Auto Update 2023/04/22 18:28:33

This commit is contained in:
motikan2010-bot 2023-04-23 03:28:33 +09:00
parent e6e5088621
commit 75d7d365cb
25 changed files with 169 additions and 100 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2015-1157 telnet server",
"fork": false,
"created_at": "2015-10-14T04:43:29Z",
"updated_at": "2016-10-02T14:49:36Z",
"updated_at": "2023-04-22T17:30:32Z",
"pushed_at": "2015-10-28T04:49:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2015-7547",
"fork": false,
"created_at": "2016-02-10T21:13:54Z",
"updated_at": "2023-03-14T19:59:25Z",
"updated_at": "2023-04-22T15:38:54Z",
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 547,
"watchers_count": 547,
"has_discussions": false,
"forks_count": 177,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 177,
"watchers": 546,
"watchers": 547,
"score": 0
},
{

View file

@ -1832,13 +1832,13 @@
"stargazers_count": 1136,
"watchers_count": 1136,
"has_discussions": false,
"forks_count": 355,
"forks_count": 354,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 355,
"forks": 354,
"watchers": 1136,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2023-03-18T17:14:43Z",
"updated_at": "2023-04-22T13:23:16Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 170,
"watchers": 171,
"score": 0
},
{

View file

@ -79,7 +79,7 @@
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 65,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -89,7 +89,7 @@
"rce"
],
"visibility": "public",
"forks": 65,
"forks": 64,
"watchers": 148,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2023-04-05T09:34:43Z",
"updated_at": "2023-04-22T15:39:57Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 155,
"watchers": 156,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
"updated_at": "2022-11-09T18:09:49Z",
"updated_at": "2023-04-22T16:30:44Z",
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 183,
"watchers": 184,
"score": 0
}
]

View file

@ -43,7 +43,7 @@
"fork": false,
"created_at": "2023-04-20T06:00:13Z",
"updated_at": "2023-04-20T06:01:06Z",
"pushed_at": "2023-04-20T06:03:46Z",
"pushed_at": "2023-04-22T14:18:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -778,10 +778,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-22T10:02:09Z",
"updated_at": "2023-04-22T14:04:39Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 880,
"watchers_count": 880,
"stargazers_count": 881,
"watchers_count": 881,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -797,7 +797,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 880,
"watchers": 881,
"score": 0
}
]

View file

@ -1919,10 +1919,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2023-04-22T09:27:30Z",
"updated_at": "2023-04-22T13:55:38Z",
"pushed_at": "2023-01-12T19:23:29Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -1931,7 +1931,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 332,
"watchers": 331,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2023-04-21T14:21:45Z",
"updated_at": "2023-04-22T14:33:42Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1025,
"watchers_count": 1025,
"stargazers_count": 1026,
"watchers_count": 1026,
"has_discussions": false,
"forks_count": 221,
"allow_forking": true,
@ -141,7 +141,7 @@
"topics": [],
"visibility": "public",
"forks": 221,
"watchers": 1025,
"watchers": 1026,
"score": 0
},
{
@ -361,10 +361,10 @@
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2023-04-04T14:09:54Z",
"updated_at": "2023-04-22T14:34:38Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -373,7 +373,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 38,
"watchers": 39,
"score": 0
},
{
@ -564,10 +564,10 @@
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
"fork": false,
"created_at": "2022-03-08T17:13:24Z",
"updated_at": "2023-04-06T07:35:34Z",
"updated_at": "2023-04-22T14:34:30Z",
"pushed_at": "2022-03-18T09:32:30Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -576,7 +576,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 49,
"watchers": 50,
"score": 0
},
{
@ -885,10 +885,10 @@
"description": "Container Excape PoC for CVE-2022-0847 \"DirtyPipe\"",
"fork": false,
"created_at": "2022-03-09T19:38:44Z",
"updated_at": "2023-01-28T01:26:56Z",
"updated_at": "2023-04-22T14:34:47Z",
"pushed_at": "2022-04-20T20:23:36Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -897,7 +897,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 76,
"watchers": 77,
"score": 0
},
{
@ -1088,10 +1088,10 @@
"description": "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell",
"fork": false,
"created_at": "2022-03-11T08:22:56Z",
"updated_at": "2023-01-04T09:54:14Z",
"updated_at": "2023-04-22T14:34:51Z",
"pushed_at": "2022-03-23T22:46:58Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -1100,7 +1100,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2023-04-21T15:37:42Z",
"updated_at": "2023-04-22T14:34:01Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 393,
"watchers_count": 393,
"stargazers_count": 394,
"watchers_count": 394,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 393,
"watchers": 394,
"score": 0
},
{

View file

@ -85,5 +85,34 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 631257182,
"name": "cve-2022-1609-exploit",
"full_name": "realsiao\/cve-2022-1609-exploit",
"owner": {
"login": "realsiao",
"id": 119853210,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119853210?v=4",
"html_url": "https:\/\/github.com\/realsiao"
},
"html_url": "https:\/\/github.com\/realsiao\/cve-2022-1609-exploit",
"description": "Exploit for CVE-2022-1609 WordPress Weblizar Backdoor.",
"fork": false,
"created_at": "2023-04-22T12:51:09Z",
"updated_at": "2023-04-22T12:51:42Z",
"pushed_at": "2023-04-22T12:51:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Hotel Druid 3.0.3 Code Injection to Remote Code Execution",
"fork": false,
"created_at": "2022-02-17T17:18:02Z",
"updated_at": "2023-04-14T16:51:33Z",
"updated_at": "2023-04-22T17:50:35Z",
"pushed_at": "2022-10-31T16:28:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -709,10 +709,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-04-22T10:02:09Z",
"updated_at": "2023-04-22T14:04:39Z",
"pushed_at": "2022-12-15T04:07:54Z",
"stargazers_count": 880,
"watchers_count": 880,
"stargazers_count": 881,
"watchers_count": 881,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -728,7 +728,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 880,
"watchers": 881,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2023-04-22T12:02:27Z",
"updated_at": "2023-04-22T17:07:42Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 347,
"watchers_count": 347,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 91,
"watchers": 346,
"watchers": 347,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-36946 linux kernel panic in netfilter_queue",
"fork": false,
"created_at": "2022-07-28T11:22:13Z",
"updated_at": "2023-03-20T03:42:39Z",
"updated_at": "2023-04-22T14:31:39Z",
"pushed_at": "2023-04-08T15:43:00Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
"updated_at": "2023-04-12T12:07:32Z",
"updated_at": "2023-04-22T16:43:06Z",
"pushed_at": "2022-12-05T23:36:42Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 145,
"watchers": 146,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Windows LPE exploit for CVE-2022-37969",
"fork": false,
"created_at": "2023-03-09T21:17:44Z",
"updated_at": "2023-04-21T23:30:28Z",
"updated_at": "2023-04-22T16:49:53Z",
"pushed_at": "2023-04-03T17:47:07Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 66,
"watchers": 67,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-04-21T14:45:19Z",
"updated_at": "2023-04-22T14:41:59Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 231,
"watchers": 232,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-04-14T16:51:38Z",
"updated_at": "2023-04-22T16:16:30Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 343,
"watchers_count": 343,
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 343,
"watchers": 344,
"score": 0
},
{

View file

@ -615,10 +615,10 @@
"description": "Perform with Dork Scanner and Massive with Joomla 4.2.8",
"fork": false,
"created_at": "2023-04-09T13:20:48Z",
"updated_at": "2023-04-22T05:31:44Z",
"updated_at": "2023-04-22T15:54:17Z",
"pushed_at": "2023-04-22T10:33:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -627,7 +627,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
"fork": false,
"created_at": "2023-04-18T21:47:47Z",
"updated_at": "2023-04-21T14:19:58Z",
"updated_at": "2023-04-22T16:02:41Z",
"pushed_at": "2023-04-21T14:22:41Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 32,
"watchers": 33,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-21T09:19:13Z",
"updated_at": "2023-04-21T10:49:25Z",
"pushed_at": "2023-04-21T11:03:29Z",
"pushed_at": "2023-04-22T14:47:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

31
2023/CVE-2023-30458.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 628370385,
"name": "CVE-2023-30458",
"full_name": "d34dun1c02n\/CVE-2023-30458",
"owner": {
"login": "d34dun1c02n",
"id": 16107315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16107315?v=4",
"html_url": "https:\/\/github.com\/d34dun1c02n"
},
"html_url": "https:\/\/github.com\/d34dun1c02n\/CVE-2023-30458",
"description": "Area to show CVE's I have discovered along with PoC code when I have the time. ",
"fork": false,
"created_at": "2023-04-15T18:27:42Z",
"updated_at": "2023-04-22T18:23:05Z",
"pushed_at": "2023-04-22T18:21:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -863,6 +863,9 @@ Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to
- [ohnonoyesyes/CVE-2023-29084](https://github.com/ohnonoyesyes/CVE-2023-29084)
### CVE-2023-30458
- [d34dun1c02n/CVE-2023-30458](https://github.com/d34dun1c02n/CVE-2023-30458)
### CVE-2023-30459 (2023-04-14)
<code>
@ -1451,6 +1454,7 @@ The WPQA Builder WordPress plugin before 5.4 which is a companion to the Discy a
- [savior-only/CVE-2022-1609](https://github.com/savior-only/CVE-2022-1609)
- [0xSojalSec/CVE-2022-1609](https://github.com/0xSojalSec/CVE-2022-1609)
- [0xSojalSec/-CVE-2022-1609](https://github.com/0xSojalSec/-CVE-2022-1609)
- [realsiao/cve-2022-1609-exploit](https://github.com/realsiao/cve-2022-1609-exploit)
### CVE-2022-1679 (2022-05-16)
@ -1763,7 +1767,12 @@ THe WCFM Membership plugin for WordPress is vulnerable to privilege escalation i
- [BaconCriCRi/PoC-CVE-2022-4939-](https://github.com/BaconCriCRi/PoC-CVE-2022-4939-)
### CVE-2022-4944
### CVE-2022-4944 (-)
<code>
Eine problematische Schwachstelle wurde in kalcaddle KodExplorer bis 4.49 entdeckt. Davon betroffen ist unbekannter Code. Durch Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.50 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.
</code>
- [MrEmpy/CVE-2022-4944](https://github.com/MrEmpy/CVE-2022-4944)
### CVE-2022-5561
@ -7126,7 +7135,7 @@ Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through
### CVE-2022-48150 (2023-04-21)
<code>
Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability.
Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI.
</code>
- [sahilop123/-CVE-2022-48150](https://github.com/sahilop123/-CVE-2022-48150)