Auto Update 2023/05/21 00:37:03

This commit is contained in:
motikan2010-bot 2023-05-21 09:37:03 +09:00
parent 1077b27507
commit cd0a617020
23 changed files with 161 additions and 68 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 2291,
"watchers_count": 2291,
"has_discussions": false,
"forks_count": 490,
"forks_count": 489,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 490,
"forks": 489,
"watchers": 2291,
"score": 0
},
@ -163,13 +163,13 @@
"stargazers_count": 572,
"watchers_count": 572,
"has_discussions": false,
"forks_count": 228,
"forks_count": 229,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 228,
"forks": 229,
"watchers": 572,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2023-03-31T09:19:41Z",
"updated_at": "2023-05-20T22:25:20Z",
"pushed_at": "2023-04-12T08:01:15Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 301,
"watchers": 302,
"score": 0
},
{

View file

@ -407,7 +407,7 @@
"stargazers_count": 413,
"watchers_count": 413,
"has_discussions": false,
"forks_count": 149,
"forks_count": 150,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -419,7 +419,7 @@
"struts-pwn"
],
"visibility": "public",
"forks": 149,
"forks": 150,
"watchers": 413,
"score": 0
},

View file

@ -47,13 +47,13 @@
"stargazers_count": 488,
"watchers_count": 488,
"has_discussions": false,
"forks_count": 121,
"forks_count": 122,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 121,
"forks": 122,
"watchers": 488,
"score": 0
},

View file

@ -47,13 +47,13 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 48,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2023-04-19T19:40:19Z",
"updated_at": "2023-05-20T18:47:33Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 343,
"watchers_count": 343,
"stargazers_count": 344,
"watchers_count": 344,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 115,
"watchers": 343,
"watchers": 344,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"forks": 43,
"watchers": 157,
"score": 0
},

View file

@ -134,7 +134,7 @@
"stargazers_count": 348,
"watchers_count": 348,
"has_discussions": false,
"forks_count": 65,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -147,7 +147,7 @@
"zerologon"
],
"visibility": "public",
"forks": 65,
"forks": 66,
"watchers": 348,
"score": 0
},
@ -1367,13 +1367,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 14,
"score": 0
},

View file

@ -134,13 +134,13 @@
"stargazers_count": 297,
"watchers_count": 297,
"has_discussions": false,
"forks_count": 84,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 84,
"forks": 85,
"watchers": 297,
"score": 0
},

View file

@ -259,5 +259,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 643372099,
"name": "CVE-2021-3493",
"full_name": "smallkill\/CVE-2021-3493",
"owner": {
"login": "smallkill",
"id": 19218766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19218766?v=4",
"html_url": "https:\/\/github.com\/smallkill"
},
"html_url": "https:\/\/github.com\/smallkill\/CVE-2021-3493",
"description": null,
"fork": false,
"created_at": "2023-05-21T00:14:40Z",
"updated_at": "2023-05-21T00:15:16Z",
"pushed_at": "2023-05-21T00:15:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2023-05-15T20:29:48Z",
"updated_at": "2023-05-20T20:37:31Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 897,
"watchers_count": 897,
"stargazers_count": 898,
"watchers_count": 898,
"has_discussions": false,
"forks_count": 186,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 186,
"watchers": 897,
"watchers": 898,
"score": 0
},
{
@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-05-20T12:15:52Z",
"updated_at": "2023-05-20T20:36:29Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 573,
"watchers_count": 573,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 572,
"watchers": 573,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 1212,
"watchers_count": 1212,
"has_discussions": false,
"forks_count": 309,
"forks_count": 310,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 309,
"forks": 310,
"watchers": 1212,
"score": 0
},

View file

@ -1552,10 +1552,10 @@
"description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-10-25T12:29:54Z",
"updated_at": "2022-10-26T01:23:44Z",
"updated_at": "2023-05-21T00:26:55Z",
"pushed_at": "2023-05-19T05:55:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1564,7 +1564,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2023-05-20T17:44:05Z",
"updated_at": "2023-05-20T23:57:14Z",
"pushed_at": "2023-03-23T10:26:41Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 55,
"forks": 6,
"watchers": 58,
"score": 0
}
]

View file

@ -114,5 +114,34 @@
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 643308038,
"name": "CVE-2022-24716",
"full_name": "antisecc\/CVE-2022-24716",
"owner": {
"login": "antisecc",
"id": 92209707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92209707?v=4",
"html_url": "https:\/\/github.com\/antisecc"
},
"html_url": "https:\/\/github.com\/antisecc\/CVE-2022-24716",
"description": null,
"fork": false,
"created_at": "2023-05-20T18:43:46Z",
"updated_at": "2023-05-20T18:50:20Z",
"pushed_at": "2023-05-20T18:50:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 259,
"watchers_count": 259,
"has_discussions": false,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 52,
"forks": 53,
"watchers": 259,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad",
"fork": false,
"created_at": "2023-01-09T11:44:09Z",
"updated_at": "2023-04-17T18:57:50Z",
"updated_at": "2023-05-20T19:56:08Z",
"pushed_at": "2023-01-14T04:40:47Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -400,10 +400,10 @@
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
"fork": false,
"created_at": "2023-03-20T16:31:54Z",
"updated_at": "2023-05-20T12:49:30Z",
"updated_at": "2023-05-20T23:05:23Z",
"pushed_at": "2023-03-24T10:46:38Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -414,7 +414,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -615,10 +615,10 @@
"description": "Perform With Mass Exploiter In Joomla 4.2.8.",
"fork": false,
"created_at": "2023-04-09T13:20:48Z",
"updated_at": "2023-05-09T14:57:43Z",
"updated_at": "2023-05-20T22:09:01Z",
"pushed_at": "2023-05-05T04:46:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -631,7 +631,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -129,10 +129,10 @@
"description": "Perform With Apache-SuperSet Leaked Token [CSRF]",
"fork": false,
"created_at": "2023-05-04T21:43:48Z",
"updated_at": "2023-05-04T23:59:24Z",
"updated_at": "2023-05-20T22:09:46Z",
"pushed_at": "2023-05-05T06:56:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -145,7 +145,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
"updated_at": "2023-05-20T07:55:34Z",
"updated_at": "2023-05-21T00:20:40Z",
"pushed_at": "2023-05-16T04:34:16Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 187,
"watchers": 188,
"score": 0
},
{

View file

@ -1,4 +1,36 @@
[
{
"id": 634970492,
"name": "keepass-password-dumper",
"full_name": "vdohney\/keepass-password-dumper",
"owner": {
"login": "vdohney",
"id": 131018578,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131018578?v=4",
"html_url": "https:\/\/github.com\/vdohney"
},
"html_url": "https:\/\/github.com\/vdohney\/keepass-password-dumper",
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-05-20T23:47:49Z",
"pushed_at": "2023-05-20T23:24:32Z",
"stargazers_count": 284,
"watchers_count": 284,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-32784",
"keepass"
],
"visibility": "public",
"forks": 28,
"watchers": 284,
"score": 0
},
{
"id": 642096503,
"name": "CVE-2023-32784-keepass-linux",

View file

@ -1273,6 +1273,7 @@ Improper Authentication vulnerability in WPDeveloper Essential Addons for Elemen
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
</code>
- [vdohney/keepass-password-dumper](https://github.com/vdohney/keepass-password-dumper)
- [CTM1/CVE-2023-32784-keepass-linux](https://github.com/CTM1/CVE-2023-32784-keepass-linux)
@ -3633,6 +3634,7 @@ Icinga Web 2 is an open source monitoring web interface, framework and command-l
- [joaoviictorti/CVE-2022-24716](https://github.com/joaoviictorti/CVE-2022-24716)
- [pumpkinpiteam/CVE-2022-24716](https://github.com/pumpkinpiteam/CVE-2022-24716)
- [doosec101/CVE-2022-24716](https://github.com/doosec101/CVE-2022-24716)
- [antisecc/CVE-2022-24716](https://github.com/antisecc/CVE-2022-24716)
### CVE-2022-24734 (2022-03-09)
@ -8795,6 +8797,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
- [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493)
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
- [smallkill/CVE-2021-3493](https://github.com/smallkill/CVE-2021-3493)
### CVE-2021-3560 (2022-02-16)