From 2bc24bca7d8a93dfa4f88b747750a680b94af709 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 20 Dec 2022 09:18:12 +0900 Subject: [PATCH] Auto Update 2022/12/20 00:18:12 --- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2016/CVE-2016-3861.json | 8 ++++---- 2017/CVE-2017-12149.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-15133.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-2729.json | 2 +- 2020/CVE-2020-11022.json | 8 ++++---- 2020/CVE-2020-17382.json | 10 +++++----- 2020/CVE-2020-2551.json | 8 ++++---- 2021/CVE-2021-1961.json | 8 ++++---- 2022/CVE-2022-22965.json | 4 ++-- 2022/CVE-2022-24125.json | 4 ++-- 2022/CVE-2022-3786.json | 2 +- 2022/CVE-2022-46689.json | 8 ++++---- README.md | 6 +++--- 19 files changed, 66 insertions(+), 66 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index efd201777b..42a00c7a7e 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-12-19T16:13:43Z", + "updated_at": "2022-12-19T21:47:51Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1561, - "watchers_count": 1561, + "stargazers_count": 1562, + "watchers_count": 1562, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 314, - "watchers": 1561, + "watchers": 1562, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 62ded2dbd1..049195712f 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-12-19T16:13:43Z", + "updated_at": "2022-12-19T21:47:51Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1561, - "watchers_count": 1561, + "stargazers_count": 1562, + "watchers_count": 1562, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 314, - "watchers": 1561, + "watchers": 1562, "score": 0 }, { diff --git a/2016/CVE-2016-3861.json b/2016/CVE-2016-3861.json index f337d069b8..f2798fb398 100644 --- a/2016/CVE-2016-3861.json +++ b/2016/CVE-2016-3861.json @@ -2,14 +2,14 @@ { "id": 229444408, "name": "CVE-2016-3861", - "full_name": "dropk1ck\/CVE-2016-3861", + "full_name": "ionraider\/CVE-2016-3861", "owner": { - "login": "dropk1ck", + "login": "ionraider", "id": 1975987, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1975987?v=4", - "html_url": "https:\/\/github.com\/dropk1ck" + "html_url": "https:\/\/github.com\/ionraider" }, - "html_url": "https:\/\/github.com\/dropk1ck\/CVE-2016-3861", + "html_url": "https:\/\/github.com\/ionraider\/CVE-2016-3861", "description": "my extended take on Mark Brand's CVE 2016-3861 libutils bug", "fork": false, "created_at": "2019-12-21T15:11:19Z", diff --git a/2017/CVE-2017-12149.json b/2017/CVE-2017-12149.json index 7d24a3dc95..1fa20e2f00 100644 --- a/2017/CVE-2017-12149.json +++ b/2017/CVE-2017-12149.json @@ -129,10 +129,10 @@ "description": "JBoss CVE-2017-12149 (Insecure Deserialization - RCE) Exploitation Lab.", "fork": false, "created_at": "2021-05-30T20:26:51Z", - "updated_at": "2021-08-04T10:11:09Z", + "updated_at": "2022-12-19T22:10:42Z", "pushed_at": "2021-08-04T10:11:06Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -141,7 +141,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 2259bbba35..04b726794e 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -42,10 +42,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-12-19T16:13:43Z", + "updated_at": "2022-12-19T21:47:51Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1561, - "watchers_count": 1561, + "stargazers_count": 1562, + "watchers_count": 1562, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 314, - "watchers": 1561, + "watchers": 1562, "score": 0 }, { diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index 6aa53807eb..ebd01561de 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -176,14 +176,14 @@ { "id": 323457742, "name": "Larascript", - "full_name": "PwnedShell\/Larascript", + "full_name": "pwnedshell\/Larascript", "owner": { - "login": "PwnedShell", + "login": "pwnedshell", "id": 55540142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55540142?v=4", - "html_url": "https:\/\/github.com\/PwnedShell" + "html_url": "https:\/\/github.com\/pwnedshell" }, - "html_url": "https:\/\/github.com\/PwnedShell\/Larascript", + "html_url": "https:\/\/github.com\/pwnedshell\/Larascript", "description": "Laravel RCE exploit. CVE-2018-15133", "fork": false, "created_at": "2020-12-21T22:02:08Z", diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 57571b63f3..0ffef3d962 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -568,10 +568,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-12-19T16:13:43Z", + "updated_at": "2022-12-19T21:47:51Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1561, - "watchers_count": 1561, + "stargazers_count": 1562, + "watchers_count": 1562, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -601,7 +601,7 @@ ], "visibility": "public", "forks": 314, - "watchers": 1561, + "watchers": 1562, "score": 0 }, { diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 965c80992c..282a0d4fbc 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2022-12-13T07:32:42Z", + "updated_at": "2022-12-19T19:32:19Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1748, - "watchers_count": 1748, + "stargazers_count": 1749, + "watchers_count": 1749, "has_discussions": false, "forks_count": 262, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 262, - "watchers": 1748, + "watchers": 1749, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index ad3d6aa156..10249ab4aa 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -187,10 +187,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-12-19T16:13:43Z", + "updated_at": "2022-12-19T21:47:51Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1561, - "watchers_count": 1561, + "stargazers_count": 1562, + "watchers_count": 1562, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -220,7 +220,7 @@ ], "visibility": "public", "forks": 314, - "watchers": 1561, + "watchers": 1562, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2729.json b/2019/CVE-2019-2729.json index fedde53c4c..bb34857913 100644 --- a/2019/CVE-2019-2729.json +++ b/2019/CVE-2019-2729.json @@ -42,7 +42,7 @@ "description": "CVE-2019-2729 Exploit Script", "fork": false, "created_at": "2020-02-19T03:49:51Z", - "updated_at": "2022-11-12T19:03:05Z", + "updated_at": "2022-12-19T19:23:56Z", "pushed_at": "2020-02-19T08:48:02Z", "stargazers_count": 35, "watchers_count": 35, diff --git a/2020/CVE-2020-11022.json b/2020/CVE-2020-11022.json index e2c6bdf811..cc52df2032 100644 --- a/2020/CVE-2020-11022.json +++ b/2020/CVE-2020-11022.json @@ -13,10 +13,10 @@ "description": "Little thing put together quickly to demonstrate this CVE ", "fork": false, "created_at": "2021-10-16T01:10:33Z", - "updated_at": "2022-12-15T18:31:06Z", + "updated_at": "2022-12-19T22:02:30Z", "pushed_at": "2022-09-11T22:06:40Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0 }, { diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json index bc0353420a..60abdd0af9 100644 --- a/2020/CVE-2020-17382.json +++ b/2020/CVE-2020-17382.json @@ -42,10 +42,10 @@ "description": "The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).", "fork": false, "created_at": "2022-12-19T07:02:18Z", - "updated_at": "2022-12-19T07:02:25Z", - "pushed_at": "2022-12-19T07:04:51Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2022-12-19T23:26:07Z", + "pushed_at": "2022-12-19T21:48:49Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index eabfa6a2cc..c2a03ff22e 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-12-19T16:13:43Z", + "updated_at": "2022-12-19T21:47:51Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1561, - "watchers_count": 1561, + "stargazers_count": 1562, + "watchers_count": 1562, "has_discussions": false, "forks_count": 314, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 314, - "watchers": 1561, + "watchers": 1562, "score": 0 }, { diff --git a/2021/CVE-2021-1961.json b/2021/CVE-2021-1961.json index 11611a1a12..ce9fb8a2b8 100644 --- a/2021/CVE-2021-1961.json +++ b/2021/CVE-2021-1961.json @@ -13,10 +13,10 @@ "description": "Exploit code for CVE-2021-1961", "fork": false, "created_at": "2022-09-03T13:31:13Z", - "updated_at": "2022-12-13T15:00:40Z", + "updated_at": "2022-12-19T22:03:34Z", "pushed_at": "2022-09-07T11:47:56Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 84, + "watchers_count": 84, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 83, + "watchers": 84, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index cd770aaabf..f9226b2980 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -130,13 +130,13 @@ "stargazers_count": 272, "watchers_count": 272, "has_discussions": false, - "forks_count": 216, + "forks_count": 215, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 216, + "forks": 215, "watchers": 272, "score": 0 }, diff --git a/2022/CVE-2022-24125.json b/2022/CVE-2022-24125.json index da2eaa30ae..428cf35701 100644 --- a/2022/CVE-2022-24125.json +++ b/2022/CVE-2022-24125.json @@ -18,7 +18,7 @@ "stargazers_count": 125, "watchers_count": 125, "has_discussions": false, - "forks_count": 7, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,7 +30,7 @@ "souls-games" ], "visibility": "public", - "forks": 7, + "forks": 6, "watchers": 125, "score": 0 } diff --git a/2022/CVE-2022-3786.json b/2022/CVE-2022-3786.json index 85cdf96914..acb25f00a9 100644 --- a/2022/CVE-2022-3786.json +++ b/2022/CVE-2022-3786.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-12-13T16:43:01Z", "updated_at": "2022-12-13T16:43:19Z", - "pushed_at": "2022-12-13T16:43:09Z", + "pushed_at": "2022-12-19T19:19:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 5e1af93e45..b60a0feae0 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -13,10 +13,10 @@ "description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.", "fork": false, "created_at": "2022-12-17T16:45:24Z", - "updated_at": "2022-12-19T16:39:56Z", + "updated_at": "2022-12-19T23:41:14Z", "pushed_at": "2022-12-17T16:45:42Z", - "stargazers_count": 104, - "watchers_count": 104, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 104, + "watchers": 112, "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 1d1aec82bf..bd5c297d39 100644 --- a/README.md +++ b/README.md @@ -4086,7 +4086,7 @@ An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerabilit ### CVE-2022-37177 (2022-08-29) -** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists. +** DISPUTED ** HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists. Furthermore, the rail-fence cipher has been removed, and TLS 1.2 is now used for encryption. - [JC175/CVE-2022-37177](https://github.com/JC175/CVE-2022-37177) @@ -21565,7 +21565,7 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut - [bukitbarisan/laravel-rce-cve-2018-15133](https://github.com/bukitbarisan/laravel-rce-cve-2018-15133) - [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133) - [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133) -- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript) +- [pwnedshell/Larascript](https://github.com/pwnedshell/Larascript) - [AzhariKun/CVE-2018-15133](https://github.com/AzhariKun/CVE-2018-15133) - [huydoppa/CVE-2018-15133](https://github.com/huydoppa/CVE-2018-15133) - [NatteeSetobol/CVE-2018-15133-Lavel-Expliot](https://github.com/NatteeSetobol/CVE-2018-15133-Lavel-Expliot) @@ -25564,7 +25564,7 @@ server/LockSettingsService.java in LockSettingsService in Android 6.x before 201 LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted file, aka internal bug 29250543. -- [dropk1ck/CVE-2016-3861](https://github.com/dropk1ck/CVE-2016-3861) +- [ionraider/CVE-2016-3861](https://github.com/ionraider/CVE-2016-3861) ### CVE-2016-3955 (2016-07-03)