Auto Update 2023/04/07 12:34:48

This commit is contained in:
motikan2010-bot 2023-04-07 21:34:48 +09:00
parent 1deb0913c0
commit aeb9617ece
34 changed files with 280 additions and 122 deletions

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-06T09:44:43Z",
"updated_at": "2023-04-07T08:48:08Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1659,
"watchers_count": 1659,
"stargazers_count": 1660,
"watchers_count": 1660,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1659,
"watchers": 1660,
"score": 0
},
{

View file

@ -438,7 +438,7 @@
"stargazers_count": 721,
"watchers_count": 721,
"has_discussions": false,
"forks_count": 428,
"forks_count": 429,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -448,7 +448,7 @@
"exploit"
],
"visibility": "public",
"forks": 428,
"forks": 429,
"watchers": 721,
"score": 0
},
@ -785,10 +785,10 @@
"description": "编译好的脏牛漏洞CVE-2016-5195EXP",
"fork": false,
"created_at": "2018-05-27T08:06:50Z",
"updated_at": "2023-04-04T10:17:59Z",
"updated_at": "2023-04-07T08:01:05Z",
"pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -797,7 +797,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -459,10 +459,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-03-30T06:27:52Z",
"updated_at": "2023-04-07T11:44:04Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 381,
"watchers_count": 381,
"stargazers_count": 383,
"watchers_count": 383,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -471,7 +471,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 381,
"watchers": 383,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-06T09:44:43Z",
"updated_at": "2023-04-07T08:48:08Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1659,
"watchers_count": 1659,
"stargazers_count": 1660,
"watchers_count": 1660,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1659,
"watchers": 1660,
"score": 0
},
{

View file

@ -559,19 +559,19 @@
"description": "OpenSSH 2.3 < 7.7 - Username Enumeration",
"fork": false,
"created_at": "2020-11-29T17:36:11Z",
"updated_at": "2023-01-20T05:37:20Z",
"updated_at": "2023-04-07T11:55:49Z",
"pushed_at": "2020-11-29T17:48:55Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 20,
"forks": 9,
"watchers": 21,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-06T09:44:43Z",
"updated_at": "2023-04-07T08:48:08Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1659,
"watchers_count": 1659,
"stargazers_count": 1660,
"watchers_count": 1660,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1659,
"watchers": 1660,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-06T03:26:14Z",
"updated_at": "2023-04-07T08:05:40Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3713,
"watchers_count": 3713,
"stargazers_count": 3714,
"watchers_count": 3714,
"has_discussions": false,
"forks_count": 1072,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1072,
"watchers": 3713,
"watchers": 3714,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-06T09:44:43Z",
"updated_at": "2023-04-07T08:48:08Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1659,
"watchers_count": 1659,
"stargazers_count": 1660,
"watchers_count": 1660,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1659,
"watchers": 1660,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-06T03:26:14Z",
"updated_at": "2023-04-07T08:05:40Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3713,
"watchers_count": 3713,
"stargazers_count": 3714,
"watchers_count": 3714,
"has_discussions": false,
"forks_count": 1072,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1072,
"watchers": 3713,
"watchers": 3714,
"score": 0
},
{

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-04-06T02:08:12Z",
"updated_at": "2023-04-07T07:32:16Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 53,
"watchers": 54,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-06T09:44:43Z",
"updated_at": "2023-04-07T08:48:08Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1659,
"watchers_count": 1659,
"stargazers_count": 1660,
"watchers_count": 1660,
"has_discussions": false,
"forks_count": 323,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 323,
"watchers": 1659,
"watchers": 1660,
"score": 0
},
{
@ -183,10 +183,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2023-03-25T07:00:23Z",
"updated_at": "2023-04-07T11:31:00Z",
"pushed_at": "2022-08-07T06:36:30Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -195,7 +195,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -143,5 +143,34 @@
"forks": 3,
"watchers": 12,
"score": 0
},
{
"id": 624776221,
"name": "SAP_CVE-2020-6287_find_mandate",
"full_name": "qmakake\/SAP_CVE-2020-6287_find_mandate",
"owner": {
"login": "qmakake",
"id": 80854804,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80854804?v=4",
"html_url": "https:\/\/github.com\/qmakake"
},
"html_url": "https:\/\/github.com\/qmakake\/SAP_CVE-2020-6287_find_mandate",
"description": "Checker help to verify created account or find it's mandat",
"fork": false,
"created_at": "2023-04-07T08:24:12Z",
"updated_at": "2023-04-07T08:28:52Z",
"pushed_at": "2023-04-07T11:08:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -47,13 +47,13 @@
"stargazers_count": 1677,
"watchers_count": 1677,
"has_discussions": false,
"forks_count": 583,
"forks_count": 582,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 583,
"forks": 582,
"watchers": 1677,
"score": 0
},

