Auto Update 2025/01/01 12:32:05

This commit is contained in:
motikan2010-bot 2025-01-01 21:32:05 +09:00
parent 3ae271591c
commit 2266fb2416
16 changed files with 80 additions and 40 deletions

View file

@ -14,10 +14,10 @@
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
"fork": false,
"created_at": "2023-02-24T10:58:53Z",
"updated_at": "2024-10-14T17:22:30Z",
"updated_at": "2025-01-01T06:54:51Z",
"pushed_at": "2023-02-27T16:32:59Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -54,13 +54,13 @@
"stargazers_count": 1974,
"watchers_count": 1974,
"has_discussions": false,
"forks_count": 512,
"forks_count": 511,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 512,
"forks": 511,
"watchers": 1974,
"score": 0,
"subscribers_count": 20
@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-12-29T01:58:07Z",
"updated_at": "2025-01-01T06:21:56Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1101,
"watchers_count": 1101,
"stargazers_count": 1102,
"watchers_count": 1102,
"has_discussions": false,
"forks_count": 191,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 191,
"watchers": 1101,
"watchers": 1102,
"score": 0,
"subscribers_count": 14
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 10,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 8,
"watchers": 20,
"score": 0,
"subscribers_count": 3

33
2023/CVE-2023-21537.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 910730197,
"name": "CVE-2023-21537",
"full_name": "stevenjoezhang\/CVE-2023-21537",
"owner": {
"login": "stevenjoezhang",
"id": 16272760,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16272760?v=4",
"html_url": "https:\/\/github.com\/stevenjoezhang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/stevenjoezhang\/CVE-2023-21537",
"description": null,
"fork": false,
"created_at": "2025-01-01T08:17:26Z",
"updated_at": "2025-01-01T08:17:32Z",
"pushed_at": "2025-01-01T08:17:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 36,
"score": 0,
"subscribers_count": 1

View file

@ -45,8 +45,8 @@
"description": "对NETIS WF2409E路由器进行的一次完整硬件安全分析研究。通过对设备进行拆解分析、调试接口识别、固件提取等工作记录了硬件分析的全过程、漏洞细节以及相应的安全建议希望能帮助提高物联网设备的安全性。",
"fork": false,
"created_at": "2024-12-27T18:09:13Z",
"updated_at": "2024-12-28T13:40:36Z",
"pushed_at": "2024-12-28T13:40:33Z",
"updated_at": "2025-01-01T11:17:43Z",
"pushed_at": "2025-01-01T11:17:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -76,8 +76,8 @@
"description": "CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.",
"fork": false,
"created_at": "2024-12-12T18:50:58Z",
"updated_at": "2024-12-18T22:12:57Z",
"pushed_at": "2024-12-18T22:12:53Z",
"updated_at": "2025-01-01T11:29:06Z",
"pushed_at": "2025-01-01T11:29:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -386,10 +386,10 @@
"description": "This is a mailer that use console prompt to exploit this vulnerability",
"fork": false,
"created_at": "2024-06-30T08:53:46Z",
"updated_at": "2024-06-30T08:53:50Z",
"updated_at": "2025-01-01T07:17:19Z",
"pushed_at": "2024-06-30T11:10:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
@ -398,7 +398,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -169,12 +169,12 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
"updated_at": "2025-01-01T05:17:05Z",
"updated_at": "2025-01-01T10:07:35Z",
"pushed_at": "2024-07-01T09:29:02Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -200,8 +200,8 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 23,
"watchers": 96,
"forks": 24,
"watchers": 97,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-12-27T13:53:08Z",
"updated_at": "2025-01-01T09:54:09Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 252,
"watchers": 253,
"score": 0,
"subscribers_count": 7
},

View file

@ -279,7 +279,7 @@
"forks": 115,
"watchers": 641,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 848337529,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -169,10 +169,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-31T10:33:55Z",
"updated_at": "2025-01-01T11:45:33Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 2
},

View file

@ -96,6 +96,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -9748,6 +9748,13 @@
- [Trinadh465/platform_frameworks_base_CVE-2023-21288](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21288)
### CVE-2023-21537 (2023-01-10)
<code>Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
</code>
- [stevenjoezhang/CVE-2023-21537](https://github.com/stevenjoezhang/CVE-2023-21537)
### CVE-2023-21554 (2023-04-11)
<code>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability