Auto Update 2022/05/23 12:15:36

This commit is contained in:
motikan2010-bot 2022-05-23 21:15:36 +09:00
parent cfcdff6b7a
commit e18e9b4e05
59 changed files with 309 additions and 207 deletions

View file

@ -13,7 +13,7 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-05-17T09:16:04Z",
"updated_at": "2022-05-23T10:58:37Z",
"pushed_at": "2022-05-13T12:31:17Z",
"stargazers_count": 96,
"watchers_count": 96,

View file

@ -70,7 +70,7 @@
"fork": false,
"created_at": "2022-05-15T10:28:03Z",
"updated_at": "2022-05-15T10:28:03Z",
"pushed_at": "2022-05-22T15:09:19Z",
"pushed_at": "2022-05-23T06:50:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -148,17 +148,17 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2022-04-15T14:33:30Z",
"updated_at": "2022-05-23T07:55:55Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 578,
"watchers_count": 578,
"stargazers_count": 577,
"watchers_count": 577,
"forks_count": 231,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 231,
"watchers": 578,
"watchers": 577,
"score": 0
},
{

View file

@ -40,7 +40,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-23T05:55:10Z",
"updated_at": "2022-05-23T09:17:55Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1365,
"watchers_count": 1365,

View file

@ -1048,12 +1048,12 @@
"pushed_at": "2019-10-08T09:12:48Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 20,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference",
"fork": false,
"created_at": "2016-03-29T09:01:52Z",
"updated_at": "2022-05-22T15:05:46Z",
"updated_at": "2022-05-23T07:20:06Z",
"pushed_at": "2016-04-07T10:37:02Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-23T05:55:10Z",
"updated_at": "2022-05-23T09:17:55Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1365,
"watchers_count": 1365,

View file

@ -371,17 +371,17 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2022-05-04T13:21:39Z",
"updated_at": "2022-05-23T08:19:48Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 65,
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 162,
"forks": 66,
"watchers": 164,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 \/ 2.x < 2.1.1 - Remote Privilege Escalation",
"fork": false,
"created_at": "2019-11-07T20:02:31Z",
"updated_at": "2021-04-27T04:39:00Z",
"updated_at": "2022-05-23T08:46:44Z",
"pushed_at": "2019-12-15T15:19:00Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -40,7 +40,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-23T05:55:10Z",
"updated_at": "2022-05-23T09:17:55Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1365,
"watchers_count": 1365,

View file

@ -67,17 +67,17 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2022-05-04T13:21:39Z",
"updated_at": "2022-05-23T08:19:48Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 65,
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 162,
"forks": 66,
"watchers": 164,
"score": 0
},
{

View file

@ -87,12 +87,12 @@
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 489,
"watchers_count": 489,
"forks_count": 181,
"forks_count": 182,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 181,
"forks": 182,
"watchers": 489,
"score": 0
},

View file

@ -530,7 +530,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-23T05:55:10Z",
"updated_at": "2022-05-23T09:17:55Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1365,
"watchers_count": 1365,

View file

@ -67,17 +67,17 @@
"description": "Win32k Exploit by Grant Willcox",
"fork": false,
"created_at": "2019-05-17T14:08:01Z",
"updated_at": "2022-05-10T04:29:53Z",
"updated_at": "2022-05-23T08:13:09Z",
"pushed_at": "2019-05-17T14:17:00Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 92,
"watchers": 91,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 30,
"score": 0
},

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [
@ -53,7 +53,7 @@
"cve-2021-36749"
],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 71,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-14540 Exploit",
"fork": false,
"created_at": "2019-08-21T03:19:19Z",
"updated_at": "2022-04-06T04:15:02Z",
"updated_at": "2022-05-23T10:22:46Z",
"pushed_at": "2019-08-21T03:59:02Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 20,
"watchers": 19,
"score": 0
}
]

View file

@ -374,17 +374,17 @@
"description": null,
"fork": false,
"created_at": "2020-11-09T21:46:57Z",
"updated_at": "2022-05-14T16:46:52Z",
"updated_at": "2022-05-23T11:24:54Z",
"pushed_at": "2021-02-07T19:51:24Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -17,14 +17,14 @@
"pushed_at": "2020-03-05T12:29:18Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2019-18426"
],
"visibility": "public",
"forks": 7,
"forks": 9,
"watchers": 8,
"score": 0
}

View file

@ -175,7 +175,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-23T05:55:10Z",
"updated_at": "2022-05-23T09:17:55Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1365,
"watchers_count": 1365,

