Auto Update 2022/11/10 00:17:48

This commit is contained in:
motikan2010-bot 2022-11-10 09:17:48 +09:00
parent 3cdc5d6a5e
commit 317b2a919e
31 changed files with 138 additions and 138 deletions

View file

@ -13,10 +13,10 @@
"description": "Scanner for network for CVE-2005-1794.",
"fork": false,
"created_at": "2022-04-12T12:18:12Z",
"updated_at": "2022-04-14T13:07:14Z",
"updated_at": "2022-11-09T18:15:43Z",
"pushed_at": "2022-04-12T12:42:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Microsoft Office Onenote 2007 (CVE-2014-2815) \".ONEPKG\" File Directory Traversal Vulnerability Leads to Arbitrary Code Execution",
"fork": false,
"created_at": "2021-10-05T21:15:27Z",
"updated_at": "2022-01-26T02:41:03Z",
"updated_at": "2022-11-09T18:13:57Z",
"pushed_at": "2021-10-05T21:20:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright stsc MP4 Atom Integer Overflow Remote Code Execution",
"fork": false,
"created_at": "2015-09-10T23:00:59Z",
"updated_at": "2022-07-27T07:04:49Z",
"updated_at": "2022-11-09T20:34:47Z",
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 196,
"watchers": 197,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-12T09:10:36Z",
"updated_at": "2022-10-19T20:11:29Z",
"updated_at": "2022-11-09T18:16:18Z",
"pushed_at": "2022-10-12T09:23:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T23:22:27Z",
"updated_at": "2022-08-29T04:01:00Z",
"updated_at": "2022-11-09T18:08:57Z",
"pushed_at": "2021-09-12T10:03:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 6,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Re-implementation of VirtueSecurity's benigncertain-monitor",
"fork": false,
"created_at": "2020-11-04T20:08:14Z",
"updated_at": "2022-11-07T19:08:31Z",
"updated_at": "2022-11-09T18:10:00Z",
"pushed_at": "2020-11-04T20:24:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 9,
"score": 0
}
]

View file

@ -601,10 +601,10 @@
"description": "CVE-2017-0199复现",
"fork": false,
"created_at": "2022-08-15T07:15:55Z",
"updated_at": "2022-09-23T19:52:55Z",
"updated_at": "2022-11-09T18:16:09Z",
"pushed_at": "2022-08-19T02:09:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -613,7 +613,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -367,10 +367,10 @@
"description": "Exploit CVE-2017-7494 for Net Security course final Assignment. This would reveal the vulnerability of services that run in administrative priority on Linux.",
"fork": false,
"created_at": "2021-05-15T06:52:23Z",
"updated_at": "2021-12-15T14:42:09Z",
"updated_at": "2022-11-09T18:12:19Z",
"pushed_at": "2021-05-18T06:35:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -379,7 +379,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2022-11-02T07:23:48Z",
"updated_at": "2022-11-09T18:11:03Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 47,
"watchers": 46,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploitation of CVE-2018-18925 a Remote Code Execution against the Git self hosted tool: Gogs.",
"fork": false,
"created_at": "2021-09-12T17:57:56Z",
"updated_at": "2022-10-21T14:13:08Z",
"updated_at": "2022-11-09T18:13:40Z",
"pushed_at": "2021-09-14T20:29:49Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 6,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-19422 Authenticated Remote Code Execution",
"fork": false,
"created_at": "2021-06-14T01:50:21Z",
"updated_at": "2022-10-09T06:44:30Z",
"updated_at": "2022-11-09T18:12:38Z",
"pushed_at": "2021-06-14T02:03:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 2,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-6066 using VBA",
"fork": false,
"created_at": "2022-10-24T13:59:12Z",
"updated_at": "2022-11-08T23:45:31Z",
"updated_at": "2022-11-09T18:16:19Z",
"pushed_at": "2022-10-24T15:44:18Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 44,
"score": 0
}
]

View file

@ -1590,10 +1590,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2022-11-09T18:03:24Z",
"updated_at": "2022-11-09T23:54:07Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 873,
"watchers_count": 873,
"stargazers_count": 872,
"watchers_count": 872,
"has_discussions": false,
"forks_count": 285,
"allow_forking": true,
@ -1602,7 +1602,7 @@
"topics": [],
"visibility": "public",
"forks": 285,
"watchers": 873,
"watchers": 872,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2022-11-09T18:05:14Z",
"updated_at": "2022-11-09T18:34:28Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 303,
"watchers_count": 303,
"stargazers_count": 304,
"watchers_count": 304,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 303,
"watchers": 304,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Decrypt FortiGate configuration secrets",
"fork": false,
"created_at": "2021-12-21T15:28:00Z",
"updated_at": "2022-03-01T08:43:51Z",
"updated_at": "2022-11-09T18:14:51Z",
"pushed_at": "2021-12-21T15:35:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -81,7 +81,7 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -102,7 +102,7 @@
"zimbra"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 6,
"score": 0
},

View file

@ -1,31 +1,31 @@
[
{
"id": 235790827,
"id": 236109748,
"name": "CVE-2020-0674",
"full_name": "suspiciousbytes\/CVE-2020-0674",
"full_name": "5l1v3r1\/CVE-2020-0674",
"owner": {
"login": "suspiciousbytes",
"id": 2205121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2205121?v=4",
"html_url": "https:\/\/github.com\/suspiciousbytes"
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/suspiciousbytes\/CVE-2020-0674",
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0674",
"description": "Info about CVE-2020-0674",
"fork": false,
"created_at": "2020-01-23T12:30:51Z",
"updated_at": "2022-11-09T18:06:01Z",
"created_at": "2020-01-25T01:08:08Z",
"updated_at": "2022-11-09T23:02:59Z",
"pushed_at": "2020-01-23T12:54:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 9,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 15,
"forks": 0,
"watchers": 0,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Exploit for CVE-2021-25741 vulnerability",
"fork": false,
"created_at": "2022-01-19T14:05:20Z",
"updated_at": "2022-11-09T18:15:08Z",
"updated_at": "2022-11-09T19:44:28Z",
"pushed_at": "2022-01-19T19:15:36Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 21,
"forks": 8,
"watchers": 22,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2022-11-09T18:12:43Z",
"updated_at": "2022-11-09T22:36:00Z",
"pushed_at": "2022-06-02T17:56:26Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 253,
"watchers": 254,
"score": 0
}
]

View file

@ -913,7 +913,7 @@
"stargazers_count": 657,
"watchers_count": 657,
"has_discussions": false,
"forks_count": 141,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -921,7 +921,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 141,
"forks": 142,
"watchers": 657,
"score": 0
},

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-11-09T18:14:44Z",
"updated_at": "2022-11-09T22:42:47Z",
"pushed_at": "2022-09-01T21:30:25Z",
"stargazers_count": 466,
"watchers_count": 466,
"stargazers_count": 467,
"watchers_count": 467,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 466,
"watchers": 467,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 11,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-11-09T18:15:17Z",
"updated_at": "2022-11-09T23:13:53Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 653,
"watchers_count": 653,
"stargazers_count": 654,
"watchers_count": 654,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 653,
"watchers": 654,
"score": 0
}
]

View file

@ -47,13 +47,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "Zimbra Unauthenticated Remote Code Execution Exploit (CVE-2022-27925)",
"fork": false,
"created_at": "2022-08-14T22:22:55Z",
"updated_at": "2022-10-15T14:21:54Z",
"updated_at": "2022-11-09T20:27:19Z",
"pushed_at": "2022-09-05T22:05:53Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 53,
"watchers": 54,
"score": 0
},
{
@ -169,10 +169,10 @@
"description": "Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)",
"fork": false,
"created_at": "2022-08-26T20:19:48Z",
"updated_at": "2022-10-11T02:27:42Z",
"updated_at": "2022-11-09T20:27:55Z",
"pushed_at": "2022-09-17T16:56:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-11-09T18:16:20Z",
"updated_at": "2022-11-09T23:32:55Z",
"pushed_at": "2022-11-07T16:21:14Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 260,
"watchers_count": 260,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 256,
"forks": 43,
"watchers": 260,
"score": 0
},
{

View file

@ -73,10 +73,10 @@
"description": "Apache Spark Command Injection PoC Exploit for CVE-2022-33891",
"fork": false,
"created_at": "2022-07-19T23:16:27Z",
"updated_at": "2022-09-11T19:04:30Z",
"updated_at": "2022-11-09T18:31:05Z",
"pushed_at": "2022-07-21T08:32:08Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-11-09T18:11:29Z",
"pushed_at": "2022-11-09T09:36:16Z",
"stargazers_count": 523,
"watchers_count": 523,
"updated_at": "2022-11-09T20:05:16Z",
"pushed_at": "2022-11-09T19:14:27Z",
"stargazers_count": 524,
"watchers_count": 524,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 523,
"watchers": 524,
"score": 0
},
{
@ -47,10 +47,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-30T23:32:56Z",
"updated_at": "2022-11-09T18:16:20Z",
"updated_at": "2022-11-09T19:56:06Z",
"pushed_at": "2022-11-01T19:56:40Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 160,
"watchers": 161,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
"updated_at": "2022-11-09T18:19:00Z",
"updated_at": "2022-11-10T00:08:19Z",
"pushed_at": "2022-11-09T14:42:56Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 8,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 16,
"forks": 10,
"watchers": 31,
"score": 0
}
]

View file

@ -228,10 +228,10 @@
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
"fork": false,
"created_at": "2022-10-20T03:11:03Z",
"updated_at": "2022-11-09T18:16:19Z",
"updated_at": "2022-11-09T18:47:25Z",
"pushed_at": "2022-10-20T06:36:42Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 20,
"watchers": 21,
"score": 0
},
{

View file

@ -9524,7 +9524,7 @@ An elevation of privilege vulnerability exists in the way that the Windows Kerne
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
</code>
- [suspiciousbytes/CVE-2020-0674](https://github.com/suspiciousbytes/CVE-2020-0674)
- [5l1v3r1/CVE-2020-0674](https://github.com/5l1v3r1/CVE-2020-0674)
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)