Auto Update 2023/01/27 00:29:37

This commit is contained in:
motikan2010-bot 2023-01-27 09:29:37 +09:00
parent 2a3172f574
commit b480f05fb2
13 changed files with 54 additions and 49 deletions

View file

@ -438,7 +438,7 @@
"stargazers_count": 702,
"watchers_count": 702,
"has_discussions": false,
"forks_count": 421,
"forks_count": 420,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -448,7 +448,7 @@
"exploit"
],
"visibility": "public",
"forks": 421,
"forks": 420,
"watchers": 702,
"score": 0
},

View file

@ -1570,13 +1570,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 165,
"forks_count": 166,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 165,
"forks": 166,
"watchers": 8,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "proof of concept exploit for Microsoft Windows 7 and Server 2008 RDP vulnerability",
"fork": false,
"created_at": "2019-05-14T21:00:50Z",
"updated_at": "2022-06-09T14:13:25Z",
"updated_at": "2023-01-26T22:30:15Z",
"pushed_at": "2019-05-15T14:23:11Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -270,19 +270,19 @@
"description": "CVE-2020-2551 Exploiter ",
"fork": false,
"created_at": "2022-06-02T14:20:43Z",
"updated_at": "2022-06-02T14:22:10Z",
"updated_at": "2023-01-26T18:32:17Z",
"pushed_at": "2022-06-02T14:23:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 873,
"watchers_count": 873,
"has_discussions": false,
"forks_count": 182,
"forks_count": 183,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"s4u2self"
],
"visibility": "public",
"forks": 182,
"forks": 183,
"watchers": 873,
"score": 0
},

View file

@ -1003,7 +1003,7 @@
"description": "CVE-2022-1388 Scanner",
"fork": false,
"created_at": "2022-05-11T19:33:37Z",
"updated_at": "2023-01-22T01:50:10Z",
"updated_at": "2023-01-26T20:22:15Z",
"pushed_at": "2023-01-22T02:08:58Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2023-01-25T18:06:59Z",
"updated_at": "2023-01-26T22:11:37Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 356,
"watchers_count": 356,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 355,
"watchers": 356,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2023-01-26T16:53:59Z",
"updated_at": "2023-01-26T20:59:21Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 36,
"forks": 4,
"watchers": 37,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)",
"fork": false,
"created_at": "2022-12-09T22:48:38Z",
"updated_at": "2023-01-06T23:01:08Z",
"updated_at": "2023-01-26T18:53:35Z",
"pushed_at": "2022-12-11T13:37:22Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 84,
"watchers": 85,
"score": 0
}
]

View file

@ -253,7 +253,7 @@
"fork": false,
"created_at": "2023-01-12T14:31:30Z",
"updated_at": "2023-01-26T17:25:26Z",
"pushed_at": "2023-01-26T15:08:14Z",
"pushed_at": "2023-01-26T19:09:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
"fork": false,
"created_at": "2023-01-17T21:26:28Z",
"updated_at": "2023-01-26T17:14:23Z",
"updated_at": "2023-01-26T23:44:50Z",
"pushed_at": "2023-01-19T13:10:07Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 70,
"watchers": 69,
"score": 0
},
{
@ -166,10 +166,10 @@
"description": "Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.",
"fork": false,
"created_at": "2023-01-23T15:49:10Z",
"updated_at": "2023-01-26T16:29:39Z",
"updated_at": "2023-01-26T20:49:19Z",
"pushed_at": "2023-01-24T16:59:23Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -185,7 +185,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC and Scanner for CVE-2023-24055",
"fork": false,
"created_at": "2023-01-24T19:19:23Z",
"updated_at": "2023-01-26T15:23:02Z",
"updated_at": "2023-01-26T20:12:00Z",
"pushed_at": "2023-01-25T00:04:57Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 24,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false,
"created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-01-26T16:53:36Z",
"updated_at": "2023-01-26T23:39:44Z",
"pushed_at": "2023-01-25T06:29:15Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 38,
"watchers": 44,
"score": 0
}
]

View file

@ -5194,7 +5194,12 @@ A cross-site scripting (XSS) vulnerability in Doctor Appointment Management Syst
- [sudoninja-noob/CVE-2022-45729](https://github.com/sudoninja-noob/CVE-2022-45729)
### CVE-2022-45770
### CVE-2022-45770 (2023-01-26)
<code>
Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows x86 up to version 7.11 allows attacker to gain local privileges escalation.
</code>
- [Marsel-marsel/CVE-2022-45770](https://github.com/Marsel-marsel/CVE-2022-45770)
### CVE-2022-45771 (2022-12-05)