Auto Update 2022/11/22 00:17:58

This commit is contained in:
motikan2010-bot 2022-11-22 09:17:58 +09:00
parent 8ce5944ef2
commit 5ecc645d20
11 changed files with 80 additions and 45 deletions

View file

@ -438,7 +438,7 @@
"stargazers_count": 681, "stargazers_count": 681,
"watchers_count": 681, "watchers_count": 681,
"has_discussions": false, "has_discussions": false,
"forks_count": 413, "forks_count": 412,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -448,7 +448,7 @@
"exploit" "exploit"
], ],
"visibility": "public", "visibility": "public",
"forks": 413, "forks": 412,
"watchers": 681, "watchers": 681,
"score": 0 "score": 0
}, },

View file

@ -1507,10 +1507,10 @@
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script", "description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
"fork": false, "fork": false,
"created_at": "2018-05-13T16:13:26Z", "created_at": "2018-05-13T16:13:26Z",
"updated_at": "2022-11-21T17:30:11Z", "updated_at": "2022-11-21T21:41:48Z",
"pushed_at": "2018-05-13T16:14:53Z", "pushed_at": "2018-05-13T16:14:53Z",
"stargazers_count": 10, "stargazers_count": 12,
"watchers_count": 10, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -1519,7 +1519,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 10, "watchers": 12,
"score": 0 "score": 0
}, },
{ {

View file

@ -18,13 +18,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 4,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -42,10 +42,10 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false, "fork": false,
"created_at": "2019-10-04T14:43:57Z", "created_at": "2019-10-04T14:43:57Z",
"updated_at": "2022-11-21T11:21:09Z", "updated_at": "2022-11-21T20:54:48Z",
"pushed_at": "2019-11-30T10:28:01Z", "pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 186, "stargazers_count": 188,
"watchers_count": 186, "watchers_count": 188,
"has_discussions": false, "has_discussions": false,
"forks_count": 105, "forks_count": 105,
"allow_forking": true, "allow_forking": true,
@ -54,7 +54,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 105, "forks": 105,
"watchers": 186, "watchers": 188,
"score": 0 "score": 0
}, },
{ {

View file

@ -1398,10 +1398,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC", "description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false, "fork": false,
"created_at": "2020-04-20T14:35:48Z", "created_at": "2020-04-20T14:35:48Z",
"updated_at": "2022-11-11T16:58:46Z", "updated_at": "2022-11-21T20:46:34Z",
"pushed_at": "2020-06-09T20:46:45Z", "pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 481, "stargazers_count": 480,
"watchers_count": 481, "watchers_count": 480,
"has_discussions": false, "has_discussions": false,
"forks_count": 154, "forks_count": 154,
"allow_forking": true, "allow_forking": true,
@ -1416,7 +1416,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 154, "forks": 154,
"watchers": 481, "watchers": 480,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Ubuntu OverlayFS Local Privesc", "description": "Ubuntu OverlayFS Local Privesc",
"fork": false, "fork": false,
"created_at": "2021-04-19T20:07:01Z", "created_at": "2021-04-19T20:07:01Z",
"updated_at": "2022-11-09T18:11:58Z", "updated_at": "2022-11-21T22:13:12Z",
"pushed_at": "2021-09-28T04:08:43Z", "pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 322, "stargazers_count": 323,
"watchers_count": 322, "watchers_count": 323,
"has_discussions": false, "has_discussions": false,
"forks_count": 122, "forks_count": 122,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 122, "forks": 122,
"watchers": 322, "watchers": 323,
"score": 0 "score": 0
}, },
{ {

View file

@ -1178,10 +1178,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false, "fork": false,
"created_at": "2021-12-13T03:57:50Z", "created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-11-21T13:25:26Z", "updated_at": "2022-11-21T20:11:59Z",
"pushed_at": "2022-10-20T15:37:44Z", "pushed_at": "2022-10-20T15:37:44Z",
"stargazers_count": 3112, "stargazers_count": 3113,
"watchers_count": 3112, "watchers_count": 3113,
"has_discussions": true, "has_discussions": true,
"forks_count": 731, "forks_count": 731,
"allow_forking": true, "allow_forking": true,
@ -1190,7 +1190,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 731, "forks": 731,
"watchers": 3112, "watchers": 3113,
"score": 0 "score": 0
}, },
{ {
@ -1790,10 +1790,10 @@
"description": "Sample docker-compose setup to show how this exploit works", "description": "Sample docker-compose setup to show how this exploit works",
"fork": false, "fork": false,
"created_at": "2021-12-14T02:26:52Z", "created_at": "2021-12-14T02:26:52Z",
"updated_at": "2022-03-23T12:22:08Z", "updated_at": "2022-11-21T21:14:16Z",
"pushed_at": "2022-01-14T14:13:07Z", "pushed_at": "2022-01-14T14:13:07Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -1802,7 +1802,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
}, },
{ {

View file

@ -2262,7 +2262,7 @@
"fork": false, "fork": false,
"created_at": "2022-11-16T16:57:14Z", "created_at": "2022-11-16T16:57:14Z",
"updated_at": "2022-11-20T12:33:30Z", "updated_at": "2022-11-20T12:33:30Z",
"pushed_at": "2022-11-19T23:29:15Z", "pushed_at": "2022-11-21T23:17:41Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -71,10 +71,10 @@
"description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit", "description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit",
"fork": false, "fork": false,
"created_at": "2022-05-28T10:46:48Z", "created_at": "2022-05-28T10:46:48Z",
"updated_at": "2022-11-06T05:21:18Z", "updated_at": "2022-11-21T19:42:10Z",
"pushed_at": "2022-05-28T10:50:30Z", "pushed_at": "2022-05-28T10:50:30Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -83,7 +83,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 11, "watchers": 12,
"score": 0 "score": 0
}, },
{ {
@ -158,10 +158,10 @@
"description": "CVE-2022-21661 exp for Elementor custom skin.", "description": "CVE-2022-21661 exp for Elementor custom skin.",
"fork": false, "fork": false,
"created_at": "2022-07-31T11:53:06Z", "created_at": "2022-07-31T11:53:06Z",
"updated_at": "2022-08-24T08:41:45Z", "updated_at": "2022-11-21T20:22:50Z",
"pushed_at": "2022-08-02T03:09:46Z", "pushed_at": "2022-08-02T03:09:46Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -170,7 +170,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
}, },
{ {

View file

@ -762,5 +762,34 @@
"forks": 4, "forks": 4,
"watchers": 3, "watchers": 3,
"score": 0 "score": 0
},
{
"id": 568995419,
"name": "CVE-2022-22954",
"full_name": "Jhonsonwannaa\/CVE-2022-22954",
"owner": {
"login": "Jhonsonwannaa",
"id": 114837630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
"html_url": "https:\/\/github.com\/Jhonsonwannaa"
},
"html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-11-21T21:22:39Z",
"updated_at": "2022-11-21T22:21:59Z",
"pushed_at": "2022-11-21T22:21:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -1316,6 +1316,7 @@ VMware Workspace ONE Access and Identity Manager contain a remote code execution
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) - [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
- [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_) - [lolminerxmrig/CVE-2022-22954_](https://github.com/lolminerxmrig/CVE-2022-22954_)
- [Jhonsonwannaa/CVE-2022-22954](https://github.com/Jhonsonwannaa/CVE-2022-22954)
### CVE-2022-22963 (2022-04-01) ### CVE-2022-22963 (2022-04-01)
@ -4282,12 +4283,7 @@ The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic key
### CVE-2022-41622 ### CVE-2022-41622
- [rbowes-r7/refreshing-soap-exploit](https://github.com/rbowes-r7/refreshing-soap-exploit) - [rbowes-r7/refreshing-soap-exploit](https://github.com/rbowes-r7/refreshing-soap-exploit)
### CVE-2022-41852 (2022-10-06) ### CVE-2022-41852
<code>
** DISPUTED ** This record was originally reported by the oss-fuzz project who failed to consider the security context in which JXPath is intended to be used and failed to contact the JXPath maintainers prior to requesting the CVE allocation. The CVE was then allocated by Google in breach of the CNA rules. After review by the JXPath maintainers, the original report was found to be invalid.
</code>
- [Warxim/CVE-2022-41852](https://github.com/Warxim/CVE-2022-41852) - [Warxim/CVE-2022-41852](https://github.com/Warxim/CVE-2022-41852)
### CVE-2022-42045 ### CVE-2022-42045
@ -4296,7 +4292,12 @@ The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic key
### CVE-2022-42094 ### CVE-2022-42094
- [bypazs/CVE-2022-42094](https://github.com/bypazs/CVE-2022-42094) - [bypazs/CVE-2022-42094](https://github.com/bypazs/CVE-2022-42094)
### CVE-2022-42096 ### CVE-2022-42096 (2022-11-21)
<code>
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content.
</code>
- [bypazs/CVE-2022-42096](https://github.com/bypazs/CVE-2022-42096) - [bypazs/CVE-2022-42096](https://github.com/bypazs/CVE-2022-42096)
### CVE-2022-42097 ### CVE-2022-42097
@ -13221,7 +13222,12 @@ The import.json.php file before 8.9 for Avideo is vulnerable to a File Deletion
- [ahussam/AVideo3xploit](https://github.com/ahussam/AVideo3xploit) - [ahussam/AVideo3xploit](https://github.com/ahussam/AVideo3xploit)
### CVE-2020-23582 ### CVE-2020-23582 (2022-11-21)
<code>
A vulnerability in the &quot;/admin/wlmultipleap.asp&quot; of optilink OP-XT71000N version: V2.2 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to create Multiple WLAN BSSID.
</code>
- [huzaifahussain98/CVE-2020-23582](https://github.com/huzaifahussain98/CVE-2020-23582) - [huzaifahussain98/CVE-2020-23582](https://github.com/huzaifahussain98/CVE-2020-23582)
### CVE-2020-23583 ### CVE-2020-23583