Auto Update 2022/11/19 12:17:32

This commit is contained in:
motikan2010-bot 2022-11-19 21:17:32 +09:00
parent 396d67a1a7
commit 9aa06addcd
17 changed files with 96 additions and 57 deletions

View file

@ -390,10 +390,10 @@
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-09T15:59:14Z",
"updated_at": "2022-11-12T07:33:44Z",
"updated_at": "2022-11-19T08:57:18Z",
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -402,7 +402,7 @@
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 148,
"watchers": 149,
"score": 0
},
{

View file

@ -459,10 +459,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-11-12T19:03:00Z",
"updated_at": "2022-11-19T12:10:01Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -471,7 +471,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 364,
"watchers": 365,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 22,
"score": 0
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 33,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 33,
"forks": 34,
"watchers": 138,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-19T04:29:36Z",
"updated_at": "2022-11-19T07:03:50Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3605,
"watchers_count": 3605,
"stargazers_count": 3604,
"watchers_count": 3604,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3605,
"watchers": 3604,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2022-11-09T18:05:51Z",
"updated_at": "2022-11-19T08:00:33Z",
"pushed_at": "2020-10-23T19:35:42Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -117,7 +117,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-11-12T19:03:00Z",
"updated_at": "2022-11-19T12:10:01Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 364,
"watchers": 365,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-19T04:29:36Z",
"updated_at": "2022-11-19T07:03:50Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3605,
"watchers_count": 3605,
"stargazers_count": 3604,
"watchers_count": 3604,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3605,
"watchers": 3604,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2022-11-16T12:59:19Z",
"updated_at": "2022-11-19T08:06:32Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 138,
"watchers": 139,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "POC for LFI related to CVE-2021-27905",
"fork": false,
"created_at": "2022-11-03T00:41:16Z",
"updated_at": "2022-11-04T00:56:54Z",
"updated_at": "2022-11-19T12:17:04Z",
"pushed_at": "2022-11-17T06:27:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -1652,10 +1652,10 @@
"description": "利用sudo提权只针对cnetos7",
"fork": false,
"created_at": "2022-11-03T13:10:23Z",
"updated_at": "2022-11-15T13:00:44Z",
"updated_at": "2022-11-19T12:17:27Z",
"pushed_at": "2022-11-03T13:52:35Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1664,7 +1664,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -2232,10 +2232,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-11-16T03:44:14Z",
"updated_at": "2022-11-18T16:57:17Z",
"updated_at": "2022-11-19T10:04:55Z",
"pushed_at": "2022-11-16T03:50:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2244,7 +2244,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-11-16T01:14:45Z",
"updated_at": "2022-11-19T09:24:43Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 525,
"watchers_count": 525,
"stargazers_count": 526,
"watchers_count": 526,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 115,
"watchers": 525,
"watchers": 526,
"score": 0
},
{

31
2022/CVE-2022-3992.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 568063140,
"name": "CVE-2022-3992",
"full_name": "Urban4\/CVE-2022-3992",
"owner": {
"login": "Urban4",
"id": 81638590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81638590?v=4",
"html_url": "https:\/\/github.com\/Urban4"
},
"html_url": "https:\/\/github.com\/Urban4\/CVE-2022-3992",
"description": "Cross Site Scripting on sanitization-management-system",
"fork": false,
"created_at": "2022-11-19T10:36:37Z",
"updated_at": "2022-11-19T10:36:37Z",
"pushed_at": "2022-11-19T11:42:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
"fork": false,
"created_at": "2022-11-18T13:19:23Z",
"updated_at": "2022-11-19T04:23:03Z",
"pushed_at": "2022-11-18T13:26:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"updated_at": "2022-11-19T07:33:11Z",
"pushed_at": "2022-11-19T10:35:50Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2022-11-18T23:48:19Z",
"updated_at": "2022-11-19T07:55:04Z",
"pushed_at": "2022-11-14T17:54:57Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 67,
"watchers": 68,
"score": 0
}
]

View file

@ -685,6 +685,14 @@ A vulnerability, which was classified as problematic, has been found in Sourceco
- [maikroservice/CVE-2022-3949](https://github.com/maikroservice/CVE-2022-3949)
### CVE-2022-3992 (2022-11-14)
<code>
A vulnerability classified as problematic was found in SourceCodester Sanitization Management System. Affected by this vulnerability is an unknown functionality of the file admin/?page=system_info of the component Banner Image Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-213571.
</code>
- [Urban4/CVE-2022-3992](https://github.com/Urban4/CVE-2022-3992)
### CVE-2022-5555
- [huihuo123/CVE-2022-5555](https://github.com/huihuo123/CVE-2022-5555)