mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/09/22 12:28:43
This commit is contained in:
parent
2e34685d27
commit
1d0c0eb26b
51 changed files with 650 additions and 414 deletions
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 1784,
|
||||
"watchers_count": 1784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 333,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -75,7 +75,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"forks": 334,
|
||||
"watchers": 1784,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-09-16T21:01:56Z",
|
||||
"updated_at": "2023-09-22T09:20:33Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -92,7 +92,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1784,
|
||||
"watchers_count": 1784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 333,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"forks": 334,
|
||||
"watchers": 1784,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 137769369,
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"owner": {
|
||||
"login": "RicterZ",
|
||||
"id": 5282759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicterZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T15:22:01Z",
|
||||
"updated_at": "2023-06-01T08:36:39Z",
|
||||
"pushed_at": "2017-11-01T07:59:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 552591833,
|
||||
"name": "CVE-2017-1000253",
|
||||
|
|
|
@ -149,6 +149,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116099094,
|
||||
"name": "weblogic_wls_wsat_rce",
|
||||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||||
"owner": {
|
||||
"login": "cjjduck",
|
||||
"id": 23519154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
|
||||
"html_url": "https:\/\/github.com\/cjjduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-10-09T02:33:00Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116430643,
|
||||
"name": "CVE-2017-10271",
|
||||
|
|
32
2017/CVE-2017-16997.json
Normal file
32
2017/CVE-2017-16997.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116118639,
|
||||
"name": "CVE-2017-16997-poc",
|
||||
"full_name": "Xiami2012\/CVE-2017-16997-poc",
|
||||
"owner": {
|
||||
"login": "Xiami2012",
|
||||
"id": 1927254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xiami2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
|
||||
"description": "A proof-of-concept for CVE-2017-16997",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T09:31:55Z",
|
||||
"updated_at": "2018-01-03T09:33:01Z",
|
||||
"pushed_at": "2018-01-03T10:39:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
32
2017/CVE-2017-17692.json
Normal file
32
2017/CVE-2017-17692.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116205741,
|
||||
"name": "CVE-2017-17692",
|
||||
"full_name": "specloli\/CVE-2017-17692",
|
||||
"owner": {
|
||||
"login": "specloli",
|
||||
"id": 10647366,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
|
||||
"html_url": "https:\/\/github.com\/specloli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T02:40:13Z",
|
||||
"updated_at": "2021-11-23T15:08:43Z",
|
||||
"pushed_at": "2018-01-02T13:58:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 1784,
|
||||
"watchers_count": 1784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 333,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -75,7 +75,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"forks": 334,
|
||||
"watchers": 1784,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -118,5 +118,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 115962692,
|
||||
"name": "CVE-2017-3881",
|
||||
"full_name": "1337g\/CVE-2017-3881",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
|
||||
"description": "credit to artkond",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T01:45:15Z",
|
||||
"updated_at": "2022-04-11T12:16:38Z",
|
||||
"pushed_at": "2018-01-02T01:46:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -35,6 +35,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
{
|
||||
"id": 116268310,
|
||||
"name": "Spectre-PoC",
|
||||
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"owner": {
|
||||
"login": "EdwardOwusuAdjei",
|
||||
"id": 16462560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T14:20:13Z",
|
||||
"updated_at": "2023-09-16T21:09:29Z",
|
||||
"pushed_at": "2018-01-04T14:27:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 116347505,
|
||||
"name": "spectre-attack-example",
|
||||
"full_name": "poilynx\/spectre-attack-example",
|
||||
"owner": {
|
||||
"login": "poilynx",
|
||||
"id": 8926090,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
|
||||