View file

@ -175,17 +175,17 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2022-05-22T01:48:02Z",
"updated_at": "2022-05-23T11:14:58Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"forks_count": 161,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 161,
"watchers": 420,
"watchers": 421,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
"fork": false,
"created_at": "2019-05-21T13:16:02Z",
"updated_at": "2022-05-16T05:37:31Z",
"updated_at": "2022-05-23T09:44:42Z",
"pushed_at": "2019-08-19T17:33:56Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 70,
"watchers": 71,
"score": 0
},
{

29
2019/CVE-2019-8331.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 495308692,
"name": "https-nj.gov---CVE-2019-8331",
"full_name": "korestreet\/https-nj.gov---CVE-2019-8331",
"owner": {
"login": "korestreet",
"id": 93614879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93614879?v=4",
"html_url": "https:\/\/github.com\/korestreet"
},
"html_url": "https:\/\/github.com\/korestreet\/https-nj.gov---CVE-2019-8331",
"description": "Vulnearability Report of the New Jersey official site",
"fork": false,
"created_at": "2022-05-23T07:48:19Z",
"updated_at": "2022-05-23T12:10:19Z",
"pushed_at": "2022-05-23T08:13:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1022,7 +1022,7 @@
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"forks_count": 372,
"forks_count": 373,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1033,7 +1033,7 @@
"smbghost"
],
"visibility": "public",
"forks": 372,
"forks": 373,
"watchers": 1200,
"score": 0
},

View file

@ -25,5 +25,32 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 495361196,
"name": "https-nj.gov---CVE-2020-11022",
"full_name": "korestreet\/https-nj.gov---CVE-2020-11022",
"owner": {
"login": "korestreet",
"id": 93614879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93614879?v=4",
"html_url": "https:\/\/github.com\/korestreet"
},
"html_url": "https:\/\/github.com\/korestreet\/https-nj.gov---CVE-2020-11022",
"description": "Vulnearability Report of the New Jersey official site",
"fork": false,
"created_at": "2022-05-23T10:26:10Z",
"updated_at": "2022-05-23T12:12:59Z",
"pushed_at": "2022-05-23T11:06:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-05-18T05:31:27Z",
"updated_at": "2022-05-23T11:49:48Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 120,
"watchers": 121,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-05-23T05:55:10Z",
"updated_at": "2022-05-23T09:17:55Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1365,
"watchers_count": 1365,

View file

@ -13,17 +13,17 @@
"description": "SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x",
"fork": false,
"created_at": "2020-12-18T14:39:28Z",
"updated_at": "2022-04-05T10:37:46Z",
"updated_at": "2022-05-23T08:20:44Z",
"pushed_at": "2020-12-18T14:41:09Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2022-04-28T21:09:58Z",
"updated_at": "2022-05-23T06:39:36Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 127,
"watchers": 128,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2022-04-12T06:14:50Z",
"updated_at": "2022-05-23T08:08:17Z",
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 236,
"watchers": 237,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-05-18T05:31:27Z",
"updated_at": "2022-05-23T11:49:48Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 120,
"watchers": 121,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2022-04-28T21:09:58Z",
"updated_at": "2022-05-23T06:39:36Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 127,
"watchers": 128,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
"fork": false,
"created_at": "2021-02-26T12:08:25Z",
"updated_at": "2022-03-14T17:31:07Z",
"updated_at": "2022-05-23T09:42:19Z",
"pushed_at": "2021-03-06T12:50:35Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 24,
"watchers": 23,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-03-01T16:45:42Z",
"updated_at": "2022-02-17T06:59:50Z",
"updated_at": "2022-05-23T10:44:52Z",
"pushed_at": "2021-03-02T07:45:20Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2022-05-19T11:28:52Z",
"updated_at": "2022-05-23T08:39:29Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 108,
"watchers": 109,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
"fork": false,
"created_at": "2022-04-15T04:23:44Z",
"updated_at": "2022-05-19T11:20:14Z",
"updated_at": "2022-05-23T08:39:25Z",
"pushed_at": "2022-04-15T08:52:11Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell",
"fork": false,
"created_at": "2022-04-15T10:28:29Z",
"updated_at": "2022-05-16T03:40:43Z",
"updated_at": "2022-05-23T09:01:50Z",
"pushed_at": "2022-04-18T14:21:35Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -94,17 +94,17 @@
"description": "Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用",
"fork": false,
"created_at": "2022-04-15T11:30:26Z",
"updated_at": "2022-05-08T18:50:07Z",
"updated_at": "2022-05-23T08:39:23Z",
"pushed_at": "2022-04-15T15:25:08Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-01-11T16:52:16Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 32,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false,
"created_at": "2021-06-28T09:43:31Z",
"updated_at": "2022-03-05T13:28:59Z",
"updated_at": "2022-05-23T10:44:40Z",
"pushed_at": "2021-08-03T14:48:27Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"cve-2021-36749"
],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 71,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-05-23T03:26:11Z",
"updated_at": "2022-05-23T12:09:25Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 12,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 46,
"forks": 13,
"watchers": 54,
"score": 0
}
]

