Auto Update 2023/05/31 00:28:39

This commit is contained in:
motikan2010-bot 2023-05-31 09:28:39 +09:00
parent 3f5d18e657
commit ef50ded99b
17 changed files with 104 additions and 139 deletions

View file

@ -1,33 +1,4 @@
[
{
"id": 178656447,
"name": "eps-CVE-2017-0261",
"full_name": "kcufId\/eps-CVE-2017-0261",
"owner": {
"login": "kcufId",
"id": 10615265,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10615265?v=4",
"html_url": "https:\/\/github.com\/kcufId"
},
"html_url": "https:\/\/github.com\/kcufId\/eps-CVE-2017-0261",
"description": "eps漏洞(CVE-2017-0261)漏洞分析",
"fork": false,
"created_at": "2019-03-31T07:29:48Z",
"updated_at": "2021-07-01T06:42:07Z",
"pushed_at": "2019-03-31T07:39:37Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 9,
"score": 0
},
{
"id": 289408689,
"name": "CVE-2017-0261",

View file

@ -1,31 +0,0 @@
[
{
"id": 164232365,
"name": "5MMISSI-CVE-2017-1000499",
"full_name": "Villaquiranm\/5MMISSI-CVE-2017-1000499",
"owner": {
"login": "Villaquiranm",
"id": 22179290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22179290?v=4",
"html_url": "https:\/\/github.com\/Villaquiranm"
},
"html_url": "https:\/\/github.com\/Villaquiranm\/5MMISSI-CVE-2017-1000499",
"description": null,
"fork": false,
"created_at": "2019-01-05T16:33:08Z",
"updated_at": "2019-01-13T11:38:09Z",
"pushed_at": "2019-01-13T11:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.",
"fork": false,
"created_at": "2017-05-30T09:55:55Z",
"updated_at": "2023-03-10T10:21:56Z",
"updated_at": "2023-05-30T22:35:03Z",
"pushed_at": "2020-04-20T10:12:11Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 110,
"forks": 32,
"watchers": 111,
"score": 0
}
]

View file

@ -268,35 +268,6 @@
"watchers": 0,
"score": 0
},
{
"id": 233294562,
"name": "Exploits_CVE-2019-19781",
"full_name": "unknowndevice64\/Exploits_CVE-2019-19781",
"owner": {
"login": "unknowndevice64",
"id": 23033569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23033569?v=4",
"html_url": "https:\/\/github.com\/unknowndevice64"
},
"html_url": "https:\/\/github.com\/unknowndevice64\/Exploits_CVE-2019-19781",
"description": "All Working Exploits",
"fork": false,
"created_at": "2020-01-11T20:43:09Z",
"updated_at": "2021-04-19T06:52:48Z",
"pushed_at": "2020-01-11T22:09:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 233412280,
"name": "citrixmash_scanner",

View file

@ -580,8 +580,8 @@
"description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)",
"fork": false,
"created_at": "2020-01-23T18:26:48Z",
"updated_at": "2021-12-05T20:32:40Z",
"pushed_at": "2020-01-28T10:11:44Z",
"updated_at": "2023-05-30T20:05:30Z",
"pushed_at": "2023-05-30T20:05:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -2433,13 +2433,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -953,13 +953,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 342,
"watchers_count": 342,
"has_discussions": false,
"forks_count": 128,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 128,
"forks": 127,
"watchers": 342,
"score": 0
},

View file

@ -105,10 +105,10 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2023-05-27T08:18:54Z",
"updated_at": "2023-05-30T18:58:24Z",
"pushed_at": "2022-01-13T12:35:19Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -119,7 +119,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 256,
"watchers": 257,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-05-27T08:19:10Z",
"updated_at": "2023-05-30T19:05:16Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 349,
"watchers": 350,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 6,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)",
"fork": false,
"created_at": "2023-01-24T18:26:10Z",
"updated_at": "2023-05-29T22:51:17Z",
"updated_at": "2023-05-30T23:12:09Z",
"pushed_at": "2023-04-07T20:09:28Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
"fork": false,
"created_at": "2023-05-25T13:25:10Z",
"updated_at": "2023-05-30T15:38:58Z",
"updated_at": "2023-05-30T19:40:20Z",
"pushed_at": "2023-05-28T00:28:52Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-05-30T11:04:15Z",
"updated_at": "2023-05-30T20:21:54Z",
"pushed_at": "2023-05-27T12:32:24Z",
"stargazers_count": 439,
"watchers_count": 439,
"stargazers_count": 441,
"watchers_count": 441,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 439,
"watchers": 441,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-05-30T02:18:29Z",
"updated_at": "2023-05-30T16:00:23Z",
"updated_at": "2023-05-30T22:03:33Z",
"pushed_at": "2023-05-30T02:43:06Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

60
2023/CVE-2023-33733.json Normal file
View file

@ -0,0 +1,60 @@
[
{
"id": 647418660,
"name": "CVE-2023-33733",
"full_name": "sahiloj\/CVE-2023-33733",
"owner": {
"login": "sahiloj",
"id": 59600077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59600077?v=4",
"html_url": "https:\/\/github.com\/sahiloj"
},
"html_url": "https:\/\/github.com\/sahiloj\/CVE-2023-33733",
"description": null,
"fork": false,
"created_at": "2023-05-30T18:36:03Z",
"updated_at": "2023-05-30T18:48:19Z",
"pushed_at": "2023-05-30T18:48:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 647486953,
"name": "CVE-2023-33733",
"full_name": "c53elyas\/CVE-2023-33733",
"owner": {
"login": "c53elyas",
"id": 127761067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127761067?v=4",
"html_url": "https:\/\/github.com\/c53elyas"
},
"html_url": "https:\/\/github.com\/c53elyas\/CVE-2023-33733",
"description": "CVE-2023-33733 reportlab RCE",
"fork": false,
"created_at": "2023-05-30T22:22:50Z",
"updated_at": "2023-05-30T22:23:01Z",
"pushed_at": "2023-05-30T22:22:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1483,6 +1483,10 @@ An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2
### CVE-2023-33731
- [sahiloj/CVE-2023-33731](https://github.com/sahiloj/CVE-2023-33731)
### CVE-2023-33733
- [sahiloj/CVE-2023-33733](https://github.com/sahiloj/CVE-2023-33733)
- [c53elyas/CVE-2023-33733](https://github.com/c53elyas/CVE-2023-33733)
### CVE-2023-33829 (2023-05-24)
<code>
@ -24208,7 +24212,6 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
- [mpgn/CVE-2019-19781](https://github.com/mpgn/CVE-2019-19781)
- [oways/CVE-2019-19781](https://github.com/oways/CVE-2019-19781)
- [becrevex/Citrix_CVE-2019-19781](https://github.com/becrevex/Citrix_CVE-2019-19781)
- [unknowndevice64/Exploits_CVE-2019-19781](https://github.com/unknowndevice64/Exploits_CVE-2019-19781)
- [x1sec/citrixmash_scanner](https://github.com/x1sec/citrixmash_scanner)
- [jamesjguthrie/Shitrix-CVE-2019-19781](https://github.com/jamesjguthrie/Shitrix-CVE-2019-19781)
- [x1sec/CVE-2019-19781](https://github.com/x1sec/CVE-2019-19781)
@ -28029,7 +28032,6 @@ Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow
Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka &quot;Office Remote Code Execution Vulnerability&quot;. This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281.
</code>
- [kcufId/eps-CVE-2017-0261](https://github.com/kcufId/eps-CVE-2017-0261)
- [erfze/CVE-2017-0261](https://github.com/erfze/CVE-2017-0261)
### CVE-2017-0263 (2017-05-12)
@ -30148,14 +30150,6 @@ Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in rem
- [cved-sources/cve-2017-1000486](https://github.com/cved-sources/cve-2017-1000486)
- [Pastea/CVE-2017-1000486](https://github.com/Pastea/CVE-2017-1000486)
### CVE-2017-1000499 (2018-01-03)
<code>
phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.
</code>
- [Villaquiranm/5MMISSI-CVE-2017-1000499](https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499)
### CVE-2017-1002101 (2018-03-13)
<code>