Auto Update 2023/11/10 00:40:00

This commit is contained in:
motikan2010-bot 2023-11-10 09:40:00 +09:00
parent 40ab31a7eb
commit 0e57c3af1f
45 changed files with 375 additions and 91 deletions

View file

@ -2,14 +2,14 @@
{
"id": 120135334,
"name": "pocs",
"full_name": "pagvac\/pocs",
"full_name": "adpast\/pocs",
"owner": {
"login": "pagvac",
"login": "adpast",
"id": 6169628,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6169628?v=4",
"html_url": "https:\/\/github.com\/pagvac"
"html_url": "https:\/\/github.com\/adpast"
},
"html_url": "https:\/\/github.com\/pagvac\/pocs",
"html_url": "https:\/\/github.com\/adpast\/pocs",
"description": "phpMyAdmin '\/scripts\/setup.php' PHP Code Injection RCE PoC (CVE-2009-1151)",
"fork": false,
"created_at": "2018-02-03T22:26:09Z",

View file

@ -13,19 +13,19 @@
"description": "Exploit code for CVE-2016-1757",
"fork": false,
"created_at": "2016-04-27T12:29:28Z",
"updated_at": "2023-09-07T17:01:02Z",
"updated_at": "2023-11-09T18:25:43Z",
"pushed_at": "2016-04-27T14:07:43Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 25,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 80,
"forks": 24,
"watchers": 81,
"score": 0,
"subscribers_count": 3
}

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-22T09:33:51Z",
"updated_at": "2023-09-07T12:47:00Z",
"updated_at": "2023-11-09T23:55:00Z",
"pushed_at": "2021-03-22T10:46:07Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-75 - Check and EXPLOIT",
"fork": false,
"created_at": "2023-11-09T17:13:30Z",
"updated_at": "2023-11-09T17:22:44Z",
"updated_at": "2023-11-09T18:31:23Z",
"pushed_at": "2023-11-09T17:22:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

32
2019/CVE-2019-0678.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 197768361,
"name": "CVE-2019-0678",
"full_name": "sharmasandeepkr\/CVE-2019-0678",
"owner": {
"login": "sharmasandeepkr",
"id": 16163884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16163884?v=4",
"html_url": "https:\/\/github.com\/sharmasandeepkr"
},
"html_url": "https:\/\/github.com\/sharmasandeepkr\/CVE-2019-0678",
"description": "Microsoft Edge Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2019-07-19T12:23:27Z",
"updated_at": "2022-12-01T13:46:39Z",
"pushed_at": "2019-07-19T12:15:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2343,6 +2343,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 197547695,
"name": "cve-2019-0708",
"full_name": "cve-2019-0708-poc\/cve-2019-0708",
"owner": {
"login": "cve-2019-0708-poc",
"id": 53038783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53038783?v=4",
"html_url": "https:\/\/github.com\/cve-2019-0708-poc"
},
"html_url": "https:\/\/github.com\/cve-2019-0708-poc\/cve-2019-0708",
"description": "CVE-2019-0708 Exploit Tool",
"fork": false,
"created_at": "2019-07-18T08:41:01Z",
"updated_at": "2022-08-23T04:38:53Z",
"pushed_at": "2019-07-18T08:44:51Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 19,
"score": 0,
"subscribers_count": 14
},
{
"id": 197655376,
"name": "CVE-2019-0708",

32
2019/CVE-2019-10915.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 198133475,
"name": "CVE-2019-10915",
"full_name": "jiansiting\/CVE-2019-10915",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915",
"description": "Siemens TIA administrator Tool RCE",
"fork": false,
"created_at": "2019-07-22T02:38:54Z",
"updated_at": "2023-09-28T11:04:20Z",
"pushed_at": "2019-07-22T11:48:39Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -37,6 +37,36 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 197643691,
"name": "jquery-prototype-pollution-fix",
"full_name": "bitnesswise\/jquery-prototype-pollution-fix",
"owner": {
"login": "bitnesswise",
"id": 32780182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32780182?v=4",
"html_url": "https:\/\/github.com\/bitnesswise"
},
"html_url": "https:\/\/github.com\/bitnesswise\/jquery-prototype-pollution-fix",
"description": "A fix for CVE-2019-11358 (prototype pollution in jquery)",
"fork": false,
"created_at": "2019-07-18T19:15:33Z",
"updated_at": "2023-09-28T11:04:14Z",
"pushed_at": "2019-07-18T20:00:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 255702097,
"name": "snyk-js-jquery-565129",

32
2019/CVE-2019-11477.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 198296662,
"name": "cve-2019-11477-poc",
"full_name": "sasqwatch\/cve-2019-11477-poc",
"owner": {
"login": "sasqwatch",
"id": 22352904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22352904?v=4",
"html_url": "https:\/\/github.com\/sasqwatch"
},
"html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc",
"description": null,
"fork": false,
"created_at": "2019-07-22T20:23:08Z",
"updated_at": "2023-09-28T11:04:22Z",
"pushed_at": "2019-07-21T15:56:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 197342430,
"name": "CVE-2019-11580",
"full_name": "jas502n\/CVE-2019-11580",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11580",
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2023-10-14T03:31:41Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 103,
"score": 0,
"subscribers_count": 2
},
{
"id": 245476096,
"name": "CVE-2019-11580",

View file

@ -1,4 +1,34 @@
[
{
"id": 197105656,
"name": "CVE-2019-11581",
"full_name": "jas502n\/CVE-2019-11581",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581",
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2023-09-28T11:04:08Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 93,
"score": 0,
"subscribers_count": 3
},
{
"id": 198763431,
"name": "CVE-2019-11581",

View file

@ -1,4 +1,34 @@
[
{
"id": 198579428,
"name": "CVE-2019-12384",
"full_name": "jas502n\/CVE-2019-12384",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12384",
"description": "Jackson Rce For CVE-2019-12384 ",
"fork": false,
"created_at": "2019-07-24T07:12:14Z",
"updated_at": "2023-09-28T11:04:25Z",
"pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 98,
"score": 0,
"subscribers_count": 3
},
{
"id": 198939305,
"name": "Jackson_RCE-CVE-2019-12384",

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -947,6 +947,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -270,6 +270,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -733,7 +733,7 @@
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 237996900,

View file

@ -117,6 +117,6 @@
"forks": 8,
"watchers": 31,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -953,6 +953,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -156,7 +156,7 @@
"forks": 21,
"watchers": 57,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 381984439,

View file

@ -872,6 +872,6 @@
"forks": 149,
"watchers": 1146,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
}
]

View file

@ -44,11 +44,11 @@
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2023-10-27T11:22:01Z",
"pushed_at": "2022-07-01T00:33:57Z",
"pushed_at": "2023-11-09T21:43:52Z",
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -57,7 +57,7 @@
"poc"
],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 62,
"score": 0,
"subscribers_count": 1

View file

@ -739,7 +739,7 @@
"forks": 10,
"watchers": 28,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 347961970,

View file

@ -27,7 +27,7 @@
"forks": 70,
"watchers": 255,
"score": 0,
"subscribers_count": 13
"subscribers_count": 14
},
{
"id": 331843308,

View file

@ -1948,10 +1948,10 @@
"description": "clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification.",
"fork": false,
"created_at": "2022-11-28T12:52:11Z",
"updated_at": "2023-10-05T08:58:58Z",
"updated_at": "2023-11-09T22:23:44Z",
"pushed_at": "2022-12-22T12:38:31Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -1960,7 +1960,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 2
},

View file

@ -31,6 +31,6 @@
"forks": 24,
"watchers": 84,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -662,7 +662,7 @@
"forks": 6,
"watchers": 18,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 625005108,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2023-11-06T11:08:08Z",
"updated_at": "2023-11-09T21:49:33Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 213,
"watchers": 214,
"score": 0,
"subscribers_count": 5
},

View file

@ -79,19 +79,19 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-11-08T22:07:22Z",
"updated_at": "2023-11-09T19:03:53Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1858,
"watchers_count": 1858,
"stargazers_count": 1857,
"watchers_count": 1857,
"has_discussions": false,
"forks_count": 515,
"forks_count": 516,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 515,
"watchers": 1858,
"forks": 516,
"watchers": 1857,
"score": 0,
"subscribers_count": 21
},

View file

@ -211,7 +211,7 @@
"forks": 35,
"watchers": 90,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 667239570,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -62,7 +62,7 @@
"forks": 113,
"watchers": 653,
"score": 0,
"subscribers_count": 11
"subscribers_count": 12
},
{
"id": 437924403,

View file

@ -675,7 +675,7 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 445007761,

View file

@ -891,7 +891,7 @@
"forks": 142,
"watchers": 922,
"score": 0,
"subscribers_count": 23
"subscribers_count": 24
},
{
"id": 437139341,
@ -4898,7 +4898,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 437983994,

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2023-11-03T07:35:36Z",
"updated_at": "2023-11-10T00:00:34Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 256,
"watchers": 257,
"score": 0,
"subscribers_count": 10
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-11-09T02:05:09Z",
"updated_at": "2023-11-09T20:45:24Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 4
}

View file

@ -73,10 +73,10 @@
"description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233",
"fork": false,
"created_at": "2023-05-16T05:58:03Z",
"updated_at": "2023-10-10T21:07:22Z",
"updated_at": "2023-11-09T22:12:11Z",
"pushed_at": "2023-06-20T06:58:04Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-11-09T07:44:24Z",
"updated_at": "2023-11-09T23:16:49Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 431,
"watchers_count": 431,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 430,
"watchers": 431,
"score": 0,
"subscribers_count": 14
}

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-11-07T05:56:45Z",
"updated_at": "2023-11-10T00:03:13Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 200,
"watchers": 201,
"score": 0,
"subscribers_count": 4
},

View file

@ -46,10 +46,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
"updated_at": "2023-11-09T17:41:58Z",
"updated_at": "2023-11-09T18:51:28Z",
"pushed_at": "2023-08-10T05:12:20Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-05T15:06:43Z",
"updated_at": "2023-11-09T08:00:21Z",
"updated_at": "2023-11-09T23:23:57Z",
"pushed_at": "2023-11-06T18:56:53Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -133,12 +133,12 @@
"description": " CVE-2023-46604 ActiveMQ RCE vulnerability verification\/exploitation tool",
"fork": false,
"created_at": "2023-11-06T04:05:51Z",
"updated_at": "2023-11-09T10:18:56Z",
"updated_at": "2023-11-09T19:51:05Z",
"pushed_at": "2023-11-07T11:58:28Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -146,7 +146,7 @@
"cve-2023-46604"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 1

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-09T12:34:42Z",
"pushed_at": "2023-11-07T12:34:17Z",
"pushed_at": "2023-11-10T00:37:38Z",
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,

View file

@ -881,13 +881,25 @@
- [juweihuitao/MpOperationLogs](https://github.com/juweihuitao/MpOperationLogs)
### CVE-2023-5539
### CVE-2023-5539 (2023-11-09)
<code>A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
</code>
- [cli-ish/CVE-2023-5539](https://github.com/cli-ish/CVE-2023-5539)
### CVE-2023-5540
### CVE-2023-5540 (2023-11-09)
<code>A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.
</code>
- [cli-ish/CVE-2023-5540](https://github.com/cli-ish/CVE-2023-5540)
### CVE-2023-5546
### CVE-2023-5546 (2023-11-09)
<code>ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.
</code>
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)
### CVE-2023-20025 (2023-01-20)
@ -22783,6 +22795,13 @@
- [Anti-ghosts/CVE-2019-0623-32-exp](https://github.com/Anti-ghosts/CVE-2019-0623-32-exp)
### CVE-2019-0678 (2019-04-08)
<code>An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain.In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability, aka 'Microsoft Edge Elevation of Privilege Vulnerability'.
</code>
- [sharmasandeepkr/CVE-2019-0678](https://github.com/sharmasandeepkr/CVE-2019-0678)
### CVE-2019-0708 (2019-05-16)
<code>A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
@ -22865,6 +22884,7 @@
- [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708)
- [ze0r/CVE-2019-0708-exp](https://github.com/ze0r/CVE-2019-0708-exp)
- [mekhalleh/cve-2019-0708](https://github.com/mekhalleh/cve-2019-0708)
- [cve-2019-0708-poc/cve-2019-0708](https://github.com/cve-2019-0708-poc/cve-2019-0708)
- [andripwn/CVE-2019-0708](https://github.com/andripwn/CVE-2019-0708)
- [0xeb-bp/bluekeep](https://github.com/0xeb-bp/bluekeep)
- [ntkernel0/CVE-2019-0708](https://github.com/ntkernel0/CVE-2019-0708)
@ -24535,6 +24555,13 @@
- [KTN1990/CVE-2019-10869](https://github.com/KTN1990/CVE-2019-10869)
### CVE-2019-10915 (2019-07-11)
<code>A vulnerability has been identified in TIA Administrator (All versions &lt; V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication. The vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
</code>
- [jiansiting/CVE-2019-10915](https://github.com/jiansiting/CVE-2019-10915)
### CVE-2019-10945 (2019-04-10)
<code>An issue was discovered in Joomla! before 3.9.5. The Media Manager component does not properly sanitize the folder parameter, allowing attackers to act outside the media manager root directory.
@ -24619,6 +24646,7 @@
</code>
- [DanielRuf/snyk-js-jquery-174006](https://github.com/DanielRuf/snyk-js-jquery-174006)
- [bitnesswise/jquery-prototype-pollution-fix](https://github.com/bitnesswise/jquery-prototype-pollution-fix)
- [DanielRuf/snyk-js-jquery-565129](https://github.com/DanielRuf/snyk-js-jquery-565129)
- [chrisneagu/FTC-Skystone-Dark-Angels-Romania-2020](https://github.com/chrisneagu/FTC-Skystone-Dark-Angels-Romania-2020)
- [Snorlyd/https-nj.gov---CVE-2019-11358](https://github.com/Snorlyd/https-nj.gov---CVE-2019-11358)
@ -24636,6 +24664,13 @@
- [thewhiteh4t/cve-2019-11447](https://github.com/thewhiteh4t/cve-2019-11447)
- [0xConstant/CVE-2019-11447](https://github.com/0xConstant/CVE-2019-11447)
### CVE-2019-11477 (2019-06-18)
<code>Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
</code>
- [sasqwatch/cve-2019-11477-poc](https://github.com/sasqwatch/cve-2019-11477-poc)
### CVE-2019-11510 (2019-05-08)
<code>In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
@ -24674,6 +24709,7 @@
<code>Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
</code>
- [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580)
- [shelld3v/CVE-2019-11580](https://github.com/shelld3v/CVE-2019-11580)
### CVE-2019-11581 (2019-08-09)
@ -24681,6 +24717,7 @@
<code>There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
</code>
- [jas502n/CVE-2019-11581](https://github.com/jas502n/CVE-2019-11581)
- [kobs0N/CVE-2019-11581](https://github.com/kobs0N/CVE-2019-11581)
- [PetrusViet/CVE-2019-11581](https://github.com/PetrusViet/CVE-2019-11581)
@ -24840,6 +24877,7 @@
<code>FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
</code>
- [jas502n/CVE-2019-12384](https://github.com/jas502n/CVE-2019-12384)
- [MagicZer0/Jackson_RCE-CVE-2019-12384](https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384)
### CVE-2019-12409 (2019-11-18)
@ -36164,7 +36202,7 @@
<code>Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.
</code>
- [pagvac/pocs](https://github.com/pagvac/pocs)
- [adpast/pocs](https://github.com/adpast/pocs)
### CVE-2009-1244 (2009-04-13)