Auto Update 2022/04/29 12:16:01

This commit is contained in:
motikan2010-bot 2022-04-29 21:16:01 +09:00
parent 446bbe542b
commit d0560b6200
45 changed files with 409 additions and 256 deletions

View file

@ -1136,12 +1136,12 @@
"pushed_at": "2017-04-30T20:00:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2022-04-27T19:26:17Z",
"updated_at": "2022-04-29T06:50:25Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 496,
"watchers_count": 496,
"stargazers_count": 495,
"watchers_count": 495,
"forks_count": 197,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 197,
"watchers": 496,
"watchers": 495,
"score": 0
},
{

View file

@ -67,10 +67,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2022-04-16T02:38:59Z",
"updated_at": "2022-04-29T06:48:59Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 104,
"allow_forking": true,
"is_template": false,
@ -83,7 +83,7 @@
],
"visibility": "public",
"forks": 104,
"watchers": 308,
"watchers": 307,
"score": 0
},
{
@ -154,17 +154,17 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2022-04-19T16:49:23Z",
"updated_at": "2022-04-29T06:48:49Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 251,
"watchers": 250,
"score": 0
},
{

View file

@ -83,17 +83,17 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2022-04-27T14:00:50Z",
"updated_at": "2022-04-29T07:57:08Z",
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 487,
"watchers_count": 487,
"stargazers_count": 488,
"watchers_count": 488,
"forks_count": 179,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 487,
"watchers": 488,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 56,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"webkit"
],
"visibility": "public",
"forks": 56,
"forks": 55,
"watchers": 203,
"score": 0
}

View file

@ -129,17 +129,17 @@
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码动手制作自己的payload",
"fork": false,
"created_at": "2019-12-10T02:39:57Z",
"updated_at": "2022-04-28T09:26:20Z",
"updated_at": "2022-04-29T11:25:44Z",
"pushed_at": "2021-04-02T09:12:32Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -1484,17 +1484,17 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2022-04-27T14:52:21Z",
"updated_at": "2022-04-29T10:27:49Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 854,
"watchers_count": 854,
"stargazers_count": 855,
"watchers_count": 855,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 277,
"watchers": 854,
"watchers": 855,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2022-04-24T09:10:30Z",
"updated_at": "2022-04-29T06:48:09Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 281,
"watchers_count": 281,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 280,
"watchers": 281,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-10T19:03:53Z",
"updated_at": "2022-04-27T15:53:03Z",
"updated_at": "2022-04-29T10:40:38Z",
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-28T04:54:11Z",
"updated_at": "2022-04-29T07:11:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3278,
"watchers_count": 3278,
"stargazers_count": 3279,
"watchers_count": 3279,
"forks_count": 977,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 977,
"watchers": 3278,
"watchers": 3279,
"score": 0
},
{

View file

@ -213,7 +213,7 @@
"pushed_at": "2022-03-17T15:49:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -223,7 +223,7 @@
"rce"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

29
2020/CVE-2020-0155.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486863266,
"name": "hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155",
"full_name": "Trinadh465\/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155",
"description": null,
"fork": false,
"created_at": "2022-04-29T06:33:54Z",
"updated_at": "2022-04-29T06:37:39Z",
"pushed_at": "2022-04-29T06:38:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-04-29T06:11:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

29
2020/CVE-2020-0240.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486929889,
"name": "external_v8_AOSP10_r33_CVE-2020-0240",
"full_name": "ShaikUsaf\/external_v8_AOSP10_r33_CVE-2020-0240",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/external_v8_AOSP10_r33_CVE-2020-0240",
"description": null,
"fork": false,
"created_at": "2022-04-29T10:25:19Z",
"updated_at": "2022-04-29T10:32:03Z",
"pushed_at": "2022-04-29T10:32:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1337,7 +1337,7 @@
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 459,
"watchers_count": 459,
"forks_count": 151,
"forks_count": 152,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1348,7 +1348,7 @@
"smbghost"
],
"visibility": "public",
"forks": 151,
"forks": 152,
"watchers": 459,
"score": 0
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-11T13:09:52Z",
"updated_at": "2021-05-09T12:11:55Z",
"pushed_at": "2022-03-02T08:38:06Z",
"pushed_at": "2022-04-29T10:21:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-04-28T14:10:43Z",
"updated_at": "2022-04-29T10:50:50Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1445,
"watchers_count": 1445,
"stargazers_count": 1446,
"watchers_count": 1446,
"forks_count": 329,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 329,
"watchers": 1445,
"watchers": 1446,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-04-28T04:54:11Z",
"updated_at": "2022-04-29T07:11:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3278,
"watchers_count": 3278,
"stargazers_count": 3279,
"watchers_count": 3279,
"forks_count": 977,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 977,
"watchers": 3278,
"watchers": 3279,
"score": 0
},
{

29
2021/CVE-2021-0313.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486862367,
"name": "frameworks_minikin_AOSP10_r33_CVE-2021-0313",
"full_name": "Satheesh575555\/frameworks_minikin_AOSP10_r33_CVE-2021-0313",
"owner": {
"login": "Satheesh575555",
"id": 102573923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4",
"html_url": "https:\/\/github.com\/Satheesh575555"
},
"html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_minikin_AOSP10_r33_CVE-2021-0313",
"description": null,
"fork": false,
"created_at": "2022-04-29T06:30:27Z",
"updated_at": "2022-04-29T06:32:35Z",
"pushed_at": "2022-04-29T06:32:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -106,5 +106,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 486940425,
"name": "external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
"full_name": "ShaikUsaf\/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
"owner": {
"login": "ShaikUsaf",
"id": 100413972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4",
"html_url": "https:\/\/github.com\/ShaikUsaf"
},
"html_url": "https:\/\/github.com\/ShaikUsaf\/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326",
"description": null,
"fork": false,
"created_at": "2022-04-29T11:05:51Z",
"updated_at": "2022-04-29T11:10:13Z",
"pushed_at": "2022-04-29T11:10:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-0393.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486872701,
"name": "external_v8_AOSP10_r33_CVE-2021-0393",
"full_name": "Trinadh465\/external_v8_AOSP10_r33_CVE-2021-0393",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/external_v8_AOSP10_r33_CVE-2021-0393",
"description": null,
"fork": false,
"created_at": "2022-04-29T07:09:27Z",
"updated_at": "2022-04-29T07:11:51Z",
"pushed_at": "2022-04-29T07:12:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-26T14:18:13Z",
"updated_at": "2022-04-02T02:45:45Z",
"updated_at": "2022-04-29T09:27:12Z",
"pushed_at": "2021-02-27T09:57:00Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 43,
"watchers": 44,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-22555 exploit rewritten with pipe primitive",
"fork": false,
"created_at": "2022-04-05T06:35:25Z",
"updated_at": "2022-04-28T02:03:45Z",
"updated_at": "2022-04-29T11:29:15Z",
"pushed_at": "2022-04-05T08:56:18Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

29
2021/CVE-2021-23841.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486927382,
"name": "external_boringssl_openssl_1.1.0g_CVE-2021-23841",
"full_name": "Trinadh465\/external_boringssl_openssl_1.1.0g_CVE-2021-23841",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/external_boringssl_openssl_1.1.0g_CVE-2021-23841",
"description": null,
"fork": false,
"created_at": "2022-04-29T10:16:14Z",
"updated_at": "2022-04-29T11:20:57Z",
"pushed_at": "2022-04-29T11:21:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-29T03:12:27Z",
"updated_at": "2022-04-29T03:12:27Z",
"updated_at": "2022-04-29T08:44:44Z",
"pushed_at": "2022-04-29T03:12:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1052,17 +1052,17 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2022-04-14T21:09:41Z",
"updated_at": "2022-04-29T09:28:13Z",
"pushed_at": "2021-11-16T04:00:14Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 128,
"watchers": 130,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-06-09T06:58:20Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 53,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"forks": 52,
"watchers": 5,
"score": 0
},

View file

@ -77,12 +77,12 @@
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"forks_count": 439,
"forks_count": 440,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 439,
"forks": 440,
"watchers": 1499,
"score": 0
},
@ -3156,12 +3156,12 @@
"pushed_at": "2022-02-15T02:39:28Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 6,
"score": 0
},

