Auto Update 2023/10/14 18:28:13

This commit is contained in:
motikan2010-bot 2023-10-15 03:28:13 +09:00
parent 3423e364f9
commit 01d62561b2
33 changed files with 207 additions and 381 deletions

View file

@ -59,96 +59,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 211957347,
"name": "smb_usermap",
"full_name": "b1fair\/smb_usermap",
"owner": {
"login": "b1fair",
"id": 43326124,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43326124?v=4",
"html_url": "https:\/\/github.com\/b1fair"
},
"html_url": "https:\/\/github.com\/b1fair\/smb_usermap",
"description": "A simple exploit for CVE-2007-2447",
"fork": false,
"created_at": "2019-09-30T21:06:09Z",
"updated_at": "2019-10-01T18:44:18Z",
"pushed_at": "2019-10-01T18:44:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 235003634,
"name": "CVE-2007-2447",
"full_name": "JoseBarrios\/CVE-2007-2447",
"owner": {
"login": "JoseBarrios",
"id": 794342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4",
"html_url": "https:\/\/github.com\/JoseBarrios"
},
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
"fork": false,
"created_at": "2020-01-20T02:30:35Z",
"updated_at": "2020-01-20T02:30:39Z",
"pushed_at": "2020-01-20T02:30:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 257885318,
"name": "CVE-2007-2447",
"full_name": "3x1t1um\/CVE-2007-2447",
"owner": {
"login": "3x1t1um",
"id": 54857145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54857145?v=4",
"html_url": "https:\/\/github.com\/3x1t1um"
},
"html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447",
"description": null,
"fork": false,
"created_at": "2020-04-22T11:47:16Z",
"updated_at": "2020-08-04T14:13:55Z",
"pushed_at": "2020-08-04T14:13:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 319098047,
"name": "exploit-CVE-2007-2447",

View file

@ -1,32 +0,0 @@
[
{
"id": 127832352,
"name": "CVE-2007-3830",
"full_name": "alt3kx\/CVE-2007-3830",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2007-3830",
"description": "IBM Proventia Sensor Appliance - Multiple Input Validation Vulnerabilities",
"fork": false,
"created_at": "2018-04-03T01:18:41Z",
"updated_at": "2018-05-11T01:21:29Z",
"pushed_at": "2018-05-11T01:21:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -73,10 +73,10 @@
"description": "A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.",
"fork": false,
"created_at": "2019-06-11T20:05:26Z",
"updated_at": "2023-09-28T11:02:51Z",
"updated_at": "2023-10-14T13:33:04Z",
"pushed_at": "2019-06-11T20:49:42Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 5
},

View file

@ -103,19 +103,19 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2023-09-28T11:03:23Z",
"updated_at": "2023-10-14T15:16:52Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"has_discussions": false,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 276,
"forks": 59,
"watchers": 277,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2023-10-09T23:27:52Z",
"updated_at": "2023-10-14T15:12:55Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1767,
"watchers_count": 1767,
"stargazers_count": 1768,
"watchers_count": 1768,
"has_discussions": false,
"forks_count": 260,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 260,
"watchers": 1767,
"watchers": 1768,
"score": 0,
"subscribers_count": 38
},

View file

@ -429,36 +429,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 318241258,
"name": "CVE-2019-15107",
"full_name": "diegojuan\/CVE-2019-15107",
"owner": {
"login": "diegojuan",
"id": 4934646,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4934646?v=4",
"html_url": "https:\/\/github.com\/diegojuan"
},
"html_url": "https:\/\/github.com\/diegojuan\/CVE-2019-15107",
"description": null,
"fork": false,
"created_at": "2020-12-03T15:43:39Z",
"updated_at": "2020-12-03T15:53:03Z",
"pushed_at": "2020-12-03T15:53:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 382448618,
"name": "CVE-2019-15107",

View file

@ -1,32 +0,0 @@
[
{
"id": 318732411,
"name": "CVE-2019-17041",
"full_name": "Resery\/CVE-2019-17041",
"owner": {
"login": "Resery",
"id": 50428593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50428593?v=4",
"html_url": "https:\/\/github.com\/Resery"
},
"html_url": "https:\/\/github.com\/Resery\/CVE-2019-17041",
"description": null,
"fork": false,
"created_at": "2020-12-05T07:49:11Z",
"updated_at": "2023-01-10T03:22:16Z",
"pushed_at": "2020-12-05T07:50:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 319352277,
"name": "nextcloud_android",
"full_name": "shanika04\/nextcloud_android",
"owner": {
"login": "shanika04",
"id": 73774345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73774345?v=4",
"html_url": "https:\/\/github.com\/shanika04"
},
"html_url": "https:\/\/github.com\/shanika04\/nextcloud_android",
"description": "SQLi CVE-2019-5454",
"fork": false,
"created_at": "2020-12-07T14:53:25Z",
"updated_at": "2020-12-07T15:01:34Z",
"pushed_at": "2020-12-07T15:01:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1627,10 +1627,10 @@
"description": "Zero-day-scanning is a Domain Controller vulnerability scanner, that currently includes checks for Zero-day-scanning (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.",
"fork": false,
"created_at": "2022-03-03T01:55:28Z",
"updated_at": "2023-03-28T01:27:40Z",
"updated_at": "2023-10-14T12:41:31Z",
"pushed_at": "2022-03-03T07:50:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1639,7 +1639,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},

View file

@ -43,19 +43,19 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-10-13T02:20:05Z",
"updated_at": "2023-10-14T13:53:02Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1740,
"watchers_count": 1740,
"stargazers_count": 1741,
"watchers_count": 1741,
"has_discussions": false,
"forks_count": 587,
"forks_count": 588,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 587,
"watchers": 1740,
"forks": 588,
"watchers": 1741,
"score": 0,
"subscribers_count": 46
},
@ -707,13 +707,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 20,
"score": 0,
"subscribers_count": 2

View file

@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2023-10-10T21:08:37Z",
"updated_at": "2023-10-14T13:34:34Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 665,
"watchers_count": 665,
"stargazers_count": 666,
"watchers_count": 666,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 167,
"watchers": 665,
"watchers": 666,
"score": 0,
"subscribers_count": 11
},

View file

@ -236,19 +236,19 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2023-10-08T11:28:18Z",
"updated_at": "2023-10-14T13:45:49Z",
"pushed_at": "2023-08-25T16:11:40Z",
"stargazers_count": 739,
"watchers_count": 739,
"stargazers_count": 740,
"watchers_count": 740,
"has_discussions": false,
"forks_count": 118,
"forks_count": 119,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 739,
"forks": 119,
"watchers": 740,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation in polkit's pkexec",
"fork": false,
"created_at": "2022-01-25T23:11:30Z",
"updated_at": "2023-09-28T11:35:22Z",
"updated_at": "2023-10-14T12:41:36Z",
"pushed_at": "2022-01-26T01:01:15Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 75,
"watchers": 74,
"score": 0,
"subscribers_count": 2
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-10-12T08:01:45Z",
"updated_at": "2023-10-14T13:23:46Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1648,
"watchers_count": 1648,
"stargazers_count": 1649,
"watchers_count": 1649,
"has_discussions": false,
"forks_count": 485,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 485,
"watchers": 1648,
"watchers": 1649,
"score": 0,
"subscribers_count": 25
},

View file

@ -108,13 +108,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 2

View file

@ -18,13 +18,13 @@
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 25,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-10-12T09:50:45Z",
"updated_at": "2023-10-14T15:57:40Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 452,
"watchers_count": 452,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 451,
"watchers": 452,
"score": 0,
"subscribers_count": 10
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-10-14T01:57:58Z",
"updated_at": "2023-10-14T16:19:50Z",
"pushed_at": "2023-10-11T18:07:05Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 41,
"watchers": 44,
"score": 0,
"subscribers_count": 1
},
@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-10-14T11:20:11Z",
"updated_at": "2023-10-14T14:23:40Z",
"pushed_at": "2023-10-12T02:21:47Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 50,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},

View file

@ -173,10 +173,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-10-05T11:27:28Z",
"updated_at": "2023-10-14T16:35:24Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 341,
"watchers_count": 341,
"stargazers_count": 342,
"watchers_count": 342,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 341,
"watchers": 342,
"score": 0,
"subscribers_count": 5
},

View file

@ -223,19 +223,19 @@
"description": "xortigate-cve-2023-27997",
"fork": false,
"created_at": "2023-10-12T16:12:41Z",
"updated_at": "2023-10-14T09:57:58Z",
"updated_at": "2023-10-14T16:23:07Z",
"pushed_at": "2023-10-12T16:17:23Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 21,
"forks": 5,
"watchers": 22,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2023-09-27T18:47:57Z",
"updated_at": "2023-10-14T17:05:33Z",
"pushed_at": "2023-07-24T01:43:17Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-28T21:20:23Z",
"updated_at": "2023-10-14T10:22:42Z",
"updated_at": "2023-10-14T15:55:01Z",
"pushed_at": "2023-10-10T17:29:32Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 49,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-10-14T05:37:08Z",
"updated_at": "2023-10-14T13:16:54Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 85,
"forks": 26,
"watchers": 87,
"score": 0,
"subscribers_count": 4
}

