Auto Update 2022/09/15 00:17:07

This commit is contained in:
motikan2010-bot 2022-09-15 09:17:07 +09:00
parent 17a890abda
commit 3a061a56a9
17 changed files with 99 additions and 66 deletions

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 40,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-09-10T16:20:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
}

File diff suppressed because one or more lines are too long

View file

@ -419,10 +419,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2022-09-14T08:38:17Z",
"updated_at": "2022-09-14T23:44:58Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"forks_count": 402,
"allow_forking": true,
"is_template": false,
@ -434,7 +434,7 @@
],
"visibility": "public",
"forks": 402,
"watchers": 645,
"watchers": 646,
"score": 0
},
{
@ -563,10 +563,10 @@
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
"fork": false,
"created_at": "2017-01-20T05:28:04Z",
"updated_at": "2022-08-09T04:30:33Z",
"updated_at": "2022-09-14T22:09:04Z",
"pushed_at": "2017-01-27T10:04:07Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 259,
"watchers_count": 259,
"forks_count": 104,
"allow_forking": true,
"is_template": false,
@ -574,7 +574,7 @@
"topics": [],
"visibility": "public",
"forks": 104,
"watchers": 258,
"watchers": 259,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1734,
"watchers_count": 1734,
"forks_count": 262,
"forks_count": 263,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 262,
"forks": 263,
"watchers": 1734,
"score": 0
},

File diff suppressed because one or more lines are too long

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2022-09-12T13:59:15Z",
"updated_at": "2022-09-14T18:53:41Z",
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 652,
"watchers_count": 652,
"stargazers_count": 653,
"watchers_count": 653,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 652,
"watchers": 653,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A proof-of-concept for CVE-2020-12753",
"fork": false,
"created_at": "2020-06-01T21:58:42Z",
"updated_at": "2022-05-11T21:21:22Z",
"updated_at": "2022-09-14T23:22:48Z",
"pushed_at": "2020-06-01T22:55:46Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2022-09-14T17:32:44Z",
"updated_at": "2022-09-15T00:16:52Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 17,
"forks": 3,
"watchers": 25,
"score": 0
}
]

View file

@ -140,18 +140,18 @@
"description": "An extended proof-of-concept for the CVE-2021-21551 Dell dbutil_2_3.sys Kernel Exploit.",
"fork": false,
"created_at": "2021-06-02T05:13:07Z",
"updated_at": "2022-09-13T19:45:45Z",
"updated_at": "2022-09-14T18:52:58Z",
"pushed_at": "2021-07-20T03:03:30Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"forks": 1,
"watchers": 9,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
"fork": false,
"created_at": "2021-12-10T06:15:38Z",
"updated_at": "2022-08-22T13:26:50Z",
"updated_at": "2022-09-14T22:58:55Z",
"pushed_at": "2021-12-16T01:33:48Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 180,
"watchers": 181,
"score": 0
},
{
@ -430,7 +430,7 @@
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1470,
"watchers_count": 1470,
"forks_count": 408,
"forks_count": 407,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -441,7 +441,7 @@
"security"
],
"visibility": "public",
"forks": 408,
"forks": 407,
"watchers": 1470,
"score": 0
},

View file

@ -69,10 +69,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-18T07:51:18Z",
"updated_at": "2022-06-08T18:29:08Z",
"updated_at": "2022-09-15T00:01:21Z",
"pushed_at": "2022-04-18T07:55:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

30
2022/CVE-2022-2546.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 536722713,
"name": "CVE-2022-2546",
"full_name": "0xvinix\/CVE-2022-2546",
"owner": {
"login": "0xvinix",
"id": 51921808,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51921808?v=4",
"html_url": "https:\/\/github.com\/0xvinix"
},
"html_url": "https:\/\/github.com\/0xvinix\/CVE-2022-2546",
"description": "CVE-2022-2546 explained",
"fork": false,
"created_at": "2022-09-14T19:03:43Z",
"updated_at": "2022-09-14T19:03:43Z",
"pushed_at": "2022-09-14T19:15:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-09-14T12:13:52Z",
"updated_at": "2022-09-14T19:04:45Z",
"pushed_at": "2022-08-29T12:54:56Z",
"stargazers_count": 757,
"watchers_count": 757,
"stargazers_count": 758,
"watchers_count": 758,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 138,
"watchers": 757,
"watchers": 758,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "HIP2022 presentation materials.",
"fork": false,
"created_at": "2022-09-14T13:59:21Z",
"updated_at": "2022-09-14T15:04:20Z",
"updated_at": "2022-09-14T22:31:54Z",
"pushed_at": "2022-09-14T14:19:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2022-09-14T18:05:46Z",
"updated_at": "2022-09-14T21:58:06Z",
"pushed_at": "2022-09-14T07:45:40Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 40,
"watchers": 42,
"score": 0
}
]

View file

@ -535,6 +535,9 @@ It was found that Quarkus 2.10.x does not terminate HTTP requests header context
- [yuxblank/CVE-2022-2466---Request-Context-not-terminated-with-GraphQL](https://github.com/yuxblank/CVE-2022-2466---Request-Context-not-terminated-with-GraphQL)
### CVE-2022-2546
- [0xvinix/CVE-2022-2546](https://github.com/0xvinix/CVE-2022-2546)
### CVE-2022-2586
- [aels/CVE-2022-2586-LPE](https://github.com/aels/CVE-2022-2586-LPE)