Auto Update 2023/04/16 00:29:30

This commit is contained in:
motikan2010-bot 2023-04-16 09:29:30 +09:00
parent 78934abb3d
commit 8b33a54ae3
11 changed files with 46 additions and 41 deletions

View file

@ -42,10 +42,10 @@
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
"fork": false,
"created_at": "2018-02-06T15:16:03Z",
"updated_at": "2023-04-15T18:12:25Z",
"updated_at": "2023-04-15T19:14:50Z",
"pushed_at": "2018-02-06T15:36:29Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 79,
"watchers": 81,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2023-04-12T00:44:38Z",
"updated_at": "2023-04-15T19:57:14Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1762,
"watchers_count": 1762,
"stargazers_count": 1761,
"watchers_count": 1761,
"has_discussions": false,
"forks_count": 264,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 264,
"watchers": 1762,
"watchers": 1761,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 8,
"score": 0
},

View file

@ -100,8 +100,8 @@
"description": "Scanning for CVE-2020-8193 - Auth Bypass check",
"fork": false,
"created_at": "2020-07-13T10:36:43Z",
"updated_at": "2023-04-04T07:33:40Z",
"pushed_at": "2023-04-11T16:09:32Z",
"updated_at": "2023-04-15T20:44:47Z",
"pushed_at": "2023-04-15T20:44:43Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,

View file

@ -1268,13 +1268,13 @@
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 38,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 37,
"watchers": 103,
"score": 0
},

View file

@ -860,10 +860,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-04-14T01:58:27Z",
"updated_at": "2023-04-15T19:10:17Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 883,
"watchers_count": 883,
"stargazers_count": 884,
"watchers_count": 884,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -892,7 +892,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 883,
"watchers": 884,
"score": 0
},
{
@ -972,12 +972,12 @@
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
"updated_at": "2023-03-18T08:33:41Z",
"updated_at": "2023-04-15T22:39:07Z",
"pushed_at": "2021-12-14T13:43:35Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -988,8 +988,8 @@
"minecraft"
],
"visibility": "public",
"forks": 18,
"watchers": 93,
"forks": 19,
"watchers": 94,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-04-13T01:28:19Z",
"updated_at": "2023-04-15T21:09:45Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 227,
"watchers_count": 227,
"stargazers_count": 228,
"watchers_count": 228,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 227,
"watchers": 228,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.",
"fork": false,
"created_at": "2022-12-29T10:32:23Z",
"updated_at": "2023-04-01T13:06:10Z",
"updated_at": "2023-04-15T18:41:05Z",
"pushed_at": "2023-01-20T23:38:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -400,10 +400,10 @@
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-04-06T08:45:05Z",
"updated_at": "2023-04-15T23:55:27Z",
"pushed_at": "2023-03-24T10:46:38Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -414,7 +414,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exploit for CVE-2023-27532 against Veeam Backup & Replication",
"fork": false,
"created_at": "2023-03-23T16:08:43Z",
"updated_at": "2023-04-13T23:58:46Z",
"updated_at": "2023-04-15T20:33:35Z",
"pushed_at": "2023-03-23T18:03:27Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 75,
"watchers": 76,
"score": 0
}
]

View file

@ -18897,7 +18897,12 @@ Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blo
- [nopdata/cve-2020-28948](https://github.com/nopdata/cve-2020-28948)
- [JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949](https://github.com/JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949)
### CVE-2020-29007
### CVE-2020-29007 (2023-04-15)
<code>
The Score extension through 0.3.0 for MediaWiki has a remote code execution vulnerability due to improper sandboxing of the GNU LilyPond executable. This allows any user with an ability to edit articles (potentially including unauthenticated anonymous users) to execute arbitrary Scheme or shell code by using crafted {{Image data to generate musical scores containing malicious code.
</code>
- [seqred-s-a/cve-2020-29007](https://github.com/seqred-s-a/cve-2020-29007)
### CVE-2020-29070 (2020-11-25)