Auto Update 2022/02/10 18:14:15

This commit is contained in:
motikan2010-bot 2022-02-11 03:14:15 +09:00
parent 3741ddce91
commit e6d0fbbe7a
33 changed files with 247 additions and 210 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2022-02-08T10:30:35Z",
"updated_at": "2022-02-10T16:01:00Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 102,
"watchers": 333,
"watchers": 334,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-10T00:55:25Z",
"updated_at": "2022-02-10T13:15:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1282,
"watchers_count": 1282,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1282,
"watchers": 1284,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2015-04-22T12:54:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 2,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-10T00:55:25Z",
"updated_at": "2022-02-10T13:15:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1282,
"watchers_count": 1282,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1282,
"watchers": 1284,
"score": 0
},
{

View file

@ -269,33 +269,6 @@
"watchers": 0,
"score": 0
},
{
"id": 100437085,
"name": "CVE-2017-1000117",
"full_name": "bells17\/CVE-2017-1000117",
"owner": {
"login": "bells17",
"id": 2158863,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2158863?v=4",
"html_url": "https:\/\/github.com\/bells17"
},
"html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117",
"description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用",
"fork": false,
"created_at": "2017-08-16T02:04:02Z",
"updated_at": "2017-10-13T17:48:19Z",
"pushed_at": "2017-08-16T09:35:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100437171,
"name": "CVE-2017-1000117",

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-10T00:55:25Z",
"updated_at": "2022-02-10T13:15:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1282,
"watchers_count": 1282,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1282,
"watchers": 1284,
"score": 0
},
{

View file

@ -207,17 +207,17 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2022-02-09T11:41:19Z",
"updated_at": "2022-02-10T17:43:29Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 50,
"forks": 51,
"watchers": 51,
"score": 0
},
{

View file

@ -67,11 +67,11 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2022-01-25T13:18:49Z",
"updated_at": "2022-02-10T12:59:33Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 298,
"watchers_count": 298,
"forks_count": 99,
"stargazers_count": 299,
"watchers_count": 299,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [
@ -82,8 +82,8 @@
"sambacry"
],
"visibility": "public",
"forks": 99,
"watchers": 298,
"forks": 100,
"watchers": 299,
"score": 0
},
{

View file

@ -445,17 +445,17 @@
"description": "Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.",
"fork": false,
"created_at": "2019-10-10T13:09:50Z",
"updated_at": "2021-12-29T12:20:55Z",
"updated_at": "2022-02-10T13:13:45Z",
"pushed_at": "2020-07-30T21:35:38Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"forks": 5,
"watchers": 11,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-10T00:55:25Z",
"updated_at": "2022-02-10T13:15:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1282,
"watchers_count": 1282,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1282,
"watchers": 1284,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2022-01-28T19:25:17Z",
"updated_at": "2022-02-10T15:08:14Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 471,
"watchers_count": 471,
"stargazers_count": 472,
"watchers_count": 472,
"forks_count": 205,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 205,
"watchers": 471,
"watchers": 472,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-02-10T05:40:35Z",
"updated_at": "2022-02-10T14:53:23Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3155,
"watchers_count": 3155,
"stargazers_count": 3156,
"watchers_count": 3156,
"forks_count": 938,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 938,
"watchers": 3155,
"watchers": 3156,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit code for CVE-2019-17662",
"fork": false,
"created_at": "2021-08-31T19:30:09Z",
"updated_at": "2021-12-09T11:55:45Z",
"updated_at": "2022-02-10T17:45:30Z",
"pushed_at": "2021-09-12T14:43:25Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-10T00:55:25Z",
"updated_at": "2022-02-10T13:15:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1282,
"watchers_count": 1282,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1282,
"watchers": 1284,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-02-10T05:40:35Z",
"updated_at": "2022-02-10T14:53:23Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3155,
"watchers_count": 3155,
"stargazers_count": 3156,
"watchers_count": 3156,
"forks_count": 938,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 938,
"watchers": 3155,
"watchers": 3156,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2022-01-07T13:00:44Z",
"updated_at": "2022-02-10T13:34:04Z",
"pushed_at": "2021-08-15T16:41:05Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 119,
"watchers": 120,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-02-10T00:55:25Z",
"updated_at": "2022-02-10T13:15:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1282,
"watchers_count": 1282,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 281,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 281,
"watchers": 1282,
"watchers": 1284,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326",
"fork": false,
"created_at": "2022-01-17T21:35:19Z",
"updated_at": "2022-02-10T11:52:51Z",
"updated_at": "2022-02-10T18:08:13Z",
"pushed_at": "2022-01-26T07:00:31Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"forks": 4,
"watchers": 10,
"score": 0
}
]

View file

@ -84,10 +84,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2022-02-06T15:27:17Z",
"updated_at": "2022-02-10T17:29:49Z",
"pushed_at": "2021-12-30T12:26:11Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
@ -96,7 +96,7 @@
],
"visibility": "public",
"forks": 132,
"watchers": 341,
"watchers": 342,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Windows MDM LPE",
"fork": false,
"created_at": "2021-11-27T00:37:07Z",
"updated_at": "2021-12-14T03:53:35Z",
"updated_at": "2022-02-10T13:34:38Z",
"pushed_at": "2021-11-27T00:38:33Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-25741 vulnerability",
"fork": false,
"created_at": "2022-01-19T14:05:20Z",
"updated_at": "2022-01-28T15:21:29Z",
"updated_at": "2022-02-10T16:09:08Z",
"pushed_at": "2022-01-19T19:15:36Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -1131,17 +1131,17 @@
"description": "Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)",
"fork": false,
"created_at": "2021-12-04T22:38:30Z",
"updated_at": "2021-12-05T20:05:20Z",
"pushed_at": "2022-02-10T07:51:54Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2022-02-10T15:36:56Z",
"pushed_at": "2022-02-10T15:20:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -1108,12 +1108,12 @@
"pushed_at": "2022-01-03T15:07:26Z",
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 134,
"score": 0
},

View file

@ -130,17 +130,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-02-10T09:23:03Z",
"updated_at": "2022-02-10T16:11:32Z",
"pushed_at": "2021-08-31T16:59:09Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-02-10T11:56:40Z",
"updated_at": "2022-02-10T13:00:12Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1221,
"watchers_count": 1221,
"stargazers_count": 1222,
"watchers_count": 1222,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1221,
"watchers": 1222,
"score": 0
},
{
@ -154,10 +154,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-02-10T11:30:46Z",
"updated_at": "2022-02-10T17:07:21Z",
"pushed_at": "2022-01-29T06:22:16Z",
"stargazers_count": 729,
"watchers_count": 729,
"stargazers_count": 731,
"watchers_count": 731,
"forks_count": 232,
"allow_forking": true,
"is_template": false,
@ -168,7 +168,7 @@
],
"visibility": "public",
"forks": 232,
"watchers": 729,
"watchers": 731,
"score": 0
},
{
@ -354,17 +354,17 @@
"description": "Exploit for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T03:33:47Z",
"updated_at": "2022-02-04T01:08:01Z",
"updated_at": "2022-02-10T15:50:25Z",
"pushed_at": "2022-01-27T11:57:05Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 92,
"watchers": 93,
"score": 0
},
{
@ -902,10 +902,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-02-10T07:33:49Z",
"updated_at": "2022-02-10T14:57:02Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 408,
"watchers_count": 408,
"stargazers_count": 409,
"watchers_count": 409,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
@ -914,7 +914,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 408,
"watchers": 409,
"score": 0
},
{
@ -1228,17 +1228,17 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2022-02-09T06:16:10Z",
"updated_at": "2022-02-10T18:13:22Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 40,
"watchers": 42,
"score": 0
},
{
@ -1722,7 +1722,7 @@
"fork": false,
"created_at": "2022-01-27T10:26:46Z",
"updated_at": "2022-01-27T13:44:20Z",
"pushed_at": "2022-02-10T10:55:04Z",
"pushed_at": "2022-02-10T18:13:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -3434,17 +3434,17 @@
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
"fork": false,
"created_at": "2021-12-13T01:55:51Z",
"updated_at": "2022-02-10T06:56:39Z",
"updated_at": "2022-02-10T12:17:46Z",
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 32,
"watchers": 33,
"score": 0
},
{
@ -3542,17 +3542,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-02-10T08:50:38Z",
"updated_at": "2022-02-10T14:51:13Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2709,
"watchers_count": 2709,
"stargazers_count": 2710,
"watchers_count": 2710,
"forks_count": 654,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 654,
"watchers": 2709,
"watchers": 2710,
"score": 0
},
{
@ -4726,7 +4726,7 @@
"pushed_at": "2021-12-17T17:23:57Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -4738,7 +4738,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 29,
"score": 0
},
@ -5965,12 +5965,12 @@
"pushed_at": "2022-02-03T20:02:09Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 93,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 93,
"forks": 94,
"watchers": 336,
"score": 0
},
@ -9462,12 +9462,12 @@
"pushed_at": "2021-12-25T11:26:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-02-10T10:04:27Z",
"updated_at": "2022-02-10T12:40:27Z",
"pushed_at": "2022-01-25T17:00:16Z",
"stargazers_count": 259,
"watchers_count": 259,
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 259,
"watchers": 260,
"score": 0
},
{

View file

@ -13,17 +13,44 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2022-02-10T12:09:39Z",
"updated_at": "2022-02-10T17:35:24Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 16,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 63,
"forks": 19,
"watchers": 70,
"score": 0
},
{
"id": 457817909,
"name": "CVE-2022-20699",
"full_name": "puckiestyle\/CVE-2022-20699",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-20699",
"description": null,
"fork": false,
"created_at": "2022-02-10T14:40:25Z",
"updated_at": "2022-02-10T14:40:40Z",
"pushed_at": "2022-02-10T14:40:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-02-10T09:24:02Z",
"updated_at": "2022-02-10T12:41:53Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 352,
"watchers_count": 352,
"stargazers_count": 353,
"watchers_count": 353,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 352,
"watchers": 353,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-02-10T12:15:24Z",
"updated_at": "2022-02-10T17:23:52Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 52,
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,8 +25,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 52,
"watchers": 304,
"forks": 54,
"watchers": 314,
"score": 0
}
]

47
2022/CVE-2022-23808.json Normal file
View file

@ -0,0 +1,47 @@
[
{
"id": 454474679,
"name": "CVE-2022-23808",
"full_name": "dipakpanchal456\/CVE-2022-23808",
"owner": {
"login": "dipakpanchal456",
"id": 31427462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31427462?v=4",
"html_url": "https:\/\/github.com\/dipakpanchal456"
},
"html_url": "https:\/\/github.com\/dipakpanchal456\/CVE-2022-23808",
"description": "phpMyAdmin XSS ",
"fork": false,
"created_at": "2022-02-01T17:02:03Z",
"updated_at": "2022-02-10T18:03:12Z",
"pushed_at": "2022-02-03T16:21:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"bugbounty",
"cross-site-scripting",
"database",
"exploit",
"exploitation",
"hacking",
"infosec",
"owasp",
"owasp-top-10",
"pentesting",
"phpmyadmin",
"poc",
"redteam",
"redteaming",
"vulnerability",
"xss",
"zeroday"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -25,32 +25,5 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 457721752,
"name": "helm-sample",
"full_name": "mochizuki875\/helm-sample",
"owner": {
"login": "mochizuki875",
"id": 37737691,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37737691?v=4",
"html_url": "https:\/\/github.com\/mochizuki875"
},
"html_url": "https:\/\/github.com\/mochizuki875\/helm-sample",
"description": "CVE-2022-24348 Test",
"fork": false,
"created_at": "2022-02-10T09:55:41Z",
"updated_at": "2022-02-10T09:58:20Z",
"pushed_at": "2022-02-10T10:54:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -31,8 +31,14 @@ A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was
- [numanturle/CVE-2022-0332](https://github.com/numanturle/CVE-2022-0332)
### CVE-2022-20699
### CVE-2022-20699 (-)
<code>
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
</code>
- [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699)
- [puckiestyle/CVE-2022-20699](https://github.com/puckiestyle/CVE-2022-20699)
### CVE-2022-21241 (2022-02-08)
@ -187,6 +193,14 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta
- [TheGetch/CVE-2022-23378](https://github.com/TheGetch/CVE-2022-23378)
### CVE-2022-23808 (2022-01-21)
<code>
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
</code>
- [dipakpanchal456/CVE-2022-23808](https://github.com/dipakpanchal456/CVE-2022-23808)
### CVE-2022-23967 (2022-01-26)
<code>
@ -210,7 +224,6 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
</code>
- [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2)
- [mochizuki875/helm-sample](https://github.com/mochizuki875/helm-sample)
### CVE-2022-24693
- [lukejenkins/CVE-2022-24693](https://github.com/lukejenkins/CVE-2022-24693)
@ -3976,7 +3989,12 @@ SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution.
- [manuelz120/CVE-2021-45897](https://github.com/manuelz120/CVE-2021-45897)
### CVE-2021-45901
### CVE-2021-45901 (2022-02-10)
<code>
The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.
</code>
- [9lyph/CVE-2021-45901](https://github.com/9lyph/CVE-2021-45901)
### CVE-2021-46005 (2022-01-18)
@ -18324,7 +18342,6 @@ A malicious third-party can give a crafted &quot;ssh://...&quot; URL to an unsus
- [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117)
- [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa)
- [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test)
- [bells17/CVE-2017-1000117](https://github.com/bells17/CVE-2017-1000117)
- [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117)
- [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117)
- [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl)