Auto Update 2022/09/15 18:17:21

This commit is contained in:
motikan2010-bot 2022-09-16 03:17:21 +09:00
parent 8e7f7096ef
commit f7e7f43910
44 changed files with 360 additions and 244 deletions

View file

@ -114,19 +114,19 @@
{
"id": 440387641,
"name": "CVE-2006-3392",
"full_name": "windsormoreira\/CVE-2006-3392",
"full_name": "kernel-cyber\/CVE-2006-3392",
"owner": {
"login": "windsormoreira",
"login": "kernel-cyber",
"id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/windsormoreira"
"html_url": "https:\/\/github.com\/kernel-cyber"
},
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2006-3392",
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392",
"description": "Webmin Local File Include (unauthenticated)",
"fork": false,
"created_at": "2021-12-21T04:18:21Z",
"updated_at": "2021-12-21T04:43:07Z",
"pushed_at": "2021-12-21T04:43:04Z",
"pushed_at": "2022-09-15T15:49:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -28,5 +28,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 537094385,
"name": "CVE-2009-4623",
"full_name": "kernel-cyber\/CVE-2009-4623",
"owner": {
"login": "kernel-cyber",
"id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/kernel-cyber"
},
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2009-4623",
"description": null,
"fork": false,
"created_at": "2022-09-15T15:38:30Z",
"updated_at": "2022-09-15T15:41:58Z",
"pushed_at": "2022-09-15T15:50:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-01-28T20:54:38Z",
"stargazers_count": 291,
"watchers_count": 291,
"forks_count": 118,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 118,
"forks": 117,
"watchers": 291,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"poc"
],
"visibility": "public",
"forks": 47,
"forks": 48,
"watchers": 89,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2022-08-28T21:27:42Z",
"updated_at": "2022-09-15T17:43:47Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 446,
"watchers_count": 446,
"forks_count": 192,
"stargazers_count": 447,
"watchers_count": 447,
"forks_count": 193,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"poc"
],
"visibility": "public",
"forks": 192,
"watchers": 446,
"forks": 193,
"watchers": 447,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)",
"fork": false,
"created_at": "2022-09-09T23:09:40Z",
"updated_at": "2022-09-14T11:27:05Z",
"updated_at": "2022-09-15T17:48:17Z",
"pushed_at": "2022-09-12T01:43:19Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -143,7 +143,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
"updated_at": "2022-07-23T23:37:22Z",
"updated_at": "2022-09-15T14:39:30Z",
"pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 78,
"watchers": 80,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"pushed_at": "2017-09-10T05:28:03Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 6,
"score": 0
},

View file

@ -50,13 +50,13 @@
"pushed_at": "2019-05-14T21:51:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 70,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 70,
"forks": 71,
"watchers": 12,
"score": 0
},

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-09-15T09:00:33Z",
"updated_at": "2022-09-15T14:48:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3539,
"watchers_count": 3539,
"stargazers_count": 3540,
"watchers_count": 3540,
"forks_count": 1038,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1038,
"watchers": 3539,
"watchers": 3540,
"score": 0
},
{

View file

@ -46,10 +46,10 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
"updated_at": "2022-07-05T12:48:09Z",
"updated_at": "2022-09-15T18:06:09Z",
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-09-15T09:00:33Z",
"updated_at": "2022-09-15T14:48:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3539,
"watchers_count": 3539,
"stargazers_count": 3540,
"watchers_count": 3540,
"forks_count": 1038,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1038,
"watchers": 3539,
"watchers": 3540,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2022-09-15T12:07:14Z",
"updated_at": "2022-09-15T13:48:19Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 4,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 51,
"forks": 6,
"watchers": 54,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE 2021-21315 PoC",
"fork": false,
"created_at": "2021-03-01T18:52:41Z",
"updated_at": "2022-08-14T18:56:52Z",
"updated_at": "2022-09-15T14:59:05Z",
"pushed_at": "2021-06-09T13:27:20Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 147,
"watchers": 148,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"forks": 43,
"watchers": 235,
"score": 0
},

