Auto Update 2023/08/22 06:48:11

This commit is contained in:
motikan2010-bot 2023-08-22 15:48:11 +09:00
parent 2e524db9c5
commit 2086be9f52
46 changed files with 338 additions and 196 deletions

View file

@ -13,10 +13,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2023-08-17T03:47:42Z",
"updated_at": "2023-08-22T04:18:46Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-21T10:32:48Z",
"updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1771,
"watchers_count": 1771,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 330,
"watchers": 1771,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-21T10:32:48Z",
"updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1771,
"watchers_count": 1771,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 330,
"watchers": 1771,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-21T10:32:48Z",
"updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1771,
"watchers_count": 1771,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 330,
"watchers": 1771,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-21T10:32:48Z",
"updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1771,
"watchers_count": 1771,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 330,
"watchers": 1771,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -363,10 +363,10 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2023-08-20T11:49:07Z",
"updated_at": "2023-08-22T05:28:46Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -375,7 +375,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 109,
"watchers": 110,
"score": 0,
"subscribers_count": 5
},

View file

@ -613,10 +613,10 @@
"description": "A PoC exploit for CVE-2018-9995 - DVR Authentication Bypass",
"fork": false,
"created_at": "2023-08-18T19:42:17Z",
"updated_at": "2023-08-18T20:00:32Z",
"updated_at": "2023-08-22T00:24:50Z",
"pushed_at": "2023-08-21T18:24:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -634,7 +634,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -936,7 +936,7 @@
"fork": false,
"created_at": "2023-08-19T05:41:39Z",
"updated_at": "2023-08-19T05:41:39Z",
"pushed_at": "2023-08-19T09:34:05Z",
"pushed_at": "2023-08-22T05:59:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-08-21T13:04:32Z",
"updated_at": "2023-08-22T05:46:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3848,
"watchers_count": 3848,
"stargazers_count": 3849,
"watchers_count": 3849,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1085,
"watchers": 3848,
"watchers": 3849,
"score": 0,
"subscribers_count": 155
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-21T10:32:48Z",
"updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1771,
"watchers_count": 1771,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 330,
"watchers": 1771,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-08-21T13:04:32Z",
"updated_at": "2023-08-22T05:46:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3848,
"watchers_count": 3848,
"stargazers_count": 3849,
"watchers_count": 3849,
"has_discussions": false,
"forks_count": 1085,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1085,
"watchers": 3848,
"watchers": 3849,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,10 +13,10 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
"updated_at": "2023-07-11T23:22:56Z",
"updated_at": "2023-08-22T01:51:20Z",
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 184,
"watchers": 185,
"score": 0,
"subscribers_count": 10
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-21T10:32:48Z",
"updated_at": "2023-08-22T02:00:00Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1771,
"watchers_count": 1771,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 330,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 330,
"watchers": 1771,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -108,10 +108,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2023-08-21T02:01:57Z",
"updated_at": "2023-08-22T01:38:07Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 518,
"watchers_count": 518,
"stargazers_count": 519,
"watchers_count": 519,
"has_discussions": false,
"forks_count": 65,
"allow_forking": true,
@ -120,7 +120,7 @@
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 518,
"watchers": 519,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-08-18T20:48:04Z",
"updated_at": "2023-08-22T04:03:12Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1729,
"watchers_count": 1729,
"stargazers_count": 1730,
"watchers_count": 1730,
"has_discussions": false,
"forks_count": 589,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 589,
"watchers": 1729,
"watchers": 1730,
"score": 0,
"subscribers_count": 46
},
@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2023-08-18T03:55:51Z",
"updated_at": "2023-08-22T04:27:24Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 934,
"watchers_count": 934,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 933,
"watchers": 934,
"score": 0,
"subscribers_count": 26
},

View file

@ -851,12 +851,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-08-21T09:19:05Z",
"updated_at": "2023-08-22T02:39:31Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 1050,
"watchers_count": 1050,
"stargazers_count": 1052,
"watchers_count": 1052,
"has_discussions": false,
"forks_count": 131,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -869,8 +869,8 @@
"vcenter"
],
"visibility": "public",
"forks": 131,
"watchers": 1050,
"forks": 132,
"watchers": 1052,
"score": 0,
"subscribers_count": 10
}

View file

@ -1130,10 +1130,10 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2023-07-18T19:09:06Z",
"updated_at": "2023-08-22T04:13:29Z",
"pushed_at": "2022-10-21T08:59:23Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -1142,7 +1142,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 171,
"watchers": 172,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-08-14T12:33:55Z",
"updated_at": "2023-08-22T02:26:31Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"has_discussions": false,
"forks_count": 317,
"forks_count": 318,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 317,
"watchers": 1245,
"forks": 318,
"watchers": 1246,
"score": 0,
"subscribers_count": 27
},

View file

@ -10275,10 +10275,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2023-08-20T08:26:45Z",
"updated_at": "2023-08-22T03:13:29Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -10292,7 +10292,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 175,
"watchers": 176,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2023-08-19T22:23:34Z",
"updated_at": "2023-08-22T03:23:51Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 187,
"watchers": 188,
"score": 0,
"subscribers_count": 6
}