View file

@ -62,5 +62,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 704995768,
"name": "CVE-2023-3710",
"full_name": "CwEeR313\/CVE-2023-3710",
"owner": {
"login": "CwEeR313",
"id": 147943631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147943631?v=4",
"html_url": "https:\/\/github.com\/CwEeR313"
},
"html_url": "https:\/\/github.com\/CwEeR313\/CVE-2023-3710",
"description": "exploit for CVE-2023-3710",
"fork": false,
"created_at": "2023-10-14T18:21:29Z",
"updated_at": "2023-10-14T18:21:29Z",
"pushed_at": "2023-10-14T18:21:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,8 +43,8 @@
"description": "PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket",
"fork": false,
"created_at": "2023-10-13T15:33:42Z",
"updated_at": "2023-10-13T15:38:38Z",
"pushed_at": "2023-10-14T08:33:49Z",
"updated_at": "2023-10-14T13:35:12Z",
"pushed_at": "2023-10-14T13:30:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -52,7 +52,16 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-38146",
"exploit",
"linux",
"poc",
"python",
"themebleed",
"windows",
"windows-11"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -73,10 +73,10 @@
"description": "Simple PoC causing overflow",
"fork": false,
"created_at": "2023-10-12T07:39:15Z",
"updated_at": "2023-10-14T06:19:49Z",
"updated_at": "2023-10-14T15:04:22Z",
"pushed_at": "2023-10-12T08:09:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -668,5 +668,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 704953176,
"name": "CVE-2023-38646",
"full_name": "asepsaepdin\/CVE-2023-38646",
"owner": {
"login": "asepsaepdin",
"id": 122620685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
"html_url": "https:\/\/github.com\/asepsaepdin"
},
"html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-38646",
"description": null,
"fork": false,
"created_at": "2023-10-14T15:56:18Z",
"updated_at": "2023-10-14T15:57:18Z",
"pushed_at": "2023-10-14T16:56:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-10-13T04:24:01Z",
"updated_at": "2023-10-14T12:56:24Z",
"pushed_at": "2023-09-17T02:17:52Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"has_discussions": false,
"forks_count": 119,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 119,
"watchers": 674,
"watchers": 675,
"score": 0,
"subscribers_count": 8
},

View file

@ -43,19 +43,19 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2023-10-14T12:03:37Z",
"pushed_at": "2023-10-14T10:25:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2023-10-14T14:54:09Z",
"pushed_at": "2023-10-14T15:49:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-42820",
"fork": false,
"created_at": "2023-10-10T06:32:51Z",
"updated_at": "2023-10-14T10:02:24Z",
"updated_at": "2023-10-14T14:42:00Z",
"pushed_at": "2023-10-13T02:36:33Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-14T11:36:23Z",
"pushed_at": "2023-10-14T06:54:10Z",
"stargazers_count": 131,
"watchers_count": 131,
"updated_at": "2023-10-14T16:03:27Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 131,
"watchers": 133,
"score": 0,
"subscribers_count": 5
},
@ -43,10 +43,10 @@
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2023-10-14T02:05:37Z",
"updated_at": "2023-10-14T13:50:33Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 22,
"watchers": 23,
"score": 0,
"subscribers_count": 2
},
@ -141,19 +141,19 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2023-10-14T08:53:44Z",
"updated_at": "2023-10-14T14:49:18Z",
"pushed_at": "2023-10-14T00:08:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -1,20 +1,20 @@
[
{
"id": 318244452,
"name": "CVE-2019-14450",
"full_name": "securifera\/CVE-2019-14450",
"id": 704942565,
"name": "CVE-2023-45471",
"full_name": "itsAptx\/CVE-2023-45471",
"owner": {
"login": "securifera",
"id": 12126525,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4",
"html_url": "https:\/\/github.com\/securifera"
"login": "itsAptx",
"id": 62826765,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62826765?v=4",
"html_url": "https:\/\/github.com\/itsAptx"
},
"html_url": "https:\/\/github.com\/securifera\/CVE-2019-14450",
"html_url": "https:\/\/github.com\/itsAptx\/CVE-2023-45471",
"description": null,
"fork": false,
"created_at": "2020-12-03T15:54:39Z",
"updated_at": "2021-12-13T21:33:11Z",
"pushed_at": "2020-12-03T15:55:31Z",
"created_at": "2023-10-14T15:20:37Z",
"updated_at": "2023-10-14T16:46:59Z",
"pushed_at": "2023-10-14T16:43:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
}
]

View file

@ -588,6 +588,7 @@
- [vpxuser/CVE-2023-3710-POC](https://github.com/vpxuser/CVE-2023-3710-POC)
- [Mahdi22228/CVE-2023-3710](https://github.com/Mahdi22228/CVE-2023-3710)
- [CwEeR313/CVE-2023-3710](https://github.com/CwEeR313/CVE-2023-3710)
### CVE-2023-3711 (2023-09-12)
@ -3664,6 +3665,7 @@
- [nickswink/CVE-2023-38646](https://github.com/nickswink/CVE-2023-38646)
- [passwa11/CVE-2023-38646](https://github.com/passwa11/CVE-2023-38646)
- [threatHNTR/CVE-2023-38646](https://github.com/threatHNTR/CVE-2023-38646)
- [asepsaepdin/CVE-2023-38646](https://github.com/asepsaepdin/CVE-2023-38646)
### CVE-2023-38743 (2023-09-11)
@ -4478,6 +4480,9 @@
- [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962)
### CVE-2023-45471
- [itsAptx/CVE-2023-45471](https://github.com/itsAptx/CVE-2023-45471)
### CVE-2023-45540
- [soundarkutty/CVE-2023-45540](https://github.com/soundarkutty/CVE-2023-45540)
@ -22914,13 +22919,6 @@
- [shanika04/cp30_XXE_partial_fix](https://github.com/shanika04/cp30_XXE_partial_fix)
### CVE-2019-5454 (2019-07-30)
<code>SQL Injection in the Nextcloud Android app prior to version 3.0.0 allows to destroy a local cache when a harmful query is executed requiring to resetup the account.
</code>
- [shanika04/nextcloud_android](https://github.com/shanika04/nextcloud_android)
### CVE-2019-5475 (2019-09-03)
<code>The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
@ -24710,13 +24708,6 @@
- [jas502n/CVE-2019-14439](https://github.com/jas502n/CVE-2019-14439)
### CVE-2019-14450 (2019-10-28)
<code>A directory traversal vulnerability was discovered in RepetierServer.exe in Repetier-Server 0.8 through 0.91 that allows for the creation of a user controlled XML file at an unintended location. When this is combined with CVE-2019-14451, an attacker can upload an &quot;external command&quot; configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.
</code>
- [securifera/CVE-2019-14450](https://github.com/securifera/CVE-2019-14450)
### CVE-2019-14514 (2020-02-10)
<code>An issue was discovered in Microvirt MEmu all versions prior to 7.0.2. A guest Android operating system inside the MEmu emulator contains a /system/bin/systemd binary that is run with root privileges on startup (this is unrelated to Red Hat's systemd init program, and is a closed-source proprietary tool that seems to be developed by Microvirt). This program opens TCP port 21509, presumably to receive installation-related commands from the host OS. Because everything after the installer:uninstall command is concatenated directly into a system() call, it is possible to execute arbitrary commands by supplying shell metacharacters.
@ -24835,7 +24826,6 @@
- [n0obit4/Webmin_1.890-POC](https://github.com/n0obit4/Webmin_1.890-POC)
- [squid22/Webmin_CVE-2019-15107](https://github.com/squid22/Webmin_CVE-2019-15107)
- [MuirlandOracle/CVE-2019-15107](https://github.com/MuirlandOracle/CVE-2019-15107)
- [diegojuan/CVE-2019-15107](https://github.com/diegojuan/CVE-2019-15107)
- [whokilleddb/CVE-2019-15107](https://github.com/whokilleddb/CVE-2019-15107)
- [puckiestyle/CVE-2019-15107](https://github.com/puckiestyle/CVE-2019-15107)
- [darrenmartyn/CVE-2019-15107](https://github.com/darrenmartyn/CVE-2019-15107)
@ -25134,13 +25124,6 @@
- [maxpl0it/CVE-2019-17026-Exploit](https://github.com/maxpl0it/CVE-2019-17026-Exploit)
- [lsw29475/CVE-2019-17026](https://github.com/lsw29475/CVE-2019-17026)
### CVE-2019-17041 (2019-10-07)
<code>An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
</code>
- [Resery/CVE-2019-17041](https://github.com/Resery/CVE-2019-17041)
### CVE-2019-17080 (2019-10-02)
<code>mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports.
@ -35620,9 +35603,6 @@
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447)
- [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3)
- [Ziemni/CVE-2007-2447-in-Python](https://github.com/Ziemni/CVE-2007-2447-in-Python)
@ -35646,13 +35626,6 @@
- [MikeRega7/CVE-2007-2447-RCE](https://github.com/MikeRega7/CVE-2007-2447-RCE)
- [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447)
### CVE-2007-3830 (2007-07-17)
<code>Cross-site scripting (XSS) vulnerability in alert.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 allows remote attackers to inject arbitrary web script or HTML via the reminder parameter.
</code>
- [alt3kx/CVE-2007-3830](https://github.com/alt3kx/CVE-2007-3830)
### CVE-2007-3831 (2007-07-17)
<code>PHP remote file inclusion in main.php in ISS Proventia Network IPS GX5108 1.3 and GX5008 1.5 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter.