Auto Update 2022/09/06 00:19:48

This commit is contained in:
motikan2010-bot 2022-09-06 09:19:48 +09:00
parent 2c4dc42678
commit 25cce4daea
19 changed files with 122 additions and 93 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-05T06:56:38Z",
"updated_at": "2022-09-06T00:01:38Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"forks_count": 305,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 305,
"watchers": 1496,
"watchers": 1497,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-05T06:56:38Z",
"updated_at": "2022-09-06T00:01:38Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"forks_count": 305,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 305,
"watchers": 1496,
"watchers": 1497,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-05T06:56:38Z",
"updated_at": "2022-09-06T00:01:38Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"forks_count": 305,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 305,
"watchers": 1496,
"watchers": 1497,
"score": 0
},
{

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-05T06:56:38Z",
"updated_at": "2022-09-06T00:01:38Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"forks_count": 305,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 305,
"watchers": 1496,
"watchers": 1497,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2022-08-28T21:09:56Z",
"updated_at": "2022-09-05T21:50:20Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 732,
"watchers_count": 732,
"stargazers_count": 733,
"watchers_count": 733,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 63,
"watchers": 732,
"watchers": 733,
"score": 0
}
]

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-05T06:56:38Z",
"updated_at": "2022-09-06T00:01:38Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"forks_count": 305,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 305,
"watchers": 1496,
"watchers": 1497,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-05T06:56:38Z",
"updated_at": "2022-09-06T00:01:38Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1496,
"watchers_count": 1496,
"stargazers_count": 1497,
"watchers_count": 1497,
"forks_count": 305,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 305,
"watchers": 1496,
"watchers": 1497,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Win10 20H2 Weaponized LPE for CVE-2021-31956",
"fork": false,
"created_at": "2022-09-02T10:35:11Z",
"updated_at": "2022-09-04T14:30:31Z",
"updated_at": "2022-09-05T22:45:36Z",
"pushed_at": "2022-09-02T10:40:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -82,5 +82,33 @@
"forks": 12,
"watchers": 48,
"score": 0
},
{
"id": 533095208,
"name": "cve-2021-34527",
"full_name": "hackerhouse-opensource\/cve-2021-34527",
"owner": {
"login": "hackerhouse-opensource",
"id": 43967630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4",
"html_url": "https:\/\/github.com\/hackerhouse-opensource"
},
"html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2021-34527",
"description": "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation",
"fork": false,
"created_at": "2022-09-05T23:48:44Z",
"updated_at": "2022-09-05T23:49:47Z",
"pushed_at": "2022-09-05T23:49:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2360,34 +2360,6 @@
"watchers": 0,
"score": 0
},
{
"id": 438118026,
"name": "log4j-urlscanner",
"full_name": "Woahd\/log4j-urlscanner",
"owner": {
"login": "Woahd",
"id": 91861246,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91861246?v=4",
"html_url": "https:\/\/github.com\/Woahd"
},
"html_url": "https:\/\/github.com\/Woahd\/log4j-urlscanner",
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading",
"fork": false,
"created_at": "2021-12-14T04:35:20Z",
"updated_at": "2021-12-15T04:54:26Z",
"pushed_at": "2021-12-15T04:54:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 438128189,
"name": "Log4j2-CVE-2021-44228-revshell",

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-05-20T04:32:13Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 20,
"score": 0
},
@ -116,5 +116,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 533101052,
"name": "CVE-2022-24706-CouchDB-Exploit",
"full_name": "trhacknon\/CVE-2022-24706-CouchDB-Exploit",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-24706-CouchDB-Exploit",
"description": null,
"fork": false,
"created_at": "2022-09-06T00:17:19Z",
"updated_at": "2022-09-06T00:17:33Z",
"pushed_at": "2022-09-06T00:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation",
"fork": false,
"created_at": "2022-09-05T14:12:06Z",
"updated_at": "2022-09-05T18:01:11Z",
"updated_at": "2022-09-06T00:13:31Z",
"pushed_at": "2022-09-05T14:25:17Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"forks": 2,
"watchers": 11,
"score": 0
}
]