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-05-22T11:19:51Z",
"updated_at": "2022-05-23T11:46:26Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1533,
"watchers_count": 1533,
"stargazers_count": 1534,
"watchers_count": 1534,
"forks_count": 451,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 451,
"watchers": 1533,
"watchers": 1534,
"score": 0
},
{
@ -879,14 +879,14 @@
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 509,
"watchers_count": 509,
"forks_count": 99,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-4034"
],
"visibility": "public",
"forks": 99,
"forks": 100,
"watchers": 509,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-05-22T10:20:06Z",
"updated_at": "2022-05-23T09:20:09Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1414,
"watchers_count": 1414,
"stargazers_count": 1415,
"watchers_count": 1415,
"forks_count": 464,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 464,
"watchers": 1414,
"watchers": 1415,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Windows Common Log File System Driver POC",
"fork": false,
"created_at": "2021-12-21T01:51:41Z",
"updated_at": "2022-04-19T11:25:14Z",
"updated_at": "2022-05-23T07:09:37Z",
"pushed_at": "2021-12-21T06:57:06Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 79,
"watchers": 80,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Case for CVE-2021-43503",
"fork": false,
"created_at": "2022-05-22T12:54:39Z",
"updated_at": "2022-05-22T12:55:04Z",
"updated_at": "2022-05-23T06:30:51Z",
"pushed_at": "2022-05-22T15:52:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -3406,17 +3406,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-05-23T02:00:55Z",
"updated_at": "2022-05-23T09:15:27Z",
"pushed_at": "2022-05-17T13:25:17Z",
"stargazers_count": 2885,
"watchers_count": 2885,
"stargazers_count": 2887,
"watchers_count": 2887,
"forks_count": 710,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 710,
"watchers": 2885,
"watchers": 2887,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-05-23T01:47:33Z",
"updated_at": "2022-05-23T12:06:45Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 943,
"watchers_count": 943,
"stargazers_count": 944,
"watchers_count": 944,
"forks_count": 198,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 198,
"watchers": 943,
"watchers": 944,
"score": 0
},
{

View file

@ -1350,17 +1350,17 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust ",
"fork": false,
"created_at": "2022-05-22T13:27:33Z",
"updated_at": "2022-05-22T13:27:52Z",
"updated_at": "2022-05-23T11:16:35Z",
"pushed_at": "2022-05-22T13:46:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-04-20T10:23:07Z",
"updated_at": "2022-05-20T16:33:27Z",
"updated_at": "2022-05-23T11:49:09Z",
"pushed_at": "2022-04-24T07:07:52Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 11,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 35,
"forks": 12,
"watchers": 36,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server",
"fork": false,
"created_at": "2022-04-20T20:31:15Z",
"updated_at": "2022-05-19T09:22:45Z",
"updated_at": "2022-05-23T11:10:53Z",
"pushed_at": "2022-04-21T12:04:10Z",
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 24,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 109,
"forks": 25,
"watchers": 110,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-22639: Get a Root Shell on macOS Monterey",
"fork": false,
"created_at": "2022-03-17T06:16:54Z",
"updated_at": "2022-05-19T07:45:04Z",
"updated_at": "2022-05-23T11:05:46Z",
"pushed_at": "2022-04-05T05:11:29Z",
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 17,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 100,
"forks": 18,
"watchers": 101,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
"fork": false,
"created_at": "2022-03-26T01:40:04Z",
"updated_at": "2022-05-16T16:34:54Z",
"updated_at": "2022-05-23T06:59:04Z",
"pushed_at": "2022-04-15T16:31:43Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 86,
"watchers": 331,
"watchers": 332,
"score": 0
},
{

View file

@ -123,12 +123,12 @@
"pushed_at": "2022-04-05T16:02:33Z",
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 196,
"forks_count": 197,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 196,
"forks": 197,
"watchers": 235,
"score": 0
},
@ -1313,17 +1313,17 @@
"description": "CVE-2022-22965 pocsuite3 POC",
"fork": false,
"created_at": "2022-04-07T02:30:26Z",
"updated_at": "2022-05-19T13:49:16Z",
"updated_at": "2022-05-23T07:17:05Z",
"pushed_at": "2022-04-07T02:31:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "CVE-2022-23253 PoC",
"fork": false,
"created_at": "2022-05-12T13:18:47Z",
"updated_at": "2022-05-12T13:18:47Z",
"pushed_at": "2022-05-12T13:18:48Z",
"updated_at": "2022-05-23T11:45:15Z",
"pushed_at": "2022-05-23T11:45:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-05-20T04:32:13Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 9,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-05-22T21:17:24Z",
"updated_at": "2022-05-23T07:01:36Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 117,
"watchers": 118,
"score": 0
}
]

View file

@ -123,17 +123,17 @@
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
"fork": false,
"created_at": "2022-04-14T16:58:09Z",
"updated_at": "2022-05-22T00:50:49Z",
"updated_at": "2022-05-23T10:23:05Z",
"pushed_at": "2022-05-17T15:17:22Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-05-22T06:39:04Z",
"updated_at": "2022-05-23T08:26:33Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 666,
"watchers_count": 666,
"stargazers_count": 665,
"watchers_count": 665,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 110,
"watchers": 666,
"watchers": 665,
"score": 0
},
{

View file

@ -72,7 +72,7 @@
"description": "Zyxel 防火墙远程命令注入漏洞CVE-2022-30525批量检测脚本",
"fork": false,
"created_at": "2022-05-13T12:58:43Z",
"updated_at": "2022-05-22T15:01:53Z",
"updated_at": "2022-05-23T09:31:33Z",
"pushed_at": "2022-05-13T14:46:04Z",
"stargazers_count": 22,
"watchers_count": 22,

29
2022/CVE-2022-30778.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 495295120,
"name": "CVE-2022-30778",
"full_name": "kang8\/CVE-2022-30778",
"owner": {
"login": "kang8",
"id": 36906329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36906329?v=4",
"html_url": "https:\/\/github.com\/kang8"
},
"html_url": "https:\/\/github.com\/kang8\/CVE-2022-30778",
"description": "Case for CVE-2022-30778",
"fork": false,
"created_at": "2022-05-23T07:04:54Z",
"updated_at": "2022-05-23T11:29:12Z",
"pushed_at": "2022-05-23T07:05:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow",
"fork": false,
"created_at": "2022-05-20T10:05:55Z",
"updated_at": "2022-05-21T06:46:11Z",
"updated_at": "2022-05-23T08:11:13Z",
"pushed_at": "2022-05-20T10:48:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -1770,6 +1770,14 @@ A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W)
- [trhacknon/CVE-2022-30525-Reverse-Shell](https://github.com/trhacknon/CVE-2022-30525-Reverse-Shell)
- [160Team/CVE-2022-30525](https://github.com/160Team/CVE-2022-30525)
### CVE-2022-30778 (2022-05-15)
<code>
Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in __destruct in Illuminate\Broadcasting\PendingBroadcast.php and dispatch($command) in Illuminate\Bus\QueueingDispatcher.php.
</code>
- [kang8/CVE-2022-30778](https://github.com/kang8/CVE-2022-30778)
### CVE-2022-30780
- [p0dalirius/CVE-2022-30780-lighttpd-denial-of-service](https://github.com/p0dalirius/CVE-2022-30780-lighttpd-denial-of-service)
@ -8823,6 +8831,7 @@ In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML f
</code>
- [0xAJ2K/CVE-2020-11022-CVE-2020-11023](https://github.com/0xAJ2K/CVE-2020-11022-CVE-2020-11023)
- [korestreet/https-nj.gov---CVE-2020-11022](https://github.com/korestreet/https-nj.gov---CVE-2020-11022)
### CVE-2020-11060 (2020-05-12)
@ -12716,6 +12725,14 @@ Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and
- [f01965/CVE-2019-8014](https://github.com/f01965/CVE-2019-8014)
### CVE-2019-8331 (2019-02-20)
<code>
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
</code>
- [korestreet/https-nj.gov---CVE-2019-8331](https://github.com/korestreet/https-nj.gov---CVE-2019-8331)
### CVE-2019-8389 (2019-02-16)
<code>