Auto Update 2023/03/18 12:28:16

This commit is contained in:
motikan2010-bot 2023-03-18 21:28:16 +09:00
parent 80681cca65
commit 98d8322a0e
29 changed files with 167 additions and 107 deletions

View file

@ -433,10 +433,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-03-14T08:07:56Z",
"updated_at": "2023-03-18T07:49:11Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 710,
"watchers_count": 710,
"stargazers_count": 711,
"watchers_count": 711,
"has_discussions": false,
"forks_count": 424,
"allow_forking": true,
@ -449,7 +449,7 @@
],
"visibility": "public",
"forks": 424,
"watchers": 710,
"watchers": 711,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "海康威视未授权访问检测poc及口令爆破",
"fork": false,
"created_at": "2020-11-12T09:02:10Z",
"updated_at": "2023-01-10T04:06:02Z",
"updated_at": "2023-03-18T09:02:54Z",
"pushed_at": "2020-11-19T08:58:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 33,
"watchers": 34,
"score": 0
},
{

View file

@ -1312,13 +1312,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 405,
"forks_count": 404,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 405,
"forks": 404,
"watchers": 3,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "BlueFrag experiments",
"fork": false,
"created_at": "2020-02-12T22:00:35Z",
"updated_at": "2022-11-09T18:06:16Z",
"updated_at": "2023-03-18T11:53:32Z",
"pushed_at": "2020-05-16T18:06:43Z",
"stargazers_count": 43,
"watchers_count": 43,

View file

@ -551,10 +551,10 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
"updated_at": "2022-11-03T21:48:27Z",
"updated_at": "2023-03-18T09:54:53Z",
"pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -563,7 +563,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -1369,10 +1369,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2023-03-02T11:32:02Z",
"updated_at": "2023-03-18T08:18:47Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 483,
"watchers_count": 483,
"stargazers_count": 484,
"watchers_count": 484,
"has_discussions": false,
"forks_count": 157,
"allow_forking": true,
@ -1387,7 +1387,7 @@
],
"visibility": "public",
"forks": 157,
"watchers": 483,
"watchers": 484,
"score": 0
},
{

View file

@ -315,13 +315,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-27358 and CVE-2020-27359",
"fork": false,
"created_at": "2020-11-02T04:54:52Z",
"updated_at": "2022-11-24T11:12:36Z",
"updated_at": "2023-03-18T09:51:23Z",
"pushed_at": "2020-11-02T05:10:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -85,5 +85,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 615681761,
"name": "TypeHub-Exploiter",
"full_name": "aliestercrowleymv\/TypeHub-Exploiter",
"owner": {
"login": "aliestercrowleymv",
"id": 124184894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124184894?v=4",
"html_url": "https:\/\/github.com\/aliestercrowleymv"
},
"html_url": "https:\/\/github.com\/aliestercrowleymv\/TypeHub-Exploiter",
"description": "This script exploits a vulnerability (CVE-2021-25094) in the TypeHub WordPress plugin.",
"fork": false,
"created_at": "2023-03-18T11:19:33Z",
"updated_at": "2023-03-18T11:20:37Z",
"pushed_at": "2023-03-18T12:05:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -622,10 +622,10 @@
"description": "Confluence server webwork OGNL injection",
"fork": false,
"created_at": "2021-09-05T09:27:55Z",
"updated_at": "2023-03-13T12:49:04Z",
"updated_at": "2023-03-18T09:22:44Z",
"pushed_at": "2023-03-16T17:38:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -634,7 +634,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 5,
"score": 0
},
{

View file

@ -134,7 +134,7 @@
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -143,7 +143,7 @@
"exploit"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 63,
"score": 0
}

View file

@ -82,13 +82,13 @@
"stargazers_count": 1765,
"watchers_count": 1765,
"has_discussions": false,
"forks_count": 504,
"forks_count": 505,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 504,
"forks": 505,
"watchers": 1765,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-30T10:44:23Z",
"updated_at": "2022-06-30T10:47:14Z",
"updated_at": "2023-03-18T12:11:55Z",
"pushed_at": "2022-06-30T10:47:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-03-17T19:05:17Z",
"updated_at": "2023-03-18T12:14:42Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 542,
"watchers_count": 542,
"stargazers_count": 543,
"watchers_count": 543,
"has_discussions": false,
"forks_count": 97,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 97,
"watchers": 542,
"watchers": 543,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Apache Log4j 远程代码执行",
"fork": false,
"created_at": "2021-12-09T15:27:38Z",
"updated_at": "2023-03-12T15:53:02Z",
"updated_at": "2023-03-18T10:14:29Z",
"pushed_at": "2022-07-25T20:41:30Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 49,
"watchers": 50,
"score": 0
},
{
@ -972,10 +972,10 @@
"description": "Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam",
"fork": false,
"created_at": "2021-12-10T23:35:31Z",
"updated_at": "2023-03-15T17:27:57Z",
"updated_at": "2023-03-18T08:33:41Z",
"pushed_at": "2021-12-14T13:43:35Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -989,7 +989,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Atlassian Jira Seraph Authentication Bypass RCECVE-2022-0540",
"fork": false,
"created_at": "2022-05-25T10:47:04Z",
"updated_at": "2023-03-17T02:17:46Z",
"updated_at": "2023-03-18T11:04:16Z",
"pushed_at": "2022-05-25T13:43:16Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 64,
"watchers": 65,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22639: Get a Root Shell on macOS Monterey",
"fork": false,
"created_at": "2022-03-17T06:16:54Z",
"updated_at": "2023-03-11T00:43:11Z",
"updated_at": "2023-03-18T10:47:06Z",
"pushed_at": "2022-04-05T05:11:29Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 115,
"watchers": 116,
"score": 0
}
]

View file

@ -571,5 +571,34 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 615687765,
"name": "CVE-2022-22963_Reverse-Shell-Exploit",
"full_name": "J0ey17\/CVE-2022-22963_Reverse-Shell-Exploit",
"owner": {
"login": "J0ey17",
"id": 72118225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72118225?v=4",
"html_url": "https:\/\/github.com\/J0ey17"
},
"html_url": "https:\/\/github.com\/J0ey17\/CVE-2022-22963_Reverse-Shell-Exploit",
"description": "CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script will verify if the vulnerability exists, and if it does, will give you a reverse shell.",
"fork": false,
"created_at": "2023-03-18T11:43:00Z",
"updated_at": "2023-03-18T11:47:57Z",
"pushed_at": "2023-03-18T11:47:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2022-23935 exploit PoC exiftool version 12.37 written in python",
"fork": false,
"created_at": "2023-02-07T13:02:40Z",
"updated_at": "2023-03-03T11:57:59Z",
"updated_at": "2023-03-18T10:11:59Z",
"pushed_at": "2023-02-07T13:10:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-03-17T06:02:09Z",
"updated_at": "2023-03-18T07:05:38Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 946,
"watchers_count": 946,
"stargazers_count": 947,
"watchers_count": 947,
"has_discussions": true,
"forks_count": 164,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 946,
"watchers": 947,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-10-28T08:52:17Z",
"updated_at": "2023-02-16T07:04:41Z",
"pushed_at": "2022-10-28T10:14:25Z",
"pushed_at": "2023-03-18T10:34:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-03-17T19:03:32Z",
"updated_at": "2023-03-18T07:50:51Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 212,
"watchers": 213,
"score": 0
},
{
@ -195,13 +195,13 @@
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 114,
"score": 0
},

View file

@ -130,7 +130,7 @@
"fork": false,
"created_at": "2023-02-15T15:22:48Z",
"updated_at": "2023-03-11T16:28:02Z",
"pushed_at": "2023-03-18T00:44:14Z",
"pushed_at": "2023-03-18T10:21:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-03-18T03:59:17Z",
"updated_at": "2023-03-18T09:44:16Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 770,
"watchers_count": 770,
"stargazers_count": 772,
"watchers_count": 772,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 770,
"watchers": 772,
"score": 0
},
{
@ -378,10 +378,10 @@
"description": "Example of CVE-2022-46689 aka MacDirtyCow.",
"fork": false,
"created_at": "2023-03-01T08:23:49Z",
"updated_at": "2023-03-01T09:03:52Z",
"updated_at": "2023-03-18T11:28:54Z",
"pushed_at": "2023-03-01T08:25:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -397,7 +397,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -42,19 +42,19 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本尽管该利用在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-03-18T01:45:23Z",
"updated_at": "2023-03-18T12:00:25Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-03-18T05:42:00Z",
"updated_at": "2023-03-18T12:01:48Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 301,
"watchers": 303,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2023-23397",
"fork": false,
"created_at": "2023-03-15T17:03:38Z",
"updated_at": "2023-03-18T04:43:18Z",
"updated_at": "2023-03-18T12:01:07Z",
"pushed_at": "2023-03-15T17:53:53Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 110,
"watchers": 113,
"score": 0
},
{
@ -129,10 +129,10 @@
"description": "Simple PoC in PowerShell for CVE-2023-23397",
"fork": false,
"created_at": "2023-03-16T19:10:37Z",
"updated_at": "2023-03-18T04:35:40Z",
"updated_at": "2023-03-18T11:29:28Z",
"pushed_at": "2023-03-16T19:29:49Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -151,7 +151,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-03-18T05:50:43Z",
"updated_at": "2023-03-18T12:17:40Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 139,
"watchers": 148,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-23415",
"fork": false,
"created_at": "2023-03-17T12:38:30Z",
"updated_at": "2023-03-17T13:51:40Z",
"updated_at": "2023-03-18T11:37:10Z",
"pushed_at": "2023-03-17T12:45:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -2043,6 +2043,7 @@ In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, w
- [iliass-dahman/CVE-2022-22963-POC](https://github.com/iliass-dahman/CVE-2022-22963-POC)
- [charis3306/CVE-2022-22963](https://github.com/charis3306/CVE-2022-22963)
- [lemmyz4n3771/CVE-2022-22963-PoC](https://github.com/lemmyz4n3771/CVE-2022-22963-PoC)
- [J0ey17/CVE-2022-22963_Reverse-Shell-Exploit](https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit)
### CVE-2022-22965 (2022-04-01)
@ -8640,6 +8641,7 @@ The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used with
- [darkpills/CVE-2021-25094-tatsu-preauth-rce](https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce)
- [TUANB4DUT/typehub-exploiter](https://github.com/TUANB4DUT/typehub-exploiter)
- [xdx57/CVE-2021-25094](https://github.com/xdx57/CVE-2021-25094)
- [aliestercrowleymv/TypeHub-Exploiter](https://github.com/aliestercrowleymv/TypeHub-Exploiter)
### CVE-2021-25162 (2021-03-29)