Auto Update 2022/08/23 00:17:24

This commit is contained in:
motikan2010-bot 2022-08-23 09:17:24 +09:00
parent 31bd8c2882
commit 1b7531a925
15 changed files with 75 additions and 46 deletions

View file

@ -13,10 +13,10 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2022-06-16T23:28:13Z",
"updated_at": "2022-08-22T21:50:33Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 549,
"watchers_count": 549,
"stargazers_count": 551,
"watchers_count": 551,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 549,
"watchers": 551,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WordPress JSmol2WP Plugin 1.07版本中存在安全漏洞。攻击者可利用该漏洞读取任意文件。",
"fork": false,
"created_at": "2022-08-22T00:37:14Z",
"updated_at": "2022-08-22T00:37:14Z",
"updated_at": "2022-08-22T23:39:10Z",
"pushed_at": "2022-08-22T00:59:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2022-06-16T23:28:13Z",
"updated_at": "2022-08-22T21:50:33Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 549,
"watchers_count": 549,
"stargazers_count": 551,
"watchers_count": 551,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 549,
"watchers": 551,
"score": 0
}
]

View file

@ -45,13 +45,13 @@
"pushed_at": "2022-05-03T09:22:01Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 38,
"score": 0
},

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2022-08-18T13:30:23Z",
"updated_at": "2022-08-22T18:25:54Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 125,
"watchers": 126,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2022-08-21T07:26:17Z",
"updated_at": "2022-08-22T19:21:35Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 46,
"watchers": 45,
"score": 0
},
{

View file

@ -882,7 +882,7 @@
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 593,
"watchers_count": 593,
"forks_count": 123,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -890,7 +890,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 123,
"forks": 124,
"watchers": 593,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-11T06:00:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 10,
"score": 0
}

View file

@ -2881,13 +2881,13 @@
"pushed_at": "2021-12-23T21:03:08Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 88,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-08-22T06:36:23Z",
"updated_at": "2022-08-23T00:04:51Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 629,
"watchers": 630,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-08-22T17:31:08Z",
"updated_at": "2022-08-22T19:43:27Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,35 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 37,
"watchers": 39,
"score": 0
},
{
"id": 527759701,
"name": "2022-LPE-UAF",
"full_name": "greek0x0\/2022-LPE-UAF",
"owner": {
"login": "greek0x0",
"id": 104328056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104328056?v=4",
"html_url": "https:\/\/github.com\/greek0x0"
},
"html_url": "https:\/\/github.com\/greek0x0\/2022-LPE-UAF",
"description": "CVE-2022-2588",
"fork": false,
"created_at": "2022-08-22T23:08:40Z",
"updated_at": "2022-08-22T23:10:02Z",
"pushed_at": "2022-08-22T23:16:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -49,10 +49,10 @@
"description": "CVE-2022-30190 Follina POC",
"fork": false,
"created_at": "2022-05-31T06:45:25Z",
"updated_at": "2022-08-18T06:59:30Z",
"updated_at": "2022-08-22T20:04:46Z",
"pushed_at": "2022-05-31T09:35:37Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-08-07T18:14:54Z",
"updated_at": "2022-08-10T05:29:04Z",
"pushed_at": "2022-08-08T08:04:03Z",
"pushed_at": "2022-08-22T20:14:47Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-18T18:39:39Z",
"updated_at": "2022-08-22T12:01:24Z",
"updated_at": "2022-08-22T23:50:22Z",
"pushed_at": "2022-08-18T18:41:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -522,6 +522,7 @@ Access to external entities when parsing XML documents can lead to XML external
### CVE-2022-2588
- [Markakd/CVE-2022-2588](https://github.com/Markakd/CVE-2022-2588)
- [greek0x0/2022-LPE-UAF](https://github.com/greek0x0/2022-LPE-UAF)
### CVE-2022-3452
- [kenyon-wong/cve-2022-3452](https://github.com/kenyon-wong/cve-2022-3452)
@ -2318,7 +2319,7 @@ A Remote Code Execution (RCE) vulnerability exists in Pixelimity 1.0 via admin/a
- [jcarabantes/CVE-2022-28590](https://github.com/jcarabantes/CVE-2022-28590)
- [trhacknon/CVE-2022-28590](https://github.com/trhacknon/CVE-2022-28590)
### CVE-2022-28598 (-)
### CVE-2022-28598 (2022-08-22)
<code>
Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users.