Auto Update 2022/12/20 00:18:12

This commit is contained in:
motikan2010-bot 2022-12-20 09:18:12 +09:00
parent 7e8897e9d6
commit 2bc24bca7d
19 changed files with 66 additions and 66 deletions

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-12-19T16:13:43Z",
"updated_at": "2022-12-19T21:47:51Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 314,
"watchers": 1561,
"watchers": 1562,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-12-19T16:13:43Z",
"updated_at": "2022-12-19T21:47:51Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 314,
"watchers": 1561,
"watchers": 1562,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 229444408,
"name": "CVE-2016-3861",
"full_name": "dropk1ck\/CVE-2016-3861",
"full_name": "ionraider\/CVE-2016-3861",
"owner": {
"login": "dropk1ck",
"login": "ionraider",
"id": 1975987,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1975987?v=4",
"html_url": "https:\/\/github.com\/dropk1ck"
"html_url": "https:\/\/github.com\/ionraider"
},
"html_url": "https:\/\/github.com\/dropk1ck\/CVE-2016-3861",
"html_url": "https:\/\/github.com\/ionraider\/CVE-2016-3861",
"description": "my extended take on Mark Brand's CVE 2016-3861 libutils bug",
"fork": false,
"created_at": "2019-12-21T15:11:19Z",

View file

@ -129,10 +129,10 @@
"description": "JBoss CVE-2017-12149 (Insecure Deserialization - RCE) Exploitation Lab.",
"fork": false,
"created_at": "2021-05-30T20:26:51Z",
"updated_at": "2021-08-04T10:11:09Z",
"updated_at": "2022-12-19T22:10:42Z",
"pushed_at": "2021-08-04T10:11:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-12-19T16:13:43Z",
"updated_at": "2022-12-19T21:47:51Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 314,
"watchers": 1561,
"watchers": 1562,
"score": 0
},
{

View file

@ -176,14 +176,14 @@
{
"id": 323457742,
"name": "Larascript",
"full_name": "PwnedShell\/Larascript",
"full_name": "pwnedshell\/Larascript",
"owner": {
"login": "PwnedShell",
"login": "pwnedshell",
"id": 55540142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55540142?v=4",
"html_url": "https:\/\/github.com\/PwnedShell"
"html_url": "https:\/\/github.com\/pwnedshell"
},
"html_url": "https:\/\/github.com\/PwnedShell\/Larascript",
"html_url": "https:\/\/github.com\/pwnedshell\/Larascript",
"description": "Laravel RCE exploit. CVE-2018-15133",
"fork": false,
"created_at": "2020-12-21T22:02:08Z",

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-12-19T16:13:43Z",
"updated_at": "2022-12-19T21:47:51Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 314,
"watchers": 1561,
"watchers": 1562,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-12-13T07:32:42Z",
"updated_at": "2022-12-19T19:32:19Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1748,
"watchers_count": 1748,
"stargazers_count": 1749,
"watchers_count": 1749,
"has_discussions": false,
"forks_count": 262,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 262,
"watchers": 1748,
"watchers": 1749,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-12-19T16:13:43Z",
"updated_at": "2022-12-19T21:47:51Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 314,
"watchers": 1561,
"watchers": 1562,
"score": 0
}
]

View file

@ -42,7 +42,7 @@
"description": "CVE-2019-2729 Exploit Script",
"fork": false,
"created_at": "2020-02-19T03:49:51Z",
"updated_at": "2022-11-12T19:03:05Z",
"updated_at": "2022-12-19T19:23:56Z",
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 35,
"watchers_count": 35,

View file

@ -13,10 +13,10 @@
"description": "Little thing put together quickly to demonstrate this CVE ",
"fork": false,
"created_at": "2021-10-16T01:10:33Z",
"updated_at": "2022-12-15T18:31:06Z",
"updated_at": "2022-12-19T22:02:30Z",
"pushed_at": "2022-09-11T22:06:40Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).",
"fork": false,
"created_at": "2022-12-19T07:02:18Z",
"updated_at": "2022-12-19T07:02:25Z",
"pushed_at": "2022-12-19T07:04:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2022-12-19T23:26:07Z",
"pushed_at": "2022-12-19T21:48:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-12-19T16:13:43Z",
"updated_at": "2022-12-19T21:47:51Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1561,
"watchers_count": 1561,
"stargazers_count": 1562,
"watchers_count": 1562,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 314,
"watchers": 1561,
"watchers": 1562,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2022-12-13T15:00:40Z",
"updated_at": "2022-12-19T22:03:34Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 83,
"watchers": 84,
"score": 0
}
]

View file

@ -130,13 +130,13 @@
"stargazers_count": 272,
"watchers_count": 272,
"has_discussions": false,
"forks_count": 216,
"forks_count": 215,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 216,
"forks": 215,
"watchers": 272,
"score": 0
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"souls-games"
],
"visibility": "public",
"forks": 7,
"forks": 6,
"watchers": 125,
"score": 0
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-12-13T16:43:01Z",
"updated_at": "2022-12-13T16:43:19Z",
"pushed_at": "2022-12-13T16:43:09Z",
"pushed_at": "2022-12-19T19:19:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2022-12-19T16:39:56Z",
"updated_at": "2022-12-19T23:41:14Z",
"pushed_at": "2022-12-17T16:45:42Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 104,
"watchers": 112,
"score": 0
}
]

View file

@ -4086,7 +4086,7 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit
### CVE-2022-37177 (2022-08-29)
<code>
** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists.
** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists. Furthermore, the rail-fence cipher has been removed, and TLS 1.2 is now used for encryption.
</code>
- [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177)
@ -21565,7 +21565,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
- [bukitbarisan/laravel-rce-cve-2018-15133](https://github.com/bukitbarisan/laravel-rce-cve-2018-15133)
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript)
- [pwnedshell/Larascript](https://github.com/pwnedshell/Larascript)
- [AzhariKun/CVE-2018-15133](https://github.com/AzhariKun/CVE-2018-15133)
- [huydoppa/CVE-2018-15133](https://github.com/huydoppa/CVE-2018-15133)
- [NatteeSetobol/CVE-2018-15133-Lavel-Expliot](https://github.com/NatteeSetobol/CVE-2018-15133-Lavel-Expliot)
@ -25564,7 +25564,7 @@ server/LockSettingsService.java in LockSettingsService in Android 6.x before 201
LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted file, aka internal bug 29250543.
</code>
- [dropk1ck/CVE-2016-3861](https://github.com/dropk1ck/CVE-2016-3861)
- [ionraider/CVE-2016-3861](https://github.com/ionraider/CVE-2016-3861)
### CVE-2016-3955 (2016-07-03)