View file

@ -216,10 +216,10 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2023-04-04T14:09:51Z",
"updated_at": "2023-04-07T07:45:47Z",
"pushed_at": "2022-02-10T11:38:46Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -228,7 +228,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -1039,10 +1039,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2023-04-01T14:07:26Z",
"updated_at": "2023-04-07T06:50:01Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 581,
"watchers_count": 581,
"stargazers_count": 582,
"watchers_count": 582,
"has_discussions": false,
"forks_count": 159,
"allow_forking": true,
@ -1051,7 +1051,7 @@
"topics": [],
"visibility": "public",
"forks": 159,
"watchers": 581,
"watchers": 582,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-03-29T11:33:24Z",
"updated_at": "2023-04-07T08:25:46Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1197,
"watchers_count": 1197,
"stargazers_count": 1198,
"watchers_count": 1198,
"has_discussions": false,
"forks_count": 306,
"forks_count": 307,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 306,
"watchers": 1197,
"forks": 307,
"watchers": 1198,
"score": 0
},
{

View file

@ -4122,10 +4122,10 @@
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
"fork": false,
"created_at": "2021-12-13T11:06:46Z",
"updated_at": "2023-01-10T09:11:07Z",
"updated_at": "2023-04-07T08:10:34Z",
"pushed_at": "2021-12-26T09:58:06Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -4134,7 +4134,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 95,
"watchers": 96,
"score": 0
},
{
@ -8989,10 +8989,10 @@
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
"updated_at": "2023-03-20T01:26:01Z",
"updated_at": "2023-04-07T10:34:26Z",
"pushed_at": "2022-12-30T12:32:05Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -9001,7 +9001,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-12-10T12:38:08Z",
"updated_at": "2023-03-01T08:14:01Z",
"pushed_at": "2023-04-06T20:32:04Z",
"pushed_at": "2023-04-07T11:06:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -856,10 +856,10 @@
"description": "spring-cloud-gateway-rce CVE-2022-22947",
"fork": false,
"created_at": "2022-03-13T10:00:21Z",
"updated_at": "2023-02-13T04:35:29Z",
"updated_at": "2023-04-07T08:23:17Z",
"pushed_at": "2022-07-13T02:38:10Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -868,7 +868,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -2055,10 +2055,10 @@
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具基于JavaFx开发图形化操作更简单提高效率。",
"fork": false,
"created_at": "2022-12-28T04:50:16Z",
"updated_at": "2023-03-27T03:25:14Z",
"updated_at": "2023-04-07T07:40:47Z",
"pushed_at": "2022-12-29T03:32:45Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -2067,7 +2067,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-27666",
"fork": false,
"created_at": "2022-03-23T22:54:28Z",
"updated_at": "2023-02-02T00:58:48Z",
"updated_at": "2023-04-07T08:16:11Z",
"pushed_at": "2022-03-28T18:21:00Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 194,
"watchers": 195,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具可根据不同的Jdk生成出其所对应的xslt文件",
"fork": false,
"created_at": "2023-01-17T03:48:11Z",
"updated_at": "2023-03-22T13:11:20Z",
"updated_at": "2023-04-07T09:47:07Z",
"pushed_at": "2023-01-17T12:27:08Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 65,
"watchers": 66,
"score": 0
}
]

View file

@ -169,10 +169,10 @@
"description": null,
"fork": false,
"created_at": "2022-11-02T17:33:26Z",
"updated_at": "2022-12-09T17:21:25Z",
"updated_at": "2023-04-07T08:25:52Z",
"pushed_at": "2022-11-02T17:33:46Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

52
2022/CVE-2022-38604.json Normal file
View file

@ -0,0 +1,52 @@
[
{
"id": 520518592,
"name": "CVE-2022-38604",
"full_name": "LucaBarile\/CVE-2022-38604",
"owner": {
"login": "LucaBarile",
"id": 74877659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74877659?v=4",
"html_url": "https:\/\/github.com\/LucaBarile"
},
"html_url": "https:\/\/github.com\/LucaBarile\/CVE-2022-38604",
"description": "Exploit for CVE-2022-0003",
"fork": false,
"created_at": "2022-08-02T13:53:18Z",
"updated_at": "2023-04-07T12:24:29Z",
"pushed_at": "2023-04-05T13:35:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0-day",
"arbitrary-file-deletion",
"denial-of-service",
"disclosure",
"elevation-of-privilege",
"exploit",
"impersonation",
"link-following",
"link-following-attack",
"local-privilege-escalation",
"mount-point",
"poc",
"proof-of-concept",
"symbolic-link",
"vulnerability",
"wacom",
"wacom-vulnerability",
"windows-denial-of-service",
"write-up",
"zero-day"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -228,10 +228,10 @@
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
"fork": false,
"created_at": "2022-10-20T03:11:03Z",
"updated_at": "2023-03-28T10:27:50Z",
"updated_at": "2023-04-07T07:43:04Z",
"pushed_at": "2022-10-20T06:36:42Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
"fork": false,
"created_at": "2023-01-17T21:26:28Z",
"updated_at": "2023-04-04T06:28:03Z",
"updated_at": "2023-04-07T08:29:19Z",
"pushed_at": "2023-01-19T13:10:07Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

31
2023/CVE-2023-21389.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 624796659,
"name": "Weblogic_CVE-2023-21389",
"full_name": "sxsuperxuan\/Weblogic_CVE-2023-21389",
"owner": {
"login": "sxsuperxuan",
"id": 103333386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103333386?v=4",
"html_url": "https:\/\/github.com\/sxsuperxuan"
},
"html_url": "https:\/\/github.com\/sxsuperxuan\/Weblogic_CVE-2023-21389",
"description": null,
"fork": false,
"created_at": "2023-04-07T09:25:09Z",
"updated_at": "2023-04-07T09:39:05Z",
"pushed_at": "2023-04-07T09:53:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A script to automate privilege escalation with CVE-2023-22809 vulnerability",
"fork": false,
"created_at": "2023-01-21T15:19:23Z",
"updated_at": "2023-04-06T15:12:04Z",
"updated_at": "2023-04-07T08:27:05Z",
"pushed_at": "2023-02-15T18:10:53Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 92,
"watchers": 94,
"score": 0
},
{
@ -80,10 +80,10 @@
"description": "CVE-2023-22809 Linux Sudo",
"fork": false,
"created_at": "2023-04-06T03:11:48Z",
"updated_at": "2023-04-06T17:24:14Z",
"updated_at": "2023-04-07T08:15:59Z",
"pushed_at": "2023-04-06T03:17:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -92,7 +92,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-16T17:28:27Z",
"updated_at": "2023-03-18T14:00:07Z",
"pushed_at": "2023-03-16T17:38:37Z",
"pushed_at": "2023-04-07T12:03:14Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -173,13 +173,13 @@
"stargazers_count": 278,
"watchers_count": 278,
"has_discussions": false,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"forks": 48,
"watchers": 278,
"score": 0
},

31
2023/CVE-2023-27100.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 624761642,
"name": "CVE-2023-27100",
"full_name": "DarokNET\/CVE-2023-27100",
"owner": {
"login": "DarokNET",
"id": 61823580,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61823580?v=4",
"html_url": "https:\/\/github.com\/DarokNET"
},
"html_url": "https:\/\/github.com\/DarokNET\/CVE-2023-27100",
"description": null,
"fork": false,
"created_at": "2023-04-07T07:38:48Z",
"updated_at": "2023-04-07T09:13:53Z",
"pushed_at": "2023-04-07T09:14:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432) ",
"fork": false,
"created_at": "2023-03-23T16:27:47Z",
"updated_at": "2023-03-30T02:02:10Z",
"updated_at": "2023-04-07T07:08:47Z",
"pushed_at": "2023-03-24T02:27:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -184,6 +184,9 @@ In BitmapExport.java, there is a possible failure to truncate images due to a lo
- [schdork/acropolypse-bot](https://github.com/schdork/acropolypse-bot)
- [lordofpipes/acropadetect](https://github.com/lordofpipes/acropadetect)
### CVE-2023-21389
- [sxsuperxuan/Weblogic_CVE-2023-21389](https://github.com/sxsuperxuan/Weblogic_CVE-2023-21389)
### CVE-2023-21608 (2023-01-18)
<code>
@ -604,6 +607,14 @@ An issue in the password reset function of Peppermint v0.2.4 allows attackers to
### CVE-2023-27053
- [d3fudd/XSS-HGJ310](https://github.com/d3fudd/XSS-HGJ310)
### CVE-2023-27100 (2023-03-22)
<code>
Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests.
</code>
- [DarokNET/CVE-2023-27100](https://github.com/DarokNET/CVE-2023-27100)
### CVE-2023-27326
- [Impalabs/CVE-2023-27326](https://github.com/Impalabs/CVE-2023-27326)
@ -5528,6 +5539,9 @@ ProcessMaker before v3.5.4 was discovered to contain insecure permissions in the
- [sornram9254/CVE-2022-38577-Processmaker](https://github.com/sornram9254/CVE-2022-38577-Processmaker)
### CVE-2022-38604
- [LucaBarile/CVE-2022-38604](https://github.com/LucaBarile/CVE-2022-38604)
### CVE-2022-38766 (2023-01-03)
<code>
@ -15253,6 +15267,7 @@ SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.
- [Onapsis/CVE-2020-6287_RECON-scanner](https://github.com/Onapsis/CVE-2020-6287_RECON-scanner)
- [ynsmroztas/CVE-2020-6287-Sap-Add-User](https://github.com/ynsmroztas/CVE-2020-6287-Sap-Add-User)
- [murataydemir/CVE-2020-6287](https://github.com/murataydemir/CVE-2020-6287)
- [qmakake/SAP_CVE-2020-6287_find_mandate](https://github.com/qmakake/SAP_CVE-2020-6287_find_mandate)
### CVE-2020-6308 (2020-10-20)