Auto Update 2023/02/18 12:30:16

This commit is contained in:
motikan2010-bot 2023-02-18 21:30:16 +09:00
parent f74e5f9802
commit 1e07117f75
19 changed files with 104 additions and 74 deletions

View file

@ -785,10 +785,10 @@
"description": "编译好的脏牛漏洞CVE-2016-5195EXP",
"fork": false,
"created_at": "2018-05-27T08:06:50Z",
"updated_at": "2022-11-30T13:10:27Z",
"updated_at": "2023-02-18T09:25:01Z",
"pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -797,7 +797,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 121,
"watchers": 122,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"forks": 50,
"watchers": 141,
"score": 0
},

View file

@ -42,12 +42,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-02-17T07:02:27Z",
"updated_at": "2023-02-18T07:34:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3670,
"watchers_count": 3670,
"stargazers_count": 3671,
"watchers_count": 3671,
"has_discussions": false,
"forks_count": 1056,
"forks_count": 1057,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -73,8 +73,8 @@
"webshell"
],
"visibility": "public",
"forks": 1056,
"watchers": 3670,
"forks": 1057,
"watchers": 3671,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609",
"fork": false,
"created_at": "2019-10-18T03:25:22Z",
"updated_at": "2022-11-14T09:11:57Z",
"updated_at": "2023-02-18T09:45:48Z",
"pushed_at": "2019-10-22T06:44:20Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 88,
"watchers": 89,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2023-02-15T15:04:39Z",
"updated_at": "2023-02-18T12:11:43Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 658,
"watchers_count": 658,
"stargazers_count": 659,
"watchers_count": 659,
"has_discussions": false,
"forks_count": 171,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 171,
"watchers": 658,
"watchers": 659,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-02-17T07:02:27Z",
"updated_at": "2023-02-18T07:34:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3670,
"watchers_count": 3670,
"stargazers_count": 3671,
"watchers_count": 3671,
"has_discussions": false,
"forks_count": 1056,
"forks_count": 1057,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,8 +44,8 @@
"webshell"
],
"visibility": "public",
"forks": 1056,
"watchers": 3670,
"forks": 1057,
"watchers": 3671,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 396,
"watchers_count": 396,
"has_discussions": false,
"forks_count": 121,
"forks_count": 120,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 121,
"forks": 120,
"watchers": 396,
"score": 0
},

View file

@ -134,7 +134,7 @@
"stargazers_count": 218,
"watchers_count": 218,
"has_discussions": false,
"forks_count": 97,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -142,7 +142,7 @@
"cve-2021-22205"
],
"visibility": "public",
"forks": 97,
"forks": 98,
"watchers": 218,
"score": 0
},

View file

@ -196,10 +196,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2023-01-05T15:05:44Z",
"updated_at": "2023-02-18T12:14:58Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -208,7 +208,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-02-17T20:54:58Z",
"updated_at": "2023-02-18T08:40:59Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1742,
"watchers_count": 1742,
"stargazers_count": 1743,
"watchers_count": 1743,
"has_discussions": false,
"forks_count": 505,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 505,
"watchers": 1742,
"watchers": 1743,
"score": 0
},
{

View file

@ -216,10 +216,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-02-17T14:55:40Z",
"updated_at": "2023-02-18T11:10:59Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1458,
"watchers_count": 1458,
"stargazers_count": 1459,
"watchers_count": 1459,
"has_discussions": false,
"forks_count": 487,
"allow_forking": true,
@ -228,7 +228,7 @@
"topics": [],
"visibility": "public",
"forks": 487,
"watchers": 1458,
"watchers": 1459,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-11T10:32:08Z",
"updated_at": "2023-01-09T05:16:44Z",
"updated_at": "2023-02-18T11:24:59Z",
"pushed_at": "2023-02-01T11:09:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -129,10 +129,10 @@
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
"fork": false,
"created_at": "2022-12-22T09:35:26Z",
"updated_at": "2023-02-17T00:48:20Z",
"updated_at": "2023-02-18T08:17:38Z",
"pushed_at": "2023-01-10T08:09:36Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 49,
"watchers": 50,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF\/Contact\/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.",
"fork": false,
"created_at": "2023-02-15T18:12:04Z",
"updated_at": "2023-02-18T05:41:48Z",
"updated_at": "2023-02-18T11:30:31Z",
"pushed_at": "2023-02-15T18:18:21Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 6,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 36,
"forks": 8,
"watchers": 40,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-02-15T10:04:44Z",
"updated_at": "2023-02-18T12:13:12Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 315,
"watchers": 317,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-02-18T05:41:05Z",
"updated_at": "2023-02-18T12:13:42Z",
"pushed_at": "2023-02-09T10:16:13Z",
"stargazers_count": 724,
"watchers_count": 724,
"stargazers_count": 726,
"watchers_count": 726,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 724,
"watchers": 726,
"score": 0
},
{
@ -158,10 +158,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-04T05:08:20Z",
"updated_at": "2023-02-14T15:42:31Z",
"updated_at": "2023-02-18T07:38:21Z",
"pushed_at": "2023-01-19T08:12:40Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 33,
"watchers": 34,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
}

View file

@ -56,5 +56,34 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 603407349,
"name": "CVE-2023-23752",
"full_name": "Saboor-Hakimi\/CVE-2023-23752",
"owner": {
"login": "Saboor-Hakimi",
"id": 44523544,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44523544?v=4",
"html_url": "https:\/\/github.com\/Saboor-Hakimi"
},
"html_url": "https:\/\/github.com\/Saboor-Hakimi\/CVE-2023-23752",
"description": "CVE-2023-23752 nuclei template",
"fork": false,
"created_at": "2023-02-18T12:19:24Z",
"updated_at": "2023-02-18T12:19:24Z",
"pushed_at": "2023-02-18T12:27:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-07T15:33:41Z",
"updated_at": "2023-02-17T09:17:15Z",
"updated_at": "2023-02-18T08:18:12Z",
"pushed_at": "2023-02-09T09:06:15Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -118,6 +118,7 @@ An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check
- [DanielRuf/CVE-2023-23752](https://github.com/DanielRuf/CVE-2023-23752)
- [YusinoMy/CVE-2023-23752](https://github.com/YusinoMy/CVE-2023-23752)
- [Saboor-Hakimi/CVE-2023-23752](https://github.com/Saboor-Hakimi/CVE-2023-23752)
### CVE-2023-23924 (2023-01-31)