Auto Update 2024/01/06 00:28:37

This commit is contained in:
motikan2010-bot 2024-01-06 09:28:37 +09:00
parent c023cad2e1
commit 69295d55ce
23 changed files with 129 additions and 59 deletions

View file

@ -31,6 +31,36 @@
"score": 0,
"subscribers_count": 17
},
{
"id": 163681865,
"name": "vulnkeys",
"full_name": "avarx\/vulnkeys",
"owner": {
"login": "avarx",
"id": 1161946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1161946?v=4",
"html_url": "https:\/\/github.com\/avarx"
},
"html_url": "https:\/\/github.com\/avarx\/vulnkeys",
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2018-12-31T16:09:49Z",
"updated_at": "2018-12-31T16:11:19Z",
"pushed_at": "2018-12-31T16:11:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 492454353,
"name": "debianopenssl",

32
2008/CVE-2008-2019.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 276735337,
"name": "AudioCaptchaBypass-CVE-2008-2019",
"full_name": "TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"owner": {
"login": "TheRook",
"id": 521783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/521783?v=4",
"html_url": "https:\/\/github.com\/TheRook"
},
"html_url": "https:\/\/github.com\/TheRook\/AudioCaptchaBypass-CVE-2008-2019",
"description": null,
"fork": false,
"created_at": "2020-07-02T20:04:05Z",
"updated_at": "2023-01-10T03:21:40Z",
"pushed_at": "2020-07-02T21:27:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-01-05T06:29:51Z",
"pushed_at": "2024-01-05T09:09:00Z",
"pushed_at": "2024-01-05T20:15:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -62,7 +62,7 @@
"forks": 75,
"watchers": 13,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 186731659,

View file

@ -27,6 +27,6 @@
"forks": 40,
"watchers": 122,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -36,6 +36,6 @@
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2023-12-02T15:43:07Z",
"updated_at": "2024-01-05T18:37:54Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 314,
"watchers": 315,
"score": 0,
"subscribers_count": 8
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -175,13 +175,13 @@
"stargazers_count": 564,
"watchers_count": 564,
"has_discussions": false,
"forks_count": 144,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 144,
"forks": 145,
"watchers": 564,
"score": 0,
"subscribers_count": 14

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-01-04T16:59:03Z",
"updated_at": "2024-01-05T19:47:58Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1768,
"watchers_count": 1768,
"stargazers_count": 1769,
"watchers_count": 1769,
"has_discussions": false,
"forks_count": 585,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 585,
"watchers": 1768,
"watchers": 1769,
"score": 0,
"subscribers_count": 44
},

View file

@ -1457,6 +1457,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2024-01-02T08:36:33Z",
"updated_at": "2024-01-05T19:47:02Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 903,
"watchers_count": 903,
"stargazers_count": 904,
"watchers_count": 904,
"has_discussions": false,
"forks_count": 243,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 243,
"watchers": 903,
"watchers": 904,
"score": 0,
"subscribers_count": 27
},

View file

@ -307,7 +307,7 @@
"forks": 41,
"watchers": 61,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 452126288,

View file

@ -13,19 +13,19 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-01-04T17:04:06Z",
"updated_at": "2024-01-05T19:47:44Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1274,
"watchers_count": 1274,
"stargazers_count": 1275,
"watchers_count": 1275,
"has_discussions": false,
"forks_count": 316,
"forks_count": 317,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 316,
"watchers": 1274,
"forks": 317,
"watchers": 1275,
"score": 0,
"subscribers_count": 27
},

View file

@ -5184,7 +5184,7 @@
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 438032826,
@ -7116,7 +7116,7 @@
"forks": 18,
"watchers": 2,
"score": 0,
"subscribers_count": 8
"subscribers_count": 7
},
{
"id": 438773632,
@ -8282,7 +8282,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 439409726,

View file

@ -13,10 +13,10 @@
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
"updated_at": "2023-06-15T13:34:33Z",
"updated_at": "2024-01-05T22:12:37Z",
"pushed_at": "2022-03-09T00:09:46Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 6
},
@ -43,10 +43,10 @@
"description": "A script to check if a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-03-06T10:57:09Z",
"updated_at": "2023-09-28T11:36:45Z",
"updated_at": "2024-01-05T22:13:46Z",
"pushed_at": "2022-03-12T13:45:32Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 3
},

View file

@ -1871,10 +1871,10 @@
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
"fork": false,
"created_at": "2022-06-04T08:31:32Z",
"updated_at": "2023-12-25T07:32:22Z",
"updated_at": "2024-01-05T22:13:17Z",
"pushed_at": "2022-06-16T17:14:10Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1891,7 +1891,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -632,10 +632,10 @@
"description": "Perform With Mass Exploiter In Joomla 4.2.8.",
"fork": false,
"created_at": "2023-04-09T13:20:48Z",
"updated_at": "2023-11-25T20:07:33Z",
"updated_at": "2024-01-05T22:56:31Z",
"pushed_at": "2023-07-24T22:22:00Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -648,7 +648,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2024-01-05T15:07:48Z",
"updated_at": "2024-01-05T23:46:47Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 100,
"watchers": 102,
"score": 0,
"subscribers_count": 2
}

View file

@ -227,7 +227,7 @@
"fork": false,
"created_at": "2024-01-04T22:43:19Z",
"updated_at": "2024-01-05T02:09:03Z",
"pushed_at": "2024-01-05T02:08:58Z",
"pushed_at": "2024-01-05T23:46:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -81,7 +81,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -93,7 +93,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2

View file

@ -13,19 +13,19 @@
"description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false,
"created_at": "2023-12-26T17:02:20Z",
"updated_at": "2024-01-05T01:37:34Z",
"updated_at": "2024-01-05T19:38:18Z",
"pushed_at": "2023-12-26T20:16:45Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 15,
"forks": 7,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -38025,6 +38025,7 @@
</code>
- [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh)
- [avarx/vulnkeys](https://github.com/avarx/vulnkeys)
- [badkeys/debianopenssl](https://github.com/badkeys/debianopenssl)
- [demining/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166](https://github.com/demining/Vulnerable-to-Debian-OpenSSL-bug-CVE-2008-0166)
@ -38049,6 +38050,13 @@
- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
### CVE-2008-2019 (2008-04-29)
<code>Simple Machines Forum (SMF), probably 1.1.4, relies on &quot;randomly generated static&quot; to hinder brute-force attacks on the WAV file (aka audio) CAPTCHA, which allows remote attackers to pass the CAPTCHA test via an automated attack that considers Hamming distances. NOTE: this issue reportedly exists because of an insufficient fix for CVE-2007-3308.
</code>
- [TheRook/AudioCaptchaBypass-CVE-2008-2019](https://github.com/TheRook/AudioCaptchaBypass-CVE-2008-2019)
### CVE-2008-2938 (2008-08-12)
<code>Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370. NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.