Auto Update 2022/09/19 00:18:47

This commit is contained in:
motikan2010-bot 2022-09-19 09:18:47 +09:00
parent fc7d2c2ba5
commit 7f0bb817e4
14 changed files with 120 additions and 53 deletions

View file

@ -423,7 +423,7 @@
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 649,
"watchers_count": 649,
"forks_count": 402,
"forks_count": 403,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -433,7 +433,7 @@
"exploit"
],
"visibility": "public",
"forks": 402,
"forks": 403,
"watchers": 649,
"score": 0
},

View file

@ -125,10 +125,10 @@
"description": "Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)",
"fork": false,
"created_at": "2022-09-09T23:09:40Z",
"updated_at": "2022-09-16T01:46:12Z",
"updated_at": "2022-09-18T23:57:52Z",
"pushed_at": "2022-09-12T01:43:19Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -143,7 +143,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -1766,10 +1766,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2022-08-27T06:44:16Z",
"updated_at": "2022-09-18T18:16:18Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1116,
"watchers_count": 1116,
"stargazers_count": 1115,
"watchers_count": 1115,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
@ -1777,7 +1777,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1116,
"watchers": 1115,
"score": 0
},
{

View file

@ -13,18 +13,18 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2022-08-14T16:19:03Z",
"updated_at": "2022-09-18T20:43:05Z",
"pushed_at": "2020-11-02T06:43:15Z",
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 99,
"stargazers_count": 315,
"watchers_count": 315,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 99,
"watchers": 314,
"forks": 100,
"watchers": 315,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2022-09-17T10:03:16Z",
"updated_at": "2022-09-18T23:16:36Z",
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 654,
"watchers_count": 654,
"stargazers_count": 655,
"watchers_count": 655,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 654,
"watchers": 655,
"score": 0
},
{

View file

@ -377,10 +377,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2022-09-17T14:49:26Z",
"updated_at": "2022-09-18T21:36:15Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 269,
"watchers_count": 269,
"stargazers_count": 270,
"watchers_count": 270,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
@ -394,7 +394,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 269,
"watchers": 270,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information",
"fork": false,
"created_at": "2021-12-10T06:15:38Z",
"updated_at": "2022-09-14T22:58:55Z",
"updated_at": "2022-09-18T19:59:17Z",
"pushed_at": "2021-12-16T01:33:48Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 181,
"watchers": 182,
"score": 0
},
{
@ -378,11 +378,11 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-09-16T04:34:00Z",
"updated_at": "2022-09-18T20:04:55Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 845,
"watchers_count": 845,
"forks_count": 131,
"stargazers_count": 846,
"watchers_count": 846,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -408,8 +408,8 @@
"writeups"
],
"visibility": "public",
"forks": 131,
"watchers": 845,
"forks": 132,
"watchers": 846,
"score": 0
},
{
@ -1479,10 +1479,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-09-16T03:41:23Z",
"updated_at": "2022-09-18T19:50:54Z",
"pushed_at": "2022-09-11T03:55:38Z",
"stargazers_count": 3047,
"watchers_count": 3047,
"stargazers_count": 3048,
"watchers_count": 3048,
"forks_count": 728,
"allow_forking": true,
"is_template": false,
@ -1490,7 +1490,7 @@
"topics": [],
"visibility": "public",
"forks": 728,
"watchers": 3047,
"watchers": 3048,
"score": 0
},
{

View file

@ -2102,7 +2102,7 @@
"fork": false,
"created_at": "2022-09-11T19:50:53Z",
"updated_at": "2022-09-13T01:44:47Z",
"pushed_at": "2022-09-12T07:15:49Z",
"pushed_at": "2022-09-18T22:53:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

30
2022/CVE-2022-20126.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 534168096,
"name": "packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
"full_name": "Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
"description": null,
"fork": false,
"created_at": "2022-09-08T10:51:13Z",
"updated_at": "2022-09-18T19:44:24Z",
"pushed_at": "2022-09-08T10:56:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -97,10 +97,10 @@
"description": "CVE-2022-2588,CVE-2022-2586,CVE-2022-2585 ",
"fork": false,
"created_at": "2022-08-24T02:20:35Z",
"updated_at": "2022-08-28T14:50:46Z",
"updated_at": "2022-09-18T21:37:19Z",
"pushed_at": "2022-08-23T23:33:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,35 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
"id": 538247197,
"name": "CVE-2022-2588",
"full_name": "sang-chu\/CVE-2022-2588",
"owner": {
"login": "sang-chu",
"id": 46855517,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46855517?v=4",
"html_url": "https:\/\/github.com\/sang-chu"
},
"html_url": "https:\/\/github.com\/sang-chu\/CVE-2022-2588",
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
"fork": false,
"created_at": "2022-09-18T21:35:19Z",
"updated_at": "2022-09-18T21:41:15Z",
"pushed_at": "2022-09-18T21:38:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -487,7 +487,7 @@
"pushed_at": "2022-06-22T23:54:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -504,7 +504,7 @@
"shodan"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 11,
"score": 0
},

View file

@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-09-08T12:03:43Z",
"updated_at": "2022-09-18T20:19:44Z",
"pushed_at": "2022-09-15T03:19:28Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 162,
"watchers_count": 162,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 161,
"watchers": 162,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2022-09-18T17:05:23Z",
"updated_at": "2022-09-18T21:07:02Z",
"pushed_at": "2022-09-14T07:45:40Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 140,
"watchers": 142,
"score": 0
},
{

View file

@ -552,6 +552,7 @@ It was found that Quarkus 2.10.x does not terminate HTTP requests header context
- [ASkyeye/2022-LPE-UAF](https://github.com/ASkyeye/2022-LPE-UAF)
- [pirenga/2022-LPE-UAF](https://github.com/pirenga/2022-LPE-UAF)
- [konoha279/2022-LPE-UAF](https://github.com/konoha279/2022-LPE-UAF)
- [sang-chu/CVE-2022-2588](https://github.com/sang-chu/CVE-2022-2588)
### CVE-2022-2639 (2022-09-01)
@ -616,6 +617,14 @@ In deletePackageX of DeletePackageHelper.java, there is a possible way for a Gue
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
### CVE-2022-20126 (2022-06-15)
<code>
In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023
</code>
- [Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126](https://github.com/Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126)
### CVE-2022-20128
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)