Auto Update 2022/09/29 00:16:57

This commit is contained in:
motikan2010-bot 2022-09-29 09:16:57 +09:00
parent 322f5ba52f
commit 17814a5af6
15 changed files with 53 additions and 53 deletions

View file

@ -105,7 +105,7 @@
"pushed_at": "2020-07-21T09:46:40Z",
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -119,7 +119,7 @@
"sslv3"
],
"visibility": "public",
"forks": 66,
"forks": 67,
"watchers": 211,
"score": 0
}

View file

@ -125,10 +125,10 @@
"description": "Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)",
"fork": false,
"created_at": "2022-09-09T23:09:40Z",
"updated_at": "2022-09-23T20:06:36Z",
"updated_at": "2022-09-28T22:45:32Z",
"pushed_at": "2022-09-21T12:57:16Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -143,7 +143,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 13,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2018-05-10T15:08:43Z",
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 71,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 71,
"forks": 72,
"watchers": 213,
"score": 0
},

View file

@ -212,13 +212,13 @@
"pushed_at": "2018-08-25T14:20:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -1267,13 +1267,13 @@
"pushed_at": "2019-05-22T02:13:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 408,
"forks_count": 409,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 408,
"forks": 409,
"watchers": 2,
"score": 0
},
@ -1854,13 +1854,13 @@
"pushed_at": "2021-01-10T04:31:22Z",
"stargazers_count": 347,
"watchers_count": 347,
"forks_count": 128,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 128,
"forks": 129,
"watchers": 347,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "This repo contains dumped flash partitions with firmware version vulnerable to CVE-2019-17147, and some useful binaries to downgrade and debug your WR841N router.",
"fork": false,
"created_at": "2022-01-16T07:08:57Z",
"updated_at": "2022-01-16T11:25:03Z",
"updated_at": "2022-09-28T19:18:45Z",
"pushed_at": "2022-01-16T14:03:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-03-12T18:22:19Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 17,
"score": 0
}

View file

@ -45,13 +45,13 @@
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 248,
"watchers_count": 248,
"forks_count": 76,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 76,
"forks": 77,
"watchers": 248,
"score": 0
},

View file

@ -101,13 +101,13 @@
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 838,
"watchers_count": 838,
"forks_count": 173,
"forks_count": 174,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 173,
"forks": 174,
"watchers": 838,
"score": 0
},

View file

@ -377,10 +377,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2022-09-18T21:36:15Z",
"updated_at": "2022-09-28T21:23:15Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
@ -394,7 +394,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 270,
"watchers": 269,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-09-25T09:45:00Z",
"updated_at": "2022-09-28T19:17:14Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 973,
"watchers_count": 973,
"stargazers_count": 974,
"watchers_count": 974,
"forks_count": 208,
"allow_forking": true,
"is_template": false,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 208,
"watchers": 973,
"watchers": 974,
"score": 0
},
{
@ -545,10 +545,10 @@
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
"fork": false,
"created_at": "2022-03-08T17:13:24Z",
"updated_at": "2022-09-16T07:04:09Z",
"updated_at": "2022-09-28T21:19:44Z",
"pushed_at": "2022-03-18T09:32:30Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -556,7 +556,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 40,
"watchers": 41,
"score": 0
},
{
@ -1107,10 +1107,10 @@
"description": "my personal exploit of CVE-2022-0847(dirty pipe)",
"fork": false,
"created_at": "2022-03-12T11:31:46Z",
"updated_at": "2022-08-25T11:26:11Z",
"updated_at": "2022-09-28T20:51:07Z",
"pushed_at": "2022-03-14T17:51:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -1118,7 +1118,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-09-25T12:27:01Z",
"updated_at": "2022-09-28T20:48:03Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 318,
"watchers_count": 318,
"stargazers_count": 319,
"watchers_count": 319,
"forks_count": 91,
"allow_forking": true,
"is_template": false,
@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 91,
"watchers": 318,
"watchers": 319,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-07-14T14:55:24Z",
"stargazers_count": 297,
"watchers_count": 297,
"forks_count": 98,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"tomcat"
],
"visibility": "public",
"forks": 98,
"forks": 97,
"watchers": 297,
"score": 0
},

View file

@ -125,8 +125,8 @@
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
"fork": false,
"created_at": "2022-09-18T21:35:19Z",
"updated_at": "2022-09-27T06:02:47Z",
"pushed_at": "2022-09-18T21:38:47Z",
"updated_at": "2022-09-28T22:33:19Z",
"pushed_at": "2022-09-28T22:33:17Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,

View file

@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2022-09-28T09:40:43Z",
"updated_at": "2022-09-28T20:23:45Z",
"pushed_at": "2022-09-02T21:05:44Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -3794,7 +3794,7 @@ An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Stri
### CVE-2022-40297 (2022-09-08)
<code>
UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password.
** DISPUTED ** UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password. NOTE: a third party states &quot;The described attack cannot be executed as demonstrated.&quot;
</code>
- [filipkarc/PoC-ubuntutouch-pin-privesc](https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc)