mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/11/23 12:39:02
This commit is contained in:
parent
e9c925de55
commit
1d813fe401
52 changed files with 177 additions and 708 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-22T07:51:15Z",
|
||||
"updated_at": "2023-11-23T06:31:53Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"stargazers_count": 1838,
|
||||
"watchers_count": 1838,
|
||||
"has_discussions": false,
|
||||
"forks_count": 337,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 337,
|
||||
"watchers": 1837,
|
||||
"watchers": 1838,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-02T12:18:57Z",
|
||||
"updated_at": "2023-10-15T13:01:52Z",
|
||||
"updated_at": "2023-11-23T07:14:46Z",
|
||||
"pushed_at": "2019-08-13T07:14:01Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-22T07:51:15Z",
|
||||
"updated_at": "2023-11-23T06:31:53Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"stargazers_count": 1838,
|
||||
"watchers_count": 1838,
|
||||
"has_discussions": false,
|
||||
"forks_count": 337,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 337,
|
||||
"watchers": 1837,
|
||||
"watchers": 1838,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -55,7 +55,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-20T02:02:10Z",
|
||||
"updated_at": "2023-11-21T03:38:27Z",
|
||||
"pushed_at": "2023-11-20T02:29:31Z",
|
||||
"pushed_at": "2023-11-23T07:35:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -154,36 +154,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116589306,
|
||||
"name": "diff",
|
||||
"full_name": "sigbitsadmin\/diff",
|
||||
"owner": {
|
||||
"login": "sigbitsadmin",
|
||||
"id": 33204560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204560?v=4",
|
||||
"html_url": "https:\/\/github.com\/sigbitsadmin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sigbitsadmin\/diff",
|
||||
"description": "Simply diff for CVE-2017-0785",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T18:30:42Z",
|
||||
"updated_at": "2018-01-07T18:31:03Z",
|
||||
"pushed_at": "2018-01-07T18:31:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 122293991,
|
||||
"name": "Bluetooth-Crash-CVE-2017-0785",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 137769369,
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"owner": {
|
||||
"login": "RicterZ",
|
||||
"id": 5282759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicterZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T15:22:01Z",
|
||||
"updated_at": "2023-06-01T08:36:39Z",
|
||||
"pushed_at": "2017-11-01T07:59:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 552591833,
|
||||
"name": "CVE-2017-1000253",
|
||||
|
|
|
@ -149,36 +149,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116099094,
|
||||
"name": "weblogic_wls_wsat_rce",
|
||||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||||
"owner": {
|
||||
"login": "cjjduck",
|
||||
"id": 23519154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
|
||||
"html_url": "https:\/\/github.com\/cjjduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-10-09T02:33:00Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116430643,
|
||||
"name": "CVE-2017-10271",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116118639,
|
||||
"name": "CVE-2017-16997-poc",
|
||||
"full_name": "Xiami2012\/CVE-2017-16997-poc",
|
||||
"owner": {
|
||||
"login": "Xiami2012",
|
||||
"id": 1927254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xiami2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
|
||||
"description": "A proof-of-concept for CVE-2017-16997",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T09:31:55Z",
|
||||
"updated_at": "2018-01-03T09:33:01Z",
|
||||
"pushed_at": "2018-01-03T10:39:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116205741,
|
||||
"name": "CVE-2017-17692",
|
||||
"full_name": "specloli\/CVE-2017-17692",
|
||||
"owner": {
|
||||
"login": "specloli",
|
||||
"id": 10647366,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
|
||||
"html_url": "https:\/\/github.com\/specloli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T02:40:13Z",
|
||||
"updated_at": "2021-11-23T15:08:43Z",
|
||||
"pushed_at": "2018-01-02T13:58:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-22T07:51:15Z",
|
||||
"updated_at": "2023-11-23T06:31:53Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"stargazers_count": 1838,
|
||||
"watchers_count": 1838,
|
||||
"has_discussions": false,
|
||||
"forks_count": 337,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 337,
|
||||
"watchers": 1837,
|
||||
"watchers": 1838,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -118,35 +118,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 115962692,
|
||||
"name": "CVE-2017-3881",
|
||||
"full_name": "1337g\/CVE-2017-3881",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
|
||||
"description": "credit to artkond",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T01:45:15Z",
|
||||
"updated_at": "2022-04-11T12:16:38Z",
|
||||
"pushed_at": "2018-01-02T01:46:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,39 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 116768537,
|
||||
"name": "exploit-cve-2017-5715",
|
||||
"full_name": "opsxcq\/exploit-cve-2017-5715",
|
||||
"owner": {
|
||||
"login": "opsxcq",
|
||||
"id": 16995025,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
|
||||
"html_url": "https:\/\/github.com\/opsxcq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
|
||||
"description": "Spectre exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T05:06:12Z",
|
||||
"updated_at": "2023-03-10T11:59:44Z",
|
||||
"pushed_at": "2018-01-09T22:27:25Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"intelbug",
|
||||
"memory-leak",
|
||||
"spectre"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 117425769,
|
||||
"name": "meltdown-spectre-bios-list",
|
||||
|
|
|
@ -1,130 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 116195445,
|
||||
"name": "spectre-attack",
|
||||
"full_name": "Eugnis\/spectre-attack",
|
||||
"owner": {
|
||||
"login": "Eugnis",
|
||||
"id": 2463830,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2463830?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eugnis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eugnis\/spectre-attack",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2023-11-13T01:49:46Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 733,
|
||||
"watchers_count": 733,
|
||||
"has_discussions": false,
|
||||
"forks_count": 183,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"c",
|
||||
"example",
|
||||
"exploit",
|
||||
"security-vulnerability",
|
||||
"spectre"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 183,
|
||||
"watchers": 733,
|
||||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
{
|
||||
"id": 116268310,
|
||||
"name": "Spectre-PoC",
|
||||
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"owner": {
|
||||
"login": "EdwardOwusuAdjei",
|
||||
"id": 16462560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T14:20:13Z",
|
||||
"updated_at": "2023-09-28T10:47:11Z",
|
||||
"pushed_at": "2018-01-04T14:27:29Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 116347505,
|
||||
"name": "spectre-attack-example",
|
||||
"full_name": "poilynx\/spectre-attack-example",
|
||||
"owner": {
|
||||
"login": "poilynx",
|
||||
"id": 8926090,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
|
||||
"html_url": "https:\/\/github.com\/poilynx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
|
||||
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T05:51:34Z",
|
||||
"updated_at": "2021-02-24T01:25:15Z",
|
||||
"pushed_at": "2018-01-05T05:56:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
"full_name": "pedrolucasoliva\/spectre-attack-demo",
|
||||
"owner": {
|
||||
"login": "pedrolucasoliva",
|
||||
"id": 10757421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T01:08:15Z",
|
||||
"updated_at": "2018-01-15T06:12:51Z",
|
||||
"pushed_at": "2018-01-06T01:09:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 116505944,
|
||||
"name": "spectreScope",
|
||||
|
@ -176,36 +50,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 116532057,
|
||||
"name": "cve-2017-5753",
|
||||
"full_name": "albertleecn\/cve-2017-5753",
|
||||
"owner": {
|
||||
"login": "albertleecn",
|
||||
"id": 4608961,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4",
|
||||
"html_url": "https:\/\/github.com\/albertleecn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753",
|
||||
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-07T02:46:38Z",
|
||||
"updated_at": "2021-03-31T12:50:11Z",
|
||||
"pushed_at": "2018-01-06T13:06:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 263311084,
|
||||
"name": "Spectre-Vulnerability-CVE-2017-5753-",
|
||||
|
|
|
@ -119,36 +119,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
{
|
||||
"id": 116449314,
|
||||
"name": "Am-I-affected-by-Meltdown",
|
||||
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
|
||||
"owner": {
|
||||
"login": "speecyy",
|
||||
"id": 35145287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
|
||||
"html_url": "https:\/\/github.com\/speecyy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
|
||||
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T03:16:33Z",
|
||||
"updated_at": "2020-02-27T19:31:43Z",
|
||||
"pushed_at": "2018-01-06T03:17:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 118008705,
|
||||
"name": "Meltdown",
|
||||
|
|
|
@ -394,36 +394,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 201442014,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "ThanHuuTuan\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "ThanHuuTuan",
|
||||
"id": 32167814,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T10:01:50Z",
|
||||
"updated_at": "2019-08-09T10:01:53Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 116858521,
|
||||
"name": "CVE-2017-8570",
|
||||
"full_name": "rxwx\/CVE-2017-8570",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/CVE-2017-8570",
|
||||
"description": "Proof of Concept exploit for CVE-2017-8570",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T19:09:33Z",
|
||||
"updated_at": "2023-09-28T10:47:21Z",
|
||||
"pushed_at": "2018-01-09T19:23:43Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"has_discussions": false,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 184,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
{
|
||||
"id": 122914059,
|
||||
"name": "Office-CVE-2017-8570",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 116008243,
|
||||
"name": "AntiWeb_testing-Suite",
|
||||
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"owner": {
|
||||
"login": "MDudek-ICS",
|
||||
"id": 31083304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T11:28:40Z",
|
||||
"updated_at": "2023-09-28T10:47:07Z",
|
||||
"pushed_at": "2017-11-21T20:19:08Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-22T07:51:15Z",
|
||||
"updated_at": "2023-11-23T06:31:53Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"stargazers_count": 1838,
|
||||
"watchers_count": 1838,
|
||||
"has_discussions": false,
|
||||
"forks_count": 337,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 337,
|
||||
"watchers": 1837,
|
||||
"watchers": 1838,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE exploitation for WebKit jsc",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-07T05:13:34Z",
|
||||
"updated_at": "2023-08-07T05:15:55Z",
|
||||
"updated_at": "2023-11-23T06:53:41Z",
|
||||
"pushed_at": "2023-08-07T05:14:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1841,10 +1841,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2023-11-22T10:31:18Z",
|
||||
"updated_at": "2023-11-23T06:17:41Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1153,
|
||||
"watchers_count": 1153,
|
||||
"stargazers_count": 1154,
|
||||
"watchers_count": 1154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
|
@ -1853,7 +1853,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 1153,
|
||||
"watchers": 1154,
|
||||
"score": 0,
|
||||
"subscribers_count": 69
|
||||
},
|
||||
|
|
|
@ -355,10 +355,10 @@
|
|||
"description": "Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-28T02:34:31Z",
|
||||
"updated_at": "2023-11-21T03:02:56Z",
|
||||
"updated_at": "2023-11-23T07:06:47Z",
|
||||
"pushed_at": "2022-03-19T14:07:35Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -376,7 +376,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-22T07:51:15Z",
|
||||
"updated_at": "2023-11-23T06:31:53Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"stargazers_count": 1838,
|
||||
"watchers_count": 1838,
|
||||
"has_discussions": false,
|
||||
"forks_count": 337,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 337,
|
||||
"watchers": 1837,
|
||||
"watchers": 1838,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -253,10 +253,10 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2023-09-28T11:02:46Z",
|
||||
"updated_at": "2023-11-23T10:43:11Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -265,7 +265,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-11-22T07:51:15Z",
|
||||
"updated_at": "2023-11-23T06:31:53Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1837,
|
||||
"watchers_count": 1837,
|
||||
"stargazers_count": 1838,
|
||||
"watchers_count": 1838,
|
||||
"has_discussions": false,
|
||||
"forks_count": 337,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 337,
|
||||
"watchers": 1837,
|
||||
"watchers": 1838,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -108,10 +108,10 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2023-10-30T09:43:18Z",
|
||||
"updated_at": "2023-11-23T06:22:24Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 533,
|
||||
"watchers_count": 533,
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 533,
|
||||
"watchers": 532,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T22:48:11Z",
|
||||
"updated_at": "2023-09-28T11:31:06Z",
|
||||
"updated_at": "2023-11-23T07:05:04Z",
|
||||
"pushed_at": "2021-09-03T22:50:08Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2023-11-20T10:05:11Z",
|
||||
"updated_at": "2023-11-23T09:29:59Z",
|
||||
"pushed_at": "2023-06-11T08:47:04Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -618,10 +618,10 @@
|
|||
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T20:20:45Z",
|
||||
"updated_at": "2023-11-11T22:36:15Z",
|
||||
"updated_at": "2023-11-23T08:10:58Z",
|
||||
"pushed_at": "2022-12-17T16:10:46Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -630,7 +630,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"wifi-camera"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -374,7 +374,7 @@
|
|||
"stargazers_count": 1077,
|
||||
"watchers_count": 1077,
|
||||
"has_discussions": false,
|
||||
"forks_count": 515,
|
||||
"forks_count": 516,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -382,7 +382,7 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 515,
|
||||
"forks": 516,
|
||||
"watchers": 1077,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
|
@ -3703,10 +3703,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-11-20T02:03:10Z",
|
||||
"updated_at": "2023-11-23T06:56:10Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3317,
|
||||
"watchers_count": 3317,
|
||||
"stargazers_count": 3318,
|
||||
"watchers_count": 3318,
|
||||
"has_discussions": true,
|
||||
"forks_count": 749,
|
||||
"allow_forking": true,
|
||||
|
@ -3715,7 +3715,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 749,
|
||||
"watchers": 3317,
|
||||
"watchers": 3318,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
@ -10215,10 +10215,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2023-11-22T09:12:00Z",
|
||||
"updated_at": "2023-11-23T09:14:41Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -10232,7 +10232,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-22T17:35:38Z",
|
||||
"updated_at": "2023-09-28T11:37:16Z",
|
||||
"updated_at": "2023-11-23T07:20:28Z",
|
||||
"pushed_at": "2022-03-22T17:47:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -678,13 +678,13 @@
|
|||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -158,10 +158,10 @@
|
|||
"description": "CVE-2022-26134 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T13:59:19Z",
|
||||
"updated_at": "2023-09-28T11:39:23Z",
|
||||
"updated_at": "2023-11-23T10:06:22Z",
|
||||
"pushed_at": "2022-06-06T16:38:49Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -174,7 +174,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 152,
|
||||
"watchers": 151,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-10T17:52:31Z",
|
||||
"updated_at": "2023-02-13T01:43:11Z",
|
||||
"updated_at": "2023-11-23T12:06:19Z",
|
||||
"pushed_at": "2023-01-13T08:39:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-24T06:00:47Z",
|
||||
"updated_at": "2023-11-07T18:04:30Z",
|
||||
"updated_at": "2023-11-23T06:36:03Z",
|
||||
"pushed_at": "2023-06-18T14:43:52Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -321,10 +321,10 @@
|
|||
"description": "CobaltStrike <= 4.7.1 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T11:46:01Z",
|
||||
"updated_at": "2023-11-20T21:56:27Z",
|
||||
"updated_at": "2023-11-23T09:41:05Z",
|
||||
"pushed_at": "2022-10-25T05:32:54Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -333,7 +333,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 355,
|
||||
"watchers": 356,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-23T15:58:18Z",
|
||||
"updated_at": "2023-08-23T18:41:47Z",
|
||||
"updated_at": "2023-11-23T06:55:16Z",
|
||||
"pushed_at": "2023-06-10T14:28:43Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 33,
|
||||
"forks": 17,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-23T10:04:58Z",
|
||||
"updated_at": "2023-10-20T02:54:37Z",
|
||||
"updated_at": "2023-11-23T11:35:55Z",
|
||||
"pushed_at": "2023-03-14T08:41:51Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 101,
|
||||
"watchers": 102,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -626,10 +626,10 @@
|
|||
"description": "CVE-2023-20198 Exploit PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T16:39:38Z",
|
||||
"updated_at": "2023-11-22T14:53:16Z",
|
||||
"updated_at": "2023-11-23T08:43:51Z",
|
||||
"pushed_at": "2023-11-17T15:16:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -638,7 +638,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -111,10 +111,10 @@
|
|||
"description": "Windows_AFD_LPE_CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-13T20:32:50Z",
|
||||
"updated_at": "2023-11-23T04:36:58Z",
|
||||
"updated_at": "2023-11-23T07:57:04Z",
|
||||
"pushed_at": "2023-08-27T10:41:40Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T23:41:27Z",
|
||||
"updated_at": "2023-11-23T02:14:18Z",
|
||||
"updated_at": "2023-11-23T08:06:42Z",
|
||||
"pushed_at": "2023-11-18T22:54:27Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 53,
|
||||
"forks": 7,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-19T14:36:47Z",
|
||||
"updated_at": "2023-09-22T11:53:57Z",
|
||||
"updated_at": "2023-11-23T10:43:23Z",
|
||||
"pushed_at": "2023-10-20T13:23:59Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "POC FortiOS SSL-VPN buffer overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T03:25:19Z",
|
||||
"updated_at": "2023-11-22T08:30:42Z",
|
||||
"updated_at": "2023-11-23T11:47:13Z",
|
||||
"pushed_at": "2023-06-16T03:28:34Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 20,
|
||||
"forks": 15,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T21:13:13Z",
|
||||
"updated_at": "2023-10-31T15:14:38Z",
|
||||
"updated_at": "2023-11-23T08:47:40Z",
|
||||
"pushed_at": "2023-05-05T21:15:24Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 68,
|
||||
"forks": 13,
|
||||
"watchers": 69,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T07:41:23Z",
|
||||
"updated_at": "2023-11-23T00:47:45Z",
|
||||
"updated_at": "2023-11-23T10:50:33Z",
|
||||
"pushed_at": "2023-11-12T00:42:29Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 132,
|
||||
"watchers": 133,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-12T18:33:57Z",
|
||||
"updated_at": "2023-11-23T03:19:42Z",
|
||||
"updated_at": "2023-11-23T10:51:59Z",
|
||||
"pushed_at": "2023-09-07T08:37:04Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2023-11-22T16:53:40Z",
|
||||
"updated_at": "2023-11-23T11:59:34Z",
|
||||
"pushed_at": "2023-11-21T10:45:58Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 60,
|
||||
"forks": 21,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,19 +43,19 @@
|
|||
"description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-19T22:20:10Z",
|
||||
"updated_at": "2023-11-22T10:48:56Z",
|
||||
"updated_at": "2023-11-23T09:39:25Z",
|
||||
"pushed_at": "2023-11-20T01:02:44Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 24,
|
||||
"forks": 19,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -312,10 +312,10 @@
|
|||
"description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-10T08:38:51Z",
|
||||
"updated_at": "2023-11-10T16:07:42Z",
|
||||
"updated_at": "2023-11-23T06:47:54Z",
|
||||
"pushed_at": "2023-11-10T08:39:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -331,7 +331,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T07:03:06Z",
|
||||
"updated_at": "2023-11-23T05:11:03Z",
|
||||
"updated_at": "2023-11-23T10:09:24Z",
|
||||
"pushed_at": "2023-11-17T07:19:11Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "PoC for the CVE-2023-49103",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-22T17:00:23Z",
|
||||
"updated_at": "2023-11-22T17:04:39Z",
|
||||
"updated_at": "2023-11-23T06:43:54Z",
|
||||
"pushed_at": "2023-11-22T17:04:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 155,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -257,10 +257,10 @@
|
|||
"description": "Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T07:44:16Z",
|
||||
"updated_at": "2023-11-22T14:59:38Z",
|
||||
"updated_at": "2023-11-23T07:10:27Z",
|
||||
"pushed_at": "2023-10-18T04:59:50Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -269,7 +269,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
34
README.md
34
README.md
|
@ -30709,7 +30709,6 @@
|
|||
- [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC)
|
||||
- [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785)
|
||||
- [pieterbork/blueborne](https://github.com/pieterbork/blueborne)
|
||||
- [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff)
|
||||
- [RavSS/Bluetooth-Crash-CVE-2017-0785](https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785)
|
||||
- [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn)
|
||||
- [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785)
|
||||
|
@ -30898,7 +30897,6 @@
|
|||
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
|
||||
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
|
||||
- [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881)
|
||||
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
|
||||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
|
@ -31087,7 +31085,6 @@
|
|||
<code>Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
|
||||
</code>
|
||||
|
||||
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
|
||||
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
|
||||
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
|
||||
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
|
||||
|
@ -31104,12 +31101,7 @@
|
|||
<code>Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
|
||||
</code>
|
||||
|
||||
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
|
||||
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
|
||||
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
|
||||
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
|
||||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
|
||||
|
||||
### CVE-2017-5754 (2018-01-04)
|
||||
|
@ -31120,7 +31112,6 @@
|
|||
- [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck)
|
||||
- [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown)
|
||||
- [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown)
|
||||
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
|
||||
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
|
||||
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
|
||||
|
||||
|
@ -31298,7 +31289,6 @@
|
|||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
|
||||
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
|
||||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||
|
@ -31540,7 +31530,6 @@
|
|||
</code>
|
||||
|
||||
- [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator)
|
||||
- [rxwx/CVE-2017-8570](https://github.com/rxwx/CVE-2017-8570)
|
||||
- [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570)
|
||||
- [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570)
|
||||
- [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570)
|
||||
|
@ -31642,13 +31631,6 @@
|
|||
|
||||
- [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE)
|
||||
|
||||
### CVE-2017-9097 (2017-06-15)
|
||||
|
||||
<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
|
||||
</code>
|
||||
|
||||
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
|
||||
|
||||
### CVE-2017-9101 (2017-05-21)
|
||||
|
||||
<code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
|
||||
|
@ -31880,7 +31862,6 @@
|
|||
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
|
||||
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
|
||||
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
|
||||
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
|
||||
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
|
||||
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
|
||||
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
|
||||
|
@ -32514,13 +32495,6 @@
|
|||
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
|
||||
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
|
||||
|
||||
### CVE-2017-16997 (2017-12-17)
|
||||
|
||||
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
|
||||
</code>
|
||||
|
||||
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
|
||||
|
||||
### CVE-2017-17058 (2017-11-29)
|
||||
|
||||
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code.
|
||||
|
@ -32575,13 +32549,6 @@
|
|||
- [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit)
|
||||
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
|
||||
|
||||
### CVE-2017-17692 (2017-12-21)
|
||||
|
||||
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
|
||||
</code>
|
||||
|
||||
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
|
||||
|
||||
### CVE-2017-17736 (2018-03-23)
|
||||
|
||||
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
|
||||
|
@ -32719,7 +32686,6 @@
|
|||
<code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
|
||||
</code>
|
||||
|
||||
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
|
||||
- [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253)
|
||||
|
||||
### CVE-2017-1000353 (2018-01-29)
|
||||
|
|
Loading…
Reference in a new issue