Auto Update 2023/03/10 00:28:52

This commit is contained in:
motikan2010-bot 2023-03-10 09:28:52 +09:00
parent 1225fec0fe
commit 7d7576fec2
23 changed files with 154 additions and 74 deletions

View file

@ -71,10 +71,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2023-03-09T07:10:32Z",
"updated_at": "2023-03-09T20:07:54Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 102,
"watchers": 103,
"score": 0
},
{

View file

@ -327,14 +327,14 @@
{
"id": 365651593,
"name": "noSAMBAnoCRY-CVE-2017-7494",
"full_name": "m4udSec\/noSAMBAnoCRY-CVE-2017-7494",
"full_name": "0xm4ud\/noSAMBAnoCRY-CVE-2017-7494",
"owner": {
"login": "m4udSec",
"login": "0xm4ud",
"id": 56730389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
"html_url": "https:\/\/github.com\/m4udSec"
"html_url": "https:\/\/github.com\/0xm4ud"
},
"html_url": "https:\/\/github.com\/m4udSec\/noSAMBAnoCRY-CVE-2017-7494",
"html_url": "https:\/\/github.com\/0xm4ud\/noSAMBAnoCRY-CVE-2017-7494",
"description": "CVE-2017-7494 python exploit",
"fork": false,
"created_at": "2021-05-09T02:32:54Z",

View file

@ -18,13 +18,13 @@
"stargazers_count": 172,
"watchers_count": 172,
"has_discussions": false,
"forks_count": 33,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 34,
"watchers": 172,
"score": 0
}

View file

@ -464,10 +464,10 @@
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2021-03-19T16:41:31Z",
"updated_at": "2023-01-31T17:39:15Z",
"updated_at": "2023-03-09T20:11:19Z",
"pushed_at": "2021-11-17T14:40:14Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -476,7 +476,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -76,13 +76,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -31,14 +31,14 @@
{
"id": 366529600,
"name": "Cacti-CVE-2020-8813",
"full_name": "m4udSec\/Cacti-CVE-2020-8813",
"full_name": "0xm4ud\/Cacti-CVE-2020-8813",
"owner": {
"login": "m4udSec",
"login": "0xm4ud",
"id": 56730389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
"html_url": "https:\/\/github.com\/m4udSec"
"html_url": "https:\/\/github.com\/0xm4ud"
},
"html_url": "https:\/\/github.com\/m4udSec\/Cacti-CVE-2020-8813",
"html_url": "https:\/\/github.com\/0xm4ud\/Cacti-CVE-2020-8813",
"description": null,
"fork": false,
"created_at": "2021-05-11T22:38:39Z",

View file

@ -129,10 +129,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2023-03-04T05:58:49Z",
"updated_at": "2023-03-09T20:41:33Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -144,7 +144,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 57,
"watchers": 58,
"score": 0
}
]

View file

@ -110,13 +110,13 @@
"stargazers_count": 269,
"watchers_count": 269,
"has_discussions": false,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 66,
"forks": 67,
"watchers": 269,
"score": 0
},

View file

@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-03-09T11:38:37Z",
"updated_at": "2023-03-09T20:59:37Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 746,
"watchers_count": 746,
"stargazers_count": 747,
"watchers_count": 747,
"has_discussions": false,
"forks_count": 153,
"allow_forking": true,
@ -922,7 +922,7 @@
],
"visibility": "public",
"forks": 153,
"watchers": 746,
"watchers": 747,
"score": 0
},
{

View file

@ -2374,10 +2374,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2023-02-13T21:59:34Z",
"updated_at": "2023-03-09T22:35:46Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -2395,7 +2395,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -3652,13 +3652,13 @@
"stargazers_count": 3203,
"watchers_count": 3203,
"has_discussions": true,
"forks_count": 746,
"forks_count": 747,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 746,
"forks": 747,
"watchers": 3203,
"score": 0
},

View file

@ -13,12 +13,12 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2023-03-09T16:27:48Z",
"updated_at": "2023-03-09T23:18:53Z",
"pushed_at": "2023-03-02T19:43:36Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"windows-boot"
],
"visibility": "public",
"forks": 36,
"watchers": 171,
"forks": 37,
"watchers": 173,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 417,
"watchers_count": 417,
"has_discussions": false,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 58,
"forks": 59,
"watchers": 417,
"score": 0
},
@ -172,5 +172,34 @@
"forks": 3,
"watchers": 10,
"score": 0
},
{
"id": 611941666,
"name": "CVE-2022-2588",
"full_name": "dom4570\/CVE-2022-2588",
"owner": {
"login": "dom4570",
"id": 70895650,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70895650?v=4",
"html_url": "https:\/\/github.com\/dom4570"
},
"html_url": "https:\/\/github.com\/dom4570\/CVE-2022-2588",
"description": null,
"fork": false,
"created_at": "2023-03-09T21:29:56Z",
"updated_at": "2023-03-09T21:30:56Z",
"pushed_at": "2023-03-09T21:30:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2023-03-06T06:06:15Z",
"updated_at": "2023-03-10T00:23:01Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 364,
"watchers": 365,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2023-03-09T12:43:00Z",
"updated_at": "2023-03-09T21:16:37Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 237,
"watchers": 238,
"score": 0
},
{

View file

@ -101,7 +101,7 @@
"fork": false,
"created_at": "2023-02-04T01:35:08Z",
"updated_at": "2023-02-10T14:29:46Z",
"pushed_at": "2023-03-07T18:59:01Z",
"pushed_at": "2023-03-09T22:28:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -56,5 +56,49 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 611950909,
"name": "CVE-2022-47986",
"full_name": "mauricelambert\/CVE-2022-47986",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-47986",
"description": "CVE-2022-47986: Python, Ruby, NMAP and Metasploit modules to exploit the vulnerability.",
"fork": false,
"created_at": "2023-03-09T22:03:48Z",
"updated_at": "2023-03-09T22:33:55Z",
"pushed_at": "2023-03-09T22:31:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"aspera",
"cve-2022-47986",
"deserialization",
"exploit",
"faspex",
"ibm",
"metasploit",
"nmap",
"poc",
"python3",
"rce",
"ruby",
"vulnerability",
"yaml"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 5,
"watchers": 0,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "RTF Crash POC Python 3.11 Windows 10",
"fork": false,
"created_at": "2023-03-07T15:03:43Z",
"updated_at": "2023-03-09T15:54:51Z",
"updated_at": "2023-03-09T19:46:22Z",
"pushed_at": "2023-03-07T15:17:47Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).",
"fork": false,
"created_at": "2023-03-08T06:20:45Z",
"updated_at": "2023-03-09T08:48:52Z",
"updated_at": "2023-03-09T22:32:11Z",
"pushed_at": "2023-03-08T06:21:58Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2023-03-09T10:07:40Z",
"updated_at": "2023-03-09T21:32:19Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 262,
"watchers_count": 262,

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-09T18:32:12Z",
"updated_at": "2023-03-09T22:35:42Z",
"pushed_at": "2023-03-08T14:50:10Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 66,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 153,
"forks": 71,
"watchers": 164,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-03T01:57:28Z",
"updated_at": "2023-03-08T17:30:29Z",
"pushed_at": "2023-03-08T00:43:48Z",
"pushed_at": "2023-03-09T20:41:26Z",
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": true,

View file

@ -5,7 +5,12 @@
- [ASkyeye/CVE-2023-0045](https://github.com/ASkyeye/CVE-2023-0045)
- [es0j/CVE-2023-0045](https://github.com/es0j/CVE-2023-0045)
### CVE-2023-0050
### CVE-2023-0050 (2023-03-09)
<code>
An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims.
</code>
- [wh-gov/CVE-2023-0050](https://github.com/wh-gov/CVE-2023-0050)
### CVE-2023-0179
@ -1025,6 +1030,7 @@ The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content
- [konoha279/2022-LPE-UAF](https://github.com/konoha279/2022-LPE-UAF)
- [PolymorphicOpcode/CVE-2022-2588](https://github.com/PolymorphicOpcode/CVE-2022-2588)
- [BassamGraini/CVE-2022-2588](https://github.com/BassamGraini/CVE-2022-2588)
- [dom4570/CVE-2022-2588](https://github.com/dom4570/CVE-2022-2588)
### CVE-2022-2602
- [LukeGix/CVE-2022-2602](https://github.com/LukeGix/CVE-2022-2602)
@ -6294,6 +6300,7 @@ IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker
- [ohnonoyesyes/CVE-2022-47986](https://github.com/ohnonoyesyes/CVE-2022-47986)
- [dhina016/CVE-2022-47986](https://github.com/dhina016/CVE-2022-47986)
- [mauricelambert/CVE-2022-47986](https://github.com/mauricelambert/CVE-2022-47986)
### CVE-2022-48194 (2022-12-30)
@ -15182,7 +15189,7 @@ graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary O
</code>
- [mhaskar/CVE-2020-8813](https://github.com/mhaskar/CVE-2020-8813)
- [m4udSec/Cacti-CVE-2020-8813](https://github.com/m4udSec/Cacti-CVE-2020-8813)
- [0xm4ud/Cacti-CVE-2020-8813](https://github.com/0xm4ud/Cacti-CVE-2020-8813)
- [hexcowboy/CVE-2020-8813](https://github.com/hexcowboy/CVE-2020-8813)
- [p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime](https://github.com/p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime)
@ -27021,7 +27028,7 @@ Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to r
- [cved-sources/cve-2017-7494](https://github.com/cved-sources/cve-2017-7494)
- [john-80/cve-2017-7494](https://github.com/john-80/cve-2017-7494)
- [Hansindu-M/CVE-2017-7494_IT19115344](https://github.com/Hansindu-M/CVE-2017-7494_IT19115344)
- [m4udSec/noSAMBAnoCRY-CVE-2017-7494](https://github.com/m4udSec/noSAMBAnoCRY-CVE-2017-7494)
- [0xm4ud/noSAMBAnoCRY-CVE-2017-7494](https://github.com/0xm4ud/noSAMBAnoCRY-CVE-2017-7494)
- [I-Rinka/BIT-EternalBlue-for-macOS_Linux](https://github.com/I-Rinka/BIT-EternalBlue-for-macOS_Linux)
- [yinyinmeimei/CVE-2017-7494-payload](https://github.com/yinyinmeimei/CVE-2017-7494-payload)
- [adjaliya/-CVE-2017-7494-Samba-Exploit-POC](https://github.com/adjaliya/-CVE-2017-7494-Samba-Exploit-POC)