View file

@ -30,19 +30,19 @@
{
"id": 524792587,
"name": "CVE-2022-27925",
"full_name": "MeDx64\/CVE-2022-27925",
"full_name": "mohamedbenchikh\/CVE-2022-27925",
"owner": {
"login": "MeDx64",
"login": "mohamedbenchikh",
"id": 58364955,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58364955?v=4",
"html_url": "https:\/\/github.com\/MeDx64"
"html_url": "https:\/\/github.com\/mohamedbenchikh"
},
"html_url": "https:\/\/github.com\/MeDx64\/CVE-2022-27925",
"html_url": "https:\/\/github.com\/mohamedbenchikh\/CVE-2022-27925",
"description": null,
"fork": false,
"created_at": "2022-08-14T22:22:55Z",
"updated_at": "2022-08-22T14:34:49Z",
"pushed_at": "2022-08-14T22:25:03Z",
"pushed_at": "2022-09-05T22:05:53Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,

View file

@ -1391,10 +1391,10 @@
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-09T09:32:10Z",
"updated_at": "2022-09-01T05:49:44Z",
"updated_at": "2022-09-05T18:54:54Z",
"pushed_at": "2022-06-16T07:28:13Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -1412,7 +1412,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
"fork": false,
"created_at": "2022-07-21T13:09:50Z",
"updated_at": "2022-09-04T18:41:56Z",
"updated_at": "2022-09-05T23:54:54Z",
"pushed_at": "2022-07-21T13:44:32Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 82,
"watchers": 83,
"score": 0
},
{

View file

@ -165,10 +165,10 @@
"description": "「💥」CVE-2022-33891 - Apache Spark Command Injection",
"fork": false,
"created_at": "2022-07-30T23:02:16Z",
"updated_at": "2022-09-02T23:54:53Z",
"updated_at": "2022-09-05T23:45:58Z",
"pushed_at": "2022-08-01T21:30:09Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -195,7 +195,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
"updated_at": "2022-09-02T01:41:52Z",
"updated_at": "2022-09-05T19:39:26Z",
"pushed_at": "2022-08-28T16:23:06Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 203,
"watchers": 204,
"score": 0
},
{

View file

@ -45,13 +45,13 @@
"pushed_at": "2022-08-29T16:56:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 9,
"score": 0
}

View file

@ -1652,6 +1652,7 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
- [XmasSnowISBACK/CVE-2022-24706](https://github.com/XmasSnowISBACK/CVE-2022-24706)
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
### CVE-2022-24707 (2022-02-23)
@ -2264,7 +2265,7 @@ Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that
</code>
- [vnhacker1337/CVE-2022-27925-PoC](https://github.com/vnhacker1337/CVE-2022-27925-PoC)
- [MeDx64/CVE-2022-27925](https://github.com/MeDx64/CVE-2022-27925)
- [mohamedbenchikh/CVE-2022-27925](https://github.com/mohamedbenchikh/CVE-2022-27925)
- [miko550/CVE-2022-27925](https://github.com/miko550/CVE-2022-27925)
- [navokus/CVE-2022-27925](https://github.com/navokus/CVE-2022-27925)
- [Josexv1/CVE-2022-27925](https://github.com/Josexv1/CVE-2022-27925)
@ -6356,6 +6357,7 @@ Windows Print Spooler Remote Code Execution Vulnerability
- [Exploitspacks/CVE-2021-34527-CVE-2021-1675](https://github.com/Exploitspacks/CVE-2021-34527-CVE-2021-1675)
- [cyb3rpeace/CVE-2021-34527](https://github.com/cyb3rpeace/CVE-2021-34527)
- [m8sec/CVE-2021-34527](https://github.com/m8sec/CVE-2021-34527)
- [hackerhouse-opensource/cve-2021-34527](https://github.com/hackerhouse-opensource/cve-2021-34527)
### CVE-2021-34600 (2022-01-20)
@ -7460,7 +7462,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)
- [alpacamybags118/log4j-cve-2021-44228-sample](https://github.com/alpacamybags118/log4j-cve-2021-44228-sample)
- [roticagas/CVE-2021-44228-Demo](https://github.com/roticagas/CVE-2021-44228-Demo)
- [Woahd/log4j-urlscanner](https://github.com/Woahd/log4j-urlscanner)
- [faisalfs10x/Log4j2-CVE-2021-44228-revshell](https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell)
- [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn)
- [codiobert/log4j-scanner](https://github.com/codiobert/log4j-scanner)