Auto Update 2022/03/21 12:15:11

This commit is contained in:
motikan2010-bot 2022-03-21 21:15:11 +09:00
parent 910bbb036b
commit ca1f6ea757
40 changed files with 309 additions and 186 deletions

View file

@ -28,5 +28,59 @@
"forks": 189,
"watchers": 278,
"score": 0
},
{
"id": 472212415,
"name": "CVE-2015-1701",
"full_name": "Anonymous-Family\/CVE-2015-1701",
"owner": {
"login": "Anonymous-Family",
"id": 98486038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
"html_url": "https:\/\/github.com\/Anonymous-Family"
},
"html_url": "https:\/\/github.com\/Anonymous-Family\/CVE-2015-1701",
"description": "Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015 (Base Score: 7.2 HIGH) Current Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka \"Win32k Elevation of Privilege Vulnerability ",
"fork": false,
"created_at": "2022-03-21T06:26:21Z",
"updated_at": "2022-03-21T06:38:17Z",
"pushed_at": "2022-03-21T06:40:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 472215624,
"name": "CVE-2015-1701-download",
"full_name": "Anonymous-Family\/CVE-2015-1701-download",
"owner": {
"login": "Anonymous-Family",
"id": 98486038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
"html_url": "https:\/\/github.com\/Anonymous-Family"
},
"html_url": "https:\/\/github.com\/Anonymous-Family\/CVE-2015-1701-download",
"description": null,
"fork": false,
"created_at": "2022-03-21T06:39:18Z",
"updated_at": "2022-03-21T06:39:18Z",
"pushed_at": "2022-03-21T06:39:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1104,5 +1104,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 472249885,
"name": "dirtycow",
"full_name": "gurpreetsinghsaluja\/dirtycow",
"owner": {
"login": "gurpreetsinghsaluja",
"id": 91534153,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91534153?v=4",
"html_url": "https:\/\/github.com\/gurpreetsinghsaluja"
},
"html_url": "https:\/\/github.com\/gurpreetsinghsaluja\/dirtycow",
"description": "Dirty Cow CVE-2016-5195 Vulnerability",
"fork": false,
"created_at": "2022-03-21T08:35:21Z",
"updated_at": "2022-03-21T08:36:24Z",
"pushed_at": "2022-03-21T08:37:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cybersecurity"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Proof of concept exploit for CVE-2017-3599",
"fork": false,
"created_at": "2017-04-18T17:08:39Z",
"updated_at": "2021-12-24T00:54:29Z",
"updated_at": "2022-03-21T09:50:15Z",
"pushed_at": "2017-04-18T17:10:18Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 19,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2017-3599"
],
"visibility": "public",
"forks": 19,
"watchers": 23,
"forks": 20,
"watchers": 24,
"score": 0
},
{

View file

@ -148,17 +148,17 @@
"description": "WebLogic WLS核心组件反序列化漏洞多线程批量检测脚本 CVE-2018-2628-MultiThreading",
"fork": false,
"created_at": "2018-04-18T17:50:29Z",
"updated_at": "2020-05-08T14:01:45Z",
"updated_at": "2022-03-21T08:48:11Z",
"pushed_at": "2018-04-19T06:56:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-03-21T05:41:32Z",
"updated_at": "2022-03-21T11:56:16Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 509,
"watchers_count": 509,
"stargazers_count": 511,
"watchers_count": 511,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 509,
"watchers": 511,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")",
"fork": false,
"created_at": "2019-11-19T08:53:56Z",
"updated_at": "2022-01-06T07:46:40Z",
"updated_at": "2022-03-21T08:19:58Z",
"pushed_at": "2019-11-19T09:18:00Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 101,
"watchers": 102,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-03-20T20:13:44Z",
"updated_at": "2022-03-21T09:37:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3221,
"watchers_count": 3221,
"stargazers_count": 3220,
"watchers_count": 3220,
"forks_count": 955,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 955,
"watchers": 3221,
"watchers": 3220,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-05-15T08:30:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 4,
"score": 0
},
@ -49,12 +49,12 @@
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 24,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 23,
"watchers": 59,
"score": 0
},

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1432,
"watchers_count": 1432,
"forks_count": 323,
"forks_count": 324,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 323,
"forks": 324,
"watchers": 1432,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-03-20T20:13:44Z",
"updated_at": "2022-03-21T09:37:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3221,
"watchers_count": 3221,
"stargazers_count": 3220,
"watchers_count": 3220,
"forks_count": 955,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 955,
"watchers": 3221,
"watchers": 3220,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-03-17T13:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2022-03-21T05:52:58Z",
"updated_at": "2022-03-21T11:54:22Z",
"pushed_at": "2021-10-29T07:46:53Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 324,
"watchers_count": 324,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 323,
"watchers": 324,
"score": 0
}
]

View file

@ -152,12 +152,12 @@
"pushed_at": "2021-04-27T21:13:18Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 25,
"score": 0
},

View file

@ -503,17 +503,17 @@
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
"fork": false,
"created_at": "2021-03-11T20:51:48Z",
"updated_at": "2022-02-26T22:51:43Z",
"updated_at": "2022-03-21T07:26:45Z",
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 55,
"watchers": 56,
"score": 0
},
{
@ -1050,17 +1050,17 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2022-03-18T05:14:54Z",
"updated_at": "2022-03-21T09:28:59Z",
"pushed_at": "2021-11-16T04:00:14Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-03T15:18:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 1,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2022-03-21T02:15:10Z",
"updated_at": "2022-03-21T08:28:16Z",
"pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2022-03-21T02:32:29Z",
"updated_at": "2022-03-21T11:08:34Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 228,
"watchers": 229,
"score": 0
},
{

View file

@ -425,17 +425,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2022-03-17T10:59:25Z",
"updated_at": "2022-03-21T08:59:46Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 817,
"watchers_count": 817,
"stargazers_count": 818,
"watchers_count": 818,
"forks_count": 234,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 234,
"watchers": 817,
"watchers": 818,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2022-03-20T18:27:44Z",
"updated_at": "2022-03-21T09:23:07Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 47,
"stargazers_count": 231,
"watchers_count": 231,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 230,
"forks": 48,
"watchers": 231,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2022-03-15T20:00:44Z",
"updated_at": "2022-03-21T08:37:17Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-03-21T05:22:36Z",
"updated_at": "2022-03-21T07:08:35Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1418,
"watchers_count": 1418,
"stargazers_count": 1419,
"watchers_count": 1419,
"forks_count": 414,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 414,
"watchers": 1418,
"watchers": 1419,
"score": 0
},
{
@ -239,17 +239,17 @@
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
"fork": false,
"created_at": "2022-01-26T01:34:44Z",
"updated_at": "2022-03-16T02:21:28Z",
"updated_at": "2022-03-21T09:58:06Z",
"pushed_at": "2022-01-27T15:13:51Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 81,
"watchers": 82,
"score": 0
},
{
@ -1228,10 +1228,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
"updated_at": "2022-03-17T18:05:07Z",
"updated_at": "2022-03-21T08:07:01Z",
"pushed_at": "2022-02-07T15:42:00Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -1254,7 +1254,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 44,
"watchers": 45,
"score": 0
},
{
@ -2804,14 +2804,14 @@
{
"id": 455655673,
"name": "CVE-2021-4034",
"full_name": "ravindubw\/CVE-2021-4034",
"full_name": "rvizz\/CVE-2021-4034",
"owner": {
"login": "ravindubw",
"login": "rvizz",
"id": 84989569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
"html_url": "https:\/\/github.com\/ravindubw"
"html_url": "https:\/\/github.com\/rvizz"
},
"html_url": "https:\/\/github.com\/ravindubw\/CVE-2021-4034",
"html_url": "https:\/\/github.com\/rvizz\/CVE-2021-4034",
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec in Python",
"fork": false,
"created_at": "2022-02-04T18:31:15Z",

View file

@ -13,17 +13,17 @@
"description": "Exploitation code for CVE-2021-40539",
"fork": false,
"created_at": "2021-11-03T14:49:27Z",
"updated_at": "2022-02-24T01:27:31Z",
"updated_at": "2022-03-21T09:54:23Z",
"pushed_at": "2021-11-09T11:15:19Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 17,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 40,
"forks": 18,
"watchers": 41,
"score": 0
}
]

View file

@ -531,10 +531,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2022-03-18T21:51:10Z",
"updated_at": "2022-03-21T12:09:20Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -550,7 +550,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-43297 POCApache Dubbo<= 2.7.13时可以实现RCE",
"fork": false,
"created_at": "2022-01-17T12:26:18Z",
"updated_at": "2022-03-05T01:07:13Z",
"updated_at": "2022-03-21T08:54:32Z",
"pushed_at": "2022-01-24T11:24:56Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"forks": 8,
"watchers": 12,
"score": 0
},
{

View file

@ -1235,10 +1235,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-03-19T12:42:48Z",
"updated_at": "2022-03-21T09:11:59Z",
"pushed_at": "2022-02-18T08:54:03Z",
"stargazers_count": 260,
"watchers_count": 260,
"stargazers_count": 262,
"watchers_count": 262,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
@ -1250,7 +1250,7 @@
],
"visibility": "public",
"forks": 63,
"watchers": 260,
"watchers": 262,
"score": 0
},
{
@ -5613,17 +5613,17 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T18:08:45Z",
"updated_at": "2022-03-06T21:29:36Z",
"updated_at": "2022-03-21T11:04:25Z",
"pushed_at": "2021-12-20T14:44:27Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 135,
"watchers": 136,
"score": 0
},
{
@ -8281,10 +8281,10 @@
"description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104",
"fork": false,
"created_at": "2021-12-19T05:13:25Z",
"updated_at": "2021-12-28T09:48:27Z",
"updated_at": "2022-03-21T08:34:57Z",
"pushed_at": "2021-12-25T01:51:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -8297,7 +8297,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -10537,7 +10537,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-03-07T10:11:58Z",
"pushed_at": "2022-03-13T07:52:39Z",
"pushed_at": "2022-03-21T06:43:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2022-03-21T05:42:59Z",
"updated_at": "2022-03-21T11:36:15Z",
"pushed_at": "2022-03-19T12:01:26Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 128,
"watchers": 140,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Redis沙盒逃逸漏洞复现(CVE-2022-0543)",
"fork": false,
"created_at": "2022-03-18T17:15:19Z",
"updated_at": "2022-03-21T02:14:50Z",
"updated_at": "2022-03-21T07:15:47Z",
"pushed_at": "2022-03-19T06:46:31Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"forks": 6,
"watchers": 8,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
"fork": false,
"created_at": "2022-03-15T19:06:33Z",
"updated_at": "2022-03-21T03:14:10Z",
"pushed_at": "2022-03-20T09:44:38Z",
"stargazers_count": 95,
"watchers_count": 95,
"updated_at": "2022-03-21T11:11:27Z",
"pushed_at": "2022-03-21T12:12:16Z",
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 95,
"watchers": 97,
"score": 0
},
{

29
2022/CVE-2022-0811.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 472271080,
"name": "webhook-cve-2022-0811",
"full_name": "spiarh\/webhook-cve-2022-0811",
"owner": {
"login": "spiarh",
"id": 33934779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33934779?v=4",
"html_url": "https:\/\/github.com\/spiarh"
},
"html_url": "https:\/\/github.com\/spiarh\/webhook-cve-2022-0811",
"description": "Simple webhook to block exploitation of CVE-2022-0811",
"fork": false,
"created_at": "2022-03-21T09:39:22Z",
"updated_at": "2022-03-21T10:06:46Z",
"pushed_at": "2022-03-21T09:58:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1078,12 +1078,12 @@
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 173,
"score": 0
},
@ -1380,17 +1380,17 @@
"description": "pwncat module that automatically exploits CVE-2022-0847 (dirtypipe)",
"fork": false,
"created_at": "2022-03-20T23:02:43Z",
"updated_at": "2022-03-20T23:10:23Z",
"updated_at": "2022-03-21T09:23:41Z",
"pushed_at": "2022-03-21T00:45:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "cve-2022-21907",
"fork": false,
"created_at": "2022-01-11T05:00:55Z",
"updated_at": "2022-01-31T14:02:36Z",
"updated_at": "2022-03-21T07:03:34Z",
"pushed_at": "2022-01-26T20:31:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -141,10 +141,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-03-09T12:36:47Z",
"updated_at": "2022-03-21T07:05:12Z",
"pushed_at": "2022-02-25T11:05:11Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -158,7 +158,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 56,
"watchers": 57,
"score": 0
},
{
@ -175,17 +175,17 @@
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2022-03-03T07:32:32Z",
"updated_at": "2022-03-21T07:03:05Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-21T04:35:29Z",
"updated_at": "2022-03-21T08:27:00Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 514,
"watchers_count": 514,
"stargazers_count": 516,
"watchers_count": 516,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 514,
"watchers": 516,
"score": 0
}
]

View file

@ -447,17 +447,17 @@
"description": "CVE-2022-22947批量检测脚本超时时间不超过2s已更新可反弹shell的EXP欢迎师傅们试用",
"fork": false,
"created_at": "2022-03-04T11:31:00Z",
"updated_at": "2022-03-16T18:26:32Z",
"updated_at": "2022-03-21T09:39:59Z",
"pushed_at": "2022-03-08T09:43:50Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 11,
"watchers": 13,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false,
"created_at": "2022-02-18T11:51:47Z",
"updated_at": "2022-03-09T05:43:09Z",
"updated_at": "2022-03-21T06:28:13Z",
"pushed_at": "2022-02-24T15:02:12Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-24086 and CVE-2022-24087 exploits proof of concept",
"fork": false,
"created_at": "2022-03-19T23:33:24Z",
"updated_at": "2022-03-19T23:33:24Z",
"updated_at": "2022-03-21T09:22:33Z",
"pushed_at": "2022-03-19T23:43:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2022-03-21T00:25:51Z",
"updated_at": "2022-03-21T08:44:34Z",
"pushed_at": "2022-03-19T09:39:29Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-24990信息泄露+RCE 一条龙",
"fork": false,
"created_at": "2022-03-20T05:21:08Z",
"updated_at": "2022-03-21T03:56:03Z",
"updated_at": "2022-03-21T10:57:39Z",
"pushed_at": "2022-03-20T05:23:57Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"forks": 9,
"watchers": 21,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-03-21T03:11:31Z",
"updated_at": "2022-03-21T08:23:52Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 61,
"stargazers_count": 316,
"watchers_count": 316,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 314,
"forks": 62,
"watchers": 316,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Exploit for CVE-2022-27226",
"fork": false,
"created_at": "2022-03-16T17:45:12Z",
"updated_at": "2022-03-20T02:00:00Z",
"updated_at": "2022-03-21T09:26:52Z",
"pushed_at": "2022-03-19T00:55:07Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -87,6 +87,14 @@ The BN_mod_sqrt() function, which computes a modular square root, contains a bug
- [drago-96/CVE-2022-0778](https://github.com/drago-96/CVE-2022-0778)
- [BobTheShoplifter/CVE-2022-0778-POC](https://github.com/BobTheShoplifter/CVE-2022-0778-POC)
### CVE-2022-0811 (2022-03-16)
<code>
A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.
</code>
- [spiarh/webhook-cve-2022-0811](https://github.com/spiarh/webhook-cve-2022-0811)
### CVE-2022-0824 (2022-03-02)
<code>
@ -1392,7 +1400,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [Ankit-Ojha16/CVE-2021-4034](https://github.com/Ankit-Ojha16/CVE-2021-4034)
- [Ph4nt0mh4x0r/auto-CVE-2021-4034](https://github.com/Ph4nt0mh4x0r/auto-CVE-2021-4034)
- [drapl0n/pwnKit](https://github.com/drapl0n/pwnKit)
- [ravindubw/CVE-2021-4034](https://github.com/ravindubw/CVE-2021-4034)
- [rvizz/CVE-2021-4034](https://github.com/rvizz/CVE-2021-4034)
- [Joffr3y/Polkit-CVE-2021-4034-HLP](https://github.com/Joffr3y/Polkit-CVE-2021-4034-HLP)
- [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit)
- [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034)
@ -19941,6 +19949,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- [ellietoulabi/Dirty-Cow](https://github.com/ellietoulabi/Dirty-Cow)
- [imfiver/CVE-2022-0847](https://github.com/imfiver/CVE-2022-0847)
- [vinspiert/scumjrs](https://github.com/vinspiert/scumjrs)
- [gurpreetsinghsaluja/dirtycow](https://github.com/gurpreetsinghsaluja/dirtycow)
### CVE-2016-5345 (2018-01-22)
@ -20704,6 +20713,8 @@ Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vist
</code>
- [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701)
- [Anonymous-Family/CVE-2015-1701](https://github.com/Anonymous-Family/CVE-2015-1701)
- [Anonymous-Family/CVE-2015-1701-download](https://github.com/Anonymous-Family/CVE-2015-1701-download)
### CVE-2015-1769 (2015-08-14)