Auto Update 2022/07/06 00:15:59

This commit is contained in:
motikan2010-bot 2022-07-06 09:15:59 +09:00
parent 3d50fac18e
commit ec4ca51d05
22 changed files with 205 additions and 75 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 105,
"forks_count": 106,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -25,7 +25,7 @@
"cve-2008-0166"
],
"visibility": "public",
"forks": 105,
"forks": 106,
"watchers": 341,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2018-02-26T12:07:11Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 4,
"watchers": 8,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2022-06-14T16:57:17Z",
"updated_at": "2022-07-05T21:45:40Z",
"pushed_at": "2022-01-28T20:54:38Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 293,
"watchers": 292,
"score": 0
},
{

View file

@ -73,13 +73,13 @@
"pushed_at": "2019-06-10T15:10:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -85,10 +85,10 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2022-07-02T08:31:22Z",
"updated_at": "2022-07-05T21:45:41Z",
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 494,
"watchers_count": 494,
"stargazers_count": 493,
"watchers_count": 493,
"forks_count": 184,
"allow_forking": true,
"is_template": false,
@ -96,7 +96,7 @@
"topics": [],
"visibility": "public",
"forks": 184,
"watchers": 494,
"watchers": 493,
"score": 0
},
{

View file

@ -1766,10 +1766,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2022-06-29T11:54:49Z",
"updated_at": "2022-07-05T21:45:41Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1112,
"watchers_count": 1112,
"stargazers_count": 1111,
"watchers_count": 1111,
"forks_count": 356,
"allow_forking": true,
"is_template": false,
@ -1777,7 +1777,7 @@
"topics": [],
"visibility": "public",
"forks": 356,
"watchers": 1112,
"watchers": 1111,
"score": 0
},
{
@ -1850,10 +1850,10 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2022-06-10T10:41:02Z",
"updated_at": "2022-07-05T21:45:41Z",
"pushed_at": "2021-01-10T04:31:22Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 346,
"watchers_count": 346,
"forks_count": 128,
"allow_forking": true,
"is_template": false,
@ -1861,7 +1861,7 @@
"topics": [],
"visibility": "public",
"forks": 128,
"watchers": 347,
"watchers": 346,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2022-06-17T21:42:07Z",
"updated_at": "2022-07-05T21:45:41Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 618,
"watchers_count": 618,
"stargazers_count": 617,
"watchers_count": 617,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 156,
"watchers": 618,
"watchers": 617,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
"updated_at": "2022-06-12T01:20:18Z",
"updated_at": "2022-07-05T20:41:12Z",
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -1228,10 +1228,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-30T18:00:03Z",
"updated_at": "2021-12-15T14:42:25Z",
"updated_at": "2022-07-05T22:37:27Z",
"pushed_at": "2021-06-30T18:00:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -1239,7 +1239,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -303,10 +303,10 @@
"description": "CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T02:21:08Z",
"updated_at": "2022-06-13T09:12:52Z",
"updated_at": "2022-07-05T21:34:56Z",
"pushed_at": "2022-01-26T02:30:05Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -314,7 +314,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-07-04T17:26:42Z",
"updated_at": "2022-07-05T20:55:44Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 545,
"watchers_count": 545,
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
@ -919,7 +919,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 545,
"watchers": 547,
"score": 0
},
{

View file

@ -741,7 +741,7 @@
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 402,
"watchers_count": 402,
"forks_count": 86,
"forks_count": 87,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -752,7 +752,7 @@
"log4jshell"
],
"visibility": "public",
"forks": 86,
"forks": 87,
"watchers": 402,
"score": 0
},

View file

@ -1868,10 +1868,10 @@
"description": "An eBPF detection program for CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T07:20:59Z",
"updated_at": "2022-07-05T17:16:19Z",
"updated_at": "2022-07-05T21:19:14Z",
"pushed_at": "2022-07-05T14:25:46Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1879,7 +1879,35 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 9,
"score": 0
},
{
"id": 510867863,
"name": "Dirty-Pipe",
"full_name": "edr1412\/Dirty-Pipe",
"owner": {
"login": "edr1412",
"id": 40953911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40953911?v=4",
"html_url": "https:\/\/github.com\/edr1412"
},
"html_url": "https:\/\/github.com\/edr1412\/Dirty-Pipe",
"description": "exp of CVE-2022-0847",
"fork": false,
"created_at": "2022-07-05T19:22:50Z",
"updated_at": "2022-07-05T19:24:40Z",
"pushed_at": "2022-07-05T19:23:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -964,7 +964,7 @@
"fork": false,
"created_at": "2022-05-11T19:33:37Z",
"updated_at": "2022-07-04T19:06:44Z",
"pushed_at": "2022-05-11T19:39:01Z",
"pushed_at": "2022-07-05T23:52:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -166,5 +166,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 510875629,
"name": "CVE-2022-21449-I2P-TLS-POC",
"full_name": "PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"owner": {
"login": "PyterSmithDarkGhost",
"id": 106814901,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106814901?v=4",
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost"
},
"html_url": "https:\/\/github.com\/PyterSmithDarkGhost\/CVE-2022-21449-I2P-TLS-POC",
"description": null,
"fork": false,
"created_at": "2022-07-05T19:51:39Z",
"updated_at": "2022-07-05T19:55:22Z",
"pushed_at": "2022-07-05T19:52:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2022-07-04T09:46:15Z",
"updated_at": "2022-07-05T23:51:37Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 416,
"watchers_count": 416,
"stargazers_count": 417,
"watchers_count": 417,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 132,
"watchers": 416,
"watchers": 417,
"score": 0
},
{

View file

@ -137,10 +137,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2022-07-05T07:32:28Z",
"updated_at": "2022-07-05T19:57:18Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 127,
"watchers_count": 127,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 126,
"watchers": 127,
"score": 0
},
{
@ -197,10 +197,10 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
"updated_at": "2022-07-05T07:10:35Z",
"updated_at": "2022-07-05T19:28:37Z",
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 242,
"watchers_count": 242,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 62,
"watchers": 240,
"watchers": 242,
"score": 0
},
{

35
2022/CVE-2022-26135.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 506925900,
"name": "jira-mobile-ssrf-exploit",
"full_name": "assetnote\/jira-mobile-ssrf-exploit",
"owner": {
"login": "assetnote",
"id": 35264812,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35264812?v=4",
"html_url": "https:\/\/github.com\/assetnote"
},
"html_url": "https:\/\/github.com\/assetnote\/jira-mobile-ssrf-exploit",
"description": "Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)",
"fork": false,
"created_at": "2022-06-24T07:55:52Z",
"updated_at": "2022-07-06T00:04:55Z",
"pushed_at": "2022-07-05T21:13:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-26135",
"exploit",
"jira",
"ssrf"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-07-05T12:26:08Z",
"updated_at": "2022-07-05T19:33:59Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "Proof-of-concept for CVE-2022-26766 on macOS 12.3.1",
"fork": false,
"created_at": "2022-07-02T06:16:33Z",
"updated_at": "2022-07-05T15:23:58Z",
"updated_at": "2022-07-05T19:48:53Z",
"pushed_at": "2022-07-02T17:14:41Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 2,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 41,
"forks": 3,
"watchers": 42,
"score": 0
}
]

View file

@ -26,5 +26,33 @@
"forks": 8,
"watchers": 22,
"score": 0
},
{
"id": 509605278,
"name": "manageengine-auditad-cve-2022-28219",
"full_name": "rbowes-r7\/manageengine-auditad-cve-2022-28219",
"owner": {
"login": "rbowes-r7",
"id": 104588115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104588115?v=4",
"html_url": "https:\/\/github.com\/rbowes-r7"
},
"html_url": "https:\/\/github.com\/rbowes-r7\/manageengine-auditad-cve-2022-28219",
"description": null,
"fork": false,
"created_at": "2022-07-01T22:40:46Z",
"updated_at": "2022-07-05T22:09:09Z",
"pushed_at": "2022-07-05T22:13:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -522,10 +522,10 @@
"description": "CVE-2022-29464 Exploit",
"fork": false,
"created_at": "2022-07-05T08:27:04Z",
"updated_at": "2022-07-05T17:45:17Z",
"updated_at": "2022-07-05T21:21:15Z",
"pushed_at": "2022-07-05T08:58:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -533,7 +533,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 13,
"score": 0
}
]

View file

@ -220,6 +220,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
- [greenhandatsjtu/CVE-2022-0847-Container-Escape](https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape)
- [flux10n/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits)
- [airbus-cert/dirtypipe-ebpf_detection](https://github.com/airbus-cert/dirtypipe-ebpf_detection)
- [edr1412/Dirty-Pipe](https://github.com/edr1412/Dirty-Pipe)
### CVE-2022-0848 (2022-03-04)
@ -544,6 +545,7 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o
- [marschall/psychic-signatures](https://github.com/marschall/psychic-signatures)
- [Damok82/SignChecker](https://github.com/Damok82/SignChecker)
- [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449)
- [PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC](https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC)
### CVE-2022-21658 (2022-01-20)
@ -1688,6 +1690,14 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
### CVE-2022-26135 (2022-06-30)
<code>
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
</code>
- [assetnote/jira-mobile-ssrf-exploit](https://github.com/assetnote/jira-mobile-ssrf-exploit)
### CVE-2022-26155 (2022-02-28)
<code>
@ -1977,6 +1987,7 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe
</code>
- [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219)
- [rbowes-r7/manageengine-auditad-cve-2022-28219](https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219)
### CVE-2022-28281
- [0vercl0k/CVE-2022-28281](https://github.com/0vercl0k/CVE-2022-28281)