View file

@ -1,30 +0,0 @@
[
{
"id": 438682864,
"name": "CVE-2021-23758-POC",
"full_name": "numanturle\/CVE-2021-23758-POC",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-23758-POC",
"description": null,
"fork": false,
"created_at": "2021-12-15T15:40:45Z",
"updated_at": "2022-08-29T04:01:32Z",
"pushed_at": "2021-12-15T16:37:09Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -1,30 +0,0 @@
[
{
"id": 438692076,
"name": "CVE-2021-2394",
"full_name": "fasanhlieu\/CVE-2021-2394",
"owner": {
"login": "fasanhlieu",
"id": 54527046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54527046?v=4",
"html_url": "https:\/\/github.com\/fasanhlieu"
},
"html_url": "https:\/\/github.com\/fasanhlieu\/CVE-2021-2394",
"description": null,
"fork": false,
"created_at": "2021-12-15T16:09:54Z",
"updated_at": "2021-12-15T16:09:54Z",
"pushed_at": "2021-12-15T16:09:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2022-08-26T07:45:05Z",
"updated_at": "2022-09-15T14:43:38Z",
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 305,
"watchers_count": 305,

View file

@ -926,5 +926,89 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 537018809,
"name": "CVE-2021-41773.git1",
"full_name": "mightysai1997\/CVE-2021-41773.git1",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773.git1",
"description": null,
"fork": false,
"created_at": "2022-09-15T12:35:06Z",
"updated_at": "2022-09-15T12:35:18Z",
"pushed_at": "2022-09-15T12:35:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 537019898,
"name": "CVE-2021-41773m",
"full_name": "mightysai1997\/CVE-2021-41773m",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773m",
"description": null,
"fork": false,
"created_at": "2022-09-15T12:37:59Z",
"updated_at": "2022-09-15T12:38:13Z",
"pushed_at": "2022-09-15T12:38:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 537060189,
"name": "CVE-2021-41773S",
"full_name": "mightysai1997\/CVE-2021-41773S",
"owner": {
"login": "mightysai1997",
"id": 110396758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110396758?v=4",
"html_url": "https:\/\/github.com\/mightysai1997"
},
"html_url": "https:\/\/github.com\/mightysai1997\/CVE-2021-41773S",
"description": null,
"fork": false,
"created_at": "2022-09-15T14:17:45Z",
"updated_at": "2022-09-15T14:17:45Z",
"pushed_at": "2022-09-15T14:17:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-09-14T12:02:08Z",
"updated_at": "2022-09-15T15:25:22Z",
"pushed_at": "2022-09-01T21:30:25Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 432,
"watchers_count": 432,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 430,
"watchers": 432,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 440389065,
"name": "CVE-2021-42913",
"full_name": "windsormoreira\/CVE-2021-42913",
"full_name": "kernel-cyber\/CVE-2021-42913",
"owner": {
"login": "windsormoreira",
"login": "kernel-cyber",
"id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/windsormoreira"
"html_url": "https:\/\/github.com\/kernel-cyber"
},
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2021-42913",
"html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2021-42913",
"description": "Samsung Printer SCX-6X55X Improper Access Control",
"fork": false,
"created_at": "2021-12-21T04:26:11Z",

View file

@ -2840,34 +2840,6 @@
"watchers": 7,
"score": 0
},
{
"id": 438595299,
"name": "log4j-CVE-2021-44228",
"full_name": "kubearmor\/log4j-CVE-2021-44228",
"owner": {
"login": "kubearmor",
"id": 86793284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86793284?v=4",
"html_url": "https:\/\/github.com\/kubearmor"
},
"html_url": "https:\/\/github.com\/kubearmor\/log4j-CVE-2021-44228",
"description": "Apache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T10:55:35Z",
"updated_at": "2022-08-08T14:05:52Z",
"pushed_at": "2021-12-15T16:29:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 438605924,
"name": "log4j-resources",

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-08-27T01:29:39Z",
"updated_at": "2022-09-15T15:18:15Z",
"pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-09-10T18:13:33Z",
"updated_at": "2022-09-15T17:33:53Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 315,
"watchers": 316,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2022-09-09T07:56:59Z",
"updated_at": "2022-09-15T12:33:24Z",
"pushed_at": "2022-09-11T10:21:10Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 116,
"watchers": 117,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22629 Proof of Concept",
"fork": false,
"created_at": "2022-09-09T17:21:27Z",
"updated_at": "2022-09-14T13:00:19Z",
"updated_at": "2022-09-15T16:38:26Z",
"pushed_at": "2022-09-09T21:23:08Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -97,10 +97,10 @@
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
"fork": false,
"created_at": "2022-03-03T13:13:02Z",
"updated_at": "2022-08-12T16:03:21Z",
"updated_at": "2022-09-15T12:30:09Z",
"pushed_at": "2022-03-03T14:31:32Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 51,
"watchers": 52,
"score": 0
},
{

View file

@ -269,16 +269,16 @@
"fork": false,
"created_at": "2022-04-12T18:08:58Z",
"updated_at": "2022-07-24T22:06:28Z",
"pushed_at": "2022-05-23T16:15:14Z",
"pushed_at": "2022-09-15T15:50:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -154,7 +154,7 @@
"fork": false,
"created_at": "2022-08-28T02:48:05Z",
"updated_at": "2022-08-28T02:48:05Z",
"pushed_at": "2022-08-28T02:57:23Z",
"pushed_at": "2022-09-15T13:06:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-13T17:12:59Z",
"updated_at": "2022-05-17T10:39:38Z",
"pushed_at": "2022-04-22T16:47:20Z",
"pushed_at": "2022-09-15T16:16:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-08-26T09:46:45Z",
"updated_at": "2022-09-15T17:52:12Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 140,
"watchers": 141,
"score": 0
},
{

View file

@ -719,10 +719,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2022-09-08T07:41:27Z",
"updated_at": "2022-09-15T14:22:09Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
@ -730,7 +730,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 217,
"watchers": 218,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PCIDriverKit proof-of-concept for CVE-2022-26763",
"fork": false,
"created_at": "2022-07-02T06:15:29Z",
"updated_at": "2022-09-12T10:49:54Z",
"updated_at": "2022-09-15T17:20:03Z",
"pushed_at": "2022-07-02T06:15:40Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 666,
"watchers_count": 666,
"forks_count": 107,
"forks_count": 106,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 107,
"forks": 106,
"watchers": 666,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang",
"fork": false,
"created_at": "2022-04-19T19:38:25Z",
"updated_at": "2022-09-02T09:24:47Z",
"updated_at": "2022-09-15T14:48:22Z",
"pushed_at": "2022-08-09T22:48:37Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2022-09-06T15:29:24Z",
"updated_at": "2022-09-15T17:51:07Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 53,
"watchers": 135,
"watchers": 136,
"score": 0
},
{
@ -682,10 +682,10 @@
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-02T06:45:19Z",
"updated_at": "2022-09-14T05:24:06Z",
"updated_at": "2022-09-15T16:04:31Z",
"pushed_at": "2022-09-13T10:05:02Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -700,7 +700,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -773,10 +773,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-09-14T03:36:50Z",
"updated_at": "2022-09-15T14:21:09Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -784,7 +784,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 331,
"watchers": 332,
"score": 0
},
{
@ -1935,5 +1935,33 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 537107690,
"name": "CVE-2022-30190",
"full_name": "winstxnhdw\/CVE-2022-30190",
"owner": {
"login": "winstxnhdw",
"id": 56998716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56998716?v=4",
"html_url": "https:\/\/github.com\/winstxnhdw"
},
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
"description": "Proof of concept for CVE-2022-30190 (Follina).",
"fork": false,
"created_at": "2022-09-15T16:12:57Z",
"updated_at": "2022-09-15T16:14:19Z",
"pushed_at": "2022-09-15T16:43:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "PoC for CVE-202230507",
"fork": false,
"created_at": "2022-07-16T15:55:28Z",
"updated_at": "2022-07-25T15:14:41Z",
"updated_at": "2022-09-15T18:00:28Z",
"pushed_at": "2022-07-23T22:36:39Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-24T06:00:47Z",
"updated_at": "2022-09-12T19:12:24Z",
"updated_at": "2022-09-15T12:39:33Z",
"pushed_at": "2022-08-25T03:02:26Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 104,
"watchers": 105,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "cve-2022-33891-poc",
"fork": false,
"created_at": "2022-07-18T16:16:51Z",
"updated_at": "2022-09-05T13:42:52Z",
"updated_at": "2022-09-15T14:53:58Z",
"pushed_at": "2022-07-20T08:00:18Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

30
2022/CVE-2022-3506.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 535111523,
"name": "Sekhmet-HackTheBox-Writeup",
"full_name": "hackthebox-writeups\/Sekhmet-HackTheBox-Writeup",
"owner": {
"login": "hackthebox-writeups",
"id": 113263298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113263298?v=4",
"html_url": "https:\/\/github.com\/hackthebox-writeups"
},
"html_url": "https:\/\/github.com\/hackthebox-writeups\/Sekhmet-HackTheBox-Writeup",
"description": "Write-up for Sekhmet HackTheBox, CVE-2022-3506, Active Directory Exploitation",
"fork": false,
"created_at": "2022-09-10T20:27:55Z",
"updated_at": "2022-09-15T17:26:13Z",
"pushed_at": "2022-09-15T17:40:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC",
"fork": false,
"created_at": "2022-07-18T20:52:01Z",
"updated_at": "2022-09-15T01:41:43Z",
"updated_at": "2022-09-15T14:58:36Z",
"pushed_at": "2022-09-06T18:26:36Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2022-09-15T12:14:30Z",
"updated_at": "2022-09-15T17:59:49Z",
"pushed_at": "2022-09-14T07:45:40Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 7,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 74,
"forks": 8,
"watchers": 90,
"score": 0
}
]

30
2022/CVE-2022-39841.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 532900425,
"name": "CVE-2022-39841",
"full_name": "stealthcopter\/CVE-2022-39841",
"owner": {
"login": "stealthcopter",
"id": 1211162,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1211162?v=4",
"html_url": "https:\/\/github.com\/stealthcopter"
},
"html_url": "https:\/\/github.com\/stealthcopter\/CVE-2022-39841",
"description": null,
"fork": false,
"created_at": "2022-09-05T12:54:26Z",
"updated_at": "2022-09-15T14:51:04Z",
"pushed_at": "2022-09-15T14:50:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -561,6 +561,9 @@ An integer coercion error was found in the openvswitch kernel module. Given a su
### CVE-2022-3452
- [kenyon-wong/cve-2022-3452](https://github.com/kenyon-wong/cve-2022-3452)
### CVE-2022-3506
- [hackthebox-writeups/Sekhmet-HackTheBox-Writeup](https://github.com/hackthebox-writeups/Sekhmet-HackTheBox-Writeup)
### CVE-2022-5555
- [huihuo123/CVE-2022-5555](https://github.com/huihuo123/CVE-2022-5555)
@ -2814,6 +2817,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
- [Gra3s/CVE-2022-30190-Follina-PowerPoint-Version](https://github.com/Gra3s/CVE-2022-30190-Follina-PowerPoint-Version)
- [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-)
- [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s)
- [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190)
### CVE-2022-30206 (2022-07-12)
@ -3505,7 +3509,12 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
- [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177)
### CVE-2022-37201
### CVE-2022-37201 (2022-09-15)
<code>
JFinal CMS 5.1.0 is vulnerable to SQL Injection.
</code>
- [AgainstTheLight/CVE-2022-37201](https://github.com/AgainstTheLight/CVE-2022-37201)
### CVE-2022-37202
@ -3523,7 +3532,12 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
### CVE-2022-37206
- [AgainstTheLight/CVE-2022-37206](https://github.com/AgainstTheLight/CVE-2022-37206)
### CVE-2022-37207
### CVE-2022-37207 (2022-09-15)
<code>
JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection
</code>
- [AgainstTheLight/CVE-2022-37207](https://github.com/AgainstTheLight/CVE-2022-37207)
### CVE-2022-37208
@ -3551,7 +3565,7 @@ In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUI
### CVE-2022-38766
- [AUTOCRYPT-IVS-VnV/CVE-2022-38766](https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766)
### CVE-2022-38789 (-)
### CVE-2022-38789 (2022-09-15)
<code>
An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
@ -3567,6 +3581,9 @@ Blackboard Learn 1.10.1 allows remote authenticated users to read unintended fil
- [DayiliWaseem/CVE-2022-39196-](https://github.com/DayiliWaseem/CVE-2022-39196-)
### CVE-2022-39841
- [stealthcopter/CVE-2022-39841](https://github.com/stealthcopter/CVE-2022-39841)
### CVE-2022-40297 (2022-09-08)
<code>
@ -4251,14 +4268,6 @@ Vulnerability in the Database Vault component of Oracle Database Server. Support
- [emad-almousa/CVE-2021-2175](https://github.com/emad-almousa/CVE-2021-2175)
### CVE-2021-2394 (2021-07-20)
<code>
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
</code>
- [fasanhlieu/CVE-2021-2394](https://github.com/fasanhlieu/CVE-2021-2394)
### CVE-2021-2456 (2021-07-20)
<code>
@ -5292,14 +5301,6 @@ The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when s
- [dn9uy3n/Check-CVE-2021-23383](https://github.com/dn9uy3n/Check-CVE-2021-23383)
### CVE-2021-23758 (2021-12-03)
<code>
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
</code>
- [numanturle/CVE-2021-23758-POC](https://github.com/numanturle/CVE-2021-23758-POC)
### CVE-2021-23841 (2021-02-16)
<code>
@ -7083,6 +7084,9 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [mightysai1997/CVE-2021-41773-i-](https://github.com/mightysai1997/CVE-2021-41773-i-)
- [mightysai1997/CVE-2021-41773-L-](https://github.com/mightysai1997/CVE-2021-41773-L-)
- [mightysai1997/CVE-2021-41773-PoC](https://github.com/mightysai1997/CVE-2021-41773-PoC)
- [mightysai1997/CVE-2021-41773.git1](https://github.com/mightysai1997/CVE-2021-41773.git1)
- [mightysai1997/CVE-2021-41773m](https://github.com/mightysai1997/CVE-2021-41773m)
- [mightysai1997/CVE-2021-41773S](https://github.com/mightysai1997/CVE-2021-41773S)
### CVE-2021-41946 (2022-05-18)
@ -7336,7 +7340,7 @@ An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An a
The SyncThru Web Service on Samsung SCX-6x55X printers allows an attacker to gain access to a list of SMB users and cleartext passwords by reading the HTML source code. Authentication is not required.
</code>
- [windsormoreira/CVE-2021-42913](https://github.com/windsormoreira/CVE-2021-42913)
- [kernel-cyber/CVE-2021-42913](https://github.com/kernel-cyber/CVE-2021-42913)
### CVE-2021-42948
- [dhammon/HotelDruid-CVE-2021-42948](https://github.com/dhammon/HotelDruid-CVE-2021-42948)
@ -7687,7 +7691,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [bhprin/log4j-vul](https://github.com/bhprin/log4j-vul)
- [anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228](https://github.com/anuvindhs/how-to-check-patch-secure-log4j-CVE-2021-44228)
- [KeysAU/Get-log4j-Windows.ps1](https://github.com/KeysAU/Get-log4j-Windows.ps1)
- [kubearmor/log4j-CVE-2021-44228](https://github.com/kubearmor/log4j-CVE-2021-44228)
- [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
- [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt)
- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
@ -27971,6 +27974,7 @@ Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.
</code>
- [hupe1980/CVE-2009-4623](https://github.com/hupe1980/CVE-2009-4623)
- [kernel-cyber/CVE-2009-4623](https://github.com/kernel-cyber/CVE-2009-4623)
### CVE-2009-4660 (2010-03-03)
@ -28257,7 +28261,7 @@ Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function be
- [IvanGlinkin/CVE-2006-3392](https://github.com/IvanGlinkin/CVE-2006-3392)
- [Adel-kaka-dz/CVE-2006-3392](https://github.com/Adel-kaka-dz/CVE-2006-3392)
- [gb21oc/ExploitWebmin](https://github.com/gb21oc/ExploitWebmin)
- [windsormoreira/CVE-2006-3392](https://github.com/windsormoreira/CVE-2006-3392)
- [kernel-cyber/CVE-2006-3392](https://github.com/kernel-cyber/CVE-2006-3392)
### CVE-2006-3592 (2006-07-14)