Auto Update 2023/05/06 00:28:45

This commit is contained in:
motikan2010-bot 2023-05-06 09:28:45 +09:00
parent 8e2e89cd8a
commit 34d21f5fb8
14 changed files with 102 additions and 54 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-9506 - SSRF",
"fork": false,
"created_at": "2018-04-25T11:25:18Z",
"updated_at": "2023-03-04T14:40:45Z",
"updated_at": "2023-05-05T23:13:22Z",
"pushed_at": "2022-02-14T22:00:28Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 50,
"watchers": 171,
"watchers": 172,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2023-02-23T20:02:07Z",
"updated_at": "2023-05-05T23:35:03Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 54,
"watchers": 53,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the \"manage files\" functionality, which may result in remote code execution.",
"fork": false,
"created_at": "2022-06-04T21:09:38Z",
"updated_at": "2023-04-14T16:51:35Z",
"updated_at": "2023-05-05T19:27:14Z",
"pushed_at": "2022-06-04T21:11:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)",
"fork": false,
"created_at": "2022-06-04T21:22:10Z",
"updated_at": "2023-03-14T23:18:31Z",
"updated_at": "2023-05-05T19:26:18Z",
"pushed_at": "2022-06-04T21:24:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 7,
"score": 0
}

View file

@ -860,10 +860,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-05-05T17:28:06Z",
"updated_at": "2023-05-05T19:41:56Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 887,
"watchers_count": 887,
"stargazers_count": 888,
"watchers_count": 888,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -892,7 +892,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 887,
"watchers": 888,
"score": 0
},
{
@ -3647,10 +3647,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-05-05T17:28:07Z",
"updated_at": "2023-05-05T20:48:51Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3241,
"watchers_count": 3241,
"stargazers_count": 3240,
"watchers_count": 3240,
"has_discussions": true,
"forks_count": 744,
"allow_forking": true,
@ -3659,7 +3659,7 @@
"topics": [],
"visibility": "public",
"forks": 744,
"watchers": 3241,
"watchers": 3240,
"score": 0
},
{

View file

@ -193,10 +193,10 @@
"description": "Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.",
"fork": false,
"created_at": "2023-01-13T13:31:34Z",
"updated_at": "2023-04-10T04:44:15Z",
"updated_at": "2023-05-05T22:45:42Z",
"pushed_at": "2023-04-07T15:01:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -210,7 +210,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -137,10 +137,10 @@
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-01-05T16:56:06Z",
"updated_at": "2023-05-05T17:10:21Z",
"updated_at": "2023-05-05T19:30:21Z",
"pushed_at": "2023-05-05T18:06:58Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -153,7 +153,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-46718: an app may be able to read sensitive location information.",
"fork": false,
"created_at": "2023-05-01T18:34:52Z",
"updated_at": "2023-05-03T14:40:16Z",
"updated_at": "2023-05-05T19:54:16Z",
"pushed_at": "2023-05-01T18:48:34Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -42,19 +42,19 @@
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
"updated_at": "2023-05-05T18:27:45Z",
"updated_at": "2023-05-05T23:53:34Z",
"pushed_at": "2023-05-05T04:30:53Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 5,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 32,
"forks": 8,
"watchers": 42,
"score": 0
}
]

View file

@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-05-05T07:23:19Z",
"updated_at": "2023-05-05T19:13:30Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 321,
"watchers": 322,
"score": 0
},
{

View file

@ -42,19 +42,28 @@
"description": "VM Escape for Parallels Desktop <18.1.1",
"fork": false,
"created_at": "2023-05-05T14:11:18Z",
"updated_at": "2023-05-05T17:53:18Z",
"pushed_at": "2023-05-05T14:12:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2023-05-05T21:16:17Z",
"pushed_at": "2023-05-05T19:08:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-27326",
"exploit",
"local-attacker",
"parallel-desktop",
"privilege-escalation",
"toolgate",
"vm",
"vm-escape"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

31
2023/CVE-2023-28231.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 636872469,
"name": "CVE-2023-28231",
"full_name": "glavstroy\/CVE-2023-28231",
"owner": {
"login": "glavstroy",
"id": 73027590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73027590?v=4",
"html_url": "https:\/\/github.com\/glavstroy"
},
"html_url": "https:\/\/github.com\/glavstroy\/CVE-2023-28231",
"description": "DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019",
"fork": false,
"created_at": "2023-05-05T21:13:13Z",
"updated_at": "2023-05-05T21:15:27Z",
"pushed_at": "2023-05-05T21:15:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -898,6 +898,14 @@ An out-of-bounds write issue was addressed with improved input validation. This
- [ZZY3312/CVE-2023-28206](https://github.com/ZZY3312/CVE-2023-28206)
### CVE-2023-28231 (2023-04-11)
<code>
DHCP Server Service Remote Code Execution Vulnerability
</code>
- [glavstroy/CVE-2023-28231](https://github.com/glavstroy/CVE-2023-28231)
### CVE-2023-28343 (2023-03-14)
<code>