Auto Update 2023/05/02 00:31:05

This commit is contained in:
motikan2010-bot 2023-05-02 09:31:05 +09:00
parent 18a8441405
commit b85287c286
20 changed files with 143 additions and 74 deletions

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2023-04-30T00:58:22Z",
"updated_at": "2023-05-01T23:21:28Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 388,
"watchers_count": 388,
"stargazers_count": 389,
"watchers_count": 389,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 388,
"watchers": 389,
"score": 0
},
{

View file

@ -43,7 +43,7 @@
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-04-29T23:04:37Z",
"pushed_at": "2023-02-16T02:07:09Z",
"pushed_at": "2023-05-01T21:48:01Z",
"stargazers_count": 1573,
"watchers_count": 1573,
"has_discussions": false,
@ -659,7 +659,7 @@
"fork": false,
"created_at": "2020-09-17T16:53:17Z",
"updated_at": "2022-11-09T18:09:28Z",
"pushed_at": "2023-02-16T02:07:12Z",
"pushed_at": "2023-05-01T21:48:28Z",
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
@ -1604,7 +1604,7 @@
"fork": false,
"created_at": "2022-03-03T02:00:21Z",
"updated_at": "2022-03-03T02:01:04Z",
"pushed_at": "2023-02-16T03:14:00Z",
"pushed_at": "2023-05-01T22:24:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -42,10 +42,10 @@
"description": "CVE-2020-17453 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
"fork": false,
"created_at": "2023-04-20T06:00:13Z",
"updated_at": "2023-04-26T23:48:50Z",
"updated_at": "2023-05-01T21:42:39Z",
"pushed_at": "2023-04-22T14:18:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-12T10:17:58Z",
"updated_at": "2023-02-20T14:53:38Z",
"updated_at": "2023-05-01T18:59:22Z",
"pushed_at": "2022-12-29T16:45:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -47,13 +47,13 @@
"stargazers_count": 1681,
"watchers_count": 1681,
"has_discussions": false,
"forks_count": 586,
"forks_count": 587,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 586,
"forks": 587,
"watchers": 1681,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Simple CVE-2021-20294 poc",
"fork": false,
"created_at": "2023-01-21T16:15:21Z",
"updated_at": "2023-02-13T01:17:41Z",
"updated_at": "2023-05-01T20:34:37Z",
"pushed_at": "2023-01-21T22:37:16Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -455,10 +455,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-04-27T08:54:19Z",
"updated_at": "2023-05-01T20:16:50Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 868,
"watchers_count": 868,
"stargazers_count": 869,
"watchers_count": 869,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -467,7 +467,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 868,
"watchers": 869,
"score": 0
},
{

View file

@ -179,10 +179,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2023-03-14T17:04:29Z",
"updated_at": "2023-05-01T19:07:48Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -191,7 +191,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -6136,10 +6136,10 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2023-04-30T21:24:48Z",
"updated_at": "2023-05-01T19:02:47Z",
"pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 343,
"watchers_count": 343,
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@ -6148,7 +6148,7 @@
"topics": [],
"visibility": "public",
"forks": 91,
"watchers": 343,
"watchers": 344,
"score": 0
},
{
@ -6999,7 +6999,7 @@
"fork": false,
"created_at": "2021-12-15T21:09:00Z",
"updated_at": "2022-08-07T20:26:05Z",
"pushed_at": "2023-01-06T04:57:11Z",
"pushed_at": "2023-05-01T23:14:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2023-05-01T17:13:46Z",
"updated_at": "2023-05-01T20:34:25Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 189,
"watchers": 191,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2023-04-14T16:51:32Z",
"updated_at": "2023-05-01T21:00:17Z",
"pushed_at": "2022-08-30T02:11:05Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 134,
"watchers": 135,
"score": 0
}
]

View file

@ -286,10 +286,10 @@
"description": "This is poc of CVE-2022-46169 authentication bypass and remote code execution",
"fork": false,
"created_at": "2023-03-11T19:39:44Z",
"updated_at": "2023-05-01T16:16:47Z",
"updated_at": "2023-05-01T19:56:23Z",
"pushed_at": "2023-04-30T19:58:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -298,7 +298,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 8,
"score": 0
},
{
@ -511,20 +511,20 @@
},
{
"id": 634912432,
"name": "cacti-CVE-2022-46169",
"full_name": "Ruycraft1514\/cacti-CVE-2022-46169",
"name": "CVE-2022-46169",
"full_name": "Ruycraft1514\/CVE-2022-46169",
"owner": {
"login": "Ruycraft1514",
"id": 103446004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
"html_url": "https:\/\/github.com\/Ruycraft1514"
},
"html_url": "https:\/\/github.com\/Ruycraft1514\/cacti-CVE-2022-46169",
"html_url": "https:\/\/github.com\/Ruycraft1514\/CVE-2022-46169",
"description": "Exploit for cacti version 1.2.22",
"fork": false,
"created_at": "2023-05-01T14:29:28Z",
"updated_at": "2023-05-01T14:30:51Z",
"pushed_at": "2023-05-01T14:35:48Z",
"updated_at": "2023-05-01T19:12:58Z",
"pushed_at": "2023-05-01T19:13:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -537,5 +537,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 635027757,
"name": "CVE-2022-46169-CACTI-1.2.22",
"full_name": "FredBrave\/CVE-2022-46169-CACTI-1.2.22",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22",
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
"fork": false,
"created_at": "2023-05-01T20:00:23Z",
"updated_at": "2023-05-01T22:54:36Z",
"pushed_at": "2023-05-01T20:11:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-05-01T18:04:32Z",
"updated_at": "2023-05-01T20:06:38Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 805,
"watchers_count": 805,
"stargazers_count": 806,
"watchers_count": 806,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 805,
"watchers": 806,
"score": 0
},
{

31
2022/CVE-2022-46718.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 635000348,
"name": "cve-2022-46718-leaky-location",
"full_name": "biscuitehh\/cve-2022-46718-leaky-location",
"owner": {
"login": "biscuitehh",
"id": 507442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507442?v=4",
"html_url": "https:\/\/github.com\/biscuitehh"
},
"html_url": "https:\/\/github.com\/biscuitehh\/cve-2022-46718-leaky-location",
"description": "CVE-2022-46718: an app may be able to read sensitive location information.",
"fork": false,
"created_at": "2023-05-01T18:34:52Z",
"updated_at": "2023-05-01T19:11:36Z",
"pushed_at": "2023-05-01T18:48:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -42,8 +42,8 @@
"description": "A collection of resources and information about CVE-2023-2033",
"fork": false,
"created_at": "2023-04-26T15:24:02Z",
"updated_at": "2023-05-01T17:44:40Z",
"pushed_at": "2023-05-01T17:44:36Z",
"updated_at": "2023-05-01T19:26:47Z",
"pushed_at": "2023-05-01T19:52:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-04-28T22:47:07Z",
"updated_at": "2023-05-01T18:48:32Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 390,
"watchers_count": 390,
"stargazers_count": 389,
"watchers_count": 389,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 390,
"watchers": 389,
"score": 0
},
{

View file

@ -72,17 +72,17 @@
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2023-05-01T15:37:05Z",
"pushed_at": "2023-04-30T18:04:09Z",
"pushed_at": "2023-05-01T19:31:20Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 12,
"watchers": 29,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
"fork": false,
"created_at": "2023-04-25T04:59:05Z",
"updated_at": "2023-05-01T13:38:02Z",
"updated_at": "2023-05-01T19:40:45Z",
"pushed_at": "2023-04-30T17:45:27Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run .\/ee.sh -f \"path\/to\/index_screenshot.txt\" -k \"hacked\" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots.",
"fork": false,
"created_at": "2023-05-01T03:29:11Z",
"updated_at": "2023-05-01T17:21:37Z",
"updated_at": "2023-05-01T23:59:19Z",
"pushed_at": "2023-05-01T03:44:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -199,7 +199,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -766,7 +766,12 @@ An issue in the password reset function of Peppermint v0.2.4 allows attackers to
- [bypazs/CVE-2023-26984](https://github.com/bypazs/CVE-2023-26984)
### CVE-2023-27035
### CVE-2023-27035 (2023-05-01)
<code>
An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page.
</code>
- [fivex3/CVE-2023-27035](https://github.com/fivex3/CVE-2023-27035)
### CVE-2023-27053
@ -7147,7 +7152,8 @@ Cacti is an open source platform which provides a robust and extensible operatio
- [icebreack/CVE-2022-46169](https://github.com/icebreack/CVE-2022-46169)
- [devilgothies/CVE-2022-46169](https://github.com/devilgothies/CVE-2022-46169)
- [yassinebk/CVE-2022-46169](https://github.com/yassinebk/CVE-2022-46169)
- [Ruycraft1514/cacti-CVE-2022-46169](https://github.com/Ruycraft1514/cacti-CVE-2022-46169)
- [Ruycraft1514/CVE-2022-46169](https://github.com/Ruycraft1514/CVE-2022-46169)
- [FredBrave/CVE-2022-46169-CACTI-1.2.22](https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22)
### CVE-2022-46175 (2022-12-23)
@ -7242,6 +7248,9 @@ A race condition was addressed with additional validation. This issue is fixed i
- [enty8080/MacDirtyCow](https://github.com/enty8080/MacDirtyCow)
- [tdquang266/MDC](https://github.com/tdquang266/MDC)
### CVE-2022-46718
- [biscuitehh/cve-2022-46718-leaky-location](https://github.com/biscuitehh/cve-2022-46718-leaky-location)
### CVE-2022-46836 (2023-02-20)
<code>