Auto Update 2023/04/12 00:30:56

This commit is contained in:
motikan2010-bot 2023-04-12 09:30:56 +09:00
parent fe71d2b206
commit 26a2982b63
25 changed files with 75 additions and 154 deletions

View file

@ -1,43 +1,4 @@
[
{
"id": 98817608,
"name": "jenkins-cve-2016-0792",
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
"owner": {
"login": "jpiechowka",
"id": 9040085,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9040085?v=4",
"html_url": "https:\/\/github.com\/jpiechowka"
},
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2017-07-30T18:39:24Z",
"updated_at": "2022-06-25T01:31:15Z",
"pushed_at": "2017-08-02T23:51:34Z",
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2016-0792",
"deserialization",
"exploit",
"jenkins-serialization-vulnerability",
"python",
"serialization",
"vulnerability",
"vulnerability-detection"
],
"visibility": "public",
"forks": 22,
"watchers": 50,
"score": 0
},
{
"id": 125023802,
"name": "java-deserialization-exploits",

View file

@ -1,31 +0,0 @@
[
{
"id": 97992350,
"name": "CVE-2016-6271",
"full_name": "gteissier\/CVE-2016-6271",
"owner": {
"login": "gteissier",
"id": 201614,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/201614?v=4",
"html_url": "https:\/\/github.com\/gteissier"
},
"html_url": "https:\/\/github.com\/gteissier\/CVE-2016-6271",
"description": "Proof of concept for ZRTP man-in-the-middle",
"fork": false,
"created_at": "2017-07-21T22:57:04Z",
"updated_at": "2023-02-01T03:25:22Z",
"pushed_at": "2017-07-22T00:06:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2023-04-10T16:49:25Z",
"updated_at": "2023-04-11T20:34:32Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 36,
"watchers": 37,
"score": 0
}
]

View file

@ -2940,13 +2940,13 @@
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 24,
"watchers": 103,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
"fork": false,
"created_at": "2023-02-24T10:58:53Z",
"updated_at": "2023-03-08T19:48:13Z",
"updated_at": "2023-04-11T18:39:18Z",
"pushed_at": "2023-02-27T16:32:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 632,
"watchers_count": 632,
"has_discussions": false,
"forks_count": 160,
"forks_count": 159,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"security"
],
"visibility": "public",
"forks": 160,
"forks": 159,
"watchers": 632,
"score": 0
},

View file

@ -141,7 +141,7 @@
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 9,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -151,7 +151,7 @@
"nmap-script"
],
"visibility": "public",
"forks": 9,
"forks": 8,
"watchers": 27,
"score": 0
},

View file

@ -47,13 +47,13 @@
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 38,
"score": 0
}

View file

@ -143,13 +143,13 @@
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 55,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"forks": 54,
"watchers": 85,
"score": 0
},

View file

@ -913,7 +913,7 @@
"stargazers_count": 768,
"watchers_count": 768,
"has_discussions": false,
"forks_count": 159,
"forks_count": 158,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -921,7 +921,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 159,
"forks": 158,
"watchers": 768,
"score": 0
},

View file

@ -105,10 +105,10 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2023-03-29T02:29:02Z",
"updated_at": "2023-04-11T22:24:13Z",
"pushed_at": "2022-01-13T12:35:19Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -119,7 +119,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 255,
"watchers": 256,
"score": 0
},
{

View file

@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-04-07T04:23:05Z",
"updated_at": "2023-04-12T00:02:53Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 388,
"watchers_count": 388,
"stargazers_count": 389,
"watchers_count": 389,
"has_discussions": false,
"forks_count": 119,
"allow_forking": true,
@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 119,
"watchers": 388,
"watchers": 389,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2023-04-11T17:46:05Z",
"updated_at": "2023-04-11T21:32:28Z",
"pushed_at": "2023-03-02T19:43:36Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 43,
"watchers": 200,
"watchers": 201,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2023-04-09T03:30:35Z",
"updated_at": "2023-04-11T22:24:13Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 699,
"watchers_count": 699,
"stargazers_count": 700,
"watchers_count": 700,
"has_discussions": false,
"forks_count": 151,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 151,
"watchers": 699,
"watchers": 700,
"score": 0
}
]

View file

@ -1366,10 +1366,10 @@
"description": "Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.",
"fork": false,
"created_at": "2022-07-15T10:06:15Z",
"updated_at": "2023-03-12T05:26:01Z",
"updated_at": "2023-04-11T18:37:11Z",
"pushed_at": "2022-07-21T14:24:29Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1378,7 +1378,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -249,10 +249,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2023-04-09T03:18:06Z",
"updated_at": "2023-04-12T00:00:56Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -261,7 +261,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 345,
"watchers": 344,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 37,
"watchers": 143,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "Docker CVE-2022-37708",
"fork": false,
"created_at": "2022-09-22T23:06:08Z",
"updated_at": "2023-02-04T16:25:16Z",
"updated_at": "2023-04-11T19:04:00Z",
"pushed_at": "2022-09-23T00:07:17Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-11T17:27:49Z",
"updated_at": "2023-04-12T00:24:53Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 94,
"watchers": 103,
"score": 0
}
]

View file

@ -97,10 +97,10 @@
"html_url": "https:\/\/github.com\/yosef0x01"
},
"html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-0669-Analysis",
"description": null,
"description": "CVE analysis for CVE-2023-0669",
"fork": false,
"created_at": "2023-02-26T02:33:54Z",
"updated_at": "2023-03-14T22:22:19Z",
"updated_at": "2023-04-11T21:16:29Z",
"pushed_at": "2023-03-12T17:37:44Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -49,10 +49,10 @@
"description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036",
"fork": false,
"created_at": "2023-03-22T14:59:42Z",
"updated_at": "2023-04-09T13:09:04Z",
"updated_at": "2023-04-11T21:07:15Z",
"pushed_at": "2023-03-23T18:10:24Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-04-11T14:13:54Z",
"updated_at": "2023-04-11T21:12:14Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 286,
"watchers_count": 286,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 285,
"watchers": 286,
"score": 0
},
{

View file

@ -615,10 +615,10 @@
"description": "CVE-2023-23752",
"fork": false,
"created_at": "2023-04-06T12:15:50Z",
"updated_at": "2023-04-06T12:27:14Z",
"updated_at": "2023-04-11T18:35:20Z",
"pushed_at": "2023-04-06T12:28:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -627,7 +627,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-03-20T11:47:54Z",
"updated_at": "2023-04-10T00:45:16Z",
"updated_at": "2023-04-11T18:47:46Z",
"pushed_at": "2023-03-20T12:51:29Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 151,
"watchers": 152,
"score": 0
}
]

View file

@ -2518,7 +2518,7 @@ Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier
### CVE-2022-22978 (2022-05-19)
<code>
In Spring Security versions 5.5.6 and 5.6.3 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
</code>
- [DeEpinGh0st/CVE-2022-22978](https://github.com/DeEpinGh0st/CVE-2022-22978)
@ -4968,7 +4968,7 @@ Power Distribution Units running on Powertek firmware (multiple brands) before 3
### CVE-2022-33679 (2022-09-13)
<code>
Windows Kerberos Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33647.
Windows Kerberos Elevation of Privilege Vulnerability
</code>
- [Bdenneu/CVE-2022-33679](https://github.com/Bdenneu/CVE-2022-33679)
@ -5058,7 +5058,7 @@ Windows Network File System Remote Code Execution Vulnerability.
### CVE-2022-34718 (2022-09-13)
<code>
Windows TCP/IP Remote Code Execution Vulnerability.
Windows TCP/IP Remote Code Execution Vulnerability
</code>
- [SecLabResearchBV/CVE-2022-34718-PoC](https://github.com/SecLabResearchBV/CVE-2022-34718-PoC)
@ -5066,7 +5066,7 @@ Windows TCP/IP Remote Code Execution Vulnerability.
### CVE-2022-34729 (2022-09-13)
<code>
Windows GDI Elevation of Privilege Vulnerability.
Windows GDI Elevation of Privilege Vulnerability
</code>
- [Pwnrin/CVE-2022-34729](https://github.com/Pwnrin/CVE-2022-34729)
@ -5216,7 +5216,7 @@ SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds over
### CVE-2022-35841 (2022-09-13)
<code>
Windows Enterprise App Management Service Remote Code Execution Vulnerability.
Windows Enterprise App Management Service Remote Code Execution Vulnerability
</code>
- [Wack0/CVE-2022-35841](https://github.com/Wack0/CVE-2022-35841)
@ -5557,7 +5557,7 @@ Docker version 20.10.15, build fd82621 is vulnerable to Insecure Permissions. Un
### CVE-2022-37969 (2022-09-13)
<code>
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35803.
Windows Common Log File System Driver Elevation of Privilege Vulnerability
</code>
- [fortra/CVE-2022-37969](https://github.com/fortra/CVE-2022-37969)
@ -29194,7 +29194,6 @@ Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
</code>
- [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792)
- [R0B1NL1N/java-deserialization-exploits](https://github.com/R0B1NL1N/java-deserialization-exploits)
### CVE-2016-0793 (2016-04-01)
@ -29827,14 +29826,6 @@ sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password has
- [justlce/CVE-2016-6210-Exploit](https://github.com/justlce/CVE-2016-6210-Exploit)
### CVE-2016-6271 (2017-01-18)
<code>
The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception.
</code>
- [gteissier/CVE-2016-6271](https://github.com/gteissier/CVE-2016-6271)
### CVE-2016-6317 (2016-09-07)
<code>