View file

@ -158,17 +158,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-04-10T16:24:07Z",
"updated_at": "2022-04-29T09:25:50Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 52,
"watchers": 53,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-12T21:04:44Z",
"updated_at": "2022-04-20T03:29:36Z",
"pushed_at": "2022-04-28T02:24:22Z",
"pushed_at": "2022-04-29T06:20:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -26,33 +26,6 @@
"watchers": 0,
"score": 0
},
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-04-16T04:07:08Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 271,
"score": 0
},
{
"id": 435840491,
"name": "CVE-2021-43798-Grafana-POC",
@ -111,37 +84,6 @@
"watchers": 6,
"score": 0
},
{
"id": 435926848,
"name": "grafanaExp",
"full_name": "A-D-Team\/grafanaExp",
"owner": {
"login": "A-D-Team",
"id": 94842031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94842031?v=4",
"html_url": "https:\/\/github.com\/A-D-Team"
},
"html_url": "https:\/\/github.com\/A-D-Team\/grafanaExp",
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2022-04-28T04:43:25Z",
"pushed_at": "2021-12-09T07:22:26Z",
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-43798",
"exploit",
"grafana"
],
"visibility": "public",
"forks": 29,
"watchers": 189,
"score": 0
},
{
"id": 436106864,
"name": "CVE-2021-43798-grafana_fileread",
@ -196,33 +138,6 @@
"watchers": 0,
"score": 0
},
{
"id": 436150384,
"name": "CVE-2021-43798-Grafana-File-Read",
"full_name": "lfz97\/CVE-2021-43798-Grafana-File-Read",
"owner": {
"login": "lfz97",
"id": 75104414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75104414?v=4",
"html_url": "https:\/\/github.com\/lfz97"
},
"html_url": "https:\/\/github.com\/lfz97\/CVE-2021-43798-Grafana-File-Read",
"description": "CVE-2021-43798-Grafana任意文件读取漏洞",
"fork": false,
"created_at": "2021-12-08T07:08:37Z",
"updated_at": "2021-12-09T02:13:12Z",
"pushed_at": "2021-12-09T02:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 436213273,
"name": "Grafana_fileread",
@ -304,33 +219,6 @@
"watchers": 5,
"score": 0
},
{
"id": 436563698,
"name": "Grafana_POC-CVE-2021-43798",
"full_name": "culprits\/Grafana_POC-CVE-2021-43798",
"owner": {
"login": "culprits",
"id": 62552076,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62552076?v=4",
"html_url": "https:\/\/github.com\/culprits"
},
"html_url": "https:\/\/github.com\/culprits\/Grafana_POC-CVE-2021-43798",
"description": "Grafana-POC任意文件读取漏洞(CVE-2021-43798)",
"fork": false,
"created_at": "2021-12-09T09:53:25Z",
"updated_at": "2022-03-30T14:52:19Z",
"pushed_at": "2021-12-09T09:56:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 436571000,
"name": "CVE-2021-43798",

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-12-17T12:53:51Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,7 +28,7 @@
"windows"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 69,
"score": 0
}

View file

@ -121,17 +121,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-04-26T04:22:01Z",
"updated_at": "2022-04-29T06:35:51Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 365,
"watchers_count": 365,
"stargazers_count": 366,
"watchers_count": 366,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 365,
"watchers": 366,
"score": 0
},
{
@ -833,10 +833,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-04-28T14:44:13Z",
"updated_at": "2022-04-29T06:42:18Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 750,
"watchers_count": 750,
"stargazers_count": 751,
"watchers_count": 751,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
@ -863,7 +863,7 @@
],
"visibility": "public",
"forks": 123,
"watchers": 750,
"watchers": 751,
"score": 0
},
{
@ -3469,12 +3469,12 @@
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2843,
"watchers_count": 2843,
"forks_count": 692,
"forks_count": 693,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 692,
"forks": 693,
"watchers": 2843,
"score": 0
},
@ -10458,7 +10458,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-03-07T10:11:58Z",
"pushed_at": "2022-04-22T07:05:21Z",
"pushed_at": "2022-04-29T08:46:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
@ -10491,7 +10491,7 @@
"fork": false,
"created_at": "2022-02-16T01:13:08Z",
"updated_at": "2022-02-16T01:21:29Z",
"pushed_at": "2022-03-28T16:12:17Z",
"pushed_at": "2022-04-29T10:37:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -10771,12 +10771,12 @@
"pushed_at": "2022-04-24T01:29:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
@ -10794,17 +10794,17 @@
"description": "Loops through all Log4j files and remediates CVE-2021-44228",
"fork": false,
"created_at": "2022-04-28T23:56:01Z",
"updated_at": "2022-04-29T00:10:50Z",
"updated_at": "2022-04-29T10:02:33Z",
"pushed_at": "2022-04-29T00:30:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-04-28T17:47:58Z",
"updated_at": "2022-04-29T06:38:27Z",
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -1101,17 +1101,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-04-28T23:00:14Z",
"updated_at": "2022-04-29T11:15:45Z",
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 248,
"watchers_count": 248,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 247,
"watchers": 248,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2022-04-28T18:23:19Z",
"updated_at": "2022-04-29T11:27:00Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 462,
"watchers_count": 462,

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-04-24T01:04:48Z",
"updated_at": "2022-04-29T08:35:48Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 579,
"watchers_count": 579,
"stargazers_count": 580,
"watchers_count": 580,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 579,
"watchers": 580,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
"updated_at": "2022-04-20T10:14:52Z",
"updated_at": "2022-04-29T07:34:06Z",
"pushed_at": "2022-02-21T08:58:22Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -312,17 +312,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-04-10T16:24:07Z",
"updated_at": "2022-04-29T09:25:50Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 52,
"watchers": 53,
"score": 0
},
{
@ -1214,17 +1214,17 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-04-28T16:44:25Z",
"updated_at": "2022-04-29T07:46:55Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 49,
"watchers": 51,
"score": 0
}
]

View file

@ -97,17 +97,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-11T23:21:50Z",
"updated_at": "2022-04-12T08:07:15Z",
"updated_at": "2022-04-29T07:57:29Z",
"pushed_at": "2022-04-12T08:06:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -1286,7 +1286,7 @@
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
"fork": false,
"created_at": "2022-04-07T00:08:16Z",
"updated_at": "2022-04-29T01:03:55Z",
"updated_at": "2022-04-29T08:46:56Z",
"pushed_at": "2022-04-07T23:00:29Z",
"stargazers_count": 88,
"watchers_count": 88,
@ -1656,5 +1656,32 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 486922280,
"name": "spring-RCE-CVE-2022-22965",
"full_name": "Enokiy\/spring-RCE-CVE-2022-22965",
"owner": {
"login": "Enokiy",
"id": 33446650,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33446650?v=4",
"html_url": "https:\/\/github.com\/Enokiy"
},
"html_url": "https:\/\/github.com\/Enokiy\/spring-RCE-CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-04-29T09:58:05Z",
"updated_at": "2022-04-29T10:03:38Z",
"pushed_at": "2022-04-29T10:03:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -258,10 +258,10 @@
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime",
"fork": false,
"created_at": "2022-04-25T18:40:24Z",
"updated_at": "2022-04-27T09:30:06Z",
"updated_at": "2022-04-29T11:54:47Z",
"pushed_at": "2022-04-25T18:41:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -274,7 +274,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Django QuerySet.annotate(), aggregate(), extra() SQL 注入",
"fork": false,
"created_at": "2022-04-26T14:47:56Z",
"updated_at": "2022-04-26T14:50:52Z",
"updated_at": "2022-04-29T06:57:46Z",
"pushed_at": "2022-04-26T14:50:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -282,5 +282,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 486893955,
"name": "CVE-2022-29464",
"full_name": "superzerosec\/CVE-2022-29464",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-29464",
"description": "CVE-2022-29464 POC exploit",
"fork": false,
"created_at": "2022-04-29T08:24:17Z",
"updated_at": "2022-04-29T08:24:17Z",
"pushed_at": "2022-04-29T08:24:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -680,6 +680,7 @@ A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable t
- [c4mx/CVE-2022-22965_PoC](https://github.com/c4mx/CVE-2022-22965_PoC)
- [mariomamo/CVE-2022-22965](https://github.com/mariomamo/CVE-2022-22965)
- [khidottrivi/CVE-2022-22965](https://github.com/khidottrivi/CVE-2022-22965)
- [Enokiy/spring-RCE-CVE-2022-22965](https://github.com/Enokiy/spring-RCE-CVE-2022-22965)
### CVE-2022-23046 (2022-01-19)
@ -1313,6 +1314,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [oppsec/WSOB](https://github.com/oppsec/WSOB)
- [k4u5h41/CVE-2022-29464](https://github.com/k4u5h41/CVE-2022-29464)
- [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464)
- [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464)
