Auto Update 2022/11/05 18:17:26

This commit is contained in:
motikan2010-bot 2022-11-06 03:17:26 +09:00
parent 8fe833b036
commit f595019c29
22 changed files with 148 additions and 78 deletions

View file

@ -50,7 +50,7 @@
"pushed_at": "2021-05-03T12:59:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -61,7 +61,7 @@
"gitlab"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -237,10 +237,10 @@
"description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.",
"fork": false,
"created_at": "2019-10-27T01:03:11Z",
"updated_at": "2021-12-05T21:57:04Z",
"updated_at": "2022-11-05T17:31:55Z",
"pushed_at": "2021-06-04T18:15:44Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -255,7 +255,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-11-04T22:30:21Z",
"updated_at": "2022-11-05T14:53:28Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1512,
"watchers_count": 1512,
"stargazers_count": 1513,
"watchers_count": 1513,
"forks_count": 342,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 342,
"watchers": 1512,
"watchers": 1513,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "GLPI automatic exploitation tool for CVE-2020-15175",
"fork": false,
"created_at": "2022-03-14T13:51:17Z",
"updated_at": "2022-03-28T19:54:16Z",
"updated_at": "2022-11-05T13:22:49Z",
"pushed_at": "2022-06-20T11:05:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -97,10 +97,10 @@
"description": "CVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8",
"fork": false,
"created_at": "2022-09-30T11:23:52Z",
"updated_at": "2022-11-04T19:50:16Z",
"updated_at": "2022-11-05T14:33:56Z",
"pushed_at": "2022-10-02T10:44:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-05-21T03:13:58Z",
"updated_at": "2022-07-13T08:23:43Z",
"updated_at": "2022-11-05T16:41:28Z",
"pushed_at": "2021-05-21T03:24:25Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -878,10 +878,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-11-03T06:22:18Z",
"updated_at": "2022-11-05T18:09:07Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 654,
"watchers_count": 654,
"stargazers_count": 656,
"watchers_count": 656,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
@ -891,7 +891,7 @@
],
"visibility": "public",
"forks": 142,
"watchers": 654,
"watchers": 656,
"score": 0
},
{

View file

@ -491,7 +491,7 @@
"pushed_at": "2022-10-31T07:06:38Z",
"stargazers_count": 528,
"watchers_count": 528,
"forks_count": 99,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -502,7 +502,7 @@
"log4jshell"
],
"visibility": "public",
"forks": 99,
"forks": 100,
"watchers": 528,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Adobe Reader DC Information Leak Exploit ",
"fork": false,
"created_at": "2022-10-13T16:42:10Z",
"updated_at": "2022-10-18T12:46:31Z",
"updated_at": "2022-11-05T17:09:40Z",
"pushed_at": "2022-10-13T17:00:50Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 17,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2022-02-14T06:23:06Z",
"updated_at": "2022-10-29T15:58:17Z",
"updated_at": "2022-11-05T15:57:52Z",
"pushed_at": "2022-02-14T06:23:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-10-31T17:42:33Z",
"updated_at": "2022-11-05T12:53:22Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 650,
"watchers_count": 650,
"stargazers_count": 651,
"watchers_count": 651,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 650,
"watchers": 651,
"score": 0
}
]

View file

@ -1262,13 +1262,13 @@
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 111,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-09-29T05:09:10Z",
"stargazers_count": 852,
"watchers_count": 852,
"forks_count": 153,
"forks_count": 152,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,7 +43,7 @@
"gui"
],
"visibility": "public",
"forks": 153,
"forks": 152,
"watchers": 852,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-202230507 PoC ",
"fork": false,
"created_at": "2022-07-16T15:55:28Z",
"updated_at": "2022-09-27T04:17:09Z",
"updated_at": "2022-11-05T13:54:08Z",
"pushed_at": "2022-09-26T12:20:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 5,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-11-05T11:58:17Z",
"updated_at": "2022-11-05T18:08:59Z",
"pushed_at": "2022-11-04T16:26:32Z",
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 28,
"stargazers_count": 193,
"watchers_count": 193,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 175,
"forks": 30,
"watchers": 193,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "1-day case study",
"fork": false,
"created_at": "2022-10-07T08:06:32Z",
"updated_at": "2022-10-13T19:48:21Z",
"updated_at": "2022-11-05T16:28:35Z",
"pushed_at": "2022-10-30T15:29:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-11-05T12:19:14Z",
"updated_at": "2022-11-05T13:45:05Z",
"pushed_at": "2022-11-05T10:13:33Z",
"stargazers_count": 507,
"watchers_count": 507,
"stargazers_count": 508,
"watchers_count": 508,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 110,
"watchers": 507,
"watchers": 508,
"score": 0
},
{

30
2022/CVE-2022-36067.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 562153901,
"name": "Exploit-For-CVE-2022-36067",
"full_name": "Prathamrajgor\/Exploit-For-CVE-2022-36067",
"owner": {
"login": "Prathamrajgor",
"id": 78405248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78405248?v=4",
"html_url": "https:\/\/github.com\/Prathamrajgor"
},
"html_url": "https:\/\/github.com\/Prathamrajgor\/Exploit-For-CVE-2022-36067",
"description": "This repo contains payload for the CVE-2022-36067",
"fork": false,
"created_at": "2022-11-05T13:28:27Z",
"updated_at": "2022-11-05T13:38:08Z",
"pushed_at": "2022-11-05T13:49:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -213,10 +213,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2022-11-05T10:19:59Z",
"updated_at": "2022-11-05T13:09:53Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -228,7 +228,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 153,
"watchers": 154,
"score": 0
},
{

View file

@ -247,10 +247,10 @@
"description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]",
"fork": false,
"created_at": "2022-10-15T16:51:25Z",
"updated_at": "2022-10-25T21:19:52Z",
"updated_at": "2022-11-05T13:15:29Z",
"pushed_at": "2022-10-19T16:27:16Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -258,7 +258,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 5,
"score": 0
},
{
@ -275,10 +275,10 @@
"description": "Exploit for CVE-2022-40684 vulnerability",
"fork": false,
"created_at": "2022-10-15T17:02:49Z",
"updated_at": "2022-10-20T09:29:55Z",
"updated_at": "2022-11-05T13:15:15Z",
"pushed_at": "2022-10-15T17:03:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -292,7 +292,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -228,10 +228,10 @@
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
"fork": false,
"created_at": "2022-10-19T11:49:08Z",
"updated_at": "2022-11-05T08:14:06Z",
"updated_at": "2022-11-05T13:10:46Z",
"pushed_at": "2022-11-02T09:45:33Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 35,
"watchers": 36,
"score": 0
},
{
@ -810,5 +810,36 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 562165502,
"name": "cve-2022-42889-jmeter",
"full_name": "QAInsights\/cve-2022-42889-jmeter",
"owner": {
"login": "QAInsights",
"id": 2826376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2826376?v=4",
"html_url": "https:\/\/github.com\/QAInsights"
},
"html_url": "https:\/\/github.com\/QAInsights\/cve-2022-42889-jmeter",
"description": "Script to handle CVE 2022-42889",
"fork": false,
"created_at": "2022-11-05T14:08:18Z",
"updated_at": "2022-11-05T14:21:15Z",
"pushed_at": "2022-11-05T15:27:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"jmeter"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -3708,6 +3708,14 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
- [xiaobaiakai/CVE-2022-35914](https://github.com/xiaobaiakai/CVE-2022-35914)
- [6E6L6F/CVE-2022-35914](https://github.com/6E6L6F/CVE-2022-35914)
### CVE-2022-36067 (2022-09-06)
<code>
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
</code>
- [Prathamrajgor/Exploit-For-CVE-2022-36067](https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067)
### CVE-2022-36162
- [MaherAzzouzi/CVE-2022-36162](https://github.com/MaherAzzouzi/CVE-2022-36162)
@ -4227,6 +4235,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d
- [Hack4rLIFE/CVE-2022-42889](https://github.com/Hack4rLIFE/CVE-2022-42889)
- [cryxnet/CVE-2022-42889-PoC](https://github.com/cryxnet/CVE-2022-42889-PoC)
- [sunnyvale-it/CVE-2022-42889-PoC](https://github.com/sunnyvale-it/CVE-2022-42889-PoC)
- [QAInsights/cve-2022-42889-jmeter](https://github.com/QAInsights/cve-2022-42889-jmeter)
### CVE-2022-42899 (2022-10-12)