Auto Update 2022/02/19 06:14:03

This commit is contained in:
motikan2010-bot 2022-02-19 15:14:03 +09:00
parent 6f47ff593a
commit 3bf312cfac
15 changed files with 72 additions and 67 deletions

View file

@ -75,7 +75,7 @@
"fork": false,
"created_at": "2020-05-12T20:39:24Z",
"updated_at": "2020-10-09T06:41:30Z",
"pushed_at": "2022-02-13T19:14:22Z",
"pushed_at": "2022-02-19T06:02:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,

View file

@ -233,12 +233,12 @@
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 140,
"score": 0
},
@ -377,12 +377,12 @@
"pushed_at": "2019-11-06T15:48:18Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 13,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-02-18T15:28:11Z",
"updated_at": "2022-02-19T03:58:58Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3167,
"watchers_count": 3167,
"stargazers_count": 3168,
"watchers_count": 3168,
"forks_count": 946,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 946,
"watchers": 3167,
"watchers": 3168,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Script that automates the process of escalating privileges on openbsd system (CVE-2019-19520) by exploiting the xlock binary and againing it's sgid and escalating to the root user by (CVE-2019-19522) exploiting the privileges of auth group and adding keys to the Skey or Yubikey",
"fork": false,
"created_at": "2020-11-21T07:30:10Z",
"updated_at": "2020-11-21T07:41:02Z",
"pushed_at": "2020-11-21T07:41:00Z",
"updated_at": "2022-02-19T04:11:28Z",
"pushed_at": "2022-02-19T04:11:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2022-02-08T14:25:07Z",
"updated_at": "2022-02-19T01:24:41Z",
"pushed_at": "2021-02-18T04:17:07Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-11T13:09:52Z",
"updated_at": "2021-05-09T12:11:55Z",
"pushed_at": "2022-02-13T13:19:40Z",
"pushed_at": "2022-02-19T02:06:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-02-18T15:28:11Z",
"updated_at": "2022-02-19T03:58:58Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3167,
"watchers_count": 3167,
"stargazers_count": 3168,
"watchers_count": 3168,
"forks_count": 946,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 946,
"watchers": 3167,
"watchers": 3168,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
"fork": false,
"created_at": "2022-02-18T14:19:58Z",
"updated_at": "2022-02-18T23:03:45Z",
"updated_at": "2022-02-19T06:11:17Z",
"pushed_at": "2022-02-18T14:23:07Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"forks": 2,
"watchers": 24,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2022-02-18T15:00:16Z",
"updated_at": "2022-02-19T03:27:11Z",
"pushed_at": "2021-07-09T19:38:41Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 65,
"watchers": 66,
"score": 0
}
]

View file

@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-02-18T15:45:26Z",
"updated_at": "2022-02-19T06:12:47Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1325,
"watchers_count": 1325,
"stargazers_count": 1327,
"watchers_count": 1327,
"forks_count": 380,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 380,
"watchers": 1325,
"watchers": 1327,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-02-15T08:16:44Z",
"updated_at": "2022-02-19T05:06:02Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1367,
"watchers_count": 1367,
"stargazers_count": 1368,
"watchers_count": 1368,
"forks_count": 450,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 450,
"watchers": 1367,
"watchers": 1368,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-02-18T20:49:45Z",
"updated_at": "2022-02-19T05:01:58Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 50,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 253,
"forks": 51,
"watchers": 254,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 99,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 99,
"forks": 100,
"watchers": 336,
"score": 0
},
@ -862,7 +862,7 @@
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 695,
"watchers_count": 695,
"forks_count": 108,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [
@ -887,7 +887,7 @@
"writeups"
],
"visibility": "public",
"forks": 108,
"forks": 109,
"watchers": 695,
"score": 0
},
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-02-18T05:07:40Z",
"updated_at": "2022-02-19T02:34:54Z",
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1244,
"watchers_count": 1244,
"forks_count": 327,
"stargazers_count": 1245,
"watchers_count": 1245,
"forks_count": 328,
"allow_forking": true,
"is_template": false,
"topics": [
@ -919,8 +919,8 @@
"security"
],
"visibility": "public",
"forks": 327,
"watchers": 1244,
"forks": 328,
"watchers": 1245,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "cve-2022-23131 exp",
"fork": false,
"created_at": "2022-02-18T08:38:53Z",
"updated_at": "2022-02-18T21:20:28Z",
"updated_at": "2022-02-19T03:27:14Z",
"pushed_at": "2022-02-18T08:51:50Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 22,
"watchers": 25,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "cve-2022-23131 zabbix-saml-bypass-exp",
"fork": false,
"created_at": "2022-02-18T11:51:47Z",
"updated_at": "2022-02-18T23:52:59Z",
"updated_at": "2022-02-19T06:12:29Z",
"pushed_at": "2022-02-18T12:00:19Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 9,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 16,
"forks": 10,
"watchers": 23,
"score": 0
},
{
@ -94,8 +94,8 @@
"description": null,
"fork": false,
"created_at": "2022-02-18T14:48:53Z",
"updated_at": "2022-02-18T14:48:53Z",
"pushed_at": "2022-02-18T15:19:06Z",
"updated_at": "2022-02-19T03:14:49Z",
"pushed_at": "2022-02-19T03:14:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -260,7 +260,12 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
### CVE-2022-24693
- [lukejenkins/CVE-2022-24693](https://github.com/lukejenkins/CVE-2022-24693)
### CVE-2022-25256
### CVE-2022-25256 (2022-02-18)
<code>
SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
</code>
- [RobertDra/CVE-2022-25256](https://github.com/RobertDra/CVE-2022-25256)
### CVE-2022-25257