mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2023/08/22 06:48:11
This commit is contained in:
parent
2e524db9c5
commit
2086be9f52
46 changed files with 338 additions and 196 deletions
2010
2014
2016
2017
2018
2019
2020
2021
2022
CVE-2022-20421.jsonCVE-2022-22947.jsonCVE-2022-22954.jsonCVE-2022-26133.jsonCVE-2022-37969.jsonCVE-2022-38694.jsonCVE-2022-39197.json
2023
CVE-2023-0386.jsonCVE-2023-2023.jsonCVE-2023-20562.jsonCVE-2023-21554.jsonCVE-2023-21716.jsonCVE-2023-25157.jsonCVE-2023-28432.jsonCVE-2023-29409.jsonCVE-2023-3079.jsonCVE-2023-32233.jsonCVE-2023-33157.jsonCVE-2023-33160.jsonCVE-2023-34312.jsonCVE-2023-3519.jsonCVE-2023-36874.jsonCVE-2023-40477.jsonCVE-2023-4460.jsonCVE-2023-5546.jsonCVE-2023-9999.json
README.md
|
@ -13,10 +13,10 @@
|
|||
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T18:59:28Z",
|
||||
"updated_at": "2023-08-17T03:47:42Z",
|
||||
"updated_at": "2023-08-22T04:18:46Z",
|
||||
"pushed_at": "2021-06-06T09:41:51Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-21T10:32:48Z",
|
||||
"updated_at": "2023-08-22T02:00:00Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1771,
|
||||
"watchers_count": 1771,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 330,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 330,
|
||||
"watchers": 1771,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-21T10:32:48Z",
|
||||
"updated_at": "2023-08-22T02:00:00Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1771,
|
||||
"watchers_count": 1771,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 330,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 330,
|
||||
"watchers": 1771,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-21T10:32:48Z",
|
||||
"updated_at": "2023-08-22T02:00:00Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1771,
|
||||
"watchers_count": 1771,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 330,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 330,
|
||||
"watchers": 1771,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-21T10:32:48Z",
|
||||
"updated_at": "2023-08-22T02:00:00Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1771,
|
||||
"watchers_count": 1771,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 330,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 330,
|
||||
"watchers": 1771,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -363,10 +363,10 @@
|
|||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2023-08-20T11:49:07Z",
|
||||
"updated_at": "2023-08-22T05:28:46Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -375,7 +375,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -613,10 +613,10 @@
|
|||
"description": "A PoC exploit for CVE-2018-9995 - DVR Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-18T19:42:17Z",
|
||||
"updated_at": "2023-08-18T20:00:32Z",
|
||||
"updated_at": "2023-08-22T00:24:50Z",
|
||||
"pushed_at": "2023-08-21T18:24:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -634,7 +634,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -936,7 +936,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-08-19T05:41:39Z",
|
||||
"updated_at": "2023-08-19T05:41:39Z",
|
||||
"pushed_at": "2023-08-19T09:34:05Z",
|
||||
"pushed_at": "2023-08-22T05:59:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-08-21T13:04:32Z",
|
||||
"updated_at": "2023-08-22T05:46:36Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3848,
|
||||
"watchers_count": 3848,
|
||||
"stargazers_count": 3849,
|
||||
"watchers_count": 3849,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3848,
|
||||
"watchers": 3849,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-21T10:32:48Z",
|
||||
"updated_at": "2023-08-22T02:00:00Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1771,
|
||||
"watchers_count": 1771,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 330,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 330,
|
||||
"watchers": 1771,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-08-21T13:04:32Z",
|
||||
"updated_at": "2023-08-22T05:46:36Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3848,
|
||||
"watchers_count": 3848,
|
||||
"stargazers_count": 3849,
|
||||
"watchers_count": 3849,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3848,
|
||||
"watchers": 3849,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-21T15:38:22Z",
|
||||
"updated_at": "2023-07-11T23:22:56Z",
|
||||
"updated_at": "2023-08-22T01:51:20Z",
|
||||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-08-21T10:32:48Z",
|
||||
"updated_at": "2023-08-22T02:00:00Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1771,
|
||||
"watchers_count": 1771,
|
||||
"stargazers_count": 1773,
|
||||
"watchers_count": 1773,
|
||||
"has_discussions": false,
|
||||
"forks_count": 330,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 330,
|
||||
"watchers": 1771,
|
||||
"watchers": 1773,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -108,10 +108,10 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2023-08-21T02:01:57Z",
|
||||
"updated_at": "2023-08-22T01:38:07Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 518,
|
||||
"watchers_count": 518,
|
||||
"stargazers_count": 519,
|
||||
"watchers_count": 519,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 518,
|
||||
"watchers": 519,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2023-08-18T20:48:04Z",
|
||||
"updated_at": "2023-08-22T04:03:12Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1729,
|
||||
"watchers_count": 1729,
|
||||
"stargazers_count": 1730,
|
||||
"watchers_count": 1730,
|
||||
"has_discussions": false,
|
||||
"forks_count": 589,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 589,
|
||||
"watchers": 1729,
|
||||
"watchers": 1730,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
},
|
||||
|
@ -301,10 +301,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2023-08-18T03:55:51Z",
|
||||
"updated_at": "2023-08-22T04:27:24Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 933,
|
||||
"watchers_count": 933,
|
||||
"stargazers_count": 934,
|
||||
"watchers_count": 934,
|
||||
"has_discussions": false,
|
||||
"forks_count": 228,
|
||||
"allow_forking": true,
|
||||
|
@ -313,7 +313,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 228,
|
||||
"watchers": 933,
|
||||
"watchers": 934,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -851,12 +851,12 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-21T09:19:05Z",
|
||||
"updated_at": "2023-08-22T02:39:31Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -869,8 +869,8 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 1050,
|
||||
"forks": 132,
|
||||
"watchers": 1052,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
}
|
||||
|
|
|
@ -1130,10 +1130,10 @@
|
|||
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T11:12:30Z",
|
||||
"updated_at": "2023-07-18T19:09:06Z",
|
||||
"updated_at": "2023-08-22T04:13:29Z",
|
||||
"pushed_at": "2022-10-21T08:59:23Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -1142,7 +1142,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-08-14T12:33:55Z",
|
||||
"updated_at": "2023-08-22T02:26:31Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1245,
|
||||
"watchers_count": 1245,
|
||||
"stargazers_count": 1246,
|
||||
"watchers_count": 1246,
|
||||
"has_discussions": false,
|
||||
"forks_count": 317,
|
||||
"forks_count": 318,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 317,
|
||||
"watchers": 1245,
|
||||
"forks": 318,
|
||||
"watchers": 1246,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -10275,10 +10275,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2023-08-20T08:26:45Z",
|
||||
"updated_at": "2023-08-22T03:13:29Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -10292,7 +10292,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 175,
|
||||
"watchers": 176,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-08-19T22:23:34Z",
|
||||
"updated_at": "2023-08-22T03:23:51Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -269,38 +269,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 465998049,
|
||||
"name": "CVE-2022-22947-goby",
|
||||
"full_name": "york-cmd\/CVE-2022-22947-goby",
|
||||
"owner": {
|
||||
"login": "york-cmd",
|
||||
"id": 64241747,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64241747?v=4",
|
||||
"html_url": "https:\/\/github.com\/york-cmd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/york-cmd\/CVE-2022-22947-goby",
|
||||
"description": "日常更新一些顺手写的gobypoc,包含高危害EXP",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T05:45:05Z",
|
||||
"updated_at": "2022-03-30T14:19:37Z",
|
||||
"pushed_at": "2022-03-04T05:47:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"golang"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 466011549,
|
||||
"name": "CVE-2022-22947-Spring-Cloud-Gateway",
|
||||
|
@ -361,6 +329,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 466061651,
|
||||
"name": "CVE-2022-22947-goby",
|
||||
"full_name": "flying0er\/CVE-2022-22947-goby",
|
||||
"owner": {
|
||||
"login": "flying0er",
|
||||
"id": 16277259,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16277259?v=4",
|
||||
"html_url": "https:\/\/github.com\/flying0er"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/flying0er\/CVE-2022-22947-goby",
|
||||
"description": "日常更新一些顺手写的gobypoc,包含高危害EXP",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T09:29:45Z",
|
||||
"updated_at": "2022-03-04T09:29:42Z",
|
||||
"pushed_at": "2022-03-04T05:47:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 466067213,
|
||||
"name": "CVE-2022-22947",
|
||||
|
|
|
@ -766,12 +766,12 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-21T09:19:05Z",
|
||||
"updated_at": "2023-08-22T02:39:31Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"has_discussions": false,
|
||||
"forks_count": 131,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -784,8 +784,8 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 1050,
|
||||
"forks": 132,
|
||||
"watchers": 1052,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:07:51Z",
|
||||
"updated_at": "2023-08-07T21:10:26Z",
|
||||
"updated_at": "2023-08-22T01:27:46Z",
|
||||
"pushed_at": "2022-05-11T02:02:59Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/TomKing062"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TomKing062\/CVE-2022-38694_unlock_bootloader",
|
||||
"description": "execute any binary with BootROM privileges, which can be used to unlock bootloader",
|
||||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-08-20T16:53:52Z",
|
||||
"updated_at": "2023-08-22T06:08:09Z",
|
||||
"pushed_at": "2023-08-18T08:00:37Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
|
|
|
@ -321,10 +321,10 @@
|
|||
"description": "CobaltStrike <= 4.7.1 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T11:46:01Z",
|
||||
"updated_at": "2023-08-20T00:05:56Z",
|
||||
"updated_at": "2023-08-22T05:10:05Z",
|
||||
"pushed_at": "2022-10-25T05:32:54Z",
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"stargazers_count": 350,
|
||||
"watchers_count": 350,
|
||||
"has_discussions": false,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
|
@ -333,7 +333,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"watchers": 349,
|
||||
"watchers": 350,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"forks": 62,
|
||||
"watchers": 352,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-2023",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T12:57:22Z",
|
||||
"updated_at": "2023-08-20T06:40:58Z",
|
||||
"updated_at": "2023-08-22T05:43:57Z",
|
||||
"pushed_at": "2023-07-25T02:38:31Z",
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"has_discussions": false,
|
||||
"forks_count": 169,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 169,
|
||||
"watchers": 437,
|
||||
"watchers": 439,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "HW2023@POC@EXP@CVE-2023-2023",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-13T05:54:17Z",
|
||||
"updated_at": "2023-08-21T07:35:45Z",
|
||||
"updated_at": "2023-08-22T05:00:51Z",
|
||||
"pushed_at": "2023-08-16T08:17:30Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,21 +13,21 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-21T00:31:50Z",
|
||||
"updated_at": "2023-08-21T20:29:55Z",
|
||||
"updated_at": "2023-08-22T06:01:30Z",
|
||||
"pushed_at": "2023-08-21T00:33:08Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 20,
|
||||
"forks": 4,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 681042384,
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-21T06:25:09Z",
|
||||
"updated_at": "2023-08-21T15:20:24Z",
|
||||
"updated_at": "2023-08-22T00:59:28Z",
|
||||
"pushed_at": "2023-08-21T06:25:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,8 +55,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-18T10:30:49Z",
|
||||
"updated_at": "2023-08-17T18:07:24Z",
|
||||
"updated_at": "2023-08-22T05:14:59Z",
|
||||
"pushed_at": "2023-05-18T10:38:57Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RTF Crash POC Python 3.11 Windows 10",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T15:03:43Z",
|
||||
"updated_at": "2023-07-29T20:18:32Z",
|
||||
"updated_at": "2023-08-22T02:34:05Z",
|
||||
"pushed_at": "2023-03-07T15:17:47Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 41,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2023-08-20T09:06:18Z",
|
||||
"updated_at": "2023-08-22T02:17:40Z",
|
||||
"pushed_at": "2023-07-14T10:40:17Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -390,6 +390,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-15T04:16:46Z",
|
||||
"updated_at": "2023-08-21T10:37:03Z",
|
||||
"updated_at": "2023-08-22T03:46:34Z",
|
||||
"pushed_at": "2023-08-17T11:43:26Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 68,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T03:06:40Z",
|
||||
"updated_at": "2023-08-17T02:25:07Z",
|
||||
"updated_at": "2023-08-22T03:45:40Z",
|
||||
"pushed_at": "2023-05-16T04:34:16Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 283,
|
||||
"watchers": 284,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2023/CVE-2023-33157.json
Normal file
32
2023/CVE-2023-33157.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 681427359,
|
||||
"name": "CVE-2023-33157",
|
||||
"full_name": "hipnesspatten\/CVE-2023-33157",
|
||||
"owner": {
|
||||
"login": "hipnesspatten",
|
||||
"id": 142857480,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4",
|
||||
"html_url": "https:\/\/github.com\/hipnesspatten"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33157",
|
||||
"description": "POC Microsoft SharePoint Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-22T02:01:04Z",
|
||||
"updated_at": "2023-08-22T02:01:25Z",
|
||||
"pushed_at": "2023-08-22T02:01:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-33160.json
Normal file
32
2023/CVE-2023-33160.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 681427098,
|
||||
"name": "CVE-2023-33160",
|
||||
"full_name": "hipnesspatten\/CVE-2023-33160",
|
||||
"owner": {
|
||||
"login": "hipnesspatten",
|
||||
"id": 142857480,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4",
|
||||
"html_url": "https:\/\/github.com\/hipnesspatten"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33160",
|
||||
"description": "POC Microsoft SharePoint Server Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-22T02:00:13Z",
|
||||
"updated_at": "2023-08-22T02:00:42Z",
|
||||
"pushed_at": "2023-08-22T02:00:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-34312",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-27T12:44:42Z",
|
||||
"updated_at": "2023-08-21T12:53:32Z",
|
||||
"updated_at": "2023-08-22T06:38:33Z",
|
||||
"pushed_at": "2023-05-27T12:45:10Z",
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"stargazers_count": 410,
|
||||
"watchers_count": 410,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 408,
|
||||
"watchers": 410,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -186,7 +186,7 @@
|
|||
"forks": 24,
|
||||
"watchers": 163,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 669309594,
|
||||
|
@ -337,5 +337,35 @@
|
|||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 681420692,
|
||||
"name": "CVE-2023-3519",
|
||||
"full_name": "knitteruntil0s\/CVE-2023-3519",
|
||||
"owner": {
|
||||
"login": "knitteruntil0s",
|
||||
"id": 142856918,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142856918?v=4",
|
||||
"html_url": "https:\/\/github.com\/knitteruntil0s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knitteruntil0s\/CVE-2023-3519",
|
||||
"description": "POC Citrix vulnerability scanner. Auto Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-22T01:33:01Z",
|
||||
"updated_at": "2023-08-22T01:36:06Z",
|
||||
"pushed_at": "2023-08-22T01:37:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-36874 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-20T13:50:42Z",
|
||||
"updated_at": "2023-08-21T23:20:53Z",
|
||||
"updated_at": "2023-08-22T06:36:21Z",
|
||||
"pushed_at": "2023-08-20T13:54:15Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 31,
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40477.json
Normal file
32
2023/CVE-2023-40477.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 681415136,
|
||||
"name": "CVE-2023-40477",
|
||||
"full_name": "whalersplonk\/CVE-2023-40477",
|
||||
"owner": {
|
||||
"login": "whalersplonk",
|
||||
"id": 142855900,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142855900?v=4",
|
||||
"html_url": "https:\/\/github.com\/whalersplonk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whalersplonk\/CVE-2023-40477",
|
||||
"description": "POC WinRAR vulnerable to remote code execution,",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-22T01:10:53Z",
|
||||
"updated_at": "2023-08-22T05:10:05Z",
|
||||
"pushed_at": "2023-08-22T01:15:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -29,6 +29,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
20
README.md
20
README.md
|
@ -465,6 +465,7 @@
|
|||
- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
|
||||
- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
|
||||
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
|
||||
- [knitteruntil0s/CVE-2023-3519](https://github.com/knitteruntil0s/CVE-2023-3519)
|
||||
|
||||
### CVE-2023-3640 (2023-07-24)
|
||||
|
||||
|
@ -2027,6 +2028,20 @@
|
|||
|
||||
- [LOURC0D3/CVE-2023-32961](https://github.com/LOURC0D3/CVE-2023-32961)
|
||||
|
||||
### CVE-2023-33157 (2023-07-11)
|
||||
|
||||
<code>Microsoft SharePoint Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [hipnesspatten/CVE-2023-33157](https://github.com/hipnesspatten/CVE-2023-33157)
|
||||
|
||||
### CVE-2023-33160 (2023-07-11)
|
||||
|
||||
<code>Microsoft SharePoint Server Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [hipnesspatten/CVE-2023-33160](https://github.com/hipnesspatten/CVE-2023-33160)
|
||||
|
||||
### CVE-2023-33242 (2023-08-09)
|
||||
|
||||
<code>Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
|
||||
|
@ -2834,6 +2849,9 @@
|
|||
### CVE-2023-40297
|
||||
- [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297)
|
||||
|
||||
### CVE-2023-40477
|
||||
- [whalersplonk/CVE-2023-40477](https://github.com/whalersplonk/CVE-2023-40477)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
|
@ -4414,9 +4432,9 @@
|
|||
- [Greetdawn/CVE-2022-22947](https://github.com/Greetdawn/CVE-2022-22947)
|
||||
- [Summer177/Spring-Cloud-Gateway-CVE-2022-22947](https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947)
|
||||
- [BerMalBerIst/CVE-2022-22947](https://github.com/BerMalBerIst/CVE-2022-22947)
|
||||
- [york-cmd/CVE-2022-22947-goby](https://github.com/york-cmd/CVE-2022-22947-goby)
|
||||
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
|
||||
- [dingxiao77/-cve-2022-22947-](https://github.com/dingxiao77/-cve-2022-22947-)
|
||||
- [flying0er/CVE-2022-22947-goby](https://github.com/flying0er/CVE-2022-22947-goby)
|
||||
- [dbgee/CVE-2022-22947](https://github.com/dbgee/CVE-2022-22947)
|
||||
- [nu0l/cve-2022-22947](https://github.com/nu0l/cve-2022-22947)
|
||||
- [nanaao/CVE-2022-22947-POC](https://github.com/nanaao/CVE-2022-22947-POC)
|
||||
|
|
Loading…
Add table
Reference in a new issue