Auto Update 2023/02/27 00:27:57

This commit is contained in:
motikan2010-bot 2023-02-27 09:27:57 +09:00
parent b001a5311e
commit 71ca257747
30 changed files with 142 additions and 112 deletions

View file

@ -129,10 +129,10 @@
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2023-02-07T21:26:11Z",
"updated_at": "2023-02-26T20:26:19Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 228,
"watchers_count": 228,
"stargazers_count": 229,
"watchers_count": 229,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 228,
"watchers": 229,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 480,
"watchers_count": 480,
"has_discussions": false,
"forks_count": 472,
"forks_count": 471,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 472,
"forks": 471,
"watchers": 480,
"score": 0
},

View file

@ -92,13 +92,13 @@
"stargazers_count": 502,
"watchers_count": 502,
"has_discussions": false,
"forks_count": 184,
"forks_count": 183,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 184,
"forks": 183,
"watchers": 502,
"score": 0
},

View file

@ -83,7 +83,7 @@
"stargazers_count": 546,
"watchers_count": 546,
"has_discussions": false,
"forks_count": 176,
"forks_count": 177,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -99,7 +99,7 @@
"sa-core-2018-002"
],
"visibility": "public",
"forks": 176,
"forks": 177,
"watchers": 546,
"score": 0
},

View file

@ -1312,13 +1312,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 406,
"forks_count": 405,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 406,
"forks": 405,
"watchers": 3,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443",
"fork": false,
"created_at": "2022-03-15T04:54:31Z",
"updated_at": "2023-02-09T17:25:40Z",
"updated_at": "2023-02-26T18:36:30Z",
"pushed_at": "2022-03-15T05:15:48Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -1037,7 +1037,7 @@
"stargazers_count": 1236,
"watchers_count": 1236,
"has_discussions": false,
"forks_count": 371,
"forks_count": 370,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1049,7 +1049,7 @@
"smbghost"
],
"visibility": "public",
"forks": 371,
"forks": 370,
"watchers": 1236,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2023-02-20T01:20:09Z",
"updated_at": "2023-02-26T22:53:33Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 388,
"watchers_count": 388,
"stargazers_count": 387,
"watchers_count": 387,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 388,
"watchers": 387,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
"fork": false,
"created_at": "2021-06-05T15:05:01Z",
"updated_at": "2022-11-09T18:12:35Z",
"updated_at": "2023-02-26T19:35:43Z",
"pushed_at": "2021-09-20T07:58:29Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -1044,13 +1044,13 @@
"stargazers_count": 569,
"watchers_count": 569,
"has_discussions": false,
"forks_count": 155,
"forks_count": 156,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 155,
"forks": 156,
"watchers": 569,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
"fork": false,
"created_at": "2023-01-07T06:09:14Z",
"updated_at": "2023-01-23T11:55:51Z",
"updated_at": "2023-02-26T23:08:08Z",
"pushed_at": "2023-01-07T19:41:36Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system",
"fork": false,
"created_at": "2023-02-23T06:36:47Z",
"updated_at": "2023-02-24T22:46:45Z",
"updated_at": "2023-02-26T18:38:49Z",
"pushed_at": "2023-02-23T19:09:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -76,7 +76,7 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -86,7 +86,7 @@
"path-traversal-exploitation"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 3,
"score": 0
},
@ -167,13 +167,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0
},

View file

@ -3281,19 +3281,19 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2023-02-02T23:09:58Z",
"updated_at": "2023-02-26T21:14:28Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 340,
"forks": 50,
"watchers": 341,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "WordPress WP_Query SQL Injection POC",
"fork": false,
"created_at": "2022-07-28T13:12:51Z",
"updated_at": "2023-01-06T06:20:38Z",
"updated_at": "2023-02-26T18:36:45Z",
"pushed_at": "2022-07-30T08:20:53Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Authenticated Remote Command Execution in Gitlab via GitHub import",
"fork": false,
"created_at": "2022-10-08T11:42:49Z",
"updated_at": "2023-02-09T01:38:28Z",
"updated_at": "2023-02-26T19:35:32Z",
"pushed_at": "2022-10-09T03:54:53Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 203,
"watchers": 204,
"score": 0
},
{

View file

@ -129,7 +129,7 @@
"description": "Bitbucket CVE-2022-36804 unauthenticated remote command execution",
"fork": false,
"created_at": "2022-09-21T10:36:50Z",
"updated_at": "2023-01-21T19:03:58Z",
"updated_at": "2023-02-26T21:59:53Z",
"pushed_at": "2023-01-21T02:14:15Z",
"stargazers_count": 7,
"watchers_count": 7,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2023-02-26T13:29:28Z",
"updated_at": "2023-02-27T00:19:50Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 218,
"watchers_count": 218,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 217,
"watchers": 218,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)",
"fork": false,
"created_at": "2022-10-13T18:13:59Z",
"updated_at": "2023-02-26T00:31:09Z",
"updated_at": "2023-02-26T21:16:02Z",
"pushed_at": "2022-10-13T20:13:44Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 83,
"watchers": 84,
"score": 0
},
{
@ -100,7 +100,7 @@
"description": "Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false,
"created_at": "2022-10-13T21:07:50Z",
"updated_at": "2023-02-24T16:48:14Z",
"updated_at": "2023-02-26T21:59:46Z",
"pushed_at": "2023-01-21T02:17:48Z",
"stargazers_count": 15,
"watchers_count": 15,

