mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/11/30 00:31:33
This commit is contained in:
parent
42d421bcbb
commit
0b108c8b6e
28 changed files with 139 additions and 193 deletions
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2300,
|
||||
"watchers_count": 2300,
|
||||
"has_discussions": false,
|
||||
"forks_count": 486,
|
||||
"forks_count": 485,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 486,
|
||||
"forks": 485,
|
||||
"watchers": 2300,
|
||||
"score": 0,
|
||||
"subscribers_count": 118
|
||||
|
@ -689,36 +689,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 18714630,
|
||||
"name": "bleeding_onions",
|
||||
"full_name": "wwwiretap\/bleeding_onions",
|
||||
"owner": {
|
||||
"login": "wwwiretap",
|
||||
"id": 210109,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4",
|
||||
"html_url": "https:\/\/github.com\/wwwiretap"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions",
|
||||
"description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-12T21:04:55Z",
|
||||
"updated_at": "2014-09-09T17:32:17Z",
|
||||
"pushed_at": "2014-04-13T14:57:20Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 18722665,
|
||||
"name": "heatbleeding",
|
||||
|
@ -809,36 +779,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 18794584,
|
||||
"name": "-Heartbleed-",
|
||||
"full_name": "indiw0rm\/-Heartbleed-",
|
||||
"owner": {
|
||||
"login": "indiw0rm",
|
||||
"id": 7300510,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4",
|
||||
"html_url": "https:\/\/github.com\/indiw0rm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-",
|
||||
"description": "A checker (site and tool) for CVE-2014-0160: ",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-15T09:30:40Z",
|
||||
"updated_at": "2014-04-15T09:30:40Z",
|
||||
"pushed_at": "2014-04-15T09:30:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 18802435,
|
||||
"name": "heartbleed-tools",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 17090204,
|
||||
"name": "Testability-CVE-2014-1266",
|
||||
"full_name": "landonf\/Testability-CVE-2014-1266",
|
||||
"owner": {
|
||||
"login": "landonf",
|
||||
"id": 18884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18884?v=4",
|
||||
"html_url": "https:\/\/github.com\/landonf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/landonf\/Testability-CVE-2014-1266",
|
||||
"description": "Demonstrating that SSLVerifySignedServerKeyExchange() is trivially testable.",
|
||||
"fork": false,
|
||||
"created_at": "2014-02-22T17:39:21Z",
|
||||
"updated_at": "2023-05-20T11:55:29Z",
|
||||
"pushed_at": "2014-02-22T17:47:09Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 17114039,
|
||||
"name": "SSLPatch",
|
||||
|
|
|
@ -28,35 +28,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 18869401,
|
||||
"name": "cve-2014-2734",
|
||||
"full_name": "adrienthebo\/cve-2014-2734",
|
||||
"owner": {
|
||||
"login": "adrienthebo",
|
||||
"id": 172194,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172194?v=4",
|
||||
"html_url": "https:\/\/github.com\/adrienthebo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adrienthebo\/cve-2014-2734",
|
||||
"description": "I think this CVE is full of lies and deceit and very confusing code.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-17T06:51:01Z",
|
||||
"updated_at": "2023-01-28T20:50:55Z",
|
||||
"pushed_at": "2014-04-17T07:07:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-11-27T10:25:05Z",
|
||||
"updated_at": "2023-11-29T23:19:28Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -92,7 +92,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2023-11-25T02:34:07Z",
|
||||
"updated_at": "2023-11-29T21:56:20Z",
|
||||
"pushed_at": "2022-12-27T20:25:09Z",
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 361,
|
||||
"watchers": 362,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": "A PoC exploit for CVE-2017-7921 - Hikvision Camera Series Improper Authentication Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-24T14:48:38Z",
|
||||
"updated_at": "2023-10-28T17:06:48Z",
|
||||
"updated_at": "2023-11-29T19:27:14Z",
|
||||
"pushed_at": "2023-08-02T18:58:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -275,7 +275,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -150,10 +150,10 @@
|
|||
"description": "Drupal 0day Remote PHP Code Execution (Perl)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-14T09:02:54Z",
|
||||
"updated_at": "2023-09-28T10:49:52Z",
|
||||
"updated_at": "2023-11-29T19:01:10Z",
|
||||
"pushed_at": "2018-04-14T09:06:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -162,7 +162,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2023-11-17T06:39:55Z",
|
||||
"updated_at": "2023-11-29T19:38:07Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 319,
|
||||
"watchers": 320,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"forks": 67,
|
||||
"watchers": 270,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
|
@ -153,13 +153,13 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -804,10 +804,10 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2023-10-20T06:35:25Z",
|
||||
"updated_at": "2023-11-29T20:30:12Z",
|
||||
"pushed_at": "2022-02-13T12:21:53Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -816,7 +816,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T21:49:33Z",
|
||||
"updated_at": "2023-11-18T12:57:22Z",
|
||||
"updated_at": "2023-11-29T23:22:43Z",
|
||||
"pushed_at": "2023-01-27T17:34:36Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2023-11-23T15:49:41Z",
|
||||
"pushed_at": "2023-11-29T21:45:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -470,7 +470,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-31T19:19:52Z",
|
||||
"updated_at": "2023-09-28T11:37:34Z",
|
||||
"pushed_at": "2022-04-01T14:21:55Z",
|
||||
"pushed_at": "2023-11-29T20:11:53Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -576,10 +576,10 @@
|
|||
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T20:00:23Z",
|
||||
"updated_at": "2023-11-08T04:39:19Z",
|
||||
"updated_at": "2023-11-30T00:24:50Z",
|
||||
"pushed_at": "2023-09-11T17:56:27Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -588,7 +588,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -317,10 +317,10 @@
|
|||
"description": "1vere$k POC on the CVE-2023-20198",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T16:01:17Z",
|
||||
"updated_at": "2023-11-29T11:41:27Z",
|
||||
"updated_at": "2023-11-29T22:18:57Z",
|
||||
"pushed_at": "2023-10-20T21:51:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -329,7 +329,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -560,7 +560,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-29T01:34:35Z",
|
||||
"updated_at": "2023-11-29T01:37:35Z",
|
||||
"pushed_at": "2023-11-29T01:37:32Z",
|
||||
"pushed_at": "2023-11-30T00:02:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "GameOver(lay) Ubuntu Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T22:02:42Z",
|
||||
"updated_at": "2023-11-28T05:30:05Z",
|
||||
"updated_at": "2023-11-29T20:35:39Z",
|
||||
"pushed_at": "2023-10-09T22:44:21Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 47,
|
||||
"forks": 7,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T04:59:05Z",
|
||||
"updated_at": "2023-11-29T01:49:24Z",
|
||||
"updated_at": "2023-11-29T19:36:29Z",
|
||||
"pushed_at": "2023-09-09T01:20:49Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T12:22:05Z",
|
||||
"updated_at": "2023-11-24T23:14:17Z",
|
||||
"updated_at": "2023-11-29T23:01:03Z",
|
||||
"pushed_at": "2023-07-10T16:57:44Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 149,
|
||||
"watchers": 150,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2023-11-29T18:12:36Z",
|
||||
"updated_at": "2023-11-29T22:54:55Z",
|
||||
"pushed_at": "2023-10-20T23:04:03Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 163,
|
||||
"watchers": 164,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -405,8 +405,8 @@
|
|||
"description": "Repository to exploit CVE-2023-46604 reported for ActiveMQ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-29T18:30:02Z",
|
||||
"updated_at": "2023-11-29T18:30:02Z",
|
||||
"pushed_at": "2023-11-29T18:30:02Z",
|
||||
"updated_at": "2023-11-29T19:27:53Z",
|
||||
"pushed_at": "2023-11-29T19:51:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
32
2023/CVE-2023-47840.json
Normal file
32
2023/CVE-2023-47840.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 725279708,
|
||||
"name": "CVE-2023-47840",
|
||||
"full_name": "RandomRobbieBF\/CVE-2023-47840",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47840",
|
||||
"description": "Qode Essential Addons <= 1.5.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation\/Activation",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-29T20:14:39Z",
|
||||
"updated_at": "2023-11-29T23:52:43Z",
|
||||
"pushed_at": "2023-11-29T20:17:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -28,5 +28,39 @@
|
|||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 725249255,
|
||||
"name": "ansible-cve-2023-49103",
|
||||
"full_name": "ditekshen\/ansible-cve-2023-49103",
|
||||
"owner": {
|
||||
"login": "ditekshen",
|
||||
"id": 43088607,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43088607?v=4",
|
||||
"html_url": "https:\/\/github.com\/ditekshen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ditekshen\/ansible-cve-2023-49103",
|
||||
"description": "Ansible Playbook for CVE-2023-49103",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-29T18:46:54Z",
|
||||
"updated_at": "2023-11-29T19:33:52Z",
|
||||
"pushed_at": "2023-11-29T19:36:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"ansible",
|
||||
"ansible-playbook",
|
||||
"cve-2023-49103"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -5418,6 +5418,9 @@
|
|||
|
||||
- [RandomRobbieBF/CVE-2023-47668](https://github.com/RandomRobbieBF/CVE-2023-47668)
|
||||
|
||||
### CVE-2023-47840
|
||||
- [RandomRobbieBF/CVE-2023-47840](https://github.com/RandomRobbieBF/CVE-2023-47840)
|
||||
|
||||
### CVE-2023-48028 (2023-11-17)
|
||||
|
||||
<code>kodbox 1.46.01 has a security flaw that enables user enumeration. This problem is present on the login page, where an attacker can identify valid users based on varying response messages, potentially paving the way for a brute force attack.
