Auto Update 2022/11/17 18:18:41

This commit is contained in:
motikan2010-bot 2022-11-18 03:18:41 +09:00
parent a0614126bc
commit e9c16dcc8b
34 changed files with 211 additions and 146 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2022-11-03T16:43:51Z",
"updated_at": "2022-11-17T15:48:24Z",
"pushed_at": "2022-10-28T13:26:02Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 130,
"watchers": 131,
"score": 0
}
]

View file

@ -332,10 +332,10 @@
"description": "A shared library wrapper with additional checks for vulnerable functions gethostbyname2_r gethostbyname_r (GHOST vulnerability)",
"fork": false,
"created_at": "2015-02-02T11:16:42Z",
"updated_at": "2016-02-17T21:52:40Z",
"updated_at": "2022-11-17T16:21:30Z",
"pushed_at": "2015-02-04T19:41:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -344,7 +344,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -433,10 +433,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2022-11-15T13:17:21Z",
"updated_at": "2022-11-17T14:55:22Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 678,
"watchers_count": 678,
"stargazers_count": 679,
"watchers_count": 679,
"has_discussions": false,
"forks_count": 412,
"allow_forking": true,
@ -449,7 +449,7 @@
],
"visibility": "public",
"forks": 412,
"watchers": 678,
"watchers": 679,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2022-11-16T08:35:20Z",
"updated_at": "2022-11-17T14:28:02Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 532,
"watchers_count": 532,
"stargazers_count": 531,
"watchers_count": 531,
"has_discussions": false,
"forks_count": 260,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 260,
"watchers": 532,
"watchers": 531,
"score": 0
},
{
@ -163,10 +163,10 @@
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
"fork": false,
"created_at": "2017-11-21T18:17:28Z",
"updated_at": "2022-09-08T08:07:28Z",
"updated_at": "2022-11-17T14:25:55Z",
"pushed_at": "2017-11-21T20:34:57Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 99,
"watchers": 98,
"score": 0
},
{

View file

@ -323,7 +323,7 @@
"description": "Automated Exploit for CVE-2017-9841 (eval-stdin.php vulnerable file)",
"fork": false,
"created_at": "2022-10-20T19:05:12Z",
"updated_at": "2022-10-20T19:07:35Z",
"updated_at": "2022-11-17T17:51:36Z",
"pushed_at": "2022-10-20T19:18:40Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "A code demonstrating CVE-2018-0886",
"fork": false,
"created_at": "2018-04-02T12:52:07Z",
"updated_at": "2022-10-26T09:37:29Z",
"updated_at": "2022-11-17T16:58:47Z",
"pushed_at": "2020-08-14T16:33:44Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 255,
"watchers": 256,
"score": 0
}
]

View file

@ -83,7 +83,7 @@
"stargazers_count": 536,
"watchers_count": 536,
"has_discussions": false,
"forks_count": 172,
"forks_count": 173,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -99,7 +99,7 @@
"sa-core-2018-002"
],
"visibility": "public",
"forks": 172,
"forks": 173,
"watchers": 536,
"score": 0
},

View file

@ -221,7 +221,7 @@
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 59,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -236,7 +236,7 @@
"security-tools"
],
"visibility": "public",
"forks": 59,
"forks": 58,
"watchers": 126,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2022-11-16T17:44:08Z",
"updated_at": "2022-11-17T14:32:39Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 746,
"watchers_count": 746,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 745,
"watchers": 746,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2022-11-11T14:20:57Z",
"updated_at": "2022-11-17T15:25:22Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 201,
"watchers": 200,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2022-11-14T10:52:13Z",
"updated_at": "2022-11-17T14:16:17Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 844,
"watchers_count": 844,
"stargazers_count": 845,
"watchers_count": 845,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 173,
"watchers": 844,
"watchers": 845,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-11-09T18:04:29Z",
"updated_at": "2022-11-17T16:41:26Z",
"pushed_at": "2022-05-04T14:12:43Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -42,19 +42,19 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-11-16T22:00:11Z",
"updated_at": "2022-11-17T15:49:37Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1516,
"watchers_count": 1516,
"stargazers_count": 1517,
"watchers_count": 1517,
"has_discussions": false,
"forks_count": 349,
"forks_count": 350,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 349,
"watchers": 1516,
"forks": 350,
"watchers": 1517,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2022-11-15T17:35:18Z",
"updated_at": "2022-11-17T16:16:54Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 347,
"watchers": 348,
"score": 0
}
]

