[ { "name": "CVE-2022-0847-DirtyPipe-Exploit", "full_name": "Arinerron/CVE-2022-0847-DirtyPipe-Exploit", "html_url": "https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit", "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "stargazers_count": 1095, "forks_count": 221, "created_at": "2022-03-07T18:55:20Z" }, { "name": "CVE-2022-29072", "full_name": "kagancapar/CVE-2022-29072", "html_url": "https://github.com/kagancapar/CVE-2022-29072", "description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.", "stargazers_count": 687, "forks_count": 105, "created_at": "2022-04-15T22:59:03Z" }, { "name": "CVE-2022-0847-DirtyPipe-Exploits", "full_name": "AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits", "html_url": "https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits", "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "stargazers_count": 586, "forks_count": 145, "created_at": "2022-03-12T20:57:24Z" }, { "name": "CVE-2022-23222", "full_name": "tr3ee/CVE-2022-23222", "html_url": "https://github.com/tr3ee/CVE-2022-23222", "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "stargazers_count": 564, "forks_count": 99, "created_at": "2022-06-07T03:20:23Z" }, { "name": "CVE-2022-0995", "full_name": "Bonfee/CVE-2022-0995", "html_url": "https://github.com/Bonfee/CVE-2022-0995", "description": "CVE-2022-0995 exploit", "stargazers_count": 496, "forks_count": 67, "created_at": "2022-03-26T21:46:09Z" }, { "name": "CVE-2022-2588", "full_name": "Markakd/CVE-2022-2588", "html_url": "https://github.com/Markakd/CVE-2022-2588", "description": "exploit for CVE-2022-2588", "stargazers_count": 483, "forks_count": 69, "created_at": "2022-08-11T06:01:24Z" }, { "name": "CVE-2022-21882", "full_name": "KaLendsi/CVE-2022-21882", "html_url": "https://github.com/KaLendsi/CVE-2022-21882", "description": "win32k LPE ", "stargazers_count": 461, "forks_count": 135, "created_at": "2022-01-27T03:44:10Z" }, { "name": "CVE-2022-27254", "full_name": "nonamecoder/CVE-2022-27254", "html_url": "https://github.com/nonamecoder/CVE-2022-27254", "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "stargazers_count": 453, "forks_count": 56, "created_at": "2022-03-23T15:03:09Z" }, { "name": "CVE-2022-25636", "full_name": "Bonfee/CVE-2022-25636", "html_url": "https://github.com/Bonfee/CVE-2022-25636", "description": "CVE-2022-25636", "stargazers_count": 427, "forks_count": 81, "created_at": "2022-03-07T13:38:41Z" }, { "name": "CVE-2022-33679", "full_name": "Bdenneu/CVE-2022-33679", "html_url": "https://github.com/Bdenneu/CVE-2022-33679", "description": "One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html", "stargazers_count": 403, "forks_count": 69, "created_at": "2022-11-02T18:38:01Z" }, { "name": "FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp", "full_name": "fuckjsonp/FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp", "html_url": "https://github.com/fuckjsonp/FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp", "description": "警惕 一种针对红队的新型溯源手段!", "stargazers_count": 400, "forks_count": 83, "created_at": "2022-07-27T15:48:19Z" }, { "name": "CVE-2022-30190-follina-Office-MSDT-Fixed", "full_name": "komomon/CVE-2022-30190-follina-Office-MSDT-Fixed", "html_url": "https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed", "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "stargazers_count": 396, "forks_count": 54, "created_at": "2022-06-02T12:33:18Z" }, { "name": "CVE-2022-39197", "full_name": "its-arun/CVE-2022-39197", "html_url": "https://github.com/its-arun/CVE-2022-39197", "description": "CobaltStrike <= 4.7.1 RCE", "stargazers_count": 379, "forks_count": 75, "created_at": "2022-10-14T11:46:01Z" }, { "name": "CVE-2022-29464", "full_name": "hakivvi/CVE-2022-29464", "html_url": "https://github.com/hakivvi/CVE-2022-29464", "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "stargazers_count": 369, "forks_count": 90, "created_at": "2022-04-20T21:23:52Z" }, { "name": "CVE-2022-0185", "full_name": "Crusaders-of-Rust/CVE-2022-0185", "html_url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185", "description": "CVE-2022-0185", "stargazers_count": 368, "forks_count": 56, "created_at": "2022-01-19T06:19:38Z" }, { "name": "CVE-2022-21907", "full_name": "ZZ-SOCMAP/CVE-2022-21907", "html_url": "https://github.com/ZZ-SOCMAP/CVE-2022-21907", "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "stargazers_count": 361, "forks_count": 98, "created_at": "2022-01-17T02:28:50Z" }, { "name": "CVE-2022-38694_unlock_bootloader", "full_name": "TomKing062/CVE-2022-38694_unlock_bootloader", "html_url": "https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader", "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https://github.com/TomKing062/CVE-2022-38691_38692", "stargazers_count": 351, "forks_count": 50, "created_at": "2023-06-10T08:31:26Z" }, { "name": "CVE-2022-40684", "full_name": "horizon3ai/CVE-2022-40684", "html_url": "https://github.com/horizon3ai/CVE-2022-40684", "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "stargazers_count": 349, "forks_count": 91, "created_at": "2022-10-13T14:24:12Z" }, { "name": "CVE-2022-26134-Godzilla-MEMSHELL", "full_name": "BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL", "html_url": "https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL", "description": null, "stargazers_count": 336, "forks_count": 54, "created_at": "2022-06-07T09:19:02Z" }, { "name": "CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera", "full_name": "Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera", "html_url": "https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera", "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337", "stargazers_count": 334, "forks_count": 34, "created_at": "2022-03-19T08:10:46Z" }, { "name": "CVE-2022-21894", "full_name": "Wack0/CVE-2022-21894", "html_url": "https://github.com/Wack0/CVE-2022-21894", "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "stargazers_count": 318, "forks_count": 63, "created_at": "2022-08-09T15:53:48Z" }, { "name": "CVE-2022-39197-patch", "full_name": "burpheart/CVE-2022-39197-patch", "html_url": "https://github.com/burpheart/CVE-2022-39197-patch", "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "stargazers_count": 315, "forks_count": 46, "created_at": "2022-09-26T08:58:21Z" }, { "name": "CVE-2022-37706-LPE-exploit", "full_name": "MaherAzzouzi/CVE-2022-37706-LPE-exploit", "html_url": "https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit", "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "stargazers_count": 311, "forks_count": 42, "created_at": "2022-09-12T19:22:44Z" }, { "name": "CVE-2022-21971", "full_name": "0vercl0k/CVE-2022-21971", "html_url": "https://github.com/0vercl0k/CVE-2022-21971", "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"", "stargazers_count": 307, "forks_count": 64, "created_at": "2022-02-26T20:37:42Z" }, { "name": "VMware-CVE-2022-22954", "full_name": "sherlocksecurity/VMware-CVE-2022-22954", "html_url": "https://github.com/sherlocksecurity/VMware-CVE-2022-22954", "description": "POC for VMWARE CVE-2022-22954", "stargazers_count": 281, "forks_count": 53, "created_at": "2022-04-11T13:59:23Z" }, { "name": "CVE-2022-0847", "full_name": "r1is/CVE-2022-0847", "html_url": "https://github.com/r1is/CVE-2022-0847", "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "stargazers_count": 280, "forks_count": 77, "created_at": "2022-03-07T18:36:50Z" }, { "name": "cve-2022-27255", "full_name": "infobyte/cve-2022-27255", "html_url": "https://github.com/infobyte/cve-2022-27255", "description": null, "stargazers_count": 275, "forks_count": 51, "created_at": "2022-07-06T17:29:04Z" }, { "name": "CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", "full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", "html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", "stargazers_count": 271, "forks_count": 40, "created_at": "2023-02-02T15:34:28Z" }, { "name": "CVE-2022-39952", "full_name": "horizon3ai/CVE-2022-39952", "html_url": "https://github.com/horizon3ai/CVE-2022-39952", "description": "POC for CVE-2022-39952", "stargazers_count": 267, "forks_count": 53, "created_at": "2023-02-20T15:12:33Z" }, { "name": "CVE-2022-34918-LPE-PoC", "full_name": "randorisec/CVE-2022-34918-LPE-PoC", "html_url": "https://github.com/randorisec/CVE-2022-34918-LPE-PoC", "description": null, "stargazers_count": 243, "forks_count": 34, "created_at": "2022-07-19T12:46:45Z" } ]