Auto Update 2023/03/23 06:29:29

This commit is contained in:
motikan2010-bot 2023-03-23 15:29:29 +09:00
parent 5123b3b792
commit c7fedb760e
76 changed files with 1141 additions and 254 deletions

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-20T12:19:54Z",
"updated_at": "2023-03-23T04:00:33Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1645,
"watchers_count": 1645,
"stargazers_count": 1646,
"watchers_count": 1646,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1645,
"watchers": 1646,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-20T12:19:54Z",
"updated_at": "2023-03-23T04:00:33Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1645,
"watchers_count": 1645,
"stargazers_count": 1646,
"watchers_count": 1646,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1645,
"watchers": 1646,
"score": 0
},
{

View file

@ -52,10 +52,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2023-02-27T21:04:33Z",
"updated_at": "2023-03-23T02:55:39Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 545,
"watchers_count": 545,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 73,
"watchers": 546,
"watchers": 545,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-20T12:19:54Z",
"updated_at": "2023-03-23T04:00:33Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1645,
"watchers_count": 1645,
"stargazers_count": 1646,
"watchers_count": 1646,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1645,
"watchers": 1646,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2023-03-15T08:40:26Z",
"updated_at": "2023-03-23T04:39:48Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1760,
"watchers_count": 1760,
"stargazers_count": 1761,
"watchers_count": 1761,
"has_discussions": false,
"forks_count": 264,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 264,
"watchers": 1760,
"watchers": 1761,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-03-22T11:57:18Z",
"updated_at": "2023-03-23T06:09:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3698,
"watchers_count": 3698,
"stargazers_count": 3700,
"watchers_count": 3700,
"has_discussions": false,
"forks_count": 1067,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1067,
"watchers": 3698,
"watchers": 3700,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2023-03-21T10:46:48Z",
"updated_at": "2023-03-23T05:39:37Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 162,
"watchers": 163,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-20T12:19:54Z",
"updated_at": "2023-03-23T04:00:33Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1645,
"watchers_count": 1645,
"stargazers_count": 1646,
"watchers_count": 1646,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1645,
"watchers": 1646,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2023-03-22T09:56:48Z",
"updated_at": "2023-03-23T05:40:33Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 204,
"watchers_count": 204,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 202,
"watchers": 204,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-22T06:32:40Z",
"updated_at": "2022-04-22T06:35:39Z",
"updated_at": "2023-03-23T01:18:23Z",
"pushed_at": "2022-04-22T06:36:40Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-02-23T11:48:10Z",
"updated_at": "2022-02-23T11:55:34Z",
"updated_at": "2023-03-23T01:13:15Z",
"pushed_at": "2022-02-23T11:56:14Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -42,7 +42,7 @@
"description": null,
"fork": false,
"created_at": "2022-03-30T09:35:35Z",
"updated_at": "2022-03-30T09:44:25Z",
"updated_at": "2023-03-23T01:18:29Z",
"pushed_at": "2022-03-30T09:46:17Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-01T11:04:45Z",
"updated_at": "2023-01-31T19:42:24Z",
"updated_at": "2023-03-23T01:15:44Z",
"pushed_at": "2022-04-01T11:09:04Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -1032,10 +1032,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2023-03-18T21:12:43Z",
"updated_at": "2023-03-23T04:40:08Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1240,
"watchers_count": 1240,
"stargazers_count": 1241,
"watchers_count": 1241,
"has_discussions": false,
"forks_count": 370,
"allow_forking": true,
@ -1050,7 +1050,7 @@
],
"visibility": "public",
"forks": 370,
"watchers": 1240,
"watchers": 1241,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-03-22T02:02:30Z",
"updated_at": "2023-03-23T04:39:27Z",
"pushed_at": "2023-02-16T02:07:09Z",
"stargazers_count": 1562,
"watchers_count": 1562,
"stargazers_count": 1563,
"watchers_count": 1563,
"has_discussions": false,
"forks_count": 353,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 353,
"watchers": 1562,
"watchers": 1563,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-03-22T11:57:18Z",
"updated_at": "2023-03-23T06:09:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3698,
"watchers_count": 3698,
"stargazers_count": 3700,
"watchers_count": 3700,
"has_discussions": false,
"forks_count": 1067,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1067,
"watchers": 3698,
"watchers": 3700,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2021-02-05T00:18:45Z",
"updated_at": "2022-03-03T22:44:22Z",
"updated_at": "2023-03-23T01:16:32Z",
"pushed_at": "2021-02-09T03:15:08Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-20T12:19:54Z",
"updated_at": "2023-03-23T04:00:33Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1645,
"watchers_count": 1645,
"stargazers_count": 1646,
"watchers_count": 1646,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1645,
"watchers": 1646,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-21T06:23:26Z",
"updated_at": "2022-04-21T06:33:37Z",
"updated_at": "2023-03-23T01:17:11Z",
"pushed_at": "2022-04-21T06:35:24Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -71,7 +71,7 @@
"description": null,
"fork": false,
"created_at": "2022-07-25T11:57:50Z",
"updated_at": "2023-01-31T20:06:46Z",
"updated_at": "2023-03-23T01:16:15Z",
"pushed_at": "2022-07-25T12:38:27Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -18,13 +18,13 @@
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 66,
"score": 0
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 7,
"score": 0
}

View file

@ -129,10 +129,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2023-03-15T15:41:50Z",
"updated_at": "2023-03-23T00:47:38Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -143,7 +143,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 222,
"watchers": 223,
"score": 0
},
{

View file

@ -455,10 +455,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-03-21T12:13:38Z",
"updated_at": "2023-03-23T04:40:59Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 863,
"watchers_count": 863,
"stargazers_count": 864,
"watchers_count": 864,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -467,7 +467,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 863,
"watchers": 864,
"score": 0
},
{

View file

@ -164,10 +164,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2023-03-10T12:09:21Z",
"updated_at": "2023-03-23T04:40:32Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 957,
"watchers_count": 957,
"stargazers_count": 958,
"watchers_count": 958,
"has_discussions": false,
"forks_count": 310,
"allow_forking": true,
@ -180,7 +180,7 @@
],
"visibility": "public",
"forks": 310,
"watchers": 957,
"watchers": 958,
"score": 0
},
{

View file

@ -461,10 +461,10 @@
"description": "Path Traversal vulnerability in Apache 2.4.49",
"fork": false,
"created_at": "2021-10-06T10:04:22Z",
"updated_at": "2021-10-10T18:52:52Z",
"updated_at": "2023-03-23T02:24:39Z",
"pushed_at": "2021-10-07T19:39:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -473,7 +473,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -2374,10 +2374,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2023-03-09T22:35:46Z",
"updated_at": "2023-03-23T00:59:39Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -2395,7 +2395,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-03-22T02:18:39Z",
"updated_at": "2023-03-23T01:18:57Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 545,
"watchers_count": 545,
"stargazers_count": 546,
"watchers_count": 546,
"has_discussions": false,
"forks_count": 97,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 97,
"watchers": 545,
"watchers": 546,
"score": 0
},
{

View file

@ -909,10 +909,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-03-21T09:14:18Z",
"updated_at": "2023-03-23T02:34:07Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1551,
"watchers_count": 1551,
"stargazers_count": 1552,
"watchers_count": 1552,
"has_discussions": false,
"forks_count": 450,
"allow_forking": true,
@ -926,7 +926,7 @@
],
"visibility": "public",
"forks": 450,
"watchers": 1551,
"watchers": 1552,
"score": 0
},
{
@ -1259,10 +1259,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-03-22T06:03:49Z",
"updated_at": "2023-03-23T02:02:57Z",
"pushed_at": "2023-03-21T03:01:52Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -1276,7 +1276,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 645,
"watchers": 646,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-22T04:11:03Z",
"updated_at": "2023-03-22T14:09:02Z",
"pushed_at": "2023-03-22T20:17:23Z",
"pushed_at": "2023-03-23T01:51:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -1865,6 +1865,64 @@
"watchers": 4,
"score": 0
},
{
"id": 510629189,
"name": "dirtypipe-ebpf_detection",
"full_name": "airbus-cert\/dirtypipe-ebpf_detection",
"owner": {
"login": "airbus-cert",
"id": 26453405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
"html_url": "https:\/\/github.com\/airbus-cert"
},
"html_url": "https:\/\/github.com\/airbus-cert\/dirtypipe-ebpf_detection",
"description": "An eBPF detection program for CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T07:20:59Z",
"updated_at": "2023-01-16T18:05:15Z",
"pushed_at": "2022-07-05T14:25:46Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 21,
"score": 0
},
{
"id": 510867863,
"name": "Dirty-Pipe",
"full_name": "edr1412\/Dirty-Pipe",
"owner": {
"login": "edr1412",
"id": 40953911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
"html_url": "https:\/\/github.com\/edr1412"
},
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
"description": "exp of CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T19:22:50Z",
"updated_at": "2023-01-31T12:51:32Z",
"pushed_at": "2022-07-05T19:23:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 520138171,
"name": "CVE-2022-0847-DirtyPipe-Exploits",

View file

@ -42,10 +42,10 @@
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-08-10T10:38:59Z",
"updated_at": "2023-03-01T11:47:12Z",
"updated_at": "2023-03-23T04:28:30Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -1592,6 +1592,68 @@
"watchers": 3,
"score": 0
},
{
"id": 509548569,
"name": "CVE-2022-1388_refresh",
"full_name": "Luchoane\/CVE-2022-1388_refresh",
"owner": {
"login": "Luchoane",
"id": 40374879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
"html_url": "https:\/\/github.com\/Luchoane"
},
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
"fork": false,
"created_at": "2022-07-01T18:08:50Z",
"updated_at": "2022-07-07T19:22:09Z",
"pushed_at": "2022-07-01T20:04:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510239425,
"name": "CVE-2022-1388",
"full_name": "jbharucha05\/CVE-2022-1388",
"owner": {
"login": "jbharucha05",
"id": 13020621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
"html_url": "https:\/\/github.com\/jbharucha05"
},
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
"description": "CVE-2022-1388, bypassing iControl REST authentication",
"fork": false,
"created_at": "2022-07-04T06:31:56Z",
"updated_at": "2022-07-04T07:08:22Z",
"pushed_at": "2022-07-04T10:37:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"f5-big-ip-icontrol-rest-rce",
"f5-bigip"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 557286411,
"name": "CVE-2022-1388",