"html_url": "https:\/\/github.com\/poilynx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
|
||||
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T05:51:34Z",
|
||||
"updated_at": "2021-02-24T01:25:15Z",
|
||||
"pushed_at": "2018-01-05T05:56:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
|
|
|
@ -394,6 +394,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 201442014,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "ThanHuuTuan\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "ThanHuuTuan",
|
||||
"id": 32167814,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T10:01:50Z",
|
||||
"updated_at": "2019-08-09T10:01:53Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"forks": 112,
|
||||
"watchers": 257,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
32
2017/CVE-2017-9097.json
Normal file
32
2017/CVE-2017-9097.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116008243,
|
||||
"name": "AntiWeb_testing-Suite",
|
||||
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"owner": {
|
||||
"login": "MDudek-ICS",
|
||||
"id": 31083304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T11:28:40Z",
|
||||
"updated_at": "2023-09-16T21:09:25Z",
|
||||
"pushed_at": "2017-11-21T20:19:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -592,7 +592,7 @@
|
|||
"stargazers_count": 1784,
|
||||
"watchers_count": 1784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 333,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -619,7 +619,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"forks": 334,
|
||||
"watchers": 1784,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 625,
|
||||
"watchers_count": 625,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -67,7 +67,7 @@
|
|||
"xss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"forks": 135,
|
||||
"watchers": 625,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
|
|
|
@ -198,7 +198,7 @@
|
|||
"stargazers_count": 1784,
|
||||
"watchers_count": 1784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 333,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -225,7 +225,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"forks": 334,
|
||||
"watchers": 1784,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 1784,
|
||||
"watchers_count": 1784,
|
||||
"has_discussions": false,
|
||||
"forks_count": 333,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"forks": 334,
|
||||
"watchers": 1784,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Typesetter CMS文件上传漏洞环境",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:50:02Z",
|
||||
"updated_at": "2023-02-08T09:55:33Z",
|
||||
"updated_at": "2023-09-22T08:27:50Z",
|
||||
"pushed_at": "2022-12-08T06:04:10Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -158,45 +158,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 381984439,
|
||||
"name": "CVE-2021-1675-LPE",
|
||||
"full_name": "hlldz\/CVE-2021-1675-LPE",
|
||||
"owner": {
|
||||
"login": "hlldz",
|
||||
"id": 16455559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
|
||||
"html_url": "https:\/\/github.com\/hlldz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
|
||||
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2023-09-18T19:54:59Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cobaltstrike",
|
||||
"cve-2021-1675",
|
||||
"cve-2021-34527",
|
||||
"exploit",
|
||||
"lpe",
|
||||
"printnightmare",
|
||||
"reflectivedll",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 332,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
{
|
||||
"id": 382024474,
|
||||
"name": "CVE-2021-1675",
|
||||
|
@ -473,156 +434,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 382418030,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "kougyokugentou\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "kougyokugentou",
|
||||
"id": 41278462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
|
||||
"html_url": "https:\/\/github.com\/kougyokugentou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
|
||||
"description": "A small powershell script to disable print spooler service using desired state configuration",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T17:29:04Z",
|
||||
"updated_at": "2021-12-22T20:12:23Z",
|
||||
"pushed_at": "2021-07-02T17:40:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 382425733,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "ptter23\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "ptter23",
|
||||
"id": 55167410,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
|
||||
"html_url": "https:\/\/github.com\/ptter23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