### CVE-2022-29548 (2022-04-20)
@ -1341,6 +1343,14 @@ In addAllPermissions of PermissionManagerService.java, there is a possible permi
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0306_CVE-2021-0317)
### CVE-2021-0313 (2021-01-11)
<code>
In isWordBreakAfter of LayoutUtils.cpp, there is a possible way to slow or crash a TextView due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170968514.
</code>
- [Satheesh575555/frameworks_minikin_AOSP10_r33_CVE-2021-0313](https://github.com/Satheesh575555/frameworks_minikin_AOSP10_r33_CVE-2021-0313)
### CVE-2021-0314 (2021-02-10)
<code>
@ -1401,6 +1411,7 @@ In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to
- [nanopathi/wpa_supplicant_8_CVE-2021-0326.](https://github.com/nanopathi/wpa_supplicant_8_CVE-2021-0326.)
- [Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326](https://github.com/Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326)
- [nanopathi/Packages_wpa_supplicant8_CVE-2021-0326](https://github.com/nanopathi/Packages_wpa_supplicant8_CVE-2021-0326)
- [ShaikUsaf/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326](https://github.com/ShaikUsaf/external_wpa_supplicant_8_AOSP10_r33CVE-2021-0326)
### CVE-2021-0327 (2021-02-10)
@ -1507,6 +1518,14 @@ In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to l
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0391](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0391)
### CVE-2021-0393 (2021-03-10)
<code>
In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375
</code>
- [Trinadh465/external_v8_AOSP10_r33_CVE-2021-0393](https://github.com/Trinadh465/external_v8_AOSP10_r33_CVE-2021-0393)
### CVE-2021-0394 (2021-03-10)
<code>
@ -2913,6 +2932,14 @@ All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted
- [numanturle/CVE-2021-23758-POC](https://github.com/numanturle/CVE-2021-23758-POC)
### CVE-2021-23841 (2021-02-16)
<code>
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
</code>
- [Trinadh465/external_boringssl_openssl_1.1.0g_CVE-2021-23841](https://github.com/Trinadh465/external_boringssl_openssl_1.1.0g_CVE-2021-23841)
### CVE-2021-24027 (2021-04-06)
<code>
@ -4778,17 +4805,13 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
</code>
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
- [JiuBanSec/Grafana-CVE-2021-43798](https://github.com/JiuBanSec/Grafana-CVE-2021-43798)
- [lfz97/CVE-2021-43798-Grafana-File-Read](https://github.com/lfz97/CVE-2021-43798-Grafana-File-Read)
- [MzzdToT/Grafana_fileread](https://github.com/MzzdToT/Grafana_fileread)
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
- [z3n70/CVE-2021-43798](https://github.com/z3n70/CVE-2021-43798)
- [culprits/Grafana_POC-CVE-2021-43798](https://github.com/culprits/Grafana_POC-CVE-2021-43798)
- [julesbozouklian/CVE-2021-43798](https://github.com/julesbozouklian/CVE-2021-43798)
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
@ -5786,6 +5809,14 @@ In get_element_attr_rsp of btif_rc.cc, there is a possible out of bounds write d
- [Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138](https://github.com/Satheesh575555/system_bt_AOSP10_r33-CVE-2020-0138)
### CVE-2020-0155 (2020-06-11)
<code>
In phNxpNciHal_send_ese_hal_cmd of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139736386
</code>
- [Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155](https://github.com/Trinadh465/hardware_nxp_nfc_AOSP10_r33_CVE-2020-0155)
### CVE-2020-0160 (2020-06-11)
<code>
@ -5885,6 +5916,14 @@ In onCommand of CompanionDeviceManagerService.java, there is a possible permissi
- [nanopathi/framework_base_AOSP10_r33_CVE-2020-0227](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2020-0227)
### CVE-2020-0240 (2020-08-11)
<code>
In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594
</code>
- [ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240](https://github.com/ShaikUsaf/external_v8_AOSP10_r33_CVE-2020-0240)
### CVE-2020-0241 (2020-08-11)
<code>