Auto Update 2022/06/11 12:15:38

This commit is contained in:
motikan2010-bot 2022-06-11 21:15:38 +09:00
parent 0066fac2cc
commit f5b6674e73
24 changed files with 167 additions and 102 deletions

View file

@ -40,11 +40,11 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-11-20T13:14:45Z", "created_at": "2019-11-20T13:14:45Z",
"updated_at": "2021-06-28T14:50:38Z", "updated_at": "2022-06-11T10:20:48Z",
"pushed_at": "2021-06-28T14:50:35Z", "pushed_at": "2021-06-28T14:50:35Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -52,8 +52,8 @@
"heap-spray" "heap-spray"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -297,17 +297,17 @@
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow", "description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
"fork": false, "fork": false,
"created_at": "2016-10-29T08:45:45Z", "created_at": "2016-10-29T08:45:45Z",
"updated_at": "2021-09-30T06:59:53Z", "updated_at": "2022-06-11T11:28:20Z",
"pushed_at": "2016-10-29T08:50:34Z", "pushed_at": "2016-10-29T08:50:34Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 12, "watchers": 13,
"score": 0 "score": 0
}, },
{ {

29
2017/CVE-2017-12561.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 502323648,
"name": "CVE-2017-12561-Exploit",
"full_name": "whokilleddb\/CVE-2017-12561-Exploit",
"owner": {
"login": "whokilleddb",
"id": 56482137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56482137?v=4",
"html_url": "https:\/\/github.com\/whokilleddb"
},
"html_url": "https:\/\/github.com\/whokilleddb\/CVE-2017-12561-Exploit",
"description": "Exploit for CVE-2017-12561: dbman Opcode 10012 Use-After-Free Remote Code Execution",
"fork": false,
"created_at": "2022-06-11T11:00:42Z",
"updated_at": "2022-06-11T11:00:42Z",
"pushed_at": "2022-06-11T11:48:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -424,17 +424,17 @@
"description": "SambaCry exploit (CVE-2017-7494) ", "description": "SambaCry exploit (CVE-2017-7494) ",
"fork": false, "fork": false,
"created_at": "2022-05-07T11:42:40Z", "created_at": "2022-05-07T11:42:40Z",
"updated_at": "2022-06-08T16:49:45Z", "updated_at": "2022-06-11T10:37:01Z",
"pushed_at": "2022-05-08T09:02:36Z", "pushed_at": "2022-05-08T09:02:36Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 15, "watchers": 16,
"score": 0 "score": 0
} }
] ]

View file

@ -283,17 +283,17 @@
"description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)", "description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)",
"fork": false, "fork": false,
"created_at": "2018-08-28T23:48:14Z", "created_at": "2018-08-28T23:48:14Z",
"updated_at": "2018-12-23T03:47:07Z", "updated_at": "2022-06-11T11:42:21Z",
"pushed_at": "2018-08-29T00:03:56Z", "pushed_at": "2018-08-29T00:03:56Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 15, "watchers": 16,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false, "fork": false,
"created_at": "2021-05-22T05:06:33Z", "created_at": "2021-05-22T05:06:33Z",
"updated_at": "2022-06-11T01:41:59Z", "updated_at": "2022-06-11T06:20:49Z",
"pushed_at": "2021-11-21T10:34:06Z", "pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 77, "stargazers_count": 78,
"watchers_count": 77, "watchers_count": 78,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -54,7 +54,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 77, "watchers": 78,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-11T05:29:38Z", "updated_at": "2022-06-11T09:12:53Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3359, "stargazers_count": 3361,
"watchers_count": 3359, "watchers_count": 3361,
"forks_count": 1001, "forks_count": 1001,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -70,7 +70,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1001, "forks": 1001,
"watchers": 3359, "watchers": 3361,
"score": 0 "score": 0
}, },
{ {

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-03-15T11:14:18Z", "pushed_at": "2021-03-15T11:14:18Z",
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,
"forks_count": 6, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 7,
"watchers": 7, "watchers": 7,
"score": 0 "score": 0
} }

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-06-11T05:29:38Z", "updated_at": "2022-06-11T09:12:53Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3359, "stargazers_count": 3361,
"watchers_count": 3359, "watchers_count": 3361,
"forks_count": 1001, "forks_count": 1001,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -43,7 +43,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1001, "forks": 1001,
"watchers": 3359, "watchers": 3361,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false, "fork": false,
"created_at": "2021-06-29T04:38:24Z", "created_at": "2021-06-29T04:38:24Z",
"updated_at": "2022-06-10T10:41:21Z", "updated_at": "2022-06-11T09:50:42Z",
"pushed_at": "2022-04-14T03:17:44Z", "pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 332, "stargazers_count": 333,
"watchers_count": 332, "watchers_count": 333,
"forks_count": 35, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 35,
"watchers": 332, "watchers": 333,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-4464 \/ CVE-2020-4450", "description": "CVE-2020-4464 \/ CVE-2020-4450",
"fork": false, "fork": false,
"created_at": "2021-08-17T08:44:49Z", "created_at": "2021-08-17T08:44:49Z",
"updated_at": "2022-06-01T06:14:09Z", "updated_at": "2022-06-11T09:02:12Z",
"pushed_at": "2021-08-24T15:02:19Z", "pushed_at": "2021-08-24T15:02:19Z",
"stargazers_count": 21, "stargazers_count": 22,
"watchers_count": 21, "watchers_count": 22,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 21, "watchers": 22,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false, "fork": false,
"created_at": "2021-05-22T05:06:33Z", "created_at": "2021-05-22T05:06:33Z",
"updated_at": "2022-06-11T01:41:59Z", "updated_at": "2022-06-11T06:20:49Z",
"pushed_at": "2021-11-21T10:34:06Z", "pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 77, "stargazers_count": 78,
"watchers_count": 77, "watchers_count": 78,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -27,7 +27,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 77, "watchers": 78,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "Recursive MMIO VM Escape PoC", "description": "Recursive MMIO VM Escape PoC",
"fork": false, "fork": false,
"created_at": "2022-05-13T05:33:28Z", "created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-06-10T23:16:22Z", "updated_at": "2022-06-11T08:17:20Z",
"pushed_at": "2022-05-13T05:37:41Z", "pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 124, "stargazers_count": 125,
"watchers_count": 124, "watchers_count": 125,
"forks_count": 19, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 19,
"watchers": 124, "watchers": 125,
"score": 0 "score": 0
} }
] ]

View file

@ -71,17 +71,17 @@
"description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50", "description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50",
"fork": false, "fork": false,
"created_at": "2021-10-27T14:29:10Z", "created_at": "2021-10-27T14:29:10Z",
"updated_at": "2022-06-08T09:46:01Z", "updated_at": "2022-06-11T08:16:58Z",
"pushed_at": "2022-05-26T09:37:00Z", "pushed_at": "2022-05-26T09:37:00Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
}, },
{ {

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-06-10T03:28:49Z", "updated_at": "2022-06-11T09:37:44Z",
"pushed_at": "2022-04-25T07:53:41Z", "pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 354, "stargazers_count": 355,
"watchers_count": 354, "watchers_count": 355,
"forks_count": 70, "forks_count": 71,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 70, "forks": 71,
"watchers": 354, "watchers": 355,
"score": 0 "score": 0
}, },
{ {

View file

@ -586,7 +586,7 @@
"pushed_at": "2022-03-20T16:33:49Z", "pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1389, "stargazers_count": 1389,
"watchers_count": 1389, "watchers_count": 1389,
"forks_count": 384, "forks_count": 385,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -596,7 +596,7 @@
"security" "security"
], ],
"visibility": "public", "visibility": "public",
"forks": 384, "forks": 385,
"watchers": 1389, "watchers": 1389,
"score": 0 "score": 0
}, },
@ -9513,7 +9513,7 @@
"fork": false, "fork": false,
"created_at": "2022-02-12T11:19:41Z", "created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-05-10T15:12:41Z", "updated_at": "2022-05-10T15:12:41Z",
"pushed_at": "2022-06-09T05:03:10Z", "pushed_at": "2022-06-11T11:56:42Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,

View file

@ -849,17 +849,17 @@
"description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation", "description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation",
"fork": false, "fork": false,
"created_at": "2022-05-10T15:44:50Z", "created_at": "2022-05-10T15:44:50Z",
"updated_at": "2022-05-28T12:39:06Z", "updated_at": "2022-06-11T08:36:43Z",
"pushed_at": "2022-05-16T14:02:29Z", "pushed_at": "2022-05-16T14:02:29Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 4, "watchers": 5,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2022-06-07T03:20:23Z", "created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-06-11T05:19:06Z", "updated_at": "2022-06-11T10:57:00Z",
"pushed_at": "2022-06-07T03:41:13Z", "pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 235, "stargazers_count": 239,
"watchers_count": 235, "watchers_count": 239,
"forks_count": 35, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 36,
"watchers": 235, "watchers": 239,
"score": 0 "score": 0
} }
] ]

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-06-11T03:18:37Z", "pushed_at": "2022-06-11T03:18:37Z",
"stargazers_count": 37, "stargazers_count": 37,
"watchers_count": 37, "watchers_count": 37,
"forks_count": 10, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -28,7 +28,7 @@
"nday" "nday"
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 11,
"watchers": 37, "watchers": 37,
"score": 0 "score": 0
}, },
@ -136,7 +136,7 @@
"pushed_at": "2022-06-06T16:38:49Z", "pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 111, "stargazers_count": 111,
"watchers_count": 111, "watchers_count": 111,
"forks_count": 34, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -145,7 +145,7 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 35,
"watchers": 111, "watchers": 111,
"score": 0 "score": 0
}, },
@ -194,7 +194,7 @@
"pushed_at": "2022-06-06T20:24:06Z", "pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 197, "stargazers_count": 197,
"watchers_count": 197, "watchers_count": 197,
"forks_count": 53, "forks_count": 54,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -211,7 +211,7 @@
"vulnerability" "vulnerability"
], ],
"visibility": "public", "visibility": "public",
"forks": 53, "forks": 54,
"watchers": 197, "watchers": 197,
"score": 0 "score": 0
}, },
@ -986,7 +986,7 @@
"description": "[CVE-2022-26134] Attlasian Confluence RCE", "description": "[CVE-2022-26134] Attlasian Confluence RCE",
"fork": false, "fork": false,
"created_at": "2022-06-10T18:07:16Z", "created_at": "2022-06-10T18:07:16Z",
"updated_at": "2022-06-11T05:41:53Z", "updated_at": "2022-06-11T11:22:55Z",
"pushed_at": "2022-06-10T18:22:30Z", "pushed_at": "2022-06-10T18:22:30Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,

View file

@ -13,17 +13,17 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false, "fork": false,
"created_at": "2022-03-23T15:03:09Z", "created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-06-06T04:37:53Z", "updated_at": "2022-06-11T09:56:40Z",
"pushed_at": "2022-03-26T05:52:15Z", "pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 345, "stargazers_count": 346,
"watchers_count": 345, "watchers_count": 346,
"forks_count": 44, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 44, "forks": 44,
"watchers": 345, "watchers": 346,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)", "description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false, "fork": false,
"created_at": "2022-06-07T23:26:47Z", "created_at": "2022-06-07T23:26:47Z",
"updated_at": "2022-06-11T04:37:17Z", "updated_at": "2022-06-11T08:39:04Z",
"pushed_at": "2022-06-08T06:54:45Z", "pushed_at": "2022-06-08T06:54:45Z",
"stargazers_count": 50, "stargazers_count": 51,
"watchers_count": 50, "watchers_count": 51,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 50, "watchers": 51,
"score": 0 "score": 0
}, },
{ {
@ -52,5 +52,32 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 502276022,
"name": "CVE-2022-30075",
"full_name": "trhacknon\/CVE-2022-30075",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-30075",
"description": null,
"fork": false,
"created_at": "2022-06-11T07:04:55Z",
"updated_at": "2022-06-11T07:05:07Z",
"pushed_at": "2022-06-11T07:12:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -780,17 +780,17 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。", "description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false, "fork": false,
"created_at": "2022-06-02T12:33:18Z", "created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-06-11T05:25:32Z", "updated_at": "2022-06-11T12:02:47Z",
"pushed_at": "2022-06-06T07:19:53Z", "pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 189, "stargazers_count": 198,
"watchers_count": 189, "watchers_count": 198,
"forks_count": 20, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 21,
"watchers": 189, "watchers": 198,
"score": 0 "score": 0
}, },
{ {
@ -1377,10 +1377,10 @@
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)", "description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
"fork": false, "fork": false,
"created_at": "2022-06-09T09:32:10Z", "created_at": "2022-06-09T09:32:10Z",
"updated_at": "2022-06-11T05:57:45Z", "updated_at": "2022-06-11T09:30:08Z",
"pushed_at": "2022-06-11T05:58:38Z", "pushed_at": "2022-06-11T05:58:38Z",
"stargazers_count": 2, "stargazers_count": 4,
"watchers_count": 2, "watchers_count": 4,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1397,7 +1397,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 4,
"score": 0 "score": 0
}, },
{ {

View file

@ -72,17 +72,17 @@
"description": "Zyxel 防火墙远程命令注入漏洞CVE-2022-30525批量检测脚本", "description": "Zyxel 防火墙远程命令注入漏洞CVE-2022-30525批量检测脚本",
"fork": false, "fork": false,
"created_at": "2022-05-13T12:58:43Z", "created_at": "2022-05-13T12:58:43Z",
"updated_at": "2022-06-11T06:03:34Z", "updated_at": "2022-06-11T09:17:39Z",
"pushed_at": "2022-05-13T14:46:04Z", "pushed_at": "2022-05-13T14:46:04Z",
"stargazers_count": 27, "stargazers_count": 29,
"watchers_count": 27, "watchers_count": 29,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 27, "watchers": 29,
"score": 0 "score": 0
}, },
{ {

View file

@ -2057,6 +2057,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f
- [aaronsvk/CVE-2022-30075](https://github.com/aaronsvk/CVE-2022-30075) - [aaronsvk/CVE-2022-30075](https://github.com/aaronsvk/CVE-2022-30075)
- [SAJIDAMINE/CVE-2022-30075](https://github.com/SAJIDAMINE/CVE-2022-30075) - [SAJIDAMINE/CVE-2022-30075](https://github.com/SAJIDAMINE/CVE-2022-30075)
- [trhacknon/CVE-2022-30075](https://github.com/trhacknon/CVE-2022-30075)
### CVE-2022-30190 (2022-06-01) ### CVE-2022-30190 (2022-06-01)
@ -21000,6 +21001,14 @@ A authentication bypass and execution of code vulnerability in HPE Integrated Li
- [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542) - [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542)
- [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner) - [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner)
### CVE-2017-12561 (2018-02-15)
<code>
A remote code execution vulnerability in HPE intelligent Management Center (iMC) PLAT version Plat 7.3 E0504P4 and earlier was found.
</code>
- [whokilleddb/CVE-2017-12561-Exploit](https://github.com/whokilleddb/CVE-2017-12561-Exploit)
### CVE-2017-12611 (2017-09-20) ### CVE-2017-12611 (2017-09-20)
<code> <code>