|
||||
"description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T18:01:21Z",
|
||||
"updated_at": "2023-09-16T21:45:37Z",
|
||||
"pushed_at": "2021-07-02T18:07:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 382496518,
|
||||
"name": "cve-2021-1675-printnightmare",
|
||||
"full_name": "initconf\/cve-2021-1675-printnightmare",
|
||||
"owner": {
|
||||
"login": "initconf",
|
||||
"id": 4044729,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
|
||||
"html_url": "https:\/\/github.com\/initconf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
|
||||
"description": "to catch cve-2021-1675-printnightmare",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T01:04:06Z",
|
||||
"updated_at": "2023-09-16T21:45:37Z",
|
||||
"pushed_at": "2021-07-03T01:08:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 382609559,
|
||||
"name": "PrintNightmare",
|
||||
"full_name": "ozergoker\/PrintNightmare",
|
||||
"owner": {
|
||||
"login": "ozergoker",
|
||||
"id": 86879266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
|
||||
"html_url": "https:\/\/github.com\/ozergoker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare",
|
||||
"description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T12:25:21Z",
|
||||
"updated_at": "2023-09-16T21:45:38Z",
|
||||
"pushed_at": "2021-07-03T12:43:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 382815972,
|
||||
"name": "PrintNightmare-CVE-2021-1675",
|
||||
"full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "exploitblizzard",
|
||||
"id": 61627070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
||||
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T09:50:39Z",
|
||||
"updated_at": "2023-09-16T21:45:39Z",
|
||||
"pushed_at": "2021-07-04T09:57:46Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 383128850,
|
||||
"name": "CVE-2021-1675",
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-09-20T08:09:45Z",
|
||||
"updated_at": "2023-09-22T06:55:52Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"stargazers_count": 1096,
|
||||
"watchers_count": 1096,
|
||||
"has_discussions": false,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 1095,
|
||||
"watchers": 1096,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2023-09-16T21:44:40Z",
|
||||
"updated_at": "2023-09-22T10:12:28Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -218,48 +218,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 382641118,
|
||||
"name": "CVE-2021-31166-Exploit",
|
||||
"full_name": "y0g3sh-99\/CVE-2021-31166-Exploit",
|
||||
"owner": {
|
||||
"login": "y0g3sh-99",
|
||||
"id": 59962466,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4",
|
||||
"html_url": "https:\/\/github.com\/y0g3sh-99"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit",
|
||||
"description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T14:54:59Z",
|
||||
"updated_at": "2022-01-18T13:29:37Z",
|
||||
"pushed_at": "2021-07-03T15:27:28Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"accept-encoding",
|
||||
"cve-2021-31166",
|
||||
"dos",
|
||||
"exploit",
|
||||
"http",
|
||||
"kernel",
|
||||
"python3",
|
||||
"rce",
|
||||
"request-header",
|
||||
"vulnerability",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 410758909,
|
||||
"name": "CVE-2021-31166",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2023-09-16T21:41:12Z",
|
||||
"updated_at": "2023-09-22T08:43:21Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
@ -347,10 +347,10 @@
|
|||
"description": "Laravel RCE (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-16T17:22:55Z",
|
||||
"updated_at": "2023-09-16T21:52:56Z",
|
||||
"updated_at": "2023-09-22T07:33:52Z",
|
||||
"pushed_at": "2023-08-16T20:58:53Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -368,7 +368,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -1074,10 +1074,10 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2023-09-20T16:05:49Z",
|
||||
"updated_at": "2023-09-22T07:42:39Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 663,
|
||||
"watchers_count": 663,
|
||||
"stargazers_count": 664,
|
||||
"watchers_count": 664,
|
||||
"has_discussions": false,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
|
@ -1086,7 +1086,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 663,
|
||||
"watchers": 664,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 383067956,
|
||||
"name": "CVE-2021-3281",
|
||||
"full_name": "lwzSoviet\/CVE-2021-3281",
|
||||
"owner": {
|
||||
"login": "lwzSoviet",
|
||||
"id": 30397594,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
|
||||
"html_url": "https:\/\/github.com\/lwzSoviet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T08:25:26Z",
|
||||
"updated_at": "2022-01-31T11:44:07Z",
|
||||
"pushed_at": "2021-07-05T08:47:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -132,36 +132,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 382894525,
|
||||
"name": "CVE-2021-34527-1675",
|
||||
"full_name": "CnOxx1\/CVE-2021-34527-1675",
|
||||
"owner": {
|
||||
"login": "CnOxx1",
|
||||
"id": 86923954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
|
||||
"html_url": "https:\/\/github.com\/CnOxx1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
|
||||
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T16:09:18Z",
|
||||
"updated_at": "2021-09-06T06:08:09Z",
|
||||
"pushed_at": "2021-07-04T16:31:21Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 383207766,
|
||||
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
|
||||
|
|
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-09-21T18:09:30Z",
|
||||
"updated_at": "2023-09-22T09:36:33Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 729,
|
||||
"watchers_count": 729,
|
||||
"stargazers_count": 730,
|
||||
"watchers_count": 730,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 729,
|
||||
"watchers": 730,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 1054,
|
||||
"watchers_count": 1054,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"forks_count": 222,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"forks": 222,
|
||||
"watchers": 1054,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-09-20T08:09:45Z",
|
||||
"updated_at": "2023-09-22T06:55:52Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"stargazers_count": 1096,
|
||||
"watchers_count": 1096,
|
||||
"has_discussions": false,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 1095,
|
||||
"watchers": 1096,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-09-22T03:20:56Z",
|
||||
"updated_at": "2023-09-22T06:45:59Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1038,
|
||||
"watchers_count": 1038,
|
||||
"stargazers_count": 1039,
|
||||
"watchers_count": 1039,
|
||||
"has_discussions": true,
|
||||
"forks_count": 182,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 182,
|
||||
"watchers": 1038,
|
||||
"watchers": 1039,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-32947 walkthough and demo",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T08:21:47Z",
|
||||
"updated_at": "2023-09-22T06:08:12Z",
|
||||
"updated_at": "2023-09-22T10:21:54Z",
|
||||
"pushed_at": "2023-09-18T03:04:48Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 100,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 2.19 - Unauthenticated RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-15T21:38:47Z",
|
||||
"updated_at": "2023-09-17T19:28:30Z",
|
||||
"updated_at": "2023-09-22T11:54:20Z",
|
||||
"pushed_at": "2023-09-16T21:55:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -197,10 +197,10 @@
|
|||
"description": "An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-21T21:22:35Z",
|
||||
"updated_at": "2023-08-27T11:39:26Z",
|
||||
"updated_at": "2023-09-22T09:14:54Z",
|
||||
"pushed_at": "2023-06-21T21:24:52Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 586854096,
|
||||
"name": "CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"full_name": "bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"owner": {
|
||||
"login": "bAuh0lz",
|
||||
"id": 15223611,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15223611?v=4",
|
||||
"html_url": "https:\/\/github.com\/bAuh0lz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
|
||||
"description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T11:44:09Z",
|
||||
"updated_at": "2023-09-16T21:58:19Z",
|
||||
"pushed_at": "2023-01-14T04:40:47Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 601937653,
|
||||
"name": "CVE-2023-0297",
|
||||
|
|
32
2023/CVE-2023-0315.json
Normal file
32
2023/CVE-2023-0315.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 594862535,
|
||||
"name": "CVE-2023-0315",
|
||||
"full_name": "mhaskar\/CVE-2023-0315",
|
||||
"owner": {
|
||||
"login": "mhaskar",
|
||||
"id": 6861215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
|
||||
"html_url": "https:\/\/github.com\/mhaskar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2023-0315",
|
||||
"description": "The official exploit for Froxlor Remote Code Execution CVE-2023-0315",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T21:20:26Z",
|
||||
"updated_at": "2023-02-13T01:56:55Z",
|
||||
