mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/04 12:32:39
This commit is contained in:
parent
f37c473940
commit
088987f975
74 changed files with 580 additions and 379 deletions
|
@ -45,10 +45,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-04T02:32:21Z",
|
||||
"updated_at": "2024-12-04T10:12:23Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -78,7 +78,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2013,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2024-11-16T02:44:07Z",
|
||||
"updated_at": "2024-12-04T06:45:11Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 340,
|
||||
"watchers": 339,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-04T02:32:21Z",
|
||||
"updated_at": "2024-12-04T10:12:23Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2013,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2024-11-16T02:44:07Z",
|
||||
"updated_at": "2024-12-04T06:45:11Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"has_discussions": false,
|
||||
"forks_count": 110,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 110,
|
||||
"watchers": 340,
|
||||
"watchers": 339,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -272,10 +272,10 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2024-11-27T10:43:05Z",
|
||||
"updated_at": "2024-12-04T10:09:50Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -288,7 +288,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 316,
|
||||
"watchers": 315,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-04T02:32:21Z",
|
||||
"updated_at": "2024-12-04T10:12:23Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -78,7 +78,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2013,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -46,7 +46,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-01-04T21:44:21Z",
|
||||
"updated_at": "2024-12-02T17:21:33Z",
|
||||
"pushed_at": "2024-12-02T17:21:30Z",
|
||||
"pushed_at": "2024-12-04T09:38:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -576,10 +576,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-04T02:32:21Z",
|
||||
"updated_at": "2024-12-04T10:12:23Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -609,7 +609,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2013,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2024-11-22T21:23:56Z",
|
||||
"updated_at": "2024-12-04T08:14:45Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"stargazers_count": 529,
|
||||
"watchers_count": 529,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 528,
|
||||
"watchers": 529,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache Tomcat Remote Code Execution on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T07:54:25Z",
|
||||
"updated_at": "2024-08-12T19:47:56Z",
|
||||
"updated_at": "2024-12-04T10:13:12Z",
|
||||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 185,
|
||||
"watchers": 184,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1618,10 +1618,10 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2024-12-01T12:18:09Z",
|
||||
"updated_at": "2024-12-04T08:31:06Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 896,
|
||||
"watchers_count": 896,
|
||||
"stargazers_count": 897,
|
||||
"watchers_count": 897,
|
||||
"has_discussions": false,
|
||||
"forks_count": 242,
|
||||
"allow_forking": true,
|
||||
|
@ -1630,7 +1630,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 242,
|
||||
"watchers": 896,
|
||||
"watchers": 897,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2024-11-13T12:58:30Z",
|
||||
"updated_at": "2024-12-04T08:34:29Z",
|
||||
"pushed_at": "2020-11-09T07:33:12Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 287,
|
||||
"watchers": 286,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-12-02T12:12:56Z",
|
||||
"updated_at": "2024-12-04T10:18:27Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4136,
|
||||
"watchers_count": 4136,
|
||||
"stargazers_count": 4135,
|
||||
"watchers_count": 4135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1099,
|
||||
"allow_forking": true,
|
||||
|
@ -77,7 +77,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1099,
|
||||
"watchers": 4136,
|
||||
"watchers": 4135,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2024-12-04T02:32:27Z",
|
||||
"updated_at": "2024-12-04T10:09:56Z",
|
||||
"pushed_at": "2024-06-16T15:35:20Z",
|
||||
"stargazers_count": 953,
|
||||
"watchers_count": 953,
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 953,
|
||||
"watchers": 952,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -200,10 +200,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-04T02:32:21Z",
|
||||
"updated_at": "2024-12-04T10:12:23Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -233,7 +233,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2013,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
}
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2024-10-15T07:32:48Z",
|
||||
"updated_at": "2024-12-04T10:14:02Z",
|
||||
"pushed_at": "2023-05-08T16:23:06Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"has_discussions": false,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 438,
|
||||
"watchers": 437,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T09:20:38Z",
|
||||
"updated_at": "2024-11-30T08:28:57Z",
|
||||
"updated_at": "2024-12-04T12:14:41Z",
|
||||
"pushed_at": "2023-11-21T13:32:01Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -227,7 +227,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2024-11-26T23:51:11Z",
|
||||
"updated_at": "2024-12-04T07:18:39Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"stargazers_count": 667,
|
||||
"watchers_count": 667,
|
||||
"has_discussions": false,
|
||||
"forks_count": 197,
|
||||
"allow_forking": true,
|
||||
|
@ -152,7 +152,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 197,
|
||||
"watchers": 666,
|
||||
"watchers": 667,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
@ -461,10 +461,10 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2024-10-29T21:41:51Z",
|
||||
"updated_at": "2024-12-04T11:12:46Z",
|
||||
"pushed_at": "2023-02-26T07:01:03Z",
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -478,7 +478,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 321,
|
||||
"watchers": 322,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
@ -1039,10 +1039,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2024-11-21T08:35:28Z",
|
||||
"updated_at": "2024-12-04T06:56:00Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1304,
|
||||
"watchers_count": 1304,
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"has_discussions": false,
|
||||
"forks_count": 343,
|
||||
"allow_forking": true,
|
||||
|
@ -1057,7 +1057,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 343,
|
||||
"watchers": 1304,
|
||||
"watchers": 1305,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-08T17:14:27Z",
|
||||
"updated_at": "2024-12-03T08:48:07Z",
|
||||
"updated_at": "2024-12-04T08:36:15Z",
|
||||
"pushed_at": "2022-05-03T10:40:14Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-12-02T12:12:56Z",
|
||||
"updated_at": "2024-12-04T10:18:27Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4136,
|
||||
"watchers_count": 4136,
|
||||
"stargazers_count": 4135,
|
||||
"watchers_count": 4135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1099,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1099,
|
||||
"watchers": 4136,
|
||||
"watchers": 4135,
|
||||
"score": 0,
|
||||
"subscribers_count": 149
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:03:16Z",
|
||||
"updated_at": "2024-12-02T00:41:17Z",
|
||||
"updated_at": "2024-12-04T08:52:09Z",
|
||||
"pushed_at": "2022-09-01T06:33:36Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T21:00:15Z",
|
||||
"updated_at": "2024-11-18T08:48:23Z",
|
||||
"updated_at": "2024-12-04T10:06:34Z",
|
||||
"pushed_at": "2021-11-26T07:40:35Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"has_discussions": false,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 294,
|
||||
"watchers": 293,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-12-04T02:32:21Z",
|
||||
"updated_at": "2024-12-04T10:12:23Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2013,
|
||||
"watchers_count": 2013,
|
||||
"stargazers_count": 2012,
|
||||
"watchers_count": 2012,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -47,7 +47,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 2013,
|
||||
"watchers": 2012,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
@ -128,10 +128,10 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2024-11-01T02:37:51Z",
|
||||
"updated_at": "2024-12-04T10:13:48Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -140,7 +140,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 333,
|
||||
"watchers": 332,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -82,10 +82,10 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2024-08-12T20:03:24Z",
|
||||
"updated_at": "2024-12-04T10:10:24Z",
|
||||
"pushed_at": "2021-10-13T07:53:46Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 372,
|
||||
"watchers": 371,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-19T01:08:48Z",
|
||||
"updated_at": "2023-08-24T05:14:06Z",
|
||||
"updated_at": "2024-12-04T10:07:11Z",
|
||||
"pushed_at": "2021-10-19T01:18:49Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-22T07:14:25Z",
|
||||
"updated_at": "2024-08-12T20:17:27Z",
|
||||
"updated_at": "2024-12-04T06:53:55Z",
|
||||
"pushed_at": "2021-12-12T06:16:02Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898307814,
|
||||
"name": "CVE-2021-29441",
|
||||
"full_name": "azhao1981\/CVE-2021-29441",
|
||||
"owner": {
|
||||
"login": "azhao1981",
|
||||
"id": 352355,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/352355?v=4",
|
||||
"html_url": "https:\/\/github.com\/azhao1981",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/azhao1981\/CVE-2021-29441",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T06:55:24Z",
|
||||
"updated_at": "2024-12-04T06:56:15Z",
|
||||
"pushed_at": "2024-12-04T06:56:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Nacos Derby命令执行漏洞利用脚本",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T01:32:37Z",
|
||||
"updated_at": "2024-12-02T02:55:21Z",
|
||||
"updated_at": "2024-12-04T06:57:44Z",
|
||||
"pushed_at": "2024-11-22T01:33:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -204,10 +204,10 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2024-11-23T08:57:08Z",
|
||||
"updated_at": "2024-12-04T09:45:01Z",
|
||||
"pushed_at": "2021-12-14T05:12:17Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -216,7 +216,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 148,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2024-12-02T12:19:35Z",
|
||||
"updated_at": "2024-12-04T10:06:55Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1602,
|
||||
"watchers_count": 1602,
|
||||
"stargazers_count": 1601,
|
||||
"watchers_count": 1601,
|
||||
"has_discussions": false,
|
||||
"forks_count": 482,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 482,
|
||||
"watchers": 1602,
|
||||
"watchers": 1601,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -1195,10 +1195,10 @@
|
|||
"description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T01:13:33Z",
|
||||
"updated_at": "2024-08-12T20:17:05Z",
|
||||
"updated_at": "2024-12-04T10:08:03Z",
|
||||
"pushed_at": "2021-11-12T00:03:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1207,7 +1207,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1449,10 +1449,10 @@
|
|||
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T03:32:18Z",
|
||||
"updated_at": "2024-11-06T23:16:22Z",
|
||||
"updated_at": "2024-12-04T10:07:59Z",
|
||||
"pushed_at": "2021-10-09T03:49:21Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -1461,7 +1461,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 148,
|
||||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -2232,37 +2232,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 447314257,
|
||||
"name": "CVE-2021-41773-exploiter",
|
||||
"full_name": "norrig\/CVE-2021-41773-exploiter",
|
||||
"owner": {
|
||||
"login": "norrig",
|
||||
"id": 5526261,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4",
|
||||
"html_url": "https:\/\/github.com\/norrig",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter",
|
||||
"description": "School project - Please use other repos for actual testing",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-12T17:42:36Z",
|
||||
"updated_at": "2022-01-12T18:26:57Z",
|
||||
"pushed_at": "2022-01-13T16:18:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 452242021,
|
||||
"name": "CVE-2021-41773-exercise",
|
||||
|
@ -2414,10 +2383,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2024-11-26T17:30:46Z",
|
||||
"updated_at": "2024-12-04T06:22:14Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -2435,7 +2404,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
33
2021/CVE-2021-42260.json
Normal file
33
2021/CVE-2021-42260.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 898319759,
|
||||
"name": "tinyxml",
|
||||
"full_name": "vm2mv\/tinyxml",
|
||||
"owner": {
|
||||
"login": "vm2mv",
|
||||
"id": 4291086,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4291086?v=4",
|
||||
"html_url": "https:\/\/github.com\/vm2mv",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vm2mv\/tinyxml",
|
||||
"description": "TinyXML 2.6.2 with fixes for CVE-2021-42260 and CVE-2023-34194",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T07:24:59Z",
|
||||
"updated_at": "2024-12-04T09:14:12Z",
|
||||
"pushed_at": "2024-12-04T09:12:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -3749,10 +3749,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-11-29T08:50:43Z",
|
||||
"updated_at": "2024-12-04T10:02:36Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3407,
|
||||
"watchers_count": 3407,
|
||||
"stargazers_count": 3405,
|
||||
"watchers_count": 3405,
|
||||
"has_discussions": true,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
|
@ -3761,7 +3761,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 740,
|
||||
"watchers": 3407,
|
||||
"watchers": 3405,
|
||||
"score": 0,
|
||||
"subscribers_count": 55
|
||||
},
|
||||
|
@ -10741,37 +10741,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 447615580,
|
||||
"name": "Log4j-CVE-2021-44228",
|
||||
"full_name": "solitarysp\/Log4j-CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "solitarysp",
|
||||
"id": 20993683,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4",
|
||||
"html_url": "https:\/\/github.com\/solitarysp",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-13T13:46:12Z",
|
||||
"updated_at": "2022-01-13T13:46:52Z",
|
||||
"pushed_at": "2022-01-13T14:43:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 447754863,
|
||||
"name": "log4j_github_repository",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-12-04T02:35:43Z",
|
||||
"updated_at": "2024-12-04T07:09:20Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1172,
|
||||
"watchers_count": 1172,
|
||||
"stargazers_count": 1173,
|
||||
"watchers_count": 1173,
|
||||
"has_discussions": true,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 1172,
|
||||
"watchers": 1173,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
|
|
@ -266,10 +266,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2024-11-01T07:14:50Z",
|
||||
"updated_at": "2024-12-04T09:58:47Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"stargazers_count": 393,
|
||||
"watchers_count": 393,
|
||||
"has_discussions": false,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
|
@ -278,7 +278,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"watchers": 394,
|
||||
"watchers": 393,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T20:36:49Z",
|
||||
"updated_at": "2024-09-24T19:37:03Z",
|
||||
"updated_at": "2024-12-04T08:58:01Z",
|
||||
"pushed_at": "2023-01-20T17:58:39Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2024-12-02T07:36:51Z",
|
||||
"updated_at": "2024-12-04T06:54:46Z",
|
||||
"pushed_at": "2023-08-02T09:35:14Z",
|
||||
"stargazers_count": 885,
|
||||
"watchers_count": 885,
|
||||
"stargazers_count": 884,
|
||||
"watchers_count": 884,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 885,
|
||||
"watchers": 884,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2024-10-10T03:00:26Z",
|
||||
"updated_at": "2024-12-04T10:43:06Z",
|
||||
"pushed_at": "2024-05-08T16:17:07Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -342,5 +342,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898440595,
|
||||
"name": "CVE-2023-32784-EXPLOIT-REPORT",
|
||||
"full_name": "dev0558\/CVE-2023-32784-EXPLOIT-REPORT",
|
||||
"owner": {
|
||||
"login": "dev0558",
|
||||
"id": 137286912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137286912?v=4",
|
||||
"html_url": "https:\/\/github.com\/dev0558",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dev0558\/CVE-2023-32784-EXPLOIT-REPORT",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T11:57:35Z",
|
||||
"updated_at": "2024-12-04T12:25:03Z",
|
||||
"pushed_at": "2024-12-04T12:24:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
33
2023/CVE-2023-34194.json
Normal file
33
2023/CVE-2023-34194.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 898319759,
|
||||
"name": "tinyxml",
|
||||
"full_name": "vm2mv\/tinyxml",
|
||||
"owner": {
|
||||
"login": "vm2mv",
|
||||
"id": 4291086,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4291086?v=4",
|
||||
"html_url": "https:\/\/github.com\/vm2mv",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vm2mv\/tinyxml",
|
||||
"description": "TinyXML 2.6.2 with fixes for CVE-2021-42260 and CVE-2023-34194",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T07:24:59Z",
|
||||
"updated_at": "2024-12-04T09:14:12Z",
|
||||
"pushed_at": "2024-12-04T09:12:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -578,40 +578,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 871328160,
|
||||
"name": "CVE-2023-36845",
|
||||
"full_name": "functionofpwnosec\/CVE-2023-36845",
|
||||
"owner": {
|
||||
"login": "functionofpwnosec",
|
||||
"id": 38102497,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38102497?v=4",
|
||||
"html_url": "https:\/\/github.com\/functionofpwnosec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/functionofpwnosec\/CVE-2023-36845",
|
||||
"description": "Juniper Networks POC Understanding CVE-2023–36845 Remote Code Execution Exploit and Protection",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-11T18:18:37Z",
|
||||
"updated_at": "2024-10-11T18:30:23Z",
|
||||
"pushed_at": "2024-10-11T18:30:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"bugbountytips",
|
||||
"cve-2023-36845",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-15T23:36:17Z",
|
||||
"updated_at": "2024-07-15T07:25:38Z",
|
||||
"updated_at": "2024-12-04T08:35:49Z",
|
||||
"pushed_at": "2023-08-15T23:37:11Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 28,
|
||||
"watchers": 226,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -60,5 +60,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898427651,
|
||||
"name": "CVE-2023-50387",
|
||||
"full_name": "Pablodiz\/CVE-2023-50387",
|
||||
"owner": {
|
||||
"login": "Pablodiz",
|
||||
"id": 114071507,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114071507?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pablodiz",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pablodiz\/CVE-2023-50387",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T11:27:11Z",
|
||||
"updated_at": "2024-12-04T11:30:55Z",
|
||||
"pushed_at": "2024-12-04T11:30:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T12:30:53Z",
|
||||
"updated_at": "2024-12-03T19:42:43Z",
|
||||
"updated_at": "2024-12-04T10:06:57Z",
|
||||
"pushed_at": "2024-12-02T06:29:52Z",
|
||||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"has_discussions": false,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 261,
|
||||
"watchers": 262,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-10220 Test repo",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T05:15:25Z",
|
||||
"updated_at": "2024-12-02T02:55:23Z",
|
||||
"updated_at": "2024-12-04T11:01:09Z",
|
||||
"pushed_at": "2024-12-01T05:18:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -251,7 +251,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T14:43:16Z",
|
||||
"updated_at": "2024-12-02T08:32:51Z",
|
||||
"updated_at": "2024-12-04T11:29:31Z",
|
||||
"pushed_at": "2024-12-02T08:32:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
@ -260,7 +260,19 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"bypass",
|
||||
"bypass-mfa",
|
||||
"bypass-wordpress",
|
||||
"cibersecurity",
|
||||
"cve",
|
||||
"cve-2024-10924",
|
||||
"exploit",
|
||||
"hacking",
|
||||
"hacking-etico",
|
||||
"really-simple-security",
|
||||
"wordpress"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
|
@ -296,7 +308,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 897913649,
|
||||
|
@ -327,6 +339,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T12:39:49Z",
|
||||
"updated_at": "2024-12-03T23:11:26Z",
|
||||
"updated_at": "2024-12-04T10:11:02Z",
|
||||
"pushed_at": "2024-12-01T12:48:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -463,5 +463,45 @@
|
|||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898401287,
|
||||
"name": "CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
|
||||
"full_name": "D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
|
||||
"owner": {
|
||||
"login": "D1se0",
|
||||
"id": 164921056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
|
||||
"html_url": "https:\/\/github.com\/D1se0",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T10:26:37Z",
|
||||
"updated_at": "2024-12-04T11:29:53Z",
|
||||
"pushed_at": "2024-12-04T11:18:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cibersecurity",
|
||||
"cve",
|
||||
"cve-2024-21413",
|
||||
"exploit",
|
||||
"hacking",
|
||||
"hacking-etico",
|
||||
"lab",
|
||||
"outlook"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T05:54:24Z",
|
||||
"updated_at": "2024-12-03T14:59:15Z",
|
||||
"updated_at": "2024-12-04T06:56:31Z",
|
||||
"pushed_at": "2024-11-23T05:57:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-24T07:20:45Z",
|
||||
"updated_at": "2024-12-02T02:55:23Z",
|
||||
"updated_at": "2024-12-04T06:56:12Z",
|
||||
"pushed_at": "2024-11-24T08:07:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -329,10 +329,10 @@
|
|||
"description": "CVE-2024-23692 是影响 Rejetto HTTP File Server(HFS)2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T03:59:13Z",
|
||||
"updated_at": "2024-12-02T02:55:24Z",
|
||||
"updated_at": "2024-12-04T06:56:48Z",
|
||||
"pushed_at": "2024-11-23T04:00:55Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -341,7 +341,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Windows LPE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T08:03:29Z",
|
||||
"updated_at": "2024-12-04T05:48:33Z",
|
||||
"updated_at": "2024-12-04T12:14:02Z",
|
||||
"pushed_at": "2024-06-11T20:41:59Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 106,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-27130是影响QNAP网络附加存储(NAS)设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数,导致堆栈缓冲区溢出。攻击者可以利用此漏洞,通过精心构造的请求在目标系统上执行任意代码,进而完全控制受影响的设备。 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T14:18:08Z",
|
||||
"updated_at": "2024-12-02T02:55:25Z",
|
||||
"updated_at": "2024-12-04T06:57:05Z",
|
||||
"pushed_at": "2024-11-22T14:20:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T14:53:05Z",
|
||||
"updated_at": "2024-06-25T10:22:48Z",
|
||||
"updated_at": "2024-12-04T07:30:12Z",
|
||||
"pushed_at": "2024-06-24T15:28:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1856,10 +1856,10 @@
|
|||
"description": "CVE-2024-3094 (XZ Backdoor) Tools",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T05:22:08Z",
|
||||
"updated_at": "2024-12-03T19:06:03Z",
|
||||
"updated_at": "2024-12-04T11:01:08Z",
|
||||
"pushed_at": "2024-12-01T05:30:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1868,7 +1868,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞,影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求,将任意文件写入服务器文件系统的任意位置,进而可能导致远程代码执行,严重威胁服务器安全。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T13:53:42Z",
|
||||
"updated_at": "2024-12-02T02:55:26Z",
|
||||
"updated_at": "2024-12-04T06:57:15Z",
|
||||
"pushed_at": "2024-11-22T14:02:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -155,7 +155,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-18T23:34:34Z",
|
||||
"updated_at": "2024-12-04T06:08:59Z",
|
||||
"updated_at": "2024-12-04T12:22:21Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"forks": 4,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -208,10 +208,10 @@
|
|||
"description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T03:54:28Z",
|
||||
"updated_at": "2024-12-02T02:55:26Z",
|
||||
"updated_at": "2024-12-04T06:56:49Z",
|
||||
"pushed_at": "2024-11-23T03:57:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Pre-Auth Exploit for CVE-2024-40711",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-15T17:25:32Z",
|
||||
"updated_at": "2024-11-30T00:51:06Z",
|
||||
"updated_at": "2024-12-04T10:39:47Z",
|
||||
"pushed_at": "2024-09-15T17:28:41Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "cve-2024-42327 ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-01T00:15:27Z",
|
||||
"updated_at": "2024-12-04T06:05:32Z",
|
||||
"updated_at": "2024-12-04T12:15:06Z",
|
||||
"pushed_at": "2024-12-01T01:18:36Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -45,10 +45,10 @@
|
|||
"description": "PoC for CVE-2024-42327 \/ ZBX-25623",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T12:44:07Z",
|
||||
"updated_at": "2024-12-04T00:48:44Z",
|
||||
"updated_at": "2024-12-04T11:43:42Z",
|
||||
"pushed_at": "2024-12-03T12:56:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,8 +57,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"poc-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-23T09:13:03Z",
|
||||
"updated_at": "2024-11-07T20:51:43Z",
|
||||
"updated_at": "2024-12-04T09:24:45Z",
|
||||
"pushed_at": "2024-08-23T09:36:55Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2024-45519是Zimbra Collaboration(ZCS)中的一个高危漏洞,存在于其postjournal服务中。当该服务被启用时,未经身份验证的攻击者可以通过构造特定的SMTP请求,远程执行任意命令,从而完全控制受影响的服务器。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T01:56:21Z",
|
||||
"updated_at": "2024-12-02T02:55:26Z",
|
||||
"updated_at": "2024-12-04T06:57:41Z",
|
||||
"pushed_at": "2024-11-22T02:00:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "CVE-2024-47575是Fortinet的FortiManager和FortiManager Cloud产品中的一个严重漏洞,源于fgfmsd守护进程缺乏对关键功能的身份验证。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T03:13:03Z",
|
||||
"updated_at": "2024-12-02T02:55:27Z",
|
||||
"updated_at": "2024-12-04T06:57:26Z",
|
||||
"pushed_at": "2024-11-22T03:17:57Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-19T08:57:18Z",
|
||||
"updated_at": "2024-12-04T04:16:24Z",
|
||||
"updated_at": "2024-12-04T12:19:36Z",
|
||||
"pushed_at": "2024-11-19T09:15:26Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 41,
|
||||
"forks": 12,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-5124 poc",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T03:18:48Z",
|
||||
"updated_at": "2024-12-03T16:37:43Z",
|
||||
"updated_at": "2024-12-04T11:00:55Z",
|
||||
"pushed_at": "2024-12-03T04:01:32Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,8 +57,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-26T02:18:24Z",
|
||||
"updated_at": "2024-12-02T02:55:27Z",
|
||||
"updated_at": "2024-12-04T06:54:51Z",
|
||||
"pushed_at": "2024-11-26T02:21:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
33
2024/CVE-2024-53259.json
Normal file
33
2024/CVE-2024-53259.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 898373341,
|
||||
"name": "cve-2024-53259",
|
||||
"full_name": "kota-yata\/cve-2024-53259",
|
||||
"owner": {
|
||||
"login": "kota-yata",
|
||||
"id": 51294895,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51294895?v=4",
|
||||
"html_url": "https:\/\/github.com\/kota-yata",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kota-yata\/cve-2024-53259",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T09:27:22Z",
|
||||
"updated_at": "2024-12-04T09:27:53Z",
|
||||
"pushed_at": "2024-12-04T09:28:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,5 +29,36 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 898312169,
|
||||
"name": "CVE-2024-5910",
|
||||
"full_name": "Farzan-Kh\/CVE-2024-5910",
|
||||
"owner": {
|
||||
"login": "Farzan-Kh",
|
||||
"id": 65416059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65416059?v=4",
|
||||
"html_url": "https:\/\/github.com\/Farzan-Kh",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Farzan-Kh\/CVE-2024-5910",
|
||||
"description": "CVE-2024-5910 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-04T07:06:44Z",
|
||||
"updated_at": "2024-12-04T07:17:50Z",
|
||||
"pushed_at": "2024-12-04T07:17:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当,导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页,利用此漏洞在Chrome渲染器中执行任意代码。",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-22T02:55:33Z",
|
||||
"updated_at": "2024-12-03T14:59:16Z",
|
||||
"updated_at": "2024-12-04T06:57:34Z",
|
||||
"pushed_at": "2024-11-22T02:58:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Proof of Concept Exploit for CVE-2024-9465",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T12:16:44Z",
|
||||
"updated_at": "2024-12-03T16:38:23Z",
|
||||
"updated_at": "2024-12-04T11:00:54Z",
|
||||
"pushed_at": "2024-12-03T12:21:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -88,8 +88,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
29
README.md
29
README.md
|
@ -1254,6 +1254,7 @@
|
|||
</code>
|
||||
|
||||
- [p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464](https://github.com/p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464)
|
||||
- [Farzan-Kh/CVE-2024-5910](https://github.com/Farzan-Kh/CVE-2024-5910)
|
||||
|
||||
### CVE-2024-5932 (2024-08-20)
|
||||
|
||||
|
@ -2469,6 +2470,7 @@
|
|||
- [DerZiad/CVE-2024-21413](https://github.com/DerZiad/CVE-2024-21413)
|
||||
- [Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape](https://github.com/Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape)
|
||||
- [ThemeHackers/CVE-2024-21413](https://github.com/ThemeHackers/CVE-2024-21413)
|
||||
- [D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB](https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB)
|
||||
|
||||
### CVE-2024-21514 (2024-06-22)
|
||||
|
||||
|
@ -7232,6 +7234,13 @@
|
|||
|
||||
- [0x4M3R/CVE-2024-53255](https://github.com/0x4M3R/CVE-2024-53255)
|
||||
|
||||
### CVE-2024-53259 (2024-12-02)
|
||||
|
||||
<code>quic-go is an implementation of the QUIC protocol in Go. An off-path attacker can inject an ICMP Packet Too Large packet. Since affected quic-go versions used IP_PMTUDISC_DO, the kernel would then return a "message too large" error on sendmsg, i.e. when quic-go attempts to send a packet that exceeds the MTU claimed in that ICMP packet. By setting this value to smaller than 1200 bytes (the minimum MTU for QUIC), the attacker can disrupt a QUIC connection. Crucially, this can be done after completion of the handshake, thereby circumventing any TCP fallback that might be implemented on the application layer (for example, many browsers fall back to HTTP over TCP if they're unable to establish a QUIC connection). The attacker needs to at least know the client's IP and port tuple to mount an attack. This vulnerability is fixed in 0.48.2.
|
||||
</code>
|
||||
|
||||
- [kota-yata/cve-2024-53259](https://github.com/kota-yata/cve-2024-53259)
|
||||
|
||||
### CVE-2024-53375 (2024-12-02)
|
||||
|
||||
<code>Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality.
|
||||
|
@ -11463,6 +11472,7 @@
|
|||
- [mister-turtle/cve-2023-32784](https://github.com/mister-turtle/cve-2023-32784)
|
||||
- [Cmadhushanka/CVE-2023-32784-Exploitation](https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation)
|
||||
- [SarahZimmermann-Schmutzler/exploit_keepass](https://github.com/SarahZimmermann-Schmutzler/exploit_keepass)
|
||||
- [dev0558/CVE-2023-32784-EXPLOIT-REPORT](https://github.com/dev0558/CVE-2023-32784-EXPLOIT-REPORT)
|
||||
|
||||
### CVE-2023-32961 (2023-06-12)
|
||||
|
||||
|
@ -11805,6 +11815,13 @@
|
|||
- [overgrowncarrot1/ImageTragick_CVE-2023-34152](https://github.com/overgrowncarrot1/ImageTragick_CVE-2023-34152)
|
||||
- [SudoIndividual/CVE-2023-34152](https://github.com/SudoIndividual/CVE-2023-34152)
|
||||
|
||||
### CVE-2023-34194 (2023-12-13)
|
||||
|
||||
<code>StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.
|
||||
</code>
|
||||
|
||||
- [vm2mv/tinyxml](https://github.com/vm2mv/tinyxml)
|
||||
|
||||
### CVE-2023-34212 (2023-06-12)
|
||||
|
||||
<code>The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.\n\nThe resolution validates the JNDI URL and restricts locations to a set of allowed schemes.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n
|
||||
|
@ -12413,7 +12430,6 @@
|
|||
- [ifconfig-me/CVE-2023-36845](https://github.com/ifconfig-me/CVE-2023-36845)
|
||||
- [e11i0t4lders0n/CVE-2023-36845](https://github.com/e11i0t4lders0n/CVE-2023-36845)
|
||||
- [Vignesh2712/Automation-for-Juniper-cve-2023-36845](https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845)
|
||||
- [functionofpwnosec/CVE-2023-36845](https://github.com/functionofpwnosec/CVE-2023-36845)
|
||||
|
||||
### CVE-2023-36846 (2023-08-17)
|
||||
|
||||
|
@ -15412,6 +15428,7 @@
|
|||
|
||||
- [knqyf263/CVE-2023-50387](https://github.com/knqyf263/CVE-2023-50387)
|
||||
- [Meirelez/SSR-DNSSEC](https://github.com/Meirelez/SSR-DNSSEC)
|
||||
- [Pablodiz/CVE-2023-50387](https://github.com/Pablodiz/CVE-2023-50387)
|
||||
|
||||
### CVE-2023-50465 (2023-12-11)
|
||||
|
||||
|
@ -25407,6 +25424,7 @@
|
|||
|
||||
- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
|
||||
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
|
||||
- [azhao1981/CVE-2021-29441](https://github.com/azhao1981/CVE-2021-29441)
|
||||
|
||||
### CVE-2021-29442 (2021-04-27)
|
||||
|
||||
|
@ -27450,7 +27468,6 @@
|
|||
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
|
||||
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
|
||||
- [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773)
|
||||
- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter)
|
||||
- [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise)
|
||||
- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773)
|
||||
- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773)
|
||||
|
@ -27628,6 +27645,13 @@
|
|||
- [vesperp/CVE-2021-42237-SiteCore-XP](https://github.com/vesperp/CVE-2021-42237-SiteCore-XP)
|
||||
- [crankyyash/SiteCore-RCE-Detection](https://github.com/crankyyash/SiteCore-RCE-Detection)
|
||||
|
||||
### CVE-2021-42260 (2021-10-11)
|
||||
|
||||
<code>TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.
|
||||
</code>
|
||||
|
||||
- [vm2mv/tinyxml](https://github.com/vm2mv/tinyxml)
|
||||
|
||||
### CVE-2021-42261 (2021-10-19)
|
||||
|
||||
<code>Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server.
|
||||
|
@ -28584,7 +28608,6 @@
|
|||
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
|
||||
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
|
||||
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
|
||||
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
|
||||
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
|
||||
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
|
||||
- [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)
|
||||
|
|
Loading…
Reference in a new issue