Auto Update 2023/01/30 00:38:17

This commit is contained in:
motikan2010-bot 2023-01-30 09:38:17 +09:00
parent ce213643a2
commit b497731f19
16 changed files with 117 additions and 68 deletions

View file

@ -13,19 +13,19 @@
"description": "CVE-2018-18368 SEP Manager EoP Exploit",
"fork": false,
"created_at": "2019-07-27T10:22:19Z",
"updated_at": "2020-06-16T11:22:19Z",
"updated_at": "2023-01-29T23:31:24Z",
"pushed_at": "2019-11-27T16:25:41Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 18,
"forks": 11,
"watchers": 19,
"score": 0
}
]

View file

@ -306,10 +306,10 @@
"description": "C# PrintNightmare (CVE-2021-1675)",
"fork": false,
"created_at": "2021-09-26T20:46:23Z",
"updated_at": "2022-11-09T18:13:51Z",
"updated_at": "2023-01-29T19:56:56Z",
"pushed_at": "2021-09-26T22:35:07Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -318,7 +318,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2023-01-22T05:50:10Z",
"updated_at": "2023-01-29T21:58:15Z",
"pushed_at": "2022-07-01T00:33:57Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2023-01-29T02:31:09Z",
"updated_at": "2023-01-30T00:06:06Z",
"pushed_at": "2021-10-13T22:32:36Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -1049,7 +1049,7 @@
"description": "This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.",
"fork": false,
"created_at": "2023-01-28T11:12:22Z",
"updated_at": "2023-01-28T11:16:53Z",
"updated_at": "2023-01-29T20:01:43Z",
"pushed_at": "2023-01-28T11:24:33Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -1058,7 +1058,17 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"automation",
"cve-2021-43798",
"exploit",
"hacking",
"lab",
"methodology",
"pentest",
"privilege-escalation",
"secrets"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -387,10 +387,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2023-01-29T03:24:46Z",
"updated_at": "2023-01-29T19:48:19Z",
"pushed_at": "2022-12-14T08:48:45Z",
"stargazers_count": 1038,
"watchers_count": 1038,
"stargazers_count": 1039,
"watchers_count": 1039,
"has_discussions": false,
"forks_count": 474,
"allow_forking": true,
@ -401,7 +401,7 @@
],
"visibility": "public",
"forks": 474,
"watchers": 1038,
"watchers": 1039,
"score": 0
},
{
@ -9585,10 +9585,10 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2023-01-22T15:06:49Z",
"updated_at": "2023-01-29T21:44:19Z",
"pushed_at": "2022-08-12T20:12:50Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -9597,7 +9597,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 98,
"watchers": 99,
"score": 0
},
{

View file

@ -100,12 +100,12 @@
"description": "lpe poc for cve-2022-21882 ",
"fork": false,
"created_at": "2022-02-07T03:45:36Z",
"updated_at": "2022-12-14T21:47:36Z",
"updated_at": "2023-01-29T23:27:13Z",
"pushed_at": "2022-02-07T03:49:37Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -115,8 +115,8 @@
"windows-exploitation"
],
"visibility": "public",
"forks": 20,
"watchers": 43,
"forks": 21,
"watchers": 44,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-12-02T18:52:20Z",
"updated_at": "2023-01-27T16:09:21Z",
"updated_at": "2023-01-29T21:10:39Z",
"pushed_at": "2022-12-16T05:29:11Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -47,10 +47,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-30T23:32:56Z",
"updated_at": "2023-01-19T19:41:22Z",
"updated_at": "2023-01-29T22:01:39Z",
"pushed_at": "2022-11-01T19:56:40Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 166,
"watchers": 167,
"score": 0
},
{

View file

@ -255,10 +255,10 @@
"description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]",
"fork": false,
"created_at": "2022-10-15T16:51:25Z",
"updated_at": "2023-01-24T12:20:14Z",
"updated_at": "2023-01-29T20:52:26Z",
"pushed_at": "2022-10-19T16:27:16Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -267,7 +267,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2023-01-29T11:25:55Z",
"updated_at": "2023-01-29T19:51:44Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 42,
"forks": 6,
"watchers": 43,
"score": 0
}
]

31
2022/CVE-2022-44900.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 591689085,
"name": "CVE-2022-44900-demo-lab",
"full_name": "0xless\/CVE-2022-44900-demo-lab",
"owner": {
"login": "0xless",
"id": 78535423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78535423?v=4",
"html_url": "https:\/\/github.com\/0xless"
},
"html_url": "https:\/\/github.com\/0xless\/CVE-2022-44900-demo-lab",
"description": "Demo webapp vulnerable to CVE-2022-44900",
"fork": false,
"created_at": "2023-01-21T14:52:59Z",
"updated_at": "2023-01-29T19:40:29Z",
"pushed_at": "2023-01-29T19:58:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit via windows driver",
"fork": false,
"created_at": "2023-01-21T10:32:02Z",
"updated_at": "2023-01-28T02:14:27Z",
"updated_at": "2023-01-29T19:05:05Z",
"pushed_at": "2023-01-28T08:57:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC and Scanner for CVE-2023-24055",
"fork": false,
"created_at": "2023-01-24T19:19:23Z",
"updated_at": "2023-01-29T18:21:02Z",
"updated_at": "2023-01-29T23:45:48Z",
"pushed_at": "2023-01-25T00:04:57Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 43,
"watchers": 44,
"score": 0
},
{
@ -42,19 +42,19 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false,
"created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-01-29T15:39:27Z",
"updated_at": "2023-01-30T00:16:56Z",
"pushed_at": "2023-01-25T06:29:15Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 93,
"forks": 16,
"watchers": 99,
"score": 0
},
{

View file

@ -5154,6 +5154,14 @@ login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
### CVE-2022-44900 (2022-12-06)
<code>
A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file.
</code>
- [0xless/CVE-2022-44900-demo-lab](https://github.com/0xless/CVE-2022-44900-demo-lab)
### CVE-2022-45025 (2022-12-06)
<code>