31
2022/CVE-2022-20124.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510660359,
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"description": null,
"fork": false,
"created_at": "2022-07-05T08:59:44Z",
"updated_at": "2022-07-05T09:52:45Z",
"pushed_at": "2022-07-05T09:52:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2022/CVE-2022-20130.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 509461641,
"name": "external_aac_AOSP10_r33_CVE-2022-20130",
"full_name": "Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/external_aac_AOSP10_r33_CVE-2022-20130",
"description": null,
"fork": false,
"created_at": "2022-07-01T13:16:14Z",
"updated_at": "2022-07-01T13:25:04Z",
"pushed_at": "2022-07-01T13:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2022/CVE-2022-20135.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510684846,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"description": null,
"fork": false,
"created_at": "2022-07-05T10:15:49Z",
"updated_at": "2022-07-05T10:42:21Z",
"pushed_at": "2022-07-05T10:41:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,33 @@
[
{
"id": 510346412,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",
"full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2022-20142",
"description": null,
"fork": false,
"created_at": "2022-07-04T12:16:05Z",
"updated_at": "2022-07-04T13:19:53Z",
"pushed_at": "2022-07-04T12:21:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 529215266,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20142",

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2023-01-17T10:33:22Z",
"updated_at": "2023-01-17T11:20:34Z",
"updated_at": "2023-03-23T01:13:28Z",
"pushed_at": "2023-01-17T11:20:36Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,19 +13,19 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2023-03-19T20:06:21Z",
"updated_at": "2023-03-23T02:11:18Z",
"pushed_at": "2023-01-10T16:25:49Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 180,
"forks": 33,
"watchers": 182,
"score": 0
}
]

View file

@ -202,6 +202,35 @@
"watchers": 0,
"score": 0
},
{
"id": 510875629,
"name": "CVE-2022-21449-I2P-TLS-POC",
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"owner": {
"login": "PyterSmithDarkGhost",
"id": 106814901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
},
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"description": null,
"fork": false,
"created_at": "2022-07-05T19:51:39Z",
"updated_at": "2022-09-01T23:29:48Z",
"pushed_at": "2022-07-05T19:52:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 519281774,
"name": "CVE-2022-21449-showcase",

View file

@ -637,6 +637,64 @@
"watchers": 0,
"score": 0
},
{
"id": 524471767,
"name": "CVE-2022-22954",
"full_name": "amit-pathak009\/CVE-2022-22954",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:04Z",
"updated_at": "2022-06-02T01:44:19Z",
"pushed_at": "2022-06-02T01:44:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 524471940,
"name": "CVE-2022-22954-PoC",
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:39Z",
"updated_at": "2022-06-01T22:41:09Z",
"pushed_at": "2022-06-01T22:41:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 545257457,
"name": "VcenterKiller",

View file

@ -125,10 +125,10 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2023-03-20T14:06:59Z",
"updated_at": "2023-03-23T05:59:57Z",
"pushed_at": "2022-08-04T18:26:18Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"has_discussions": false,
"forks_count": 220,
"allow_forking": true,
@ -137,7 +137,7 @@
"topics": [],
"visibility": "public",
"forks": 220,
"watchers": 282,
"watchers": 283,
"score": 0
},
{
@ -1896,6 +1896,35 @@
"watchers": 72,
"score": 0
},
{
"id": 510562121,
"name": "CVE-2022-22965",
"full_name": "trhacknon\/CVE-2022-22965",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-07-05T02:30:29Z",
"updated_at": "2022-09-27T23:19:26Z",
"pushed_at": "2022-07-05T02:32:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 510569312,
"name": "Spring4Shell-CVE-2022-22965",
@ -2055,10 +2084,10 @@
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具基于JavaFx开发图形化操作更简单提高效率。",
"fork": false,
"created_at": "2022-12-28T04:50:16Z",
"updated_at": "2023-03-22T08:28:32Z",
"updated_at": "2023-03-23T03:52:50Z",
"pushed_at": "2022-12-29T03:32:45Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -2067,7 +2096,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 61,
"watchers": 63,
"score": 0
},
{

39
2022/CVE-2022-24342.json Normal file
View file

@ -0,0 +1,39 @@
[
{
"id": 509870464,
"name": "CVE-2022-24342",
"full_name": "yuriisanin\/CVE-2022-24342",
"owner": {
"login": "yuriisanin",
"id": 11749007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
"html_url": "https:\/\/github.com\/yuriisanin"
},
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-24342",
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
"fork": false,
"created_at": "2022-07-02T22:04:29Z",
"updated_at": "2023-02-12T21:01:11Z",
"pushed_at": "2022-07-05T17:31:35Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"csrf",
"cve",
"cve-2022-24342",
"exploit",
"jetbrains",
"teamcity",
"vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 34,
"score": 0
}
]

View file

@ -100,10 +100,10 @@
"description": "Open Web Analytics (OWA) - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2022-10-08T21:12:35Z",
"updated_at": "2023-03-22T21:44:56Z",
"updated_at": "2023-03-23T01:10:51Z",
"pushed_at": "2022-10-12T17:14:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -57,6 +57,35 @@
"watchers": 0,
"score": 0
},
{
"id": 510182546,
"name": "CVE-2022-24706",
"full_name": "superzerosec\/CVE-2022-24706",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-24706",
"description": "CVE-2022-24706 POC exploit",
"fork": false,
"created_at": "2022-07-04T02:06:27Z",
"updated_at": "2022-07-04T02:06:27Z",
"pushed_at": "2022-07-04T02:06:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 533101052,
"name": "CVE-2022-24706-CouchDB-Exploit",

View file

@ -1280,6 +1280,35 @@
"watchers": 0,
"score": 0
},
{
"id": 510402169,
"name": "TryHackMe-Atlassian-CVE-2022-26134",
"full_name": "r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"owner": {
"login": "r1skkam",
"id": 58542375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
"html_url": "https:\/\/github.com\/r1skkam"
},
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-Atlassian-CVE-2022-26134",
"description": "Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.",
"fork": false,
"created_at": "2022-07-04T15:00:21Z",
"updated_at": "2022-07-19T02:30:51Z",
"pushed_at": "2022-07-04T16:49:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510586350,
"name": "CVE-2022-26134",
@ -1314,6 +1343,44 @@
"watchers": 10,
"score": 0
},
{
"id": 510624422,
"name": "CVE-2022-26134",
"full_name": "Debajyoti0-0\/CVE-2022-26134",
"owner": {
"login": "Debajyoti0-0",
"id": 79437050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
"html_url": "https:\/\/github.com\/Debajyoti0-0"
},
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-07-05T07:04:50Z",
"updated_at": "2022-07-10T08:52:10Z",
"pushed_at": "2022-07-05T09:40:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"atlassian-confluence",
"cve-2022-26134",
"infosec",
"ognl-injection-vulnerability",
"payload",
"python",
"rce",
"unauthenticated"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 510946912,
"name": "cve-2022-26134",

31
2022/CVE-2022-26763.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 509675215,
"name": "PCICrash",
"full_name": "zhuowei\/PCICrash",
"owner": {
"login": "zhuowei",
"id": 704768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
"html_url": "https:\/\/github.com\/zhuowei"
},
"html_url": "https:\/\/github.com\/zhuowei\/PCICrash",
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-09-15T17:20:03Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 36,
"score": 0
}
]

31
2022/CVE-2022-26766.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 509675427,
"name": "CoreTrustDemo",
"full_name": "zhuowei\/CoreTrustDemo",
"owner": {
"login": "zhuowei",
"id": 704768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/704768?v=4",
"html_url": "https:\/\/github.com\/zhuowei"
},
"html_url": "https:\/\/github.com\/zhuowei\/CoreTrustDemo",
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
"fork": false,
"created_at": "2022-07-02T06:16:33Z",
"updated_at": "2023-02-26T02:08:22Z",
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 74,
"score": 0
}
]

View file

@ -28,6 +28,35 @@
"watchers": 38,
"score": 0
},
{
"id": 509605278,
"name": "manageengine-auditad-cve-2022-28219",
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
"owner": {
"login": "rbowes-r7",
"id": 104588115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
"html_url": "https:\/\/github.com\/rbowes-r7"
},
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
"description": null,
"fork": false,
"created_at": "2022-07-01T22:40:46Z",
"updated_at": "2022-07-19T13:50:08Z",
"pushed_at": "2022-07-05T22:13:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 518384320,
"name": "CVE-2022-28219-Like",

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2023-03-09T07:34:27Z",
"updated_at": "2023-03-23T03:39:44Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 89,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 89,
"watchers": 345,
"watchers": 346,
"score": 0
},
{
@ -554,6 +554,64 @@
"watchers": 4,
"score": 0
},
{
"id": 524474931,
"name": "CVE-2022-29464",
"full_name": "amit-pathak009\/CVE-2022-29464",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:14:43Z",
"updated_at": "2022-05-19T21:24:13Z",
"pushed_at": "2022-05-19T21:24:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 524475053,
"name": "CVE-2022-29464-mass",
"full_name": "amit-pathak009\/CVE-2022-29464-mass",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-29464-mass",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:15:18Z",
"updated_at": "2023-01-11T06:21:01Z",
"pushed_at": "2022-05-29T19:16:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 540011346,
"name": "CVE-2022-29464",

View file

@ -27,5 +27,34 @@
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 509388193,
"name": "CVE-2022-29885",
"full_name": "iveresk\/CVE-2022-29885",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/CVE-2022-29885",
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
"fork": false,
"created_at": "2022-07-01T09:02:10Z",
"updated_at": "2023-01-24T17:20:21Z",
"pushed_at": "2022-07-05T06:23:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -2044,20 +2044,20 @@
},
{
"id": 508614565,
"name": "CVE-2022-30190_PowerPoint",
"full_name": "Gra3s\/CVE-2022-30190_PowerPoint",
"name": "CVE-2022-30190_EXP_PowerPoint",
"full_name": "Gra3s\/CVE-2022-30190_EXP_PowerPoint",
"owner": {
"login": "Gra3s",
"id": 76804515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76804515?v=4",
"html_url": "https:\/\/github.com\/Gra3s"
},
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_PowerPoint",
"description": "CVE-2022-30190 exp on PowerPoint",
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_EXP_PowerPoint",
"description": "This is exploit of CVE-2022-30190 on PowerPoint.",
"fork": false,
"created_at": "2022-06-29T08:48:12Z",
"updated_at": "2023-02-27T09:18:22Z",
"pushed_at": "2022-06-30T01:27:36Z",
"updated_at": "2023-03-23T03:19:30Z",
"pushed_at": "2023-03-23T03:18:46Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,

View file

@ -1,4 +1,33 @@
[
{
"id": 510563141,
"name": "CVE-2022-30333-PoC",
"full_name": "TheL1ghtVn\/CVE-2022-30333-PoC",
"owner": {
"login": "TheL1ghtVn",
"id": 89027345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89027345?v=4",
"html_url": "https:\/\/github.com\/TheL1ghtVn"
},
"html_url": "https:\/\/github.com\/TheL1ghtVn\/CVE-2022-30333-PoC",
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
"updated_at": "2022-11-19T19:17:38Z",
"pushed_at": "2022-07-05T02:58:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 514420724,
"name": "unrar-cve-2022-30333-poc",

31
2022/CVE-2022-30594.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510304709,
"name": "linux-4.19.72_CVE-2022-30594",
"full_name": "nidhi7598\/linux-4.19.72_CVE-2022-30594",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/linux-4.19.72_CVE-2022-30594",
"description": null,
"fork": false,
"created_at": "2022-07-04T10:01:05Z",
"updated_at": "2023-03-08T01:26:26Z",
"pushed_at": "2022-07-04T10:18:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

31
2022/CVE-2022-30887.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 510479826,
"name": "CVE-2022-30887",
"full_name": "MuallimNaci\/CVE-2022-30887",
"owner": {
"login": "MuallimNaci",
"id": 87265009,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87265009?v=4",
"html_url": "https:\/\/github.com\/MuallimNaci"
},
"html_url": "https:\/\/github.com\/MuallimNaci\/CVE-2022-30887",
"description": null,
"fork": false,
"created_at": "2022-07-04T19:24:56Z",
"updated_at": "2022-12-08T03:15:35Z",
"pushed_at": "2022-07-04T19:30:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

31
2022/CVE-2022-30929.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 511398695,
"name": "CVE-2022-30929",
"full_name": "nanaao\/CVE-2022-30929",
"owner": {
"login": "nanaao",
"id": 77666853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
"html_url": "https:\/\/github.com\/nanaao"
},
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-30929",
"description": "CVE-2022-30929 POC",
"fork": false,
"created_at": "2022-07-07T05:44:56Z",
"updated_at": "2023-01-31T12:52:11Z",
"pushed_at": "2022-07-04T06:19:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2023-03-19T16:45:01Z",
"updated_at": "2023-03-23T03:07:58Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 368,
"watchers_count": 368,
"stargazers_count": 369,
"watchers_count": 369,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 368,
"watchers": 369,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-03T11:39:25Z",
"updated_at": "2023-03-16T16:47:02Z",
"updated_at": "2023-03-23T05:31:28Z",
"pushed_at": "2022-10-10T08:57:29Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -158,10 +158,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2023-03-21T15:29:04Z",
"updated_at": "2023-03-23T01:26:56Z",
"pushed_at": "2022-09-15T03:19:28Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 201,
"watchers": 202,
"score": 0
},
{

View file

@ -220,10 +220,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2023-03-22T01:49:51Z",
"updated_at": "2023-03-23T03:27:19Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -236,7 +236,7 @@
],
"visibility": "public",
"forks": 41,
"watchers": 235,
"watchers": 236,
"score": 0
},
{
@ -253,10 +253,10 @@
"description": "CVE-2022-39197 bug fix patch",
"fork": false,
"created_at": "2022-10-09T04:06:23Z",
"updated_at": "2022-10-17T06:58:26Z",
"updated_at": "2023-03-23T03:34:03Z",
"pushed_at": "2022-10-09T05:50:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2023-03-17T15:46:52Z",
"updated_at": "2023-03-23T02:11:24Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 250,
"watchers_count": 250,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 249,
"forks": 50,
"watchers": 250,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-41040 nuclei template",
"fork": false,
"created_at": "2022-10-02T11:26:57Z",
"updated_at": "2023-01-14T21:54:26Z",
"updated_at": "2023-03-23T04:19:54Z",
"pushed_at": "2022-10-02T11:55:35Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -199,10 +199,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-14T17:01:17Z",
"updated_at": "2022-11-01T16:13:17Z",
"updated_at": "2023-03-23T04:20:35Z",
"pushed_at": "2022-10-15T09:10:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -211,7 +211,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Vulnerability Details for CVE-2022-41218",
"fork": false,
"created_at": "2022-09-30T07:12:23Z",
"updated_at": "2023-03-22T21:55:50Z",
"updated_at": "2023-03-23T04:55:28Z",
"pushed_at": "2022-10-09T05:26:03Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"forks": 7,
"watchers": 24,
"score": 0
}
]

View file

@ -46,10 +46,10 @@
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
"fork": false,
"created_at": "2023-02-23T10:04:58Z",
"updated_at": "2023-03-22T13:01:41Z",
"updated_at": "2023-03-23T04:32:01Z",
"pushed_at": "2023-03-14T08:41:51Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-03-22T02:38:48Z",
"updated_at": "2023-03-23T02:28:07Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 218,
"watchers_count": 218,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 217,
"watchers": 218,
"score": 0
},
{
@ -281,10 +281,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
"fork": false,
"created_at": "2023-02-13T02:00:51Z",
"updated_at": "2023-03-22T13:41:58Z",
"updated_at": "2023-03-23T01:15:57Z",
"pushed_at": "2023-03-22T11:33:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -306,7 +306,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -352,10 +352,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-22T21:26:20Z",
"updated_at": "2023-03-22T21:26:20Z",
"updated_at": "2023-03-23T05:43:33Z",
"pushed_at": "2023-03-22T21:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -364,7 +364,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-05T17:29:10Z",
"updated_at": "2023-03-09T07:29:56Z",
"updated_at": "2023-03-23T04:19:43Z",
"pushed_at": "2023-01-05T17:40:18Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 100,
"watchers": 101,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
"fork": false,
"created_at": "2022-12-09T22:48:38Z",
"updated_at": "2023-02-23T12:25:38Z",
"updated_at": "2023-03-23T02:55:51Z",
"pushed_at": "2022-12-11T13:37:22Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 88,
"watchers": 87,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2022-46463(Harbor 未授权)",
"fork": false,
"created_at": "2023-01-17T14:58:14Z",
"updated_at": "2023-03-10T06:55:23Z",
"updated_at": "2023-03-23T01:47:52Z",
"pushed_at": "2023-01-19T12:47:21Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-03-22T14:40:25Z",
"updated_at": "2023-03-23T06:01:04Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 777,
"watchers_count": 777,
"stargazers_count": 778,
"watchers_count": 778,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 777,
"watchers": 778,
"score": 0
},
{

View file

@ -39,13 +39,13 @@
"html_url": "https:\/\/github.com\/infobyte"
},
"html_url": "https:\/\/github.com\/infobyte\/CVE-2023-21036",
"description": "Detection an sanitization for Acropalypse Now - CVE-2023-21036",
"description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036",
"fork": false,
"created_at": "2023-03-22T14:59:42Z",
"updated_at": "2023-03-23T00:27:58Z",
"updated_at": "2023-03-23T04:28:15Z",
"pushed_at": "2023-03-22T19:19:26Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 15,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).",
"fork": false,
"created_at": "2023-03-08T06:20:45Z",
"updated_at": "2023-03-21T12:38:03Z",
"updated_at": "2023-03-23T04:35:27Z",
"pushed_at": "2023-03-08T06:21:58Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 53,
"watchers": 54,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-22T12:55:45Z",
"updated_at": "2023-03-23T01:27:35Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 322,
"watchers": 323,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2023-03-21T16:18:45Z",
"updated_at": "2023-03-23T02:31:50Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -91,7 +91,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 91,
"watchers": 92,
"score": 0
},
{
@ -166,10 +166,10 @@
"description": "CVE-2023-21768 Windows 11 22H2 系统本地提权 POC",
"fork": false,
"created_at": "2023-03-22T07:24:36Z",
"updated_at": "2023-03-22T16:12:37Z",
"updated_at": "2023-03-23T02:42:13Z",
"pushed_at": "2023-03-22T07:34:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -178,7 +178,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-03-20T14:32:11Z",
"updated_at": "2023-03-23T03:55:00Z",
"pushed_at": "2023-03-03T03:30:04Z",
"stargazers_count": 473,
"watchers_count": 473,
"stargazers_count": 474,
"watchers_count": 474,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 473,
"watchers": 474,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "Simple PoC in PowerShell for CVE-2023-23397",
"fork": false,
"created_at": "2023-03-16T19:10:37Z",
"updated_at": "2023-03-22T12:02:43Z",
"updated_at": "2023-03-23T03:17:42Z",
"pushed_at": "2023-03-16T19:29:49Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -151,7 +151,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 16,
"score": 0
},
{
@ -173,13 +173,13 @@
"stargazers_count": 239,
"watchers_count": 239,
"has_discussions": false,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 36,
"watchers": 239,
"score": 0
},
@ -371,12 +371,12 @@
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-03-22T23:36:32Z",
"updated_at": "2023-03-23T05:40:30Z",
"pushed_at": "2023-03-20T16:55:25Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -384,8 +384,8 @@
"cve-2023-23397"
],
"visibility": "public",
"forks": 3,
"watchers": 23,
"forks": 5,
"watchers": 26,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-22T11:23:44Z",
"updated_at": "2023-03-22T11:41:06Z",
"updated_at": "2023-03-23T02:18:12Z",
"pushed_at": "2023-03-22T11:41:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-03-21T10:57:03Z",
"updated_at": "2023-03-23T01:54:37Z",
"pushed_at": "2023-03-07T10:43:36Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 86,
"watchers": 87,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2023-03-22T21:59:29Z",
"updated_at": "2023-03-23T05:55:32Z",
"pushed_at": "2023-03-20T12:51:29Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 116,
"forks": 14,
"watchers": 122,
"score": 0
}
]

