Auto Update 2023/08/14 00:29:31

This commit is contained in:
motikan2010-bot 2023-08-14 09:29:31 +09:00
parent a7a68cb2b7
commit 2d2f779016
22 changed files with 108 additions and 69 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 305,
"watchers_count": 305,
"has_discussions": false,
"forks_count": 116,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 116,
"forks": 117,
"watchers": 305,
"score": 0,
"subscribers_count": 8

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2020-03-28T22:09:39Z",
"updated_at": "2023-03-17T18:10:16Z",
"pushed_at": "2023-08-11T00:59:25Z",
"pushed_at": "2023-08-13T19:19:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2023-08-04T01:50:23Z",
"updated_at": "2023-08-13T19:12:31Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 389,
"watchers_count": 389,
"stargazers_count": 390,
"watchers_count": 390,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 389,
"watchers": 390,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,10 +43,10 @@
"description": "Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager role to RCE.",
"fork": false,
"created_at": "2021-04-28T19:46:55Z",
"updated_at": "2023-01-24T16:12:46Z",
"updated_at": "2023-08-13T21:43:14Z",
"pushed_at": "2021-12-03T03:56:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-08-12T14:45:18Z",
"updated_at": "2023-08-13T19:22:51Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1065,
"watchers_count": 1065,
"stargazers_count": 1066,
"watchers_count": 1066,
"has_discussions": false,
"forks_count": 328,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 328,
"watchers": 1065,
"watchers": 1066,
"score": 0,
"subscribers_count": 37
}

View file

@ -40,6 +40,6 @@
"forks": 15,
"watchers": 66,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2023-08-05T01:26:02Z",
"updated_at": "2023-08-13T19:17:21Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 7
}

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-08-12T14:45:18Z",
"updated_at": "2023-08-13T19:22:51Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1065,
"watchers_count": 1065,
"stargazers_count": 1066,
"watchers_count": 1066,
"has_discussions": false,
"forks_count": 328,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 328,
"watchers": 1065,
"watchers": 1066,
"score": 0,
"subscribers_count": 37
},

View file

@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2023-03-19T19:02:34Z",
"pushed_at": "2021-12-25T04:54:11Z",
"stargazers_count": 32,
"watchers_count": 32,
"updated_at": "2023-08-14T00:00:52Z",
"pushed_at": "2023-08-13T21:00:46Z",
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 32,
"watchers": 37,
"score": 0,
"subscribers_count": 4
}

View file

@ -61,6 +61,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,7 +57,7 @@
"forks": 70,
"watchers": 201,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 424140037,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-08-28T04:21:44Z",
"updated_at": "2023-07-13T07:20:43Z",
"updated_at": "2023-08-13T21:34:34Z",
"pushed_at": "2021-08-29T14:06:28Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2023-08-13T16:44:25Z",
"updated_at": "2023-08-13T23:41:19Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 916,
"watchers_count": 916,
"stargazers_count": 917,
"watchers_count": 917,
"has_discussions": false,
"forks_count": 190,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 916,
"watchers": 917,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-01-25T23:58:17Z",
"updated_at": "2023-07-06T21:41:11Z",
"updated_at": "2023-08-13T21:39:29Z",
"pushed_at": "2022-01-26T00:18:26Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2023-08-12T14:33:27Z",
"updated_at": "2023-08-13T22:45:50Z",
"pushed_at": "2023-08-05T20:56:12Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 88,
"watchers": 89,
"score": 0,
"subscribers_count": 2
}

32
2022/CVE-2022-3457.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 678117266,
"name": "CVE-2022-3457",
"full_name": "Nithisssh\/CVE-2022-3457",
"owner": {
"login": "Nithisssh",
"id": 142154570,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142154570?v=4",
"html_url": "https:\/\/github.com\/Nithisssh"
},
"html_url": "https:\/\/github.com\/Nithisssh\/CVE-2022-3457",
"description": null,
"fork": false,
"created_at": "2023-08-13T18:28:33Z",
"updated_at": "2023-08-13T18:28:34Z",
"pushed_at": "2023-08-13T18:29:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2023-08-08T07:43:10Z",
"updated_at": "2023-08-13T20:21:03Z",
"pushed_at": "2023-02-16T13:49:47Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 160,
"watchers": 163,
"score": 0,
"subscribers_count": 5
},
@ -43,10 +43,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-08-04T05:23:56Z",
"updated_at": "2023-08-13T19:57:21Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 202,
"watchers": 203,
"score": 0,
"subscribers_count": 5
}

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-04-26T15:24:02Z",
"updated_at": "2023-07-25T04:31:53Z",
"pushed_at": "2023-07-06T02:55:45Z",
"pushed_at": "2023-08-13T21:53:14Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-15T16:09:19Z",
"updated_at": "2023-08-13T09:10:15Z",
"pushed_at": "2023-05-15T16:21:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2023-08-13T19:36:12Z",
"pushed_at": "2023-08-13T23:30:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-08-13T18:14:18Z",
"updated_at": "2023-08-13T19:43:45Z",
"pushed_at": "2023-06-03T23:23:11Z",
"stargazers_count": 511,
"watchers_count": 511,
"stargazers_count": 513,
"watchers_count": 513,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 41,
"watchers": 511,
"watchers": 513,
"score": 0,
"subscribers_count": 10
},

View file

@ -330,10 +330,10 @@
"description": "Automatic Tools For Metabase Exploit Known As CVE-2023-38646",
"fork": false,
"created_at": "2023-08-09T14:05:24Z",
"updated_at": "2023-08-13T00:51:35Z",
"updated_at": "2023-08-14T00:15:00Z",
"pushed_at": "2023-08-11T10:31:01Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -342,7 +342,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -3452,6 +3452,13 @@
- [kenyon-wong/cve-2022-3452](https://github.com/kenyon-wong/cve-2022-3452)
### CVE-2022-3457 (2022-10-13)
<code>Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5.
</code>
- [Nithisssh/CVE-2022-3457](https://github.com/Nithisssh/CVE-2022-3457)
### CVE-2022-3464 (2022-10-12)
<code>A vulnerability classified as problematic has been found in puppyCMS up to 5.1. This affects an unknown part of the file /admin/settings.php. The manipulation of the argument site_name leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-210699.