Auto Update 2023/12/07 18:51:01

This commit is contained in:
motikan2010-bot 2023-12-08 03:51:01 +09:00
parent db1e341251
commit 2c043b1c05
20 changed files with 75 additions and 71 deletions

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,7 +13,7 @@
"description": "CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.",
"fork": false,
"created_at": "2017-10-07T09:42:05Z",
"updated_at": "2023-10-08T05:58:47Z",
"updated_at": "2023-12-07T18:04:10Z",
"pushed_at": "2017-12-07T01:04:52Z",
"stargazers_count": 30,
"watchers_count": 30,

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2023-12-06T03:01:06Z",
"updated_at": "2023-12-07T15:52:44Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 107,
"watchers": 108,
"score": 0,
"subscribers_count": 6
},

View file

@ -133,10 +133,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2023-11-24T19:59:55Z",
"updated_at": "2023-12-07T18:06:39Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 644,
"watchers_count": 644,
"has_discussions": false,
"forks_count": 206,
"allow_forking": true,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 206,
"watchers": 645,
"watchers": 644,
"score": 0,
"subscribers_count": 27
},

View file

@ -417,10 +417,10 @@
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
"fork": false,
"created_at": "2021-01-05T14:41:13Z",
"updated_at": "2023-09-28T11:23:40Z",
"updated_at": "2023-12-07T15:51:14Z",
"pushed_at": "2021-07-29T09:28:20Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -429,7 +429,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,7 +43,7 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-12-07T02:55:18Z",
"updated_at": "2023-12-07T15:09:34Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1761,
"watchers_count": 1761,

View file

@ -13,10 +13,10 @@
"description": "nuclei scanner for proxyshell ( CVE-2021-34473 )",
"fork": false,
"created_at": "2021-08-10T15:01:02Z",
"updated_at": "2023-11-22T13:21:57Z",
"updated_at": "2023-12-07T12:35:46Z",
"pushed_at": "2022-10-09T20:34:21Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 2
},

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2023-11-29T06:48:46Z",
"updated_at": "2023-12-07T13:30:54Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -148,7 +148,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 2
},

View file

@ -48,7 +48,7 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-12-07T06:51:09Z",
"updated_at": "2023-12-07T15:09:33Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 665,
"watchers_count": 665,

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-12-05T15:59:19Z",
"updated_at": "2023-12-07T13:33:10Z",
"pushed_at": "2023-11-08T21:02:16Z",
"stargazers_count": 1669,
"watchers_count": 1669,
"stargazers_count": 1670,
"watchers_count": 1670,
"has_discussions": false,
"forks_count": 493,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 493,
"watchers": 1669,
"watchers": 1670,
"score": 0,
"subscribers_count": 25
},
@ -3708,13 +3708,13 @@
"stargazers_count": 3318,
"watchers_count": 3318,
"has_discussions": true,
"forks_count": 750,
"forks_count": 749,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 750,
"forks": 749,
"watchers": 3318,
"score": 0,
"subscribers_count": 58
@ -9823,10 +9823,10 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2023-11-07T09:52:41Z",
"updated_at": "2023-12-07T17:23:44Z",
"pushed_at": "2022-08-12T20:12:50Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -9835,7 +9835,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 5
},

View file

@ -1185,10 +1185,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-12-04T18:12:51Z",
"updated_at": "2023-12-07T14:05:36Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 472,
"watchers_count": 472,
"stargazers_count": 474,
"watchers_count": 474,
"has_discussions": false,
"forks_count": 133,
"allow_forking": true,
@ -1197,7 +1197,7 @@
"topics": [],
"visibility": "public",
"forks": 133,
"watchers": 472,
"watchers": 474,
"score": 0,
"subscribers_count": 15
},

View file

@ -233,10 +233,10 @@
"description": "Spring Cloud Function Vulnerable Application \/ CVE-2022-22963",
"fork": false,
"created_at": "2022-03-31T14:32:14Z",
"updated_at": "2023-10-31T13:13:54Z",
"updated_at": "2023-12-07T14:11:03Z",
"pushed_at": "2022-04-01T12:51:25Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -245,7 +245,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 19,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10",
"fork": false,
"created_at": "2023-03-19T20:41:46Z",
"updated_at": "2023-03-30T13:28:20Z",
"updated_at": "2023-12-07T14:08:19Z",
"pushed_at": "2023-03-27T22:46:04Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -364,10 +364,10 @@
"description": "CVE-2023-22515 (Confluence Broken Access Control Exploit)",
"fork": false,
"created_at": "2023-10-22T23:37:56Z",
"updated_at": "2023-10-24T08:49:48Z",
"updated_at": "2023-12-07T18:07:29Z",
"pushed_at": "2023-11-22T21:44:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -376,7 +376,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
"fork": false,
"created_at": "2023-01-21T15:19:23Z",
"updated_at": "2023-11-19T15:31:28Z",
"updated_at": "2023-12-07T14:11:22Z",
"pushed_at": "2023-02-15T18:10:53Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 130,
"watchers": 129,
"score": 0,
"subscribers_count": 3
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-12-07T10:46:53Z",
"updated_at": "2023-12-07T12:47:14Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 230,
"watchers_count": 230,
"stargazers_count": 231,
"watchers_count": 231,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 230,
"watchers": 231,
"score": 0,
"subscribers_count": 4
},

View file

@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2023-12-05T04:01:24Z",
"updated_at": "2023-12-07T18:48:07Z",
"pushed_at": "2023-08-28T20:41:57Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "Plugin to fix security vulnerability CVE-2023-40626 in Joomla 3.10.12",
"fork": false,
"created_at": "2023-11-29T19:46:15Z",
"updated_at": "2023-12-06T20:30:19Z",
"updated_at": "2023-12-07T18:09:41Z",
"pushed_at": "2023-12-02T00:42:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-16T19:22:30Z",
"updated_at": "2023-11-16T19:29:53Z",
"updated_at": "2023-12-07T17:11:21Z",
"pushed_at": "2023-11-16T19:32:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -5382,7 +5382,11 @@
- [jakedmurphy1/CVE-2023-46954](https://github.com/jakedmurphy1/CVE-2023-46954)
### CVE-2023-46974
### CVE-2023-46974 (2023-12-07)
<code>Cross Site Scripting vulnerability in Best Courier Management System v.1.000 allows a remote attacker to execute arbitrary code via a crafted payload to the page parameter in the URL.
</code>
- [yte121/CVE-2023-46974](https://github.com/yte121/CVE-2023-46974)
### CVE-2023-46980 (2023-11-03)