View file

@ -242,7 +242,12 @@ A Path Traversal in setup.php in OpenEMR &lt; 7.0.0 allows remote unauthenticate
### CVE-2023-23138
- [OmarAtallahh/CVE-2023-23138](https://github.com/OmarAtallahh/CVE-2023-23138)
### CVE-2023-23192
### CVE-2023-23192 (2023-03-22)
<code>
IS Decisions UserLock MFA 11.01 is vulnerable to authentication bypass using scheduled task.
</code>
- [pinarsadioglu/CVE-2023-23192](https://github.com/pinarsadioglu/CVE-2023-23192)
- [Penkyzduyi/CVE-2023-23192](https://github.com/Penkyzduyi/CVE-2023-23192)
@ -732,6 +737,8 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [ih3na/debian11-dirty_pipe-patcher](https://github.com/ih3na/debian11-dirty_pipe-patcher)
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
- [eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits)
- [EagleTube/CVE-2022-0847](https://github.com/EagleTube/CVE-2022-0847)
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
@ -984,6 +991,8 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC)
- [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388)
- [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388)
- [Luchoane/CVE-2022-1388_refresh](https://github.com/Luchoane/CVE-2022-1388_refresh)
- [jbharucha05/CVE-2022-1388](https://github.com/jbharucha05/CVE-2022-1388)
- [On-Cyber-War/CVE-2022-1388](https://github.com/On-Cyber-War/CVE-2022-1388)
- [OnCyberWar/CVE-2022-1388](https://github.com/OnCyberWar/CVE-2022-1388)
- [revanmalang/CVE-2022-1388](https://github.com/revanmalang/CVE-2022-1388)
@ -1374,6 +1383,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
- [nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007](https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20007)
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007)
### CVE-2022-20124 (2022-06-15)
<code>
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-170646036
</code>
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
### CVE-2022-20126 (2022-06-15)
<code>
@ -1385,6 +1402,14 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo
### CVE-2022-20128
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
### CVE-2022-20130 (2022-06-15)
<code>
In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979
</code>
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
### CVE-2022-20133 (2022-06-15)
<code>
@ -1393,6 +1418,14 @@ In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of
- [nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133](https://github.com/nidhi7598/packages_apps_Bluetooth_AOSP_10_r33_CVE-2022-20133)
### CVE-2022-20135 (2022-06-15)
<code>
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
</code>
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
### CVE-2022-20138 (2022-06-15)
<code>
@ -1409,6 +1442,7 @@ In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there
In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possible arbitrary code execution due to parcel mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216631962
</code>
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142)
### CVE-2022-20186 (2022-06-15)
@ -1599,6 +1633,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
- [thack1/CVE-2022-21449](https://github.com/thack1/CVE-2022-21449)
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
- [Skipper7718/CVE-2022-21449-showcase](https://github.com/Skipper7718/CVE-2022-21449-showcase)
- [davwwwx/CVE-2022-21449](https://github.com/davwwwx/CVE-2022-21449)
@ -2048,6 +2083,8 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [badboy-sft/CVE-2022-22954](https://github.com/badboy-sft/CVE-2022-22954)
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
@ -2149,6 +2186,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
- [cxzero/CVE-2022-22965-spring4shell](https://github.com/cxzero/CVE-2022-22965-spring4shell)
- [tpt11fb/SpringVulScan](https://github.com/tpt11fb/SpringVulScan)
- [trhacknon/CVE-2022-22965](https://github.com/trhacknon/CVE-2022-22965)
- [D1mang/Spring4Shell-CVE-2022-22965](https://github.com/D1mang/Spring4Shell-CVE-2022-22965)
- [iloveflag/Fast-CVE-2022-22965](https://github.com/iloveflag/Fast-CVE-2022-22965)
- [ClemExp/CVE-2022-22965-PoC](https://github.com/ClemExp/CVE-2022-22965-PoC)
@ -2534,6 +2572,14 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
### CVE-2022-24342 (2022-02-25)
<code>
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
</code>
- [yuriisanin/CVE-2022-24342](https://github.com/yuriisanin/CVE-2022-24342)
### CVE-2022-24348 (2022-02-04)
<code>
@ -2652,6 +2698,7 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
- [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit)
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
### CVE-2022-24707 (2022-02-23)
@ -3057,7 +3104,9 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
- [f4yd4-s3c/cve-2022-26134](https://github.com/f4yd4-s3c/cve-2022-26134)
- [coskper-papa/CVE-2022-26134](https://github.com/coskper-papa/CVE-2022-26134)
- [p4b3l1t0/confusploit](https://github.com/p4b3l1t0/confusploit)
@ -3183,6 +3232,22 @@ A use after free issue was addressed with improved memory management. This issue
- [Dylbin/flow_divert](https://github.com/Dylbin/flow_divert)
### CVE-2022-26763 (2022-05-26)
<code>
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.
</code>
- [zhuowei/PCICrash](https://github.com/zhuowei/PCICrash)
### CVE-2022-26766 (2022-05-26)
<code>
A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.
</code>
- [zhuowei/CoreTrustDemo](https://github.com/zhuowei/CoreTrustDemo)
### CVE-2022-26809 (2022-04-15)
<code>
@ -3431,6 +3496,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
</code>
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
- [aeifkz/CVE-2022-28219-Like](https://github.com/aeifkz/CVE-2022-28219-Like)
### CVE-2022-28281 (2022-12-22)
@ -3705,6 +3771,8 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
- [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464)
- [amit-pathak009/CVE-2022-29464](https://github.com/amit-pathak009/CVE-2022-29464)
- [amit-pathak009/CVE-2022-29464-mass](https://github.com/amit-pathak009/CVE-2022-29464-mass)
- [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464)
- [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464)
- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-)
@ -3811,6 +3879,7 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20
</code>
- [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885)
- [iveresk/CVE-2022-29885](https://github.com/iveresk/CVE-2022-29885)
### CVE-2022-29932 (2022-05-11)
@ -3947,7 +4016,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
- [Cerebrovinny/follina-CVE-2022-30190](https://github.com/Cerebrovinny/follina-CVE-2022-30190)
- [ethicalblue/Follina-CVE-2022-30190-Sample](https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample)
- [Lucaskrell/go_follina](https://github.com/Lucaskrell/go_follina)
- [Gra3s/CVE-2022-30190_PowerPoint](https://github.com/Gra3s/CVE-2022-30190_PowerPoint)
- [Gra3s/CVE-2022-30190_EXP_PowerPoint](https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint)
- [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-)
- [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s)
- [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190)
@ -3990,6 +4059,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
</code>
- [TheL1ghtVn/CVE-2022-30333-PoC](https://github.com/TheL1ghtVn/CVE-2022-30333-PoC)
- [rbowes-r7/unrar-cve-2022-30333-poc](https://github.com/rbowes-r7/unrar-cve-2022-30333-poc)
- [J0hnbX/CVE-2022-30333](https://github.com/J0hnbX/CVE-2022-30333)
- [aslitsecurity/Zimbra-CVE-2022-30333](https://github.com/aslitsecurity/Zimbra-CVE-2022-30333)
@ -4100,6 +4170,14 @@ liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandl
- [efchatz/HTTP3-attacks](https://github.com/efchatz/HTTP3-attacks)
### CVE-2022-30594 (2022-05-12)
<code>
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
</code>
- [nidhi7598/linux-4.19.72_CVE-2022-30594](https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594)
### CVE-2022-30600 (2022-05-18)
<code>
@ -4127,6 +4205,22 @@ Gitea before 1.16.7 does not escape git fetch remote.
- [wuhan005/CVE-2022-30781](https://github.com/wuhan005/CVE-2022-30781)
### CVE-2022-30887 (2022-05-20)
<code>
Pharmacy Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
</code>
- [MuallimNaci/CVE-2022-30887](https://github.com/MuallimNaci/CVE-2022-30887)
### CVE-2022-30929 (2022-07-06)
<code>
Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
</code>
- [nanaao/CVE-2022-30929](https://github.com/nanaao/CVE-2022-30929)
### CVE-2022-31007 (2022-05-31)
<code>