View file

@ -129,7 +129,7 @@
"description": "CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server",
"fork": false,
"created_at": "2022-10-09T15:27:40Z",
"updated_at": "2023-02-13T03:21:21Z",
"updated_at": "2023-02-26T22:00:00Z",
"pushed_at": "2023-01-21T01:57:59Z",
"stargazers_count": 75,
"watchers_count": 75,

View file

@ -13,19 +13,19 @@
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
"fork": false,
"created_at": "2022-10-01T11:53:14Z",
"updated_at": "2023-02-21T15:10:33Z",
"updated_at": "2023-02-26T21:14:09Z",
"pushed_at": "2023-01-03T08:37:33Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 75,
"forks": 20,
"watchers": 76,
"score": 0
},
{
@ -129,12 +129,12 @@
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
"fork": false,
"created_at": "2022-12-22T09:35:26Z",
"updated_at": "2023-02-25T13:00:40Z",
"updated_at": "2023-02-26T22:17:00Z",
"pushed_at": "2023-01-10T08:09:36Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -148,8 +148,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 23,
"watchers": 57,
"forks": 24,
"watchers": 58,
"score": 0
},
{

View file

@ -272,7 +272,7 @@
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
"fork": false,
"created_at": "2022-10-19T11:49:08Z",
"updated_at": "2023-01-21T01:52:55Z",
"updated_at": "2023-02-26T22:00:23Z",
"pushed_at": "2023-01-21T01:52:51Z",
"stargazers_count": 42,
"watchers_count": 42,

View file

@ -281,7 +281,7 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
"fork": false,
"created_at": "2023-02-13T02:00:51Z",
"updated_at": "2023-02-13T02:27:18Z",
"updated_at": "2023-02-26T21:58:54Z",
"pushed_at": "2023-02-13T02:26:56Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -117,20 +117,49 @@
},
{
"id": 606615026,
"name": "Analysis4CVE-2023-0669",
"full_name": "yosef0x01\/Analysis4CVE-2023-0669",
"name": "CVE-2023-0669-Analysis",
"full_name": "yosef0x01\/CVE-2023-0669-Analysis",
"owner": {
"login": "yosef0x01",
"id": 96077889,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96077889?v=4",
"html_url": "https:\/\/github.com\/yosef0x01"
},
"html_url": "https:\/\/github.com\/yosef0x01\/Analysis4CVE-2023-0669",
"html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-0669-Analysis",
"description": null,
"fork": false,
"created_at": "2023-02-26T02:33:54Z",
"updated_at": "2023-02-26T02:33:54Z",
"pushed_at": "2023-02-26T02:46:02Z",
"updated_at": "2023-02-26T22:38:19Z",
"pushed_at": "2023-02-26T22:38:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 606877054,
"name": "CVE-2023-0669-bis",
"full_name": "trhacknon\/CVE-2023-0669-bis",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2023-0669-bis",
"description": null,
"fork": false,
"created_at": "2023-02-26T20:22:20Z",
"updated_at": "2023-02-26T20:22:36Z",
"pushed_at": "2023-02-26T20:22:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-01-30T12:57:48Z",
"updated_at": "2023-02-26T06:29:49Z",
"updated_at": "2023-02-26T22:11:54Z",
"pushed_at": "2023-02-03T03:07:59Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 152,
"watchers": 153,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-02-26T18:00:44Z",
"updated_at": "2023-02-27T00:23:42Z",
"pushed_at": "2023-02-26T11:24:37Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"weblogic"
],
"visibility": "public",
"forks": 21,
"watchers": 171,
"forks": 22,
"watchers": 174,
"score": 0
},
{
@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-21T16:08:56Z",
"updated_at": "2023-02-26T11:37:11Z",
"updated_at": "2023-02-27T00:20:39Z",
"pushed_at": "2023-02-26T06:43:18Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 136,
"watchers": 137,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.",
"fork": false,
"created_at": "2023-01-24T08:33:19Z",
"updated_at": "2023-02-26T14:32:05Z",
"updated_at": "2023-02-26T22:14:26Z",
"pushed_at": "2023-01-24T12:51:29Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -219,10 +219,10 @@
"description": "simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose",
"fork": false,
"created_at": "2023-02-24T01:33:55Z",
"updated_at": "2023-02-25T12:16:13Z",
"updated_at": "2023-02-26T19:07:35Z",
"pushed_at": "2023-02-24T04:45:36Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -231,7 +231,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2023-02-07T15:33:41Z",
"updated_at": "2023-02-25T00:09:16Z",
"updated_at": "2023-02-26T20:21:14Z",
"pushed_at": "2023-02-09T09:06:15Z",
"stargazers_count": 29,
"watchers_count": 29,
@ -71,10 +71,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-02-26T14:14:03Z",
"updated_at": "2023-02-26T20:36:10Z",
"pushed_at": "2023-02-24T15:39:38Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 36,
"watchers": 38,
"score": 0
}
]

View file

@ -36,7 +36,8 @@ Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication
- [cataiovita/CVE-2023-0669](https://github.com/cataiovita/CVE-2023-0669)
- [Griffin-01/CVE-2023-0669](https://github.com/Griffin-01/CVE-2023-0669)
- [trhacknon/CVE-2023-0669](https://github.com/trhacknon/CVE-2023-0669)
- [yosef0x01/Analysis4CVE-2023-0669](https://github.com/yosef0x01/Analysis4CVE-2023-0669)
- [yosef0x01/CVE-2023-0669-Analysis](https://github.com/yosef0x01/CVE-2023-0669-Analysis)
- [trhacknon/CVE-2023-0669-bis](https://github.com/trhacknon/CVE-2023-0669-bis)
### CVE-2023-0748 (2023-02-08)