Auto Update 2023/01/27 18:30:39

This commit is contained in:
motikan2010-bot 2023-01-28 03:30:39 +09:00
parent 28fce0a1af
commit 48ee1552c0
20 changed files with 128 additions and 98 deletions

View file

@ -71,19 +71,19 @@
"description": null,
"fork": false,
"created_at": "2021-07-08T17:35:50Z",
"updated_at": "2023-01-13T18:19:24Z",
"updated_at": "2023-01-27T14:22:22Z",
"pushed_at": "2022-11-02T15:35:18Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 26,
"forks": 7,
"watchers": 27,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2023-01-13T03:10:58Z",
"updated_at": "2023-01-27T16:53:05Z",
"pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 330,
"watchers_count": 330,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 108,
"watchers": 329,
"watchers": 330,
"score": 0
},
{

View file

@ -111,10 +111,10 @@
"description": "This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).",
"fork": false,
"created_at": "2018-03-09T20:51:19Z",
"updated_at": "2022-11-10T02:40:59Z",
"updated_at": "2023-01-27T12:33:58Z",
"pushed_at": "2021-06-04T01:26:28Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -132,7 +132,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 19,
"watchers": 18,
"score": 0
},
{

View file

@ -110,10 +110,10 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
"updated_at": "2022-11-18T13:46:48Z",
"updated_at": "2023-01-27T15:13:48Z",
"pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -126,7 +126,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 170,
"watchers": 171,
"score": 0
},
{

View file

@ -42,7 +42,7 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-01-27T04:45:46Z",
"updated_at": "2023-01-27T12:53:25Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1545,
"watchers_count": 1545,

View file

@ -13,10 +13,10 @@
"description": "Cachet 2.4 Code Execution via Laravel Configuration Injection CVE-2021-39172",
"fork": false,
"created_at": "2022-09-17T07:58:33Z",
"updated_at": "2022-09-19T05:49:45Z",
"updated_at": "2023-01-27T16:44:17Z",
"pushed_at": "2023-01-22T13:45:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -164,10 +164,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2023-01-18T19:03:30Z",
"updated_at": "2023-01-27T16:58:15Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 940,
"watchers_count": 940,
"stargazers_count": 941,
"watchers_count": 941,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -180,7 +180,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 940,
"watchers": 941,
"score": 0
},
{

View file

@ -43,7 +43,7 @@
"fork": false,
"created_at": "2021-12-09T21:49:33Z",
"updated_at": "2022-12-28T06:36:13Z",
"pushed_at": "2021-12-20T19:13:02Z",
"pushed_at": "2023-01-27T17:34:36Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
@ -3619,13 +3619,13 @@
"stargazers_count": 3171,
"watchers_count": 3171,
"has_discussions": true,
"forks_count": 743,
"forks_count": 742,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 743,
"forks": 742,
"watchers": 3171,
"score": 0
},
@ -6842,10 +6842,10 @@
"description": "Small example repo for looking into log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T19:59:38Z",
"updated_at": "2023-01-17T08:58:13Z",
"updated_at": "2023-01-27T13:52:24Z",
"pushed_at": "2021-12-24T15:44:53Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -6854,7 +6854,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 66,
"watchers": 65,
"score": 0
},
{

View file

@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-01-20T00:34:09Z",
"updated_at": "2023-01-27T15:05:27Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 367,
"watchers_count": 367,
"stargazers_count": 368,
"watchers_count": 368,
"has_discussions": false,
"forks_count": 109,
"allow_forking": true,
@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 367,
"watchers": 368,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-12-02T18:52:20Z",
"updated_at": "2023-01-17T17:36:24Z",
"updated_at": "2023-01-27T16:09:21Z",
"pushed_at": "2022-12-16T05:29:11Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -35,8 +35,8 @@
"use-after-free"
],
"visibility": "public",
"forks": 21,
"watchers": 102,
"forks": 22,
"watchers": 103,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2022-12-07T11:29:44Z",
"updated_at": "2023-01-27T14:40:26Z",
"pushed_at": "2022-12-18T03:36:03Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for GLPI CVE-2022-31061",
"fork": false,
"created_at": "2022-08-09T07:09:52Z",
"updated_at": "2022-12-07T13:38:13Z",
"updated_at": "2023-01-27T16:31:50Z",
"pushed_at": "2022-08-08T08:04:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 29,
"watchers": 125,
"score": 0
},
{
"id": 594075430,
"name": "CVE-2022-32250-LPE",
"full_name": "ysanatomic\/CVE-2022-32250-LPE",
"owner": {
"login": "ysanatomic",
"id": 41269324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
"html_url": "https:\/\/github.com\/ysanatomic"
},
"html_url": "https:\/\/github.com\/ysanatomic\/CVE-2022-32250-LPE",
"description": "LPE PoC of a user-after-free vulnerability in the Linux netfilter subsystem.",
"fork": false,
"created_at": "2023-01-27T14:44:39Z",
"updated_at": "2023-01-27T17:55:22Z",
"pushed_at": "2023-01-27T17:51:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
"fork": false,
"created_at": "2022-12-25T04:34:26Z",
"updated_at": "2023-01-27T04:22:36Z",
"updated_at": "2023-01-27T15:39:02Z",
"pushed_at": "2022-12-27T21:30:08Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 38,
"watchers": 39,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2023-01-26T20:59:21Z",
"updated_at": "2023-01-27T13:48:30Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 37,
"forks": 5,
"watchers": 38,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-01-27T01:30:16Z",
"updated_at": "2023-01-27T17:18:15Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 280,
"watchers_count": 280,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 278,
"watchers": 280,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2023-01-27T05:14:53Z",
"updated_at": "2023-01-27T15:15:58Z",
"pushed_at": "2023-01-18T20:06:53Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 75,
"watchers": 76,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-01-27T03:44:16Z",
"updated_at": "2023-01-27T14:28:41Z",
"pushed_at": "2023-01-22T09:55:49Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 645,
"watchers": 646,
"score": 0
},
{
@ -221,10 +221,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
"updated_at": "2023-01-27T02:53:50Z",
"updated_at": "2023-01-27T16:45:30Z",
"pushed_at": "2023-01-23T07:14:48Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -235,7 +235,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 116,
"watchers": 117,
"score": 0
},
{
@ -253,7 +253,7 @@
"fork": false,
"created_at": "2023-01-12T14:31:30Z",
"updated_at": "2023-01-27T03:00:54Z",
"pushed_at": "2023-01-26T19:09:35Z",
"pushed_at": "2023-01-27T13:59:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
"fork": false,
"created_at": "2023-01-17T21:26:28Z",
"updated_at": "2023-01-27T08:57:25Z",
"updated_at": "2023-01-27T15:49:23Z",
"pushed_at": "2023-01-19T13:10:07Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-21T01:02:01Z",
"updated_at": "2023-01-27T11:34:51Z",
"updated_at": "2023-01-27T14:00:25Z",
"pushed_at": "2023-01-21T14:23:42Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 30,
"watchers": 31,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "POC and Scanner for CVE-2023-24055",
"fork": false,
"created_at": "2023-01-24T19:19:23Z",
"updated_at": "2023-01-27T08:55:14Z",
"updated_at": "2023-01-27T18:05:10Z",
"pushed_at": "2023-01-25T00:04:57Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"forks": 6,
"watchers": 33,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false,
"created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-01-27T09:55:01Z",
"updated_at": "2023-01-27T17:28:37Z",
"pushed_at": "2023-01-25T06:29:15Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 54,
"watchers": 60,
"score": 0
}
]

View file

@ -3885,6 +3885,7 @@ net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local
</code>
- [theori-io/CVE-2022-32250-exploit](https://github.com/theori-io/CVE-2022-32250-exploit)
- [ysanatomic/CVE-2022-32250-LPE](https://github.com/ysanatomic/CVE-2022-32250-LPE)
### CVE-2022-32532 (2022-06-28)
@ -5079,7 +5080,7 @@ Insufficiently Protected Credentials in the AD/LDAP server settings in 1C-Bitrix
### CVE-2022-44149 (2023-01-06)
<code>
The web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 devices allows remote OS command execution by placing &amp;telnetd in the JSON host field to the ping feature of the goform/sysTools component. Authentication is required.
The web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 and 80.103.2.5045 devices allows remote OS command execution by placing &amp;telnetd in the JSON host field to the ping feature of the goform/sysTools component. Authentication is required
</code>
- [yerodin/CVE-2022-44149](https://github.com/yerodin/CVE-2022-44149)