View file

@ -275,5 +275,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 567344895,
"name": "CVE-2021-29447",
"full_name": "Abdulazizalsewedy\/CVE-2021-29447",
"owner": {
"login": "Abdulazizalsewedy",
"id": 64151982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64151982?v=4",
"html_url": "https:\/\/github.com\/Abdulazizalsewedy"
},
"html_url": "https:\/\/github.com\/Abdulazizalsewedy\/CVE-2021-29447",
"description": null,
"fork": false,
"created_at": "2022-11-17T15:38:22Z",
"updated_at": "2022-11-17T15:38:22Z",
"pushed_at": "2022-11-17T16:34:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1039,10 +1039,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-11-17T05:44:49Z",
"updated_at": "2022-11-17T16:47:09Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 548,
"watchers_count": 548,
"stargazers_count": 549,
"watchers_count": 549,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@ -1051,7 +1051,7 @@
"topics": [],
"visibility": "public",
"forks": 152,
"watchers": 548,
"watchers": 549,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-12-13T09:23:36Z",
"updated_at": "2022-07-13T09:22:36Z",
"updated_at": "2022-11-17T12:42:51Z",
"pushed_at": "2022-10-27T01:14:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -411,10 +411,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-11-17T08:53:33Z",
"updated_at": "2022-11-17T14:26:00Z",
"pushed_at": "2022-11-17T02:44:09Z",
"stargazers_count": 540,
"watchers_count": 540,
"stargazers_count": 541,
"watchers_count": 541,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -428,7 +428,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 540,
"watchers": 541,
"score": 0
},
{
@ -445,10 +445,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-11-15T05:18:54Z",
"updated_at": "2022-11-17T14:29:59Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 837,
"watchers_count": 837,
"stargazers_count": 838,
"watchers_count": 838,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -470,7 +470,7 @@
],
"visibility": "public",
"forks": 180,
"watchers": 837,
"watchers": 838,
"score": 0
},
{
@ -2291,39 +2291,6 @@
"watchers": 7,
"score": 0
},
{
"id": 438605924,
"name": "log4j-resources",
"full_name": "gitlab-de\/log4j-resources",
"owner": {
"login": "gitlab-de",
"id": 75491323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75491323?v=4",
"html_url": "https:\/\/github.com\/gitlab-de"
},
"html_url": "https:\/\/github.com\/gitlab-de\/log4j-resources",
"description": "This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)",
"fork": false,
"created_at": "2021-12-15T11:34:02Z",
"updated_at": "2021-12-18T15:25:17Z",
"pushed_at": "2021-12-18T15:25:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-44228",
"cve-2021-45046",
"log4j"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 438650245,
"name": "log4j_temp_CVE-2021-44228",

View file

@ -2246,5 +2246,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 567286754,
"name": "CVE-2022-0847-Dirty-Pipe-Vulnerability-",
"full_name": "siholley\/CVE-2022-0847-Dirty-Pipe-Vulnerability-",
"owner": {
"login": "siholley",
"id": 6509191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6509191?v=4",
"html_url": "https:\/\/github.com\/siholley"
},
"html_url": "https:\/\/github.com\/siholley\/CVE-2022-0847-Dirty-Pipe-Vulnerability-",
"description": null,
"fork": false,
"created_at": "2022-11-17T13:25:32Z",
"updated_at": "2022-11-17T13:25:32Z",
"pushed_at": "2022-11-17T13:26:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22629 Proof of Concept",
"fork": false,
"created_at": "2022-09-09T17:21:27Z",
"updated_at": "2022-11-17T12:20:26Z",
"updated_at": "2022-11-17T14:39:32Z",
"pushed_at": "2022-09-09T21:23:08Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -1273,10 +1273,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-11-17T03:00:26Z",
"updated_at": "2022-11-17T13:57:36Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -1285,7 +1285,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 124,
"watchers": 125,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 188,
"watchers_count": 188,
"has_discussions": false,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 188,
"score": 0
}

View file

@ -1882,10 +1882,10 @@
"description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files",
"fork": false,
"created_at": "2022-06-15T02:22:53Z",
"updated_at": "2022-08-10T07:05:30Z",
"updated_at": "2022-11-17T12:40:16Z",
"pushed_at": "2022-06-15T02:24:00Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -1894,7 +1894,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 29,
"watchers": 28,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"vulnerabilities"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"vulnerabilities"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 53,
"score": 0
}

31
2022/CVE-2022-31691.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 567279826,
"name": "CVE-2022-31691",
"full_name": "SpindleSec\/CVE-2022-31691",
"owner": {
"login": "SpindleSec",
"id": 114083317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114083317?v=4",
"html_url": "https:\/\/github.com\/SpindleSec"
},
"html_url": "https:\/\/github.com\/SpindleSec\/CVE-2022-31691",
"description": "A write-up of my (so far inconclusive) look into CVE-2022-31691",
"fork": false,
"created_at": "2022-11-17T13:09:03Z",
"updated_at": "2022-11-17T15:20:37Z",
"pushed_at": "2022-11-17T15:19:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215",
"fork": false,
"created_at": "2022-11-11T05:11:14Z",
"updated_at": "2022-11-17T08:58:49Z",
"pushed_at": "2022-11-11T05:18:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"updated_at": "2022-11-17T15:27:44Z",
"pushed_at": "2022-11-17T12:58:20Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-11-17T12:02:06Z",
"updated_at": "2022-11-17T18:13:34Z",
"pushed_at": "2022-11-07T16:21:14Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 290,
"watchers_count": 290,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 286,
"watchers": 290,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC-exploit",
"fork": false,
"created_at": "2022-07-18T20:52:01Z",
"updated_at": "2022-10-28T15:31:38Z",
"updated_at": "2022-11-17T13:40:41Z",
"pushed_at": "2022-09-27T14:52:32Z",
"stargazers_count": 27,
"watchers_count": 27,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-09-30T16:43:28Z",
"updated_at": "2022-11-09T18:16:17Z",
"updated_at": "2022-11-17T17:47:55Z",
"pushed_at": "2022-10-01T09:43:20Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 36,
"watchers": 37,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-11-16T01:14:45Z",
"pushed_at": "2022-11-15T15:20:41Z",
"pushed_at": "2022-11-17T12:24:25Z",
"stargazers_count": 525,
"watchers_count": 525,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T14:24:12Z",
"updated_at": "2022-11-16T17:19:14Z",
"updated_at": "2022-11-17T12:47:06Z",
"pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 287,
"watchers": 288,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2022-11-17T10:49:09Z",
"updated_at": "2022-11-17T15:23:09Z",
"pushed_at": "2022-11-14T17:54:57Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 61,
"watchers": 63,
"score": 0
}
]

View file

@ -252,6 +252,7 @@ A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer
- [badboy-sft/Dirty-Pipe-Oneshot](https://github.com/badboy-sft/Dirty-Pipe-Oneshot)
- [edsonjt81/CVE-2022-0847-DirtyPipe-](https://github.com/edsonjt81/CVE-2022-0847-DirtyPipe-)
- [Z3R0W4R3/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/Z3R0W4R3/CVE-2022-0847-DirtyPipe-Exploits)
- [siholley/CVE-2022-0847-Dirty-Pipe-Vulnerability-](https://github.com/siholley/CVE-2022-0847-Dirty-Pipe-Vulnerability-)
### CVE-2022-0848 (2022-03-04)
@ -3367,6 +3368,14 @@ In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables netw
- [silnex/CVE-2022-31629-poc](https://github.com/silnex/CVE-2022-31629-poc)
### CVE-2022-31691 (2022-11-04)
<code>
Spring Tools 4 for Eclipse version 4.16.0 and below as well as VSCode extensions such as Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor and Cloudfoundry Manifest YML Support version 1.39.0 and below all use Snakeyaml library for YAML editing support. This library allows for some special syntax in the YAML that under certain circumstances allows for potentially harmful remote code execution by the attacker.
</code>
- [SpindleSec/CVE-2022-31691](https://github.com/SpindleSec/CVE-2022-31691)
### CVE-2022-31692 (2022-10-31)
<code>
@ -6778,6 +6787,7 @@ Wordpress is an open source CMS. A user with the ability to upload files (like a
- [M3l0nPan/wordpress-cve-2021-29447](https://github.com/M3l0nPan/wordpress-cve-2021-29447)
- [mega8bit/exploit_cve-2021-29447](https://github.com/mega8bit/exploit_cve-2021-29447)
- [thomas-osgood/CVE-2021-29447](https://github.com/thomas-osgood/CVE-2021-29447)
- [Abdulazizalsewedy/CVE-2021-29447](https://github.com/Abdulazizalsewedy/CVE-2021-29447)
### CVE-2021-29505 (2021-05-28)
@ -8462,7 +8472,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
- [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228)
- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)