Auto Update 2023/04/29 00:34:57

This commit is contained in:
motikan2010-bot 2023-04-29 09:34:57 +09:00
parent 5dea28e147
commit dda43ab208
18 changed files with 126 additions and 66 deletions

View file

@ -42,12 +42,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-28T08:37:18Z",
"updated_at": "2023-04-28T21:06:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3738,
"watchers_count": 3738,
"stargazers_count": 3739,
"watchers_count": 3739,
"has_discussions": false,
"forks_count": 1077,
"forks_count": 1078,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -73,8 +73,8 @@
"webshell"
],
"visibility": "public",
"forks": 1077,
"watchers": 3738,
"forks": 1078,
"watchers": 3739,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2023-04-27T20:10:40Z",
"updated_at": "2023-04-28T21:13:43Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 388,
"watchers_count": 388,
"stargazers_count": 389,
"watchers_count": 389,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 388,
"watchers": 389,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-28T08:37:18Z",
"updated_at": "2023-04-28T21:06:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3738,
"watchers_count": 3738,
"stargazers_count": 3739,
"watchers_count": 3739,
"has_discussions": false,
"forks_count": 1077,
"forks_count": 1078,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,8 +44,8 @@
"webshell"
],
"visibility": "public",
"forks": 1077,
"watchers": 3738,
"forks": 1078,
"watchers": 3739,
"score": 0
},
{

View file

@ -62,5 +62,34 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 634051631,
"name": "CVE-2020-35489",
"full_name": "bod4k\/CVE-2020-35489",
"owner": {
"login": "bod4k",
"id": 37278209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37278209?v=4",
"html_url": "https:\/\/github.com\/bod4k"
},
"html_url": "https:\/\/github.com\/bod4k\/CVE-2020-35489",
"description": "POC for Contact Form 7 < 5.3.2 - Unrestricted File Upload (Maybe Code execution )",
"fork": false,
"created_at": "2023-04-28T22:59:53Z",
"updated_at": "2023-04-28T23:01:43Z",
"pushed_at": "2023-04-28T23:01:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -158,10 +158,10 @@
"description": "Arbitrary file read controller based on CVE-2021-29447",
"fork": false,
"created_at": "2022-11-06T04:26:20Z",
"updated_at": "2022-11-08T13:24:21Z",
"updated_at": "2023-04-28T22:17:00Z",
"pushed_at": "2022-11-11T06:27:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -1039,10 +1039,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2023-04-28T08:36:29Z",
"updated_at": "2023-04-28T20:38:36Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 586,
"watchers_count": 586,
"stargazers_count": 587,
"watchers_count": 587,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -1051,7 +1051,7 @@
"topics": [],
"visibility": "public",
"forks": 160,
"watchers": 586,
"watchers": 587,
"score": 0
},
{

View file

@ -221,13 +221,13 @@
"stargazers_count": 1464,
"watchers_count": 1464,
"has_discussions": false,
"forks_count": 485,
"forks_count": 486,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 485,
"forks": 486,
"watchers": 1464,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
"fork": false,
"created_at": "2022-12-25T04:34:26Z",
"updated_at": "2023-04-12T07:05:12Z",
"updated_at": "2023-04-28T23:20:44Z",
"pushed_at": "2022-12-27T21:30:08Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 63,
"watchers": 64,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2022-38181 POC for FireTV 3rd gen Cube (gazelle)",
"fork": false,
"created_at": "2023-04-13T13:25:09Z",
"updated_at": "2023-04-13T13:35:38Z",
"updated_at": "2023-04-28T19:01:15Z",
"pushed_at": "2023-04-13T13:29:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -316,13 +316,13 @@
"stargazers_count": 319,
"watchers_count": 319,
"has_discussions": false,
"forks_count": 83,
"forks_count": 82,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 83,
"forks": 82,
"watchers": 319,
"score": 0
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2022-10-23T15:58:18Z",
"updated_at": "2023-04-18T13:08:16Z",
"updated_at": "2023-04-28T19:55:47Z",
"pushed_at": "2022-10-24T10:13:34Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 13,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 33,
"forks": 12,
"watchers": 32,
"score": 0
}
]

View file

@ -178,19 +178,19 @@
"description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ",
"fork": false,
"created_at": "2022-10-18T13:53:55Z",
"updated_at": "2023-02-22T14:25:34Z",
"updated_at": "2023-04-28T19:55:46Z",
"pushed_at": "2022-10-18T14:10:07Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 14,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 39,
"forks": 13,
"watchers": 38,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-28T16:48:22Z",
"updated_at": "2023-04-28T19:02:32Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 189,
"watchers_count": 189,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 188,
"watchers": 189,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-04-26T20:50:13Z",
"updated_at": "2023-04-28T22:47:07Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 389,
"watchers_count": 389,
"stargazers_count": 390,
"watchers_count": 390,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 389,
"watchers": 390,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-04-20T09:51:30Z",
"updated_at": "2023-04-28T19:24:58Z",
"pushed_at": "2023-03-07T10:43:36Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 91,
"watchers": 92,
"score": 0
},
{
@ -114,5 +114,34 @@
"forks": 7,
"watchers": 37,
"score": 0
},
{
"id": 634006271,
"name": "CVE-2023-25136",
"full_name": "nhakobyan685\/CVE-2023-25136",
"owner": {
"login": "nhakobyan685",
"id": 118097522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118097522?v=4",
"html_url": "https:\/\/github.com\/nhakobyan685"
},
"html_url": "https:\/\/github.com\/nhakobyan685\/CVE-2023-25136",
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-04-28T19:46:03Z",
"updated_at": "2023-04-28T20:28:08Z",
"pushed_at": "2023-04-28T20:29:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve"
],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 9,
"score": 0
}

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2023-04-27T20:51:47Z",
"updated_at": "2023-04-27T20:51:48Z",
"updated_at": "2023-04-28T21:29:10Z",
"pushed_at": "2023-04-27T21:17:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -631,6 +631,7 @@ OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.
- [ticofookfook/CVE-2023-25136](https://github.com/ticofookfook/CVE-2023-25136)
- [Christbowel/CVE-2023-25136](https://github.com/Christbowel/CVE-2023-25136)
- [adhikara13/CVE-2023-25136](https://github.com/adhikara13/CVE-2023-25136)
- [nhakobyan685/CVE-2023-25136](https://github.com/nhakobyan685/CVE-2023-25136)
### CVE-2023-25194 (2023-02-07)
@ -19370,6 +19371,7 @@ The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows
- [dn9uy3n/Check-WP-CVE-2020-35489](https://github.com/dn9uy3n/Check-WP-CVE-2020-35489)
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [bod4k/CVE-2020-35489](https://github.com/bod4k/CVE-2020-35489)
### CVE-2020-35498 (2021-02-11)