Auto Update 2022/12/13 06:20:01

This commit is contained in:
motikan2010-bot 2022-12-13 15:20:01 +09:00
parent 1ae2fa88ff
commit a52ad632ad
26 changed files with 526 additions and 1837 deletions

View file

@ -43,7 +43,7 @@
"fork": false,
"created_at": "2022-10-21T06:38:41Z",
"updated_at": "2022-12-11T20:33:31Z",
"pushed_at": "2022-12-11T21:58:36Z",
"pushed_at": "2022-12-13T01:05:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -71,10 +71,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2022-12-09T21:38:45Z",
"updated_at": "2022-12-13T02:45:29Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 694,
"watchers_count": 694,
"stargazers_count": 695,
"watchers_count": 695,
"has_discussions": false,
"forks_count": 287,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 287,
"watchers": 694,
"watchers": 695,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894",
"fork": false,
"created_at": "2019-11-19T16:51:39Z",
"updated_at": "2022-10-19T10:03:07Z",
"updated_at": "2022-12-13T04:50:32Z",
"pushed_at": "2020-12-08T15:39:24Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 43,
"watchers": 44,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-04-27T12:00:24Z",
"updated_at": "2022-11-23T02:28:47Z",
"updated_at": "2022-12-13T05:56:21Z",
"pushed_at": "2021-04-30T02:27:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 6,
"score": 0
}
]

View file

@ -84,13 +84,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 43,
"score": 0
},

View file

@ -254,10 +254,10 @@
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2022-09-01T00:06:29Z",
"updated_at": "2022-12-13T05:28:49Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -273,7 +273,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -362,5 +362,34 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 577600604,
"name": "CVE-2019-11510",
"full_name": "trhacknon\/CVE-2019-11510",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-11510",
"description": null,
"fork": false,
"created_at": "2022-12-13T05:09:42Z",
"updated_at": "2022-12-13T05:32:09Z",
"pushed_at": "2022-12-13T05:12:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1435,5 +1435,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 577607477,
"name": "CVE-2019-19781",
"full_name": "trhacknon\/CVE-2019-19781",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-19781",
"description": null,
"fork": false,
"created_at": "2022-12-13T05:38:14Z",
"updated_at": "2022-12-13T05:40:37Z",
"pushed_at": "2022-12-13T05:41:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -53,13 +53,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 45,
"score": 0
}

View file

@ -79,7 +79,7 @@
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 63,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -89,7 +89,7 @@
"rce"
],
"visibility": "public",
"forks": 63,
"forks": 62,
"watchers": 138,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894",
"fork": false,
"created_at": "2019-11-19T16:51:39Z",
"updated_at": "2022-10-19T10:03:07Z",
"updated_at": "2022-12-13T04:50:32Z",
"pushed_at": "2020-12-08T15:39:24Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 43,
"watchers": 44,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 62,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.",
"fork": false,
"created_at": "2020-05-08T15:56:26Z",
"updated_at": "2022-11-09T18:07:39Z",
"updated_at": "2022-12-13T02:01:21Z",
"pushed_at": "2020-05-08T17:10:48Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -53,13 +53,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 45,
"score": 0
}

View file

@ -244,35 +244,6 @@
"watchers": 1,
"score": 0
},
{
"id": 277626606,
"name": "F5-Patch",
"full_name": "GoodiesHQ\/F5-Patch",
"owner": {
"login": "GoodiesHQ",
"id": 4576046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4576046?v=4",
"html_url": "https:\/\/github.com\/GoodiesHQ"
},
"html_url": "https:\/\/github.com\/GoodiesHQ\/F5-Patch",
"description": "Patch F5 appliance CVE-2020-5902",
"fork": false,
"created_at": "2020-07-06T19:07:33Z",
"updated_at": "2020-07-06T19:07:34Z",
"pushed_at": "2020-07-06T19:07:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 277692329,
"name": "CVE-2020-5902",
@ -1306,5 +1277,34 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 577594257,
"name": "CVE-2020-5902-Scanner",
"full_name": "trhacknon\/CVE-2020-5902-Scanner",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2020-5902-Scanner",
"description": null,
"fork": false,
"created_at": "2022-12-13T04:42:11Z",
"updated_at": "2022-12-13T04:42:26Z",
"pushed_at": "2022-12-13T05:30:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2022-11-22T14:31:37Z",
"updated_at": "2022-12-13T05:56:18Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 391,
"watchers_count": 391,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 392,
"watchers": 391,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 228,
"watchers_count": 228,
"has_discussions": false,
"forks_count": 67,
"forks_count": 68,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 67,
"forks": 68,
"watchers": 228,
"score": 0
},

View file

@ -455,10 +455,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2022-12-06T17:50:06Z",
"updated_at": "2022-12-13T05:59:07Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 846,
"watchers_count": 846,
"stargazers_count": 845,
"watchers_count": 845,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -467,7 +467,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 846,
"watchers": 845,
"score": 0
},
{

View file

@ -1924,13 +1924,13 @@
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 324,
"score": 0
},

View file

@ -1049,10 +1049,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-12-12T06:47:10Z",
"updated_at": "2022-12-13T02:02:54Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3142,
"watchers_count": 3142,
"stargazers_count": 3141,
"watchers_count": 3141,
"has_discussions": true,
"forks_count": 734,
"allow_forking": true,
@ -1061,7 +1061,7 @@
"topics": [],
"visibility": "public",
"forks": 734,
"watchers": 3142,
"watchers": 3141,
"score": 0
},
{

View file

@ -56,5 +56,34 @@
"forks": 9,
"watchers": 16,
"score": 0
},
{
"id": 556684444,
"name": "CVE-2022-37042",
"full_name": "0xf4n9x\/CVE-2022-37042",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-37042",
"description": "CVE-2022-37042 Zimbra Auth Bypass leads to RCE",
"fork": false,
"created_at": "2022-10-24T10:10:45Z",
"updated_at": "2022-12-13T05:33:58Z",
"pushed_at": "2022-12-09T02:45:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,20 +1,20 @@
[
{
"id": 554169656,
"name": "-expat_2.1.0_CVE-2022-40674",
"full_name": "nidhi7598\/-expat_2.1.0_CVE-2022-40674",
"name": "expat_2.1.0_CVE-2022-40674",
"full_name": "nidhi7598\/expat_2.1.0_CVE-2022-40674",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/-expat_2.1.0_CVE-2022-40674",
"html_url": "https:\/\/github.com\/nidhi7598\/expat_2.1.0_CVE-2022-40674",
"description": null,
"fork": false,
"created_at": "2022-10-19T11:15:29Z",
"updated_at": "2022-10-19T11:15:29Z",
"pushed_at": "2022-10-19T11:15:29Z",
"updated_at": "2022-12-13T05:56:49Z",
"pushed_at": "2022-12-13T05:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -580,10 +580,10 @@
"description": "CVE-2022-42889 Text4Shell Exploit POC",
"fork": false,
"created_at": "2022-10-22T10:30:41Z",
"updated_at": "2022-10-22T10:31:54Z",
"updated_at": "2022-12-13T04:44:38Z",
"pushed_at": "2022-10-22T10:31:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -592,7 +592,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -609,10 +609,10 @@
"description": "A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.",
"fork": false,
"created_at": "2022-10-23T05:48:48Z",
"updated_at": "2022-10-24T05:21:27Z",
"updated_at": "2022-12-13T04:50:35Z",
"pushed_at": "2022-10-23T06:23:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -621,7 +621,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -831,10 +831,10 @@
"description": "Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) ",
"fork": false,
"created_at": "2022-11-04T19:26:23Z",
"updated_at": "2022-12-09T20:14:16Z",
"updated_at": "2022-12-13T04:53:44Z",
"pushed_at": "2022-11-21T10:17:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -843,7 +843,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-12-03T11:04:17Z",
"updated_at": "2022-12-12T14:00:34Z",
"updated_at": "2022-12-13T02:25:37Z",
"pushed_at": "2022-12-02T14:38:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
"fork": false,
"created_at": "2022-12-09T22:48:38Z",
"updated_at": "2022-12-12T22:22:17Z",
"updated_at": "2022-12-13T02:16:18Z",
"pushed_at": "2022-12-11T13:37:22Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"rce"
],
"visibility": "public",
"forks": 11,
"watchers": 61,
"forks": 12,
"watchers": 63,
"score": 0
}
]

31
2022/CVE-2022-46169.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 575651169,
"name": "CVE-2022-46169",
"full_name": "0xf4n9x\/CVE-2022-46169",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-46169",
"description": "CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.",
"fork": false,
"created_at": "2022-12-08T01:52:13Z",
"updated_at": "2022-12-13T06:16:32Z",
"pushed_at": "2022-12-08T02:50:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

2031
README.md

File diff suppressed because it is too large Load diff