|
||||
|
@ -5486,6 +5489,7 @@
|
|||
</code>
|
||||
|
||||
- [creacitysec/CVE-2023-49103](https://github.com/creacitysec/CVE-2023-49103)
|
||||
- [ditekshen/ansible-cve-2023-49103](https://github.com/ditekshen/ansible-cve-2023-49103)
|
||||
|
||||
### CVE-2023-49313 (2023-11-28)
|
||||
|
||||
|
@ -35160,11 +35164,9 @@
|
|||
- [sammyfung/openssl-heartbleed-fix](https://github.com/sammyfung/openssl-heartbleed-fix)
|
||||
- [a0726h77/heartbleed-test](https://github.com/a0726h77/heartbleed-test)
|
||||
- [hreese/heartbleed-dtls](https://github.com/hreese/heartbleed-dtls)
|
||||
- [wwwiretap/bleeding_onions](https://github.com/wwwiretap/bleeding_onions)
|
||||
- [idkqh7/heatbleeding](https://github.com/idkqh7/heatbleeding)
|
||||
- [GeeksXtreme/ssl-heartbleed.nse](https://github.com/GeeksXtreme/ssl-heartbleed.nse)
|
||||
- [xlucas/heartbleed](https://github.com/xlucas/heartbleed)
|
||||
- [indiw0rm/-Heartbleed-](https://github.com/indiw0rm/-Heartbleed-)
|
||||
- [einaros/heartbleed-tools](https://github.com/einaros/heartbleed-tools)
|
||||
- [mozilla-services/Heartbleed](https://github.com/mozilla-services/Heartbleed)
|
||||
- [yryz/heartbleed.js](https://github.com/yryz/heartbleed.js)
|
||||
|
@ -35287,7 +35289,6 @@
|
|||
<code>The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange.c in the Secure Transport feature in the Data Security component in Apple iOS 6.x before 6.1.6 and 7.x before 7.0.6, Apple TV 6.x before 6.0.2, and Apple OS X 10.9.x before 10.9.2 does not check the signature in a TLS Server Key Exchange message, which allows man-in-the-middle attackers to spoof SSL servers by (1) using an arbitrary private key for the signing step or (2) omitting the signing step.
|
||||
</code>
|
||||
|
||||
- [landonf/Testability-CVE-2014-1266](https://github.com/landonf/Testability-CVE-2014-1266)
|
||||
- [linusyang/SSLPatch](https://github.com/linusyang/SSLPatch)
|
||||
- [gabrielg/CVE-2014-1266-poc](https://github.com/gabrielg/CVE-2014-1266-poc)
|
||||
|
||||
|
@ -35389,7 +35390,6 @@
|
|||
</code>
|
||||
|
||||
- [gdisneyleugers/CVE-2014-2734](https://github.com/gdisneyleugers/CVE-2014-2734)
|
||||
- [adrienthebo/cve-2014-2734](https://github.com/adrienthebo/cve-2014-2734)
|
||||
|
||||
### CVE-2014-2815 (2014-08-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue