",
"full_name": "bigzooooz\/CVE-2022-30512",
"owner": {
"login": "bigzooooz",
"id": 7108710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
"html_url": "https:\/\/github.com\/bigzooooz"
},
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30512",
"description": "School Dormitory Management System 1.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2022-05-25T16:23:53Z",
"updated_at": "2022-05-25T16:23:53Z",
"pushed_at": "2022-05-25T16:27:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-30513.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 496314993,
"name": "CVE-2022-30513",
"full_name": "bigzooooz\/CVE-2022-30513",
"owner": {
"login": "bigzooooz",
"id": 7108710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
"html_url": "https:\/\/github.com\/bigzooooz"
},
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30513",
"description": "School Dormitory Management System 1.0 - Reflected XSS",
"fork": false,
"created_at": "2022-05-25T16:46:09Z",
"updated_at": "2022-05-25T16:46:09Z",
"pushed_at": "2022-05-25T16:47:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2022/CVE-2022-30514.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 496313723,
"name": "CVE-2022-30514",
"full_name": "bigzooooz\/CVE-2022-30514",
"owner": {
"login": "bigzooooz",
"id": 7108710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7108710?v=4",
"html_url": "https:\/\/github.com\/bigzooooz"
},
"html_url": "https:\/\/github.com\/bigzooooz\/CVE-2022-30514",
"description": "School Dormitory Management System 1.0 - Reflected XSS",
"fork": false,
"created_at": "2022-05-25T16:42:25Z",
"updated_at": "2022-05-25T16:42:25Z",
"pushed_at": "2022-05-25T16:43:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "🍵 Gitea repository migration remote command execution exploit.",
"fork": false,
"created_at": "2022-05-22T05:15:58Z",
"updated_at": "2022-05-25T06:39:35Z",
"updated_at": "2022-05-25T13:57:30Z",
"pushed_at": "2022-05-22T05:26:29Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -861,6 +861,14 @@ Point-to-Point Tunneling Protocol Denial of Service Vulnerability.
- [nettitude/CVE-2022-23253-PoC](https://github.com/nettitude/CVE-2022-23253-PoC)
### CVE-2022-23270 (2022-05-10)
<code>
Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21972.
</code>
- [corelight/CVE-2022-23270-PPTP](https://github.com/corelight/CVE-2022-23270-PPTP)
### CVE-2022-23305 (2022-01-18)
<code>
@ -1472,6 +1480,14 @@ Windows Graphics Component Remote Code Execution Vulnerability.
- [Exploitables/CVE-2022-26927](https://github.com/Exploitables/CVE-2022-26927)
### CVE-2022-26937 (2022-05-10)
<code>
Windows Network File System Remote Code Execution Vulnerability.
</code>
- [corelight/CVE-2022-26937](https://github.com/corelight/CVE-2022-26937)
### CVE-2022-27134 (2022-05-12)
<code>
@ -1710,6 +1726,14 @@ Smarty is a template engine for PHP, facilitating the separation of presentation
- [sbani/CVE-2022-29221-PoC](https://github.com/sbani/CVE-2022-29221-PoC)
### CVE-2022-29337 (2022-05-24)
<code>
C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary commands via a crafted HTTP request.
</code>
- [exploitwritter/CVE-2022-29337](https://github.com/exploitwritter/CVE-2022-29337)
### CVE-2022-29359 (2022-05-24)
<code>
@ -1809,6 +1833,21 @@ WAVLINK WN535 G3 was discovered to contain a cross-site scripting (XSS) vulnerab
- [badboycxcc/XSS-CVE-2022-30489](https://github.com/badboycxcc/XSS-CVE-2022-30489)
- [trhacknon/XSS-CVE-2022-30489](https://github.com/trhacknon/XSS-CVE-2022-30489)
### CVE-2022-30510
- [bigzooooz/CVE-2022-30510](https://github.com/bigzooooz/CVE-2022-30510)
### CVE-2022-30511
- [bigzooooz/CVE-2022-30511](https://github.com/bigzooooz/CVE-2022-30511)
### CVE-2022-30512
- [bigzooooz/CVE-2022-30512](https://github.com/bigzooooz/CVE-2022-30512)
### CVE-2022-30513
- [bigzooooz/CVE-2022-30513](https://github.com/bigzooooz/CVE-2022-30513)
### CVE-2022-30514
- [bigzooooz/CVE-2022-30514](https://github.com/bigzooooz/CVE-2022-30514)
### CVE-2022-30525 (2022-05-12)
<code>