Auto Update 2023/05/12 18:29:11

This commit is contained in:
motikan2010-bot 2023-05-13 03:29:11 +09:00
parent 2ce74a919f
commit 0712bf792f
41 changed files with 219 additions and 180 deletions

View file

@ -71,7 +71,7 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2023-05-09T00:21:20Z",
"updated_at": "2023-05-12T17:05:06Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 109,
"watchers_count": 109,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-05-10T07:44:56Z",
"updated_at": "2023-05-12T16:11:30Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1683,
"watchers_count": 1683,
"stargazers_count": 1684,
"watchers_count": 1684,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1683,
"watchers": 1684,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-05-10T07:44:56Z",
"updated_at": "2023-05-12T16:11:30Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1683,
"watchers_count": 1683,
"stargazers_count": 1684,
"watchers_count": 1684,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1683,
"watchers": 1684,
"score": 0
},
{

View file

@ -324,6 +324,35 @@
"watchers": 1,
"score": 0
},
{
"id": 195966434,
"name": "CVE-2018-11235",
"full_name": "0rx1\/CVE-2018-11235",
"owner": {
"login": "0rx1",
"id": 12779060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
"html_url": "https:\/\/github.com\/0rx1"
},
"html_url": "https:\/\/github.com\/0rx1\/CVE-2018-11235",
"description": null,
"fork": false,
"created_at": "2019-07-09T08:28:49Z",
"updated_at": "2019-07-09T08:28:49Z",
"pushed_at": "2019-07-09T08:28:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 218206529,
"name": "CVE-2018-11235-test",

View file

@ -13,10 +13,10 @@
"description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555",
"fork": false,
"created_at": "2019-01-16T14:45:44Z",
"updated_at": "2023-05-03T00:30:29Z",
"updated_at": "2023-05-12T16:53:37Z",
"pushed_at": "2020-10-20T14:30:01Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 78,
"watchers": 77,
"score": 0
}
]

31
2018/CVE-2018-20718.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 196255066,
"name": "CVE-2018-20718",
"full_name": "us3r777\/CVE-2018-20718",
"owner": {
"login": "us3r777",
"id": 8191240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8191240?v=4",
"html_url": "https:\/\/github.com\/us3r777"
},
"html_url": "https:\/\/github.com\/us3r777\/CVE-2018-20718",
"description": null,
"fork": false,
"created_at": "2019-07-10T18:19:59Z",
"updated_at": "2022-04-01T22:37:41Z",
"pushed_at": "2019-07-15T13:39:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-05-10T07:44:56Z",
"updated_at": "2023-05-12T16:11:30Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1683,
"watchers_count": 1683,
"stargazers_count": 1684,
"watchers_count": 1684,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1683,
"watchers": 1684,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-7600 Drupal RCE",
"fork": false,
"created_at": "2018-03-30T08:52:54Z",
"updated_at": "2022-06-18T04:00:35Z",
"updated_at": "2023-05-12T13:22:17Z",
"pushed_at": "2018-04-18T06:58:39Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 114,
"watchers": 115,
"score": 0
},
{

View file

@ -56,5 +56,34 @@
"forks": 62,
"watchers": 122,
"score": 0
},
{
"id": 195813761,
"name": "leHACK-Analysis-of-CVE-2018-8453",
"full_name": "thepwnrip\/leHACK-Analysis-of-CVE-2018-8453",
"owner": {
"login": "thepwnrip",
"id": 25064984,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25064984?v=4",
"html_url": "https:\/\/github.com\/thepwnrip"
},
"html_url": "https:\/\/github.com\/thepwnrip\/leHACK-Analysis-of-CVE-2018-8453",
"description": null,
"fork": false,
"created_at": "2019-07-08T13:06:10Z",
"updated_at": "2020-04-01T12:35:52Z",
"pushed_at": "2019-07-08T13:15:07Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"score": 0
}
]

View file

@ -79,10 +79,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2023-02-17T17:54:39Z",
"updated_at": "2023-05-12T12:24:55Z",
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -103,7 +103,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -47,7 +47,7 @@
"stargazers_count": 3742,
"watchers_count": 3742,
"has_discussions": false,
"forks_count": 1080,
"forks_count": 1081,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -73,7 +73,7 @@
"webshell"
],
"visibility": "public",
"forks": 1080,
"forks": 1081,
"watchers": 3742,
"score": 0
},

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-05-10T07:44:56Z",
"updated_at": "2023-05-12T16:11:30Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1683,
"watchers_count": 1683,
"stargazers_count": 1684,
"watchers_count": 1684,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1683,
"watchers": 1684,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)",
"fork": false,
"created_at": "2019-11-01T16:44:51Z",
"updated_at": "2023-04-20T00:38:01Z",
"updated_at": "2023-05-12T13:20:59Z",
"pushed_at": "2019-11-02T10:47:46Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2023-02-17T17:54:39Z",
"updated_at": "2023-05-12T12:24:55Z",
"pushed_at": "2022-08-22T12:00:56Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 3742,
"watchers_count": 3742,
"has_discussions": false,
"forks_count": 1080,
"forks_count": 1081,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
"forks": 1080,
"forks": 1081,
"watchers": 3742,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-05-10T07:44:56Z",
"updated_at": "2023-05-12T16:11:30Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1683,
"watchers_count": 1683,
"stargazers_count": 1684,
"watchers_count": 1684,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1683,
"watchers": 1684,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Simple CVE-2021-20294 poc",
"fork": false,
"created_at": "2023-01-21T16:15:21Z",
"updated_at": "2023-05-01T20:34:37Z",
"updated_at": "2023-05-12T16:16:58Z",
"pushed_at": "2023-01-21T22:37:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
"fork": false,
"created_at": "2021-05-11T18:45:07Z",
"updated_at": "2023-05-11T19:04:12Z",
"updated_at": "2023-05-12T16:54:39Z",
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -27,34 +27,5 @@
"forks": 10,
"watchers": 39,
"score": 0
},
{
"id": 639831642,
"name": "CVE-2021-35587-Vulnerability-Check",
"full_name": "1s1ldur\/CVE-2021-35587-Vulnerability-Check",
"owner": {
"login": "1s1ldur",
"id": 124069385,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124069385?v=4",
"html_url": "https:\/\/github.com\/1s1ldur"
},
"html_url": "https:\/\/github.com\/1s1ldur\/CVE-2021-35587-Vulnerability-Check",
"description": "This PoC proves that target is vulnerable to the CVE-2021-35587. Vulnerability is found in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0",
"fork": false,
"created_at": "2023-05-12T10:22:35Z",
"updated_at": "2023-05-12T10:23:15Z",
"pushed_at": "2023-05-12T10:23:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -3116,7 +3116,7 @@
"fork": false,
"created_at": "2022-09-15T14:17:45Z",
"updated_at": "2022-09-16T01:01:16Z",
"pushed_at": "2023-05-05T03:37:37Z",
"pushed_at": "2023-05-12T17:37:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -1060,7 +1060,7 @@
"fork": false,
"created_at": "2023-05-12T04:10:09Z",
"updated_at": "2023-05-12T04:36:47Z",
"pushed_at": "2023-05-12T04:39:33Z",
"pushed_at": "2023-05-12T17:37:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -2748,10 +2748,10 @@
"description": "Mitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script",
"fork": false,
"created_at": "2021-12-12T13:45:08Z",
"updated_at": "2023-05-05T03:24:46Z",
"updated_at": "2023-05-12T17:06:20Z",
"pushed_at": "2021-12-15T08:14:56Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -2767,7 +2767,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 41,
"watchers": 40,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "Redis RCE through Lua Sandbox Escape vulnerability",
"fork": false,
"created_at": "2022-09-01T16:44:56Z",
"updated_at": "2022-12-04T01:17:56Z",
"updated_at": "2023-05-12T17:34:58Z",
"pushed_at": "2022-09-02T22:46:08Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
"fork": false,
"created_at": "2022-08-10T10:38:59Z",
"updated_at": "2023-05-08T10:00:58Z",
"updated_at": "2023-05-12T17:09:04Z",
"pushed_at": "2022-10-21T07:55:22Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 26,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC",
"fork": false,
"created_at": "2022-04-17T05:44:45Z",
"updated_at": "2023-05-04T12:24:10Z",
"updated_at": "2023-05-12T17:07:48Z",
"pushed_at": "2022-04-17T05:53:54Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 9,
"watchers": 8,
"score": 0
},
{

View file

@ -158,10 +158,10 @@
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
"fork": false,
"created_at": "2022-11-06T20:44:10Z",
"updated_at": "2023-05-05T17:32:10Z",
"updated_at": "2023-05-12T17:09:56Z",
"pushed_at": "2022-11-23T21:09:11Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -176,7 +176,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 93,
"watchers": 92,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload",
"fork": false,
"created_at": "2022-09-01T04:36:50Z",
"updated_at": "2023-04-20T09:50:51Z",
"updated_at": "2023-05-12T14:04:45Z",
"pushed_at": "2022-09-02T11:00:28Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 79,
"watchers": 80,
"score": 0
},
{

View file

@ -85,34 +85,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 625290723,
"name": "CVE-2022-2602",
"full_name": "vnc1106\/CVE-2022-2602",
"owner": {
"login": "vnc1106",
"id": 100759941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100759941?v=4",
"html_url": "https:\/\/github.com\/vnc1106"
},
"html_url": "https:\/\/github.com\/vnc1106\/CVE-2022-2602",
"description": null,
"fork": false,
"created_at": "2023-04-08T16:50:23Z",
"updated_at": "2023-04-08T16:53:09Z",
"pushed_at": "2023-04-08T16:53:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2023-05-05T17:29:51Z",
"updated_at": "2023-05-12T17:24:44Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 347,
"watchers": 348,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
"fork": false,
"created_at": "2023-01-09T04:27:15Z",
"updated_at": "2023-05-09T14:52:01Z",
"updated_at": "2023-05-12T18:00:38Z",
"pushed_at": "2023-01-09T08:19:27Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 111,
"watchers": 112,
"score": 0
}
]

View file

@ -398,10 +398,10 @@
"description": "Cobalt Strike 4.4 猪猪版 去暗桩 去流量特征 beacon仿造真实API服务 修补CVE-2022-39197补丁",
"fork": false,
"created_at": "2023-04-28T06:31:38Z",
"updated_at": "2023-05-11T03:52:38Z",
"updated_at": "2023-05-12T12:51:57Z",
"pushed_at": "2023-04-28T07:10:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -410,7 +410,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -228,10 +228,10 @@
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
"fork": false,
"created_at": "2022-10-20T03:11:03Z",
"updated_at": "2023-05-07T21:16:19Z",
"updated_at": "2023-05-12T16:37:06Z",
"pushed_at": "2022-10-20T06:36:42Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2023-05-05T17:33:03Z",
"updated_at": "2023-05-12T18:15:04Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 55,
"watchers": 56,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 346,
"score": 0
},

View file

@ -42,10 +42,10 @@
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc",
"fork": false,
"created_at": "2023-04-07T03:30:22Z",
"updated_at": "2023-04-14T03:29:37Z",
"updated_at": "2023-05-12T15:36:33Z",
"pushed_at": "2023-04-07T03:41:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-16T00:33:56Z",
"updated_at": "2023-05-10T19:40:34Z",
"pushed_at": "2023-05-08T19:50:50Z",
"pushed_at": "2023-05-12T12:39:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -105,10 +105,10 @@
"description": "CVE-2023-21839工具",
"fork": false,
"created_at": "2023-03-11T08:26:30Z",
"updated_at": "2023-04-28T15:04:29Z",
"updated_at": "2023-05-12T14:36:29Z",
"pushed_at": "2023-03-11T08:28:28Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -117,7 +117,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "CVE-2023-23924 PoC",
"fork": false,
"created_at": "2023-02-01T18:21:23Z",
"updated_at": "2023-05-11T13:10:32Z",
"updated_at": "2023-05-12T12:54:12Z",
"pushed_at": "2023-02-02T02:05:12Z",
"stargazers_count": 7,
"watchers_count": 7,

View file

@ -13,10 +13,10 @@
"description": "POC and Scanner for CVE-2023-24055",
"fork": false,
"created_at": "2023-01-24T19:19:23Z",
"updated_at": "2023-05-08T21:13:46Z",
"updated_at": "2023-05-12T16:17:37Z",
"pushed_at": "2023-01-25T00:04:57Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-04-21T09:19:13Z",
"updated_at": "2023-04-24T13:50:59Z",
"pushed_at": "2023-04-22T14:47:32Z",
"pushed_at": "2023-05-12T13:20:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -71,10 +71,10 @@
"description": "Proof of Concept Exploit for PaperCut CVE-2023-27350",
"fork": false,
"created_at": "2023-04-22T21:34:06Z",
"updated_at": "2023-05-12T11:00:10Z",
"updated_at": "2023-05-12T18:06:45Z",
"pushed_at": "2023-05-01T19:31:20Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 34,
"watchers": 35,
"score": 0
},
{

View file

@ -1882,7 +1882,6 @@ The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content
- [LukeGix/CVE-2022-2602](https://github.com/LukeGix/CVE-2022-2602)
- [kiks7/CVE-2022-2602-Kernel-Exploit](https://github.com/kiks7/CVE-2022-2602-Kernel-Exploit)
- [th3-5had0w/CVE-2022-2602-Study](https://github.com/th3-5had0w/CVE-2022-2602-Study)
- [vnc1106/CVE-2022-2602](https://github.com/vnc1106/CVE-2022-2602)
### CVE-2022-2639 (2022-09-01)
@ -11379,7 +11378,6 @@ Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (
</code>
- [antx-code/CVE-2021-35587](https://github.com/antx-code/CVE-2021-35587)
- [1s1ldur/CVE-2021-35587-Vulnerability-Check](https://github.com/1s1ldur/CVE-2021-35587-Vulnerability-Check)
### CVE-2021-35616 (2021-10-20)
@ -25494,6 +25492,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
- [Mkv4/cve-2018-8453-exp](https://github.com/Mkv4/cve-2018-8453-exp)
- [ze0r/cve-2018-8453-exp](https://github.com/ze0r/cve-2018-8453-exp)
- [thepwnrip/leHACK-Analysis-of-CVE-2018-8453](https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453)
### CVE-2018-8495 (2018-10-10)
@ -25916,6 +25915,7 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
- [qweraqq/CVE-2018-11235-Git-Submodule-CE](https://github.com/qweraqq/CVE-2018-11235-Git-Submodule-CE)
- [jhswartz/CVE-2018-11235](https://github.com/jhswartz/CVE-2018-11235)
- [AnonymKing/CVE-2018-11235](https://github.com/AnonymKing/CVE-2018-11235)
- [0rx1/CVE-2018-11235](https://github.com/0rx1/CVE-2018-11235)
- [cchang27/CVE-2018-11235-test](https://github.com/cchang27/CVE-2018-11235-test)
- [nthuong95/CVE-2018-11235](https://github.com/nthuong95/CVE-2018-11235)
- [xElkomy/CVE-2018-11235](https://github.com/xElkomy/CVE-2018-11235)
@ -27289,6 +27289,14 @@ The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remot
- [gscamelo/CVE-2018-20580](https://github.com/gscamelo/CVE-2018-20580)
### CVE-2018-20718 (2019-01-15)
<code>
In Pydio before 8.2.2, an attack is possible via PHP Object Injection because a user is allowed to use the $phpserial$a:0:{} syntax to store a preference. An attacker either needs a &quot;public link&quot; of a file, or access to any unprivileged user account for creation of such a link.
</code>
- [us3r777/CVE-2018-20718](https://github.com/us3r777/CVE-2018-20718)
### CVE-2018-20966 (2019-08-12)
<code>