Auto Update 2023/03/31 18:32:42

This commit is contained in:
motikan2010-bot 2023-04-01 03:32:42 +09:00
parent 6bb30855d1
commit ca3344466b
21 changed files with 118 additions and 58 deletions

View file

@ -369,10 +369,10 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
"updated_at": "2023-03-25T09:08:19Z",
"updated_at": "2023-03-31T14:18:34Z",
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -381,7 +381,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 97,
"watchers": 98,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
"fork": false,
"created_at": "2019-02-25T06:38:15Z",
"updated_at": "2022-11-23T12:24:16Z",
"updated_at": "2023-03-31T13:36:32Z",
"pushed_at": "2019-03-18T01:20:52Z",
"stargazers_count": 67,
"watchers_count": 67,

View file

@ -42,10 +42,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-03-31T03:58:11Z",
"updated_at": "2023-03-31T14:37:30Z",
"pushed_at": "2023-02-16T02:07:09Z",
"stargazers_count": 1566,
"watchers_count": 1566,
"stargazers_count": 1567,
"watchers_count": 1567,
"has_discussions": false,
"forks_count": 354,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 354,
"watchers": 1566,
"watchers": 1567,
"score": 0
},
{

View file

@ -455,10 +455,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-03-27T14:36:00Z",
"updated_at": "2023-03-31T13:23:35Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 866,
"watchers_count": 866,
"stargazers_count": 867,
"watchers_count": 867,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -467,7 +467,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 866,
"watchers": 867,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 75,
"score": 0
},

View file

@ -138,7 +138,7 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2023-03-10T12:09:42Z",
"updated_at": "2023-03-31T15:04:12Z",
"pushed_at": "2022-11-16T13:14:56Z",
"stargazers_count": 83,
"watchers_count": 83,

View file

@ -1510,7 +1510,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2022-11-09T18:14:42Z",
"pushed_at": "2022-11-10T15:43:50Z",
"pushed_at": "2023-03-31T15:18:41Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
@ -10446,10 +10446,10 @@
"description": "Log4jshell - CVE-2021-44228",
"fork": false,
"created_at": "2022-01-07T09:56:30Z",
"updated_at": "2022-01-12T06:44:17Z",
"updated_at": "2023-03-31T16:40:36Z",
"pushed_at": "2022-07-26T05:17:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -10458,7 +10458,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-03-30T06:44:52Z",
"updated_at": "2023-03-31T15:33:02Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 951,
"watchers_count": 951,
"stargazers_count": 952,
"watchers_count": 952,
"has_discussions": true,
"forks_count": 166,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 951,
"watchers": 952,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploits GitLab authenticated RCE vulnerability known as CVE-2022-2884.",
"fork": false,
"created_at": "2022-12-22T17:52:26Z",
"updated_at": "2023-03-20T08:12:45Z",
"updated_at": "2023-03-31T13:27:05Z",
"pushed_at": "2022-12-26T09:49:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -46,10 +46,10 @@
"description": "POC of CVE-2022-36537",
"fork": false,
"created_at": "2022-12-09T14:15:52Z",
"updated_at": "2023-03-10T09:22:35Z",
"updated_at": "2023-03-31T18:07:43Z",
"pushed_at": "2022-12-11T13:13:21Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -329,5 +329,34 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 621899889,
"name": "CVE-2022-46169_poc",
"full_name": "devAL3X\/CVE-2022-46169_poc",
"owner": {
"login": "devAL3X",
"id": 40294005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40294005?v=4",
"html_url": "https:\/\/github.com\/devAL3X"
},
"html_url": "https:\/\/github.com\/devAL3X\/CVE-2022-46169_poc",
"description": null,
"fork": false,
"created_at": "2023-03-31T16:21:20Z",
"updated_at": "2023-03-31T16:21:28Z",
"pushed_at": "2023-03-31T16:21:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -81,10 +81,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2023-02-13T06:11:40Z",
"updated_at": "2023-03-24T10:19:27Z",
"updated_at": "2023-03-31T18:07:39Z",
"pushed_at": "2023-02-13T09:03:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -108,10 +108,10 @@
"description": "Windows_AFD_LPE_CVE-2023-21768",
"fork": false,
"created_at": "2023-03-13T20:32:50Z",
"updated_at": "2023-03-24T10:19:25Z",
"updated_at": "2023-03-31T18:07:38Z",
"pushed_at": "2023-03-13T21:16:01Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-03-31T11:15:50Z",
"updated_at": "2023-03-31T14:04:57Z",
"pushed_at": "2023-03-03T03:30:04Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 75,
"watchers": 493,
"watchers": 494,
"score": 0
},
{

View file

@ -371,10 +371,10 @@
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-03-31T09:49:07Z",
"updated_at": "2023-03-31T13:11:11Z",
"pushed_at": "2023-03-24T10:46:38Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -385,7 +385,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 242,
"watchers_count": 242,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 242,
"score": 0
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-15T15:52:20Z",
"updated_at": "2023-03-21T18:42:21Z",
"pushed_at": "2023-03-15T16:31:11Z",
"pushed_at": "2023-03-31T16:44:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -47,13 +47,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
}

View file

@ -233,5 +233,34 @@
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 621829474,
"name": "MinIO_CVE-2023-28432",
"full_name": "Majus527\/MinIO_CVE-2023-28432",
"owner": {
"login": "Majus527",
"id": 98865436,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98865436?v=4",
"html_url": "https:\/\/github.com\/Majus527"
},
"html_url": "https:\/\/github.com\/Majus527\/MinIO_CVE-2023-28432",
"description": "minio敏感信息泄露",
"fork": false,
"created_at": "2023-03-31T13:29:36Z",
"updated_at": "2023-03-31T14:09:52Z",
"pushed_at": "2023-03-31T14:06:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false,
"created_at": "2023-03-27T08:53:04Z",
"updated_at": "2023-03-31T12:33:57Z",
"updated_at": "2023-03-31T17:32:05Z",
"pushed_at": "2023-03-27T09:03:56Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 139,
"watchers": 142,
"score": 0
}
]

View file

@ -595,6 +595,7 @@ Minio is a Multi-Cloud Object Storage framework. In a cluster deployment startin
- [steponeerror/Cve-2023-28432-](https://github.com/steponeerror/Cve-2023-28432-)
- [yuyongxr/minio_cve-2023-28432](https://github.com/yuyongxr/minio_cve-2023-28432)
- [Cuerz/CVE-2023-28432](https://github.com/Cuerz/CVE-2023-28432)
- [Majus527/MinIO_CVE-2023-28432](https://github.com/Majus527/MinIO_CVE-2023-28432)
### CVE-2023-28434 (2023-03-22)
@ -6573,6 +6574,7 @@ Cacti is an open source platform which provides a robust and extensible operatio
- [miko550/CVE-2022-46169](https://github.com/miko550/CVE-2022-46169)
- [ariyaadinatha/cacti-cve-2022-46169-exploit](https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit)
- [doosec101/CVE-2022-46169](https://github.com/doosec101/CVE-2022-46169)
- [devAL3X/CVE-2022-46169_poc](https://github.com/devAL3X/CVE-2022-46169_poc)
### CVE-2022-46175 (2022-12-23)