View file

@ -269,38 +269,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 465998049,
"name": "CVE-2022-22947-goby",
"full_name": "york-cmd\/CVE-2022-22947-goby",
"owner": {
"login": "york-cmd",
"id": 64241747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64241747?v=4",
"html_url": "https:\/\/github.com\/york-cmd"
},
"html_url": "https:\/\/github.com\/york-cmd\/CVE-2022-22947-goby",
"description": "日常更新一些顺手写的gobypoc包含高危害EXP",
"fork": false,
"created_at": "2022-03-04T05:45:05Z",
"updated_at": "2022-03-30T14:19:37Z",
"pushed_at": "2022-03-04T05:47:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"golang"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 466011549,
"name": "CVE-2022-22947-Spring-Cloud-Gateway",
@ -361,6 +329,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 466061651,
"name": "CVE-2022-22947-goby",
"full_name": "flying0er\/CVE-2022-22947-goby",
"owner": {
"login": "flying0er",
"id": 16277259,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16277259?v=4",
"html_url": "https:\/\/github.com\/flying0er"
},
"html_url": "https:\/\/github.com\/flying0er\/CVE-2022-22947-goby",
"description": "日常更新一些顺手写的gobypoc包含高危害EXP",
"fork": false,
"created_at": "2022-03-04T09:29:45Z",
"updated_at": "2022-03-04T09:29:42Z",
"pushed_at": "2022-03-04T05:47:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 466067213,
"name": "CVE-2022-22947",

View file

@ -766,12 +766,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-08-21T09:19:05Z",
"updated_at": "2023-08-22T02:39:31Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 1050,
"watchers_count": 1050,
"stargazers_count": 1052,
"watchers_count": 1052,
"has_discussions": false,
"forks_count": 131,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -784,8 +784,8 @@
"vcenter"
],
"visibility": "public",
"forks": 131,
"watchers": 1050,
"forks": 132,
"watchers": 1052,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2023-08-07T21:10:26Z",
"updated_at": "2023-08-22T01:27:46Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 147,
"watchers": 148,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 107,
"score": 0,
"subscribers_count": 4

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/TomKing062"
},
"html_url": "https:\/\/github.com\/TomKing062\/CVE-2022-38694_unlock_bootloader",
"description": "execute any binary with BootROM privileges, which can be used to unlock bootloader",
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-08-20T16:53:52Z",
"updated_at": "2023-08-22T06:08:09Z",
"pushed_at": "2023-08-18T08:00:37Z",
"stargazers_count": 54,
"watchers_count": 54,

View file

@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-08-20T00:05:56Z",
"updated_at": "2023-08-22T05:10:05Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 349,
"watchers": 350,
"score": 0,
"subscribers_count": 7
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 352,
"watchers_count": 352,
"has_discussions": false,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 61,
"forks": 62,
"watchers": 352,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-2023",
"fork": false,
"created_at": "2021-11-22T12:57:22Z",
"updated_at": "2023-08-20T06:40:58Z",
"updated_at": "2023-08-22T05:43:57Z",
"pushed_at": "2023-07-25T02:38:31Z",
"stargazers_count": 437,
"watchers_count": 437,
"stargazers_count": 439,
"watchers_count": 439,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 169,
"watchers": 437,
"watchers": 439,
"score": 0,
"subscribers_count": 16
},
@ -43,10 +43,10 @@
"description": "HW2023@POC@EXP@CVE-2023-2023",
"fork": false,
"created_at": "2023-08-13T05:54:17Z",
"updated_at": "2023-08-21T07:35:45Z",
"updated_at": "2023-08-22T05:00:51Z",
"pushed_at": "2023-08-16T08:17:30Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,21 +13,21 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T00:31:50Z",
"updated_at": "2023-08-21T20:29:55Z",
"updated_at": "2023-08-22T06:01:30Z",
"pushed_at": "2023-08-21T00:33:08Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 2,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 20,
"forks": 4,
"watchers": 28,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 681042384,
@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T06:25:09Z",
"updated_at": "2023-08-21T15:20:24Z",
"updated_at": "2023-08-22T00:59:28Z",
"pushed_at": "2023-08-21T06:25:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,8 +55,8 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
"updated_at": "2023-08-17T18:07:24Z",
"updated_at": "2023-08-22T05:14:59Z",
"pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 1
},
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "RTF Crash POC Python 3.11 Windows 10",
"fork": false,
"created_at": "2023-03-07T15:03:43Z",
"updated_at": "2023-07-29T20:18:32Z",
"updated_at": "2023-08-22T02:34:05Z",
"pushed_at": "2023-03-07T15:17:47Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 41,
"watchers": 43,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
"updated_at": "2023-08-20T09:06:18Z",
"updated_at": "2023-08-22T02:17:40Z",
"pushed_at": "2023-07-14T10:40:17Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 2
},

View file

@ -390,6 +390,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
"updated_at": "2023-08-21T10:37:03Z",
"updated_at": "2023-08-22T03:46:34Z",
"pushed_at": "2023-08-17T11:43:26Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 68,
"watchers": 67,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-32233: Linux内核中的安全漏洞",
"fork": false,
"created_at": "2023-05-16T03:06:40Z",
"updated_at": "2023-08-17T02:25:07Z",
"updated_at": "2023-08-22T03:45:40Z",
"pushed_at": "2023-05-16T04:34:16Z",
"stargazers_count": 283,
"watchers_count": 283,
"stargazers_count": 284,
"watchers_count": 284,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 283,
"watchers": 284,
"score": 0,
"subscribers_count": 4
},

32
2023/CVE-2023-33157.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 681427359,
"name": "CVE-2023-33157",
"full_name": "hipnesspatten\/CVE-2023-33157",
"owner": {
"login": "hipnesspatten",
"id": 142857480,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4",
"html_url": "https:\/\/github.com\/hipnesspatten"
},
"html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33157",
"description": "POC Microsoft SharePoint Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2023-08-22T02:01:04Z",
"updated_at": "2023-08-22T02:01:25Z",
"pushed_at": "2023-08-22T02:01:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-33160.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 681427098,
"name": "CVE-2023-33160",
"full_name": "hipnesspatten\/CVE-2023-33160",
"owner": {
"login": "hipnesspatten",
"id": 142857480,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142857480?v=4",
"html_url": "https:\/\/github.com\/hipnesspatten"
},
"html_url": "https:\/\/github.com\/hipnesspatten\/CVE-2023-33160",
"description": "POC Microsoft SharePoint Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2023-08-22T02:00:13Z",
"updated_at": "2023-08-22T02:00:42Z",
"pushed_at": "2023-08-22T02:00:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34312",
"fork": false,
"created_at": "2023-05-27T12:44:42Z",
"updated_at": "2023-08-21T12:53:32Z",
"updated_at": "2023-08-22T06:38:33Z",
"pushed_at": "2023-05-27T12:45:10Z",
"stargazers_count": 408,
"watchers_count": 408,
"stargazers_count": 410,
"watchers_count": 410,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 408,
"watchers": 410,
"score": 0,
"subscribers_count": 3
},

View file

@ -186,7 +186,7 @@
"forks": 24,
"watchers": 163,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 669309594,
@ -337,5 +337,35 @@
"watchers": 38,
"score": 0,
"subscribers_count": 4
},
{
"id": 681420692,
"name": "CVE-2023-3519",
"full_name": "knitteruntil0s\/CVE-2023-3519",
"owner": {
"login": "knitteruntil0s",
"id": 142856918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142856918?v=4",
"html_url": "https:\/\/github.com\/knitteruntil0s"
},
"html_url": "https:\/\/github.com\/knitteruntil0s\/CVE-2023-3519",
"description": "POC Citrix vulnerability scanner. Auto Exploit",
"fork": false,
"created_at": "2023-08-22T01:33:01Z",
"updated_at": "2023-08-22T01:36:06Z",
"pushed_at": "2023-08-22T01:37:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-36874 PoC",
"fork": false,
"created_at": "2023-08-20T13:50:42Z",
"updated_at": "2023-08-21T23:20:53Z",
"updated_at": "2023-08-22T06:36:21Z",
"pushed_at": "2023-08-20T13:54:15Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 12,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 31,
"forks": 16,
"watchers": 45,
"score": 0,
"subscribers_count": 1
},
@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2023/CVE-2023-40477.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 681415136,
"name": "CVE-2023-40477",
"full_name": "whalersplonk\/CVE-2023-40477",
"owner": {
"login": "whalersplonk",
"id": 142855900,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142855900?v=4",
"html_url": "https:\/\/github.com\/whalersplonk"
},
"html_url": "https:\/\/github.com\/whalersplonk\/CVE-2023-40477",
"description": "POC WinRAR vulnerable to remote code execution,",
"fork": false,
"created_at": "2023-08-22T01:10:53Z",
"updated_at": "2023-08-22T05:10:05Z",
"pushed_at": "2023-08-22T01:15:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -465,6 +465,7 @@
- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
- [knitteruntil0s/CVE-2023-3519](https://github.com/knitteruntil0s/CVE-2023-3519)
### CVE-2023-3640 (2023-07-24)
@ -2027,6 +2028,20 @@
- [LOURC0D3/CVE-2023-32961](https://github.com/LOURC0D3/CVE-2023-32961)
### CVE-2023-33157 (2023-07-11)
<code>Microsoft SharePoint Remote Code Execution Vulnerability
</code>
- [hipnesspatten/CVE-2023-33157](https://github.com/hipnesspatten/CVE-2023-33157)
### CVE-2023-33160 (2023-07-11)
<code>Microsoft SharePoint Server Remote Code Execution Vulnerability
</code>
- [hipnesspatten/CVE-2023-33160](https://github.com/hipnesspatten/CