Auto Update 2022/09/02 00:17:03

This commit is contained in:
motikan2010-bot 2022-09-02 09:17:03 +09:00
parent 54e2464444
commit 01e01bfdda
22 changed files with 147 additions and 121 deletions

View file

@ -75,13 +75,13 @@
"pushed_at": "2022-07-08T09:14:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 0,
"score": 0
},

File diff suppressed because one or more lines are too long

View file

@ -17,13 +17,13 @@
"pushed_at": "2015-05-11T22:39:06Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 43,
"score": 0
}

View file

@ -81,7 +81,7 @@
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -99,7 +99,7 @@
"snyk-js-jquery-567880"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 17,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -35,7 +35,7 @@
"snyk-js-jquery-567880"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 17,
"score": 0
}

View file

@ -17,13 +17,13 @@
"pushed_at": "2021-01-04T10:16:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0
}

View file

@ -134,13 +134,13 @@
"pushed_at": "2022-08-30T11:52:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0
}

View file

@ -133,7 +133,7 @@
"fork": false,
"created_at": "2022-01-18T20:40:55Z",
"updated_at": "2022-06-30T19:28:30Z",
"pushed_at": "2022-01-18T21:15:46Z",
"pushed_at": "2022-09-01T21:28:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-08-29T09:11:50Z",
"updated_at": "2022-09-01T21:20:55Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1634,
"watchers_count": 1634,
"stargazers_count": 1635,
"watchers_count": 1635,
"forks_count": 476,
"allow_forking": true,
"is_template": false,
@ -86,7 +86,7 @@
"topics": [],
"visibility": "public",
"forks": 476,
"watchers": 1634,
"watchers": 1635,
"score": 0
},
{
@ -4258,5 +4258,42 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 531708844,
"name": "CVE-2021-4034",
"full_name": "1337Rin\/CVE-2021-4034",
"owner": {
"login": "1337Rin",
"id": 108487881,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108487881?v=4",
"html_url": "https:\/\/github.com\/1337Rin"
},
"html_url": "https:\/\/github.com\/1337Rin\/CVE-2021-4034",
"description": "pwnkit auto exploiter written in Go, no network connectivity required.",
"fork": false,
"created_at": "2022-09-01T22:48:09Z",
"updated_at": "2022-09-01T22:54:46Z",
"pushed_at": "2022-09-01T23:47:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automation",
"cve",
"cve-2021-4034",
"go",
"golang",
"linux",
"privilege-escalation",
"pwnkit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -47,7 +47,7 @@
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-09-01T11:04:52Z",
"pushed_at": "2022-04-25T07:53:41Z",
"pushed_at": "2022-09-01T21:30:25Z",
"stargazers_count": 403,
"watchers_count": 403,
"forks_count": 77,

View file

@ -2360,34 +2360,6 @@
"watchers": 0,
"score": 0
},
{
"id": 438118026,
"name": "log4j-urlscanner",
"full_name": "Woahd\/log4j-urlscanner",
"owner": {
"login": "Woahd",
"id": 91861246,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4",
"html_url": "https:\/\/github.com\/Woahd"
},
"html_url": "https:\/\/github.com\/Woahd\/log4j-urlscanner",
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading",
"fork": false,
"created_at": "2021-12-14T04:35:20Z",
"updated_at": "2021-12-15T04:54:26Z",
"pushed_at": "2021-12-15T04:54:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 438128189,
"name": "Log4j2-CVE-2021-44228-revshell",

View file

@ -70,7 +70,7 @@
"fork": false,
"created_at": "2022-09-01T16:44:56Z",
"updated_at": "2022-09-01T17:43:34Z",
"pushed_at": "2022-09-01T18:09:20Z",
"pushed_at": "2022-09-01T18:51:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2022-09-01T07:05:57Z",
"updated_at": "2022-09-01T18:33:40Z",
"pushed_at": "2022-08-26T00:48:33Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 111,
"watchers": 112,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-30T11:52:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0
}

View file

@ -181,10 +181,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T19:51:39Z",
"updated_at": "2022-08-31T13:37:21Z",
"updated_at": "2022-09-01T23:29:48Z",
"pushed_at": "2022-07-05T19:52:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "CVE-2022-23222, managed with Rust.",
"fork": false,
"created_at": "2022-07-09T19:28:46Z",
"updated_at": "2022-07-11T01:59:15Z",
"updated_at": "2022-09-01T21:21:15Z",
"pushed_at": "2022-08-30T20:56:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1,30 +1,30 @@
[
{
"id": 530742974,
"id": 530761622,
"name": "CVE-2022-24637",
"full_name": "JacobEbben\/CVE-2022-24637",
"full_name": "Lay0us1\/CVE-2022-24637",
"owner": {
"login": "JacobEbben",
"id": 112503338,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112503338?v=4",
"html_url": "https:\/\/github.com\/JacobEbben"
"login": "Lay0us1",
"id": 99304369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99304369?v=4",
"html_url": "https:\/\/github.com\/Lay0us1"
},
"html_url": "https:\/\/github.com\/JacobEbben\/CVE-2022-24637",
"description": "Unauthenticated RCE in Open Web Analytics (OWA) <1.7.4",
"html_url": "https:\/\/github.com\/Lay0us1\/CVE-2022-24637",
"description": "Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3",
"fork": false,
"created_at": "2022-08-30T16:38:01Z",
"updated_at": "2022-08-31T09:20:50Z",
"pushed_at": "2022-09-01T00:34:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"created_at": "2022-08-30T17:31:14Z",
"updated_at": "2022-08-30T17:31:08Z",
"pushed_at": "2022-08-30T17:09:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"forks": 1,
"watchers": 0,
"score": 0
}
]

38
2022/CVE-2022-25260.json Normal file
View file

@ -0,0 +1,38 @@
[
{
"id": 531686651,
"name": "CVE-2022-25260",
"full_name": "yuriisanin\/CVE-2022-25260",
"owner": {
"login": "yuriisanin",
"id": 11749007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11749007?v=4",
"html_url": "https:\/\/github.com\/yuriisanin"
},
"html_url": "https:\/\/github.com\/yuriisanin\/CVE-2022-25260",
"description": "PoC for CVE-2022-25260: semi-blind SSRF in JetBrains Hub",
"fork": false,
"created_at": "2022-09-01T21:08:19Z",
"updated_at": "2022-09-01T21:16:39Z",
"pushed_at": "2022-09-01T21:14:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-25260",
"exploit",
"jetbrains",
"jetbrains-hub",
"ssrf",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -150,10 +150,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2022-08-31T09:55:50Z",
"updated_at": "2022-09-01T22:22:36Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -165,7 +165,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-08-26T04:01:17Z",
"updated_at": "2022-09-01T19:49:56Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 303,
"watchers_count": 303,
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 303,
"watchers": 304,
"score": 0
},
{

View file

@ -27,34 +27,6 @@
"watchers": 100,
"score": 0
},
{
"id": 512156451,
"name": "CVE-2022-34265-modified",
"full_name": "raheel0x01\/CVE-2022-34265-modified",
"owner": {
"login": "raheel0x01",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
"html_url": "https:\/\/github.com\/raheel0x01"
},
"html_url": "https:\/\/github.com\/raheel0x01\/CVE-2022-34265-modified",
"description": null,
"fork": false,
"created_at": "2022-07-09T10:25:48Z",
"updated_at": "2022-09-01T18:03:42Z",
"pushed_at": "2022-09-01T18:01:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 513523694,
"name": "CVE-2022-34265",

View file

@ -1578,7 +1578,7 @@ Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Sili
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '&lt;?php (instead of the intended &quot;&lt;?php sequence) aren't handled by the PHP interpreter.
</code>
- [JacobEbben/CVE-2022-24637](https://github.com/JacobEbben/CVE-2022-24637)
- [Lay0us1/CVE-2022-24637](https://github.com/Lay0us1/CVE-2022-24637)
### CVE-2022-24644 (2022-03-07)
@ -1803,6 +1803,14 @@ An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel be
- [szymonh/d-os-descriptor](https://github.com/szymonh/d-os-descriptor)
### CVE-2022-25260 (2022-02-25)
<code>
JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).
</code>
- [yuriisanin/CVE-2022-25260](https://github.com/yuriisanin/CVE-2022-25260)
### CVE-2022-25262 (2022-02-25)
<code>
@ -3194,7 +3202,6 @@ An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Tr
</code>
- [aeyesec/CVE-2022-34265](https://github.com/aeyesec/CVE-2022-34265)
- [raheel0x01/CVE-2022-34265-modified](https://github.com/raheel0x01/CVE-2022-34265-modified)
- [traumatising/CVE-2022-34265](https://github.com/traumatising/CVE-2022-34265)
- [ZhaoQi99/CVE-2022-34265](https://github.com/ZhaoQi99/CVE-2022-34265)
@ -3348,7 +3355,7 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
### CVE-2022-37177 (2022-08-29)
<code>
HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm.
** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: the is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services and no product with version V1.0 exists.
</code>
- [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177)
@ -4541,6 +4548,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [Silencecyber/cve-2021-4034](https://github.com/Silencecyber/cve-2021-4034)
- [Geni0r/cve-2021-4034-poc](https://github.com/Geni0r/cve-2021-4034-poc)
- [Naughty-SEC/pkexec-shell-executor](https://github.com/Naughty-SEC/pkexec-shell-executor)
- [1337Rin/CVE-2021-4034](https://github.com/1337Rin/CVE-2021-4034)
### CVE-2021-4043 (2022-02-04)
@ -7384,7 +7392,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
- [alpacamybags118/log4j-cve-2021-44228-sample](https://github.com/alpacamybags118/log4j-cve-2021-44228-sample)
- [roticagas/CVE-2021-44228-Demo](https://github.com/roticagas/CVE-2021-44228-Demo)
- [Woahd/log4j-urlscanner](https://github.com/Woahd/log4j-urlscanner)
- [faisalfs10x/Log4j2-CVE-2021-44228-revshell](https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell)
- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn)
- [codiobert/log4j-scanner](https://github.com/codiobert/log4j-scanner)