"pushed_at": "2023-01-29T21:23:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-21739.json
Normal file
32
2023/CVE-2023-21739.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 591426445,
|
||||
"name": "CVE-2023-21739",
|
||||
"full_name": "gmh5225\/CVE-2023-21739",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2023-21739",
|
||||
"description": "Windows Bluetooth Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-20T18:21:40Z",
|
||||
"updated_at": "2023-02-20T15:28:18Z",
|
||||
"pushed_at": "2023-01-18T23:57:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 587377595,
|
||||
"name": "CVE-2023-21752",
|
||||
"full_name": "Wh04m1001\/CVE-2023-21752",
|
||||
"owner": {
|
||||
"login": "Wh04m1001",
|
||||
"id": 44291883,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
|
||||
"html_url": "https:\/\/github.com\/Wh04m1001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Wh04m1001\/CVE-2023-21752",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2023-09-16T21:58:20Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 289,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 677068156,
|
||||
"name": "CVE-2023-21752",
|
||||
|
|
|
@ -35,5 +35,35 @@
|
|||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 592920759,
|
||||
"name": "CVE-2023-22960",
|
||||
"full_name": "manas3c\/CVE-2023-22960",
|
||||
"owner": {
|
||||
"login": "manas3c",
|
||||
"id": 123151924,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123151924?v=4",
|
||||
"html_url": "https:\/\/github.com\/manas3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/manas3c\/CVE-2023-22960",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T20:23:09Z",
|
||||
"updated_at": "2023-01-24T22:12:37Z",
|
||||
"pushed_at": "2023-01-24T20:23:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 592899217,
|
||||
"name": "CVE-2023-24055",
|
||||
"full_name": "deetl\/CVE-2023-24055",
|
||||
"owner": {
|
||||
"login": "deetl",
|
||||
"id": 50047716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50047716?v=4",
|
||||
"html_url": "https:\/\/github.com\/deetl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/deetl\/CVE-2023-24055",
|
||||
"description": "POC and Scanner for CVE-2023-24055",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T19:19:23Z",
|
||||
"updated_at": "2023-09-16T21:58:28Z",
|
||||
"pushed_at": "2023-01-25T00:04:57Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 593024753,
|
||||
"name": "CVE-2023-24055_PoC",
|
||||
|
|
32
2023/CVE-2023-24059.json
Normal file
32
2023/CVE-2023-24059.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 592223844,
|
||||
"name": "CVE-2023-24059",
|
||||
"full_name": "gmh5225\/CVE-2023-24059",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2023-24059",
|
||||
"description": "Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-23T08:48:08Z",
|
||||
"updated_at": "2023-02-20T16:16:21Z",
|
||||
"pushed_at": "2023-01-22T11:39:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2023-09-08T00:26:20Z",
|
||||
"updated_at": "2023-09-22T11:27:17Z",
|
||||
"pushed_at": "2023-07-14T10:40:17Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-19T14:36:47Z",
|
||||
"updated_at": "2023-09-16T04:23:44Z",
|
||||
"updated_at": "2023-09-22T11:53:57Z",
|
||||
"pushed_at": "2023-06-22T07:19:36Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T04:59:05Z",
|
||||
"updated_at": "2023-09-13T18:03:42Z",
|
||||
"updated_at": "2023-09-22T07:04:06Z",
|
||||
"pushed_at": "2023-09-09T01:20:49Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T03:06:40Z",
|
||||
"updated_at": "2023-09-18T03:34:35Z",
|
||||
"updated_at": "2023-09-22T09:36:49Z",
|
||||
"pushed_at": "2023-05-16T04:34:16Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T20:16:28Z",
|
||||
"updated_at": "2023-09-21T17:32:08Z",
|
||||
"updated_at": "2023-09-22T09:45:23Z",
|
||||
"pushed_at": "2023-09-12T07:52:40Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Cloudpanel 0-day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T09:20:22Z",
|
||||
"updated_at": "2023-09-02T07:50:53Z",
|
||||
"updated_at": "2023-09-22T07:20:42Z",
|
||||
"pushed_at": "2023-07-24T01:43:17Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-16T09:11:21Z",
|
||||
"updated_at": "2023-09-21T19:20:36Z",
|
||||
"updated_at": "2023-09-22T09:20:32Z",
|
||||
"pushed_at": "2023-09-17T09:14:32Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 37,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-20T12:43:23Z",
|
||||
"updated_at": "2023-09-20T12:43:23Z",
|
||||
"pushed_at": "2023-09-20T12:51:09Z",
|
||||
"pushed_at": "2023-09-22T07:19:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-08-23T11:34:30Z",
|
||||
"updated_at": "2023-09-21T20:11:20Z",
|
||||
"pushed_at": "2023-09-16T18:53:09Z",
|
||||
"pushed_at": "2023-09-22T12:20:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-09-22T06:34:48Z",
|
||||
"updated_at": "2023-09-22T10:32:16Z",
|
||||
"pushed_at": "2023-09-22T04:31:47Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 16,
|
||||
"forks": 3,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
67
README.md
67
README.md
|
@ -57,10 +57,18 @@
|
|||
<code>Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
|
||||
</code>
|
||||
|
||||
- [bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad](https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad)
|
||||
- [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297)
|
||||
- [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297)
|
||||
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
|
||||
|
||||
### CVE-2023-0315 (2023-01-15)
|
||||
|
||||
<code>Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
|
||||
</code>
|
||||
|
||||
- [mhaskar/CVE-2023-0315](https://github.com/mhaskar/CVE-2023-0315)
|
||||
|
||||
### CVE-2023-0386 (2023-03-22)
|
||||
|
||||
<code>A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
|
||||
|
@ -794,6 +802,13 @@
|
|||
- [JMousqueton/CVE-2023-21716](https://github.com/JMousqueton/CVE-2023-21716)
|
||||
- [Lord-of-the-IoT/CVE-2023-21716](https://github.com/Lord-of-the-IoT/CVE-2023-21716)
|
||||
|
||||
### CVE-2023-21739 (2023-01-10)
|
||||
|
||||
<code>Windows Bluetooth Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-21739](https://github.com/gmh5225/CVE-2023-21739)
|
||||
|
||||
### CVE-2023-21742 (2023-01-10)
|
||||
|
||||
<code>Microsoft SharePoint Server Remote Code Execution Vulnerability
|
||||
|
@ -813,6 +828,7 @@
|
|||
<code>Windows Backup Service Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Wh04m1001/CVE-2023-21752](https://github.com/Wh04m1001/CVE-2023-21752)
|
||||
- [yosef0x01/CVE-2023-21752](https://github.com/yosef0x01/CVE-2023-21752)
|
||||
|
||||
### CVE-2023-21766 (2023-01-10)
|
||||
|
@ -950,6 +966,7 @@
|
|||
</code>
|
||||
|
||||
- [t3l3machus/CVE-2023-22960](https://github.com/t3l3machus/CVE-2023-22960)
|
||||
- [manas3c/CVE-2023-22960](https://github.com/manas3c/CVE-2023-22960)
|
||||
|
||||
### CVE-2023-22974 (2023-02-22)
|
||||
|
||||
|
@ -1103,6 +1120,7 @@
|
|||
<code>** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
|
||||
</code>
|
||||
|
||||
- [deetl/CVE-2023-24055](https://github.com/deetl/CVE-2023-24055)
|
||||
- [alt3kx/CVE-2023-24055_PoC](https://github.com/alt3kx/CVE-2023-24055_PoC)
|
||||
- [Cyb3rtus/keepass_CVE-2023-24055_yara_rule](https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule)
|
||||
- [ATTACKnDEFEND/CVE-2023-24055](https://github.com/ATTACKnDEFEND/CVE-2023-24055)
|
||||
|
@ -1110,6 +1128,13 @@
|
|||
- [digital-dev/KeePass-TriggerLess](https://github.com/digital-dev/KeePass-TriggerLess)
|
||||
- [zwlsix/KeePass-CVE-2023-24055](https://github.com/zwlsix/KeePass-CVE-2023-24055)
|
||||
|
||||
### CVE-2023-24059 (2023-01-22)
|
||||
|
||||
<code>Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2023-24059](https://github.com/gmh5225/CVE-2023-24059)
|
||||
|
||||
### CVE-2023-24078 (2023-02-17)
|
||||
|
||||
<code>Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
|
||||
|
@ -10192,7 +10217,6 @@
|
|||
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
|
||||
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
|
||||
- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP)
|
||||
- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
|
||||
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
|
||||
- [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare)
|
||||
- [tanarchytan/CVE-2021-1675](https://github.com/tanarchytan/CVE-2021-1675)
|
||||
|
@ -10202,11 +10226,6 @@
|
|||
- [mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery](https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery)
|
||||
- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare)
|
||||
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
|
||||
- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675)
|
||||
- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675)
|
||||
- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare)
|
||||
- [ozergoker/PrintNightmare](https://github.com/ozergoker/PrintNightmare)
|
||||
- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
|
||||
- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
|
||||
- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
|
||||
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
|
||||
|
@ -10579,13 +10598,6 @@
|
|||
|
||||
- [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279)
|
||||
|
||||
### CVE-2021-3281 (2021-02-02)
|
||||
|
||||
<code>In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
|
||||
</code>
|
||||
|
||||
- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
|
||||
|
||||
### CVE-2021-3291 (2021-01-26)
|
||||
|
||||
<code>Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
|
||||
|
@ -12774,7 +12786,6 @@
|
|||
- [zecopro/CVE-2021-31166](https://github.com/zecopro/CVE-2021-31166)
|
||||
- [bgsilvait/WIn-CVE-2021-31166](https://github.com/bgsilvait/WIn-CVE-2021-31166)
|
||||
- [Udyz/CVE-2021-31166](https://github.com/Udyz/CVE-2021-31166)
|
||||
- [y0g3sh-99/CVE-2021-31166-Exploit](https://github.com/y0g3sh-99/CVE-2021-31166-Exploit)
|
||||
- [antx-code/CVE-2021-31166](https://github.com/antx-code/CVE-2021-31166)
|
||||
- [imikoYa/CVE-2021-31166-exploit](https://github.com/imikoYa/CVE-2021-31166-exploit)
|
||||
- [mauricelambert/CVE-2021-31166](https://github.com/mauricelambert/CVE-2021-31166)
|
||||
|
@ -13240,7 +13251,6 @@
|
|||
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
|
||||
- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527)
|
||||
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
|
||||
- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
|
||||
- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
|
||||
- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
|
||||
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
|
||||
|
@ -28515,6 +28525,7 @@
|
|||
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
|
||||
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
|
||||
- [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881)
|
||||
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
|
||||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
|
@ -28723,6 +28734,8 @@
|
|||
</code>
|
||||
|
||||
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
|
||||
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
|
||||
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
|
||||
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
|
||||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
|
@ -28913,6 +28926,7 @@
|
|||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
|
||||
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
|
||||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||
|
@ -29246,6 +29260,13 @@
|
|||
|
||||
- [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE)
|
||||
|
||||
### CVE-2017-9097 (2017-06-15)
|
||||
|
||||
<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
|
||||
</code>
|
||||
|
||||
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
|
||||
|
||||
### CVE-2017-9101 (2017-05-21)
|
||||
|
||||
<code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
|
||||
|
@ -29477,6 +29498,7 @@
|
|||
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
|
||||
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
|
||||
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
|
||||
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
|
||||
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
|
||||
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
|
||||
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
|
||||
|
@ -30088,6 +30110,13 @@
|
|||
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
|
||||
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
|
||||
|
||||
### CVE-2017-16997 (2017-12-17)
|
||||
|
||||
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
|
||||
</code>
|
||||
|
||||
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
|
||||
|
||||
### CVE-2017-17058 (2017-11-29)
|
||||
|
||||
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code.
|
||||
|
@ -30142,6 +30171,13 @@
|
|||
- [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit)
|
||||
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
|
||||
|
||||
### CVE-2017-17692 (2017-12-21)
|
||||
|
||||
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
|
||||
</code>
|
||||
|
||||
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
|
||||
|
||||
### CVE-2017-17736 (2018-03-23)
|
||||
|
||||
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
|
||||
|
@ -30279,6 +30315,7 @@
|
|||
<code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
|
||||
</code>
|
||||
|
||||
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
|
||||
- [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253)
|
||||
|
||||
### CVE-2017-1000353 (2018-01-29)
|
||||
|
|
Loading…
Reference in a new issue