Auto Update 2023/11/23 12:39:02

This commit is contained in:
motikan2010-bot 2023-11-23 21:39:02 +09:00
parent e9c925de55
commit 1d813fe401
52 changed files with 177 additions and 708 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-22T07:51:15Z",
"updated_at": "2023-11-23T06:31:53Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
"fork": false,
"created_at": "2016-05-02T12:18:57Z",
"updated_at": "2023-10-15T13:01:52Z",
"updated_at": "2023-11-23T07:14:46Z",
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-22T07:51:15Z",
"updated_at": "2023-11-23T06:31:53Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 34
},

View file

@ -55,7 +55,7 @@
"fork": false,
"created_at": "2023-11-20T02:02:10Z",
"updated_at": "2023-11-21T03:38:27Z",
"pushed_at": "2023-11-20T02:29:31Z",
"pushed_at": "2023-11-23T07:35:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -154,36 +154,6 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 116589306,
"name": "diff",
"full_name": "sigbitsadmin\/diff",
"owner": {
"login": "sigbitsadmin",
"id": 33204560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33204560?v=4",
"html_url": "https:\/\/github.com\/sigbitsadmin"
},
"html_url": "https:\/\/github.com\/sigbitsadmin\/diff",
"description": "Simply diff for CVE-2017-0785",
"fork": false,
"created_at": "2018-01-07T18:30:42Z",
"updated_at": "2018-01-07T18:31:03Z",
"pushed_at": "2018-01-07T18:31:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 122293991,
"name": "Bluetooth-Crash-CVE-2017-0785",

View file

@ -1,34 +1,4 @@
[
{
"id": 137769369,
"name": "PIE-Stack-Clash-CVE-2017-1000253",
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
"owner": {
"login": "RicterZ",
"id": 5282759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
"html_url": "https:\/\/github.com\/RicterZ"
},
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
"description": "Demo-ing CVE-2017-1000253 in a container",
"fork": false,
"created_at": "2018-06-18T15:22:01Z",
"updated_at": "2023-06-01T08:36:39Z",
"pushed_at": "2017-11-01T07:59:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 552591833,
"name": "CVE-2017-1000253",

View file

@ -149,36 +149,6 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 116099094,
"name": "weblogic_wls_wsat_rce",
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
"owner": {
"login": "cjjduck",
"id": 23519154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
"html_url": "https:\/\/github.com\/cjjduck"
},
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-10-09T02:33:00Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 116430643,
"name": "CVE-2017-10271",

View file

@ -1,32 +0,0 @@
[
{
"id": 116118639,
"name": "CVE-2017-16997-poc",
"full_name": "Xiami2012\/CVE-2017-16997-poc",
"owner": {
"login": "Xiami2012",
"id": 1927254,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
"html_url": "https:\/\/github.com\/Xiami2012"
},
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
"description": "A proof-of-concept for CVE-2017-16997",
"fork": false,
"created_at": "2018-01-03T09:31:55Z",
"updated_at": "2018-01-03T09:33:01Z",
"pushed_at": "2018-01-03T10:39:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 116205741,
"name": "CVE-2017-17692",
"full_name": "specloli\/CVE-2017-17692",
"owner": {
"login": "specloli",
"id": 10647366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
"html_url": "https:\/\/github.com\/specloli"
},
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
"description": null,
"fork": false,
"created_at": "2018-01-04T02:40:13Z",
"updated_at": "2021-11-23T15:08:43Z",
"pushed_at": "2018-01-02T13:58:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-22T07:51:15Z",
"updated_at": "2023-11-23T06:31:53Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 337,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 34
},

View file

@ -118,35 +118,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 115962692,
"name": "CVE-2017-3881",
"full_name": "1337g\/CVE-2017-3881",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
"description": "credit to artkond",
"fork": false,
"created_at": "2018-01-02T01:45:15Z",
"updated_at": "2022-04-11T12:16:38Z",
"pushed_at": "2018-01-02T01:46:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,39 +1,4 @@
[
{
"id": 116768537,
"name": "exploit-cve-2017-5715",
"full_name": "opsxcq\/exploit-cve-2017-5715",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
"description": "Spectre exploit",
"fork": false,
"created_at": "2018-01-09T05:06:12Z",
"updated_at": "2023-03-10T11:59:44Z",
"pushed_at": "2018-01-09T22:27:25Z",
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"intelbug",
"memory-leak",
"spectre"
],
"visibility": "public",
"forks": 19,
"watchers": 52,
"score": 0,
"subscribers_count": 4
},
{
"id": 117425769,
"name": "meltdown-spectre-bios-list",

View file

@ -1,130 +1,4 @@
[
{
"id": 116195445,
"name": "spectre-attack",
"full_name": "Eugnis\/spectre-attack",
"owner": {
"login": "Eugnis",
"id": 2463830,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2463830?v=4",
"html_url": "https:\/\/github.com\/Eugnis"
},
"html_url": "https:\/\/github.com\/Eugnis\/spectre-attack",
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2023-11-13T01:49:46Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 733,
"watchers_count": 733,
"has_discussions": false,
"forks_count": 183,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"c",
"example",
"exploit",
"security-vulnerability",
"spectre"
],
"visibility": "public",
"forks": 183,
"watchers": 733,
"score": 0,
"subscribers_count": 41
},
{
"id": 116268310,
"name": "Spectre-PoC",
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
"owner": {
"login": "EdwardOwusuAdjei",
"id": 16462560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
},
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
"fork": false,
"created_at": "2018-01-04T14:20:13Z",
"updated_at": "2023-09-28T10:47:11Z",
"pushed_at": "2018-01-04T14:27:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 3
},
{
"id": 116347505,
"name": "spectre-attack-example",
"full_name": "poilynx\/spectre-attack-example",
"owner": {
"login": "poilynx",
"id": 8926090,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
"html_url": "https:\/\/github.com\/poilynx"
},
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
"fork": false,
"created_at": "2018-01-05T05:51:34Z",
"updated_at": "2021-02-24T01:25:15Z",
"pushed_at": "2018-01-05T05:56:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 116442461,
"name": "spectre-attack-demo",
"full_name": "pedrolucasoliva\/spectre-attack-demo",
"owner": {
"login": "pedrolucasoliva",
"id": 10757421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
"html_url": "https:\/\/github.com\/pedrolucasoliva"
},
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-06T01:08:15Z",
"updated_at": "2018-01-15T06:12:51Z",
"pushed_at": "2018-01-06T01:09:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 116505944,
"name": "spectreScope",
@ -176,36 +50,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 116532057,
"name": "cve-2017-5753",
"full_name": "albertleecn\/cve-2017-5753",
"owner": {
"login": "albertleecn",
"id": 4608961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4",
"html_url": "https:\/\/github.com\/albertleecn"
},
"html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753",
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
"fork": false,
"created_at": "2018-01-07T02:46:38Z",
"updated_at": "2021-03-31T12:50:11Z",
"pushed_at": "2018-01-06T13:06:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 263311084,
"name": "Spectre-Vulnerability-CVE-2017-5753-",

View file

@ -119,36 +119,6 @@
"score": 0,
"subscribers_count": 17
},
{
"id": 116449314,
"name": "Am-I-affected-by-Meltdown",
"full_name": "speecyy\/Am-I-affected-by-Meltdown",
"owner": {
"login": "speecyy",
"id": 35145287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35145287?v=4",
"html_url": "https:\/\/github.com\/speecyy"
},
"html_url": "https:\/\/github.com\/speecyy\/Am-I-affected-by-Meltdown",
"description": "Proof-of-concept \/ Exploit \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a ",
"fork": false,
"created_at": "2018-01-06T03:16:33Z",
"updated_at": "2020-02-27T19:31:43Z",
"pushed_at": "2018-01-06T03:17:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 118008705,
"name": "Meltdown",

View file

@ -394,36 +394,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 201442014,
"name": "CVE-2017-7269",
"full_name": "ThanHuuTuan\/CVE-2017-7269",
"owner": {
"login": "ThanHuuTuan",
"id": 32167814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
"html_url": "https:\/\/github.com\/ThanHuuTuan"
},
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
"description": null,
"fork": false,
"created_at": "2019-08-09T10:01:50Z",
"updated_at": "2019-08-09T10:01:53Z",
"pushed_at": "2017-04-04T17:20:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 386542444,
"name": "CVE-2017-7269",

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 7
},
{
"id": 116858521,
"name": "CVE-2017-8570",
"full_name": "rxwx\/CVE-2017-8570",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx"
},
"html_url": "https:\/\/github.com\/rxwx\/CVE-2017-8570",
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2023-09-28T10:47:21Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 184,
"watchers_count": 184,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 184,
"score": 0,
"subscribers_count": 9
},
{
"id": 122914059,
"name": "Office-CVE-2017-8570",

View file

@ -1,32 +0,0 @@
[
{
"id": 116008243,
"name": "AntiWeb_testing-Suite",
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
"owner": {
"login": "MDudek-ICS",
"id": 31083304,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
"html_url": "https:\/\/github.com\/MDudek-ICS"
},
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
"fork": false,
"created_at": "2018-01-02T11:28:40Z",
"updated_at": "2023-09-28T10:47:07Z",
"pushed_at": "2017-11-21T20:19:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-22T07:51:15Z",
"updated_at": "2023-11-23T06:31:53Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 337,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "CVE exploitation for WebKit jsc",
"fork": false,
"created_at": "2023-08-07T05:13:34Z",
"updated_at": "2023-08-07T05:15:55Z",
"updated_at": "2023-11-23T06:53:41Z",
"pushed_at": "2023-08-07T05:14:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-11-22T10:31:18Z",
"updated_at": "2023-11-23T06:17:41Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1153,
"watchers_count": 1153,
"stargazers_count": 1154,
"watchers_count": 1154,
"has_discussions": false,
"forks_count": 355,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1153,
"watchers": 1154,
"score": 0,
"subscribers_count": 69
},

View file

@ -355,10 +355,10 @@
"description": "Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration",
"fork": false,
"created_at": "2022-02-28T02:34:31Z",
"updated_at": "2023-11-21T03:02:56Z",
"updated_at": "2023-11-23T07:06:47Z",
"pushed_at": "2022-03-19T14:07:35Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -376,7 +376,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 4
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-22T07:51:15Z",
"updated_at": "2023-11-23T06:31:53Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 337,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 34
}

View file

@ -253,10 +253,10 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2023-09-28T11:02:46Z",
"updated_at": "2023-11-23T10:43:11Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 185,
"watchers": 186,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-22T07:51:15Z",
"updated_at": "2023-11-23T06:31:53Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1837,
"watchers_count": 1837,
"stargazers_count": 1838,
"watchers_count": 1838,
"has_discussions": false,
"forks_count": 337,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1837,
"watchers": 1838,
"score": 0,
"subscribers_count": 34
},

View file

@ -108,10 +108,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2023-10-30T09:43:18Z",
"updated_at": "2023-11-23T06:22:24Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 533,
"watchers_count": 533,
"stargazers_count": 532,
"watchers_count": 532,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 533,
"watchers": 532,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
"fork": false,
"created_at": "2021-09-03T22:48:11Z",
"updated_at": "2023-09-28T11:31:06Z",
"updated_at": "2023-11-23T07:05:04Z",
"pushed_at": "2021-09-03T22:50:08Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
"fork": false,
"created_at": "2021-06-05T15:05:01Z",
"updated_at": "2023-11-20T10:05:11Z",
"updated_at": "2023-11-23T09:29:59Z",
"pushed_at": "2023-06-11T08:47:04Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},

View file

@ -618,10 +618,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2023-11-11T22:36:15Z",
"updated_at": "2023-11-23T08:10:58Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -630,7 +630,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 82,
"watchers": 83,
"score": 0,
"subscribers_count": 3
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"wifi-camera"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 48,
"score": 0,
"subscribers_count": 2

View file

@ -374,7 +374,7 @@
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 515,
"forks_count": 516,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -382,7 +382,7 @@
"log4shell"
],
"visibility": "public",
"forks": 515,
"forks": 516,
"watchers": 1077,
"score": 0,
"subscribers_count": 23
@ -3703,10 +3703,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-11-20T02:03:10Z",
"updated_at": "2023-11-23T06:56:10Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3317,
"watchers_count": 3317,
"stargazers_count": 3318,
"watchers_count": 3318,
"has_discussions": true,
"forks_count": 749,
"allow_forking": true,
@ -3715,7 +3715,7 @@
"topics": [],
"visibility": "public",
"forks": 749,
"watchers": 3317,
"watchers": 3318,
"score": 0,
"subscribers_count": 58
},
@ -10215,10 +10215,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2023-11-22T09:12:00Z",
"updated_at": "2023-11-23T09:14:41Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -10232,7 +10232,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 190,
"watchers": 191,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.",
"fork": false,
"created_at": "2022-03-22T17:35:38Z",
"updated_at": "2023-09-28T11:37:16Z",
"updated_at": "2023-11-23T07:20:28Z",
"pushed_at": "2022-03-22T17:47:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -678,13 +678,13 @@
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 32,
"score": 0,
"subscribers_count": 2

View file

@ -158,10 +158,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2023-09-28T11:39:23Z",
"updated_at": "2023-11-23T10:06:22Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 151,
"watchers_count": 151,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -174,7 +174,7 @@
],
"visibility": "public",
"forks": 47,
"watchers": 152,
"watchers": 151,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-10T17:52:31Z",
"updated_at": "2023-02-13T01:43:11Z",
"updated_at": "2023-11-23T12:06:19Z",
"pushed_at": "2023-01-13T08:39:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-24T06:00:47Z",
"updated_at": "2023-11-07T18:04:30Z",
"updated_at": "2023-11-23T06:36:03Z",
"pushed_at": "2023-06-18T14:43:52Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 155,
"watchers": 156,
"score": 0,
"subscribers_count": 7
},

View file

@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-11-20T21:56:27Z",
"updated_at": "2023-11-23T09:41:05Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 356,
"watchers_count": 356,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 355,
"watchers": 356,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2022-10-23T15:58:18Z",
"updated_at": "2023-08-23T18:41:47Z",
"updated_at": "2023-11-23T06:55:16Z",
"pushed_at": "2023-06-10T14:28:43Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 33,
"forks": 17,
"watchers": 34,
"score": 0,
"subscribers_count": 6
}

View file

@ -47,10 +47,10 @@
"description": "POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon",
"fork": false,
"created_at": "2023-02-23T10:04:58Z",
"updated_at": "2023-10-20T02:54:37Z",
"updated_at": "2023-11-23T11:35:55Z",
"pushed_at": "2023-03-14T08:41:51Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -59,7 +59,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 101,
"watchers": 102,
"score": 0,
"subscribers_count": 1
},

View file

@ -626,10 +626,10 @@
"description": "CVE-2023-20198 Exploit PoC",
"fork": false,
"created_at": "2023-11-16T16:39:38Z",
"updated_at": "2023-11-22T14:53:16Z",
"updated_at": "2023-11-23T08:43:51Z",
"pushed_at": "2023-11-17T15:16:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -638,7 +638,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -111,10 +111,10 @@
"description": "Windows_AFD_LPE_CVE-2023-21768",
"fork": false,
"created_at": "2023-03-13T20:32:50Z",
"updated_at": "2023-11-23T04:36:58Z",
"updated_at": "2023-11-23T07:57:04Z",
"pushed_at": "2023-08-27T10:41:40Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2023-11-23T02:14:18Z",
"updated_at": "2023-11-23T08:06:42Z",
"pushed_at": "2023-11-18T22:54:27Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 53,
"forks": 7,
"watchers": 54,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.",
"fork": false,
"created_at": "2023-06-19T14:36:47Z",
"updated_at": "2023-09-22T11:53:57Z",
"updated_at": "2023-11-23T10:43:23Z",
"pushed_at": "2023-10-20T13:23:59Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,19 +43,19 @@
"description": "POC FortiOS SSL-VPN buffer overflow vulnerability",
"fork": false,
"created_at": "2023-06-16T03:25:19Z",
"updated_at": "2023-11-22T08:30:42Z",
"updated_at": "2023-11-23T11:47:13Z",
"pushed_at": "2023-06-16T03:28:34Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 20,
"forks": 15,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
@ -228,13 +228,13 @@
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 47,
"score": 0,
"subscribers_count": 4

View file

@ -13,19 +13,19 @@
"description": "DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019",
"fork": false,
"created_at": "2023-05-05T21:13:13Z",
"updated_at": "2023-10-31T15:14:38Z",
"updated_at": "2023-11-23T08:47:40Z",
"pushed_at": "2023-05-05T21:15:24Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 68,
"forks": 13,
"watchers": 69,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
"fork": false,
"created_at": "2023-09-01T07:41:23Z",
"updated_at": "2023-11-23T00:47:45Z",
"updated_at": "2023-11-23T10:50:33Z",
"pushed_at": "2023-11-12T00:42:29Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 132,
"watchers": 133,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
"fork": false,
"created_at": "2023-08-12T18:33:57Z",
"updated_at": "2023-11-23T03:19:42Z",
"updated_at": "2023-11-23T10:51:59Z",
"pushed_at": "2023-09-07T08:37:04Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2023-11-22T16:53:40Z",
"updated_at": "2023-11-23T11:59:34Z",
"pushed_at": "2023-11-21T10:45:58Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 18,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 60,
"forks": 21,
"watchers": 67,
"score": 0,
"subscribers_count": 1
},
@ -43,19 +43,19 @@
"description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
"fork": false,
"created_at": "2023-11-19T22:20:10Z",
"updated_at": "2023-11-22T10:48:56Z",
"updated_at": "2023-11-23T09:39:25Z",
"pushed_at": "2023-11-20T01:02:44Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 24,
"forks": 19,
"watchers": 26,
"score": 0,
"subscribers_count": 3
},

View file

@ -312,10 +312,10 @@
"description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
"fork": false,
"created_at": "2023-11-10T08:38:51Z",
"updated_at": "2023-11-10T16:07:42Z",
"updated_at": "2023-11-23T06:47:54Z",
"pushed_at": "2023-11-10T08:39:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -331,7 +331,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false,
"created_at": "2023-11-17T07:03:06Z",
"updated_at": "2023-11-23T05:11:03Z",
"updated_at": "2023-11-23T10:09:24Z",
"pushed_at": "2023-11-17T07:19:11Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "PoC for the CVE-2023-49103",
"fork": false,
"created_at": "2023-11-22T17:00:23Z",
"updated_at": "2023-11-22T17:04:39Z",
"updated_at": "2023-11-23T06:43:54Z",
"pushed_at": "2023-11-22T17:04:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -78,13 +78,13 @@
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 155,
"score": 0,
"subscribers_count": 3
@ -257,10 +257,10 @@
"description": "Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.",
"fork": false,
"created_at": "2023-10-17T07:44:16Z",
"updated_at": "2023-11-22T14:59:38Z",
"updated_at": "2023-11-23T07:10:27Z",
"pushed_at": "2023-10-18T04:59:50Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -269,7 +269,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 1
},

View file

@ -30709,7 +30709,6 @@
- [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC)
- [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785)
- [pieterbork/blueborne](https://github.com/pieterbork/blueborne)
- [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff)
- [RavSS/Bluetooth-Crash-CVE-2017-0785](https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785)
- [sh4rknado/BlueBorn](https://github.com/sh4rknado/BlueBorn)
- [Joanmei/CVE-2017-0785](https://github.com/Joanmei/CVE-2017-0785)
@ -30898,7 +30897,6 @@
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
- [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881)
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
### CVE-2017-4490
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
@ -31087,7 +31085,6 @@
<code>Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
</code>
- [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715)
- [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list)
- [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment)
- [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit)
@ -31104,12 +31101,7 @@
<code>Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
</code>
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
### CVE-2017-5754 (2018-01-04)
@ -31120,7 +31112,6 @@
- [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck)
- [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown)
- [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown)
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
@ -31298,7 +31289,6 @@
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
@ -31540,7 +31530,6 @@
</code>
- [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator)
- [rxwx/CVE-2017-8570](https://github.com/rxwx/CVE-2017-8570)
- [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570)
- [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570)
- [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570)
@ -31642,13 +31631,6 @@
- [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE)
### CVE-2017-9097 (2017-06-15)
<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
</code>
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
### CVE-2017-9101 (2017-05-21)
<code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
@ -31880,7 +31862,6 @@
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
@ -32514,13 +32495,6 @@
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
### CVE-2017-16997 (2017-12-17)
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the &quot;./&quot; directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
</code>
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
### CVE-2017-17058 (2017-11-29)
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have &quot;if (!defined('ABSPATH')) {exit;}&quot; code.
@ -32575,13 +32549,6 @@
- [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit)
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
### CVE-2017-17692 (2017-12-21)
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
</code>
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
### CVE-2017-17736 (2018-03-23)
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
@ -32719,7 +32686,6 @@
<code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm-&gt;mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm-&gt;mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm-&gt;mmap_base into the are that is supposed to be the &quot;gap&quot; between the stack and the binary.
</code>
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
- [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253)
### CVE-2017-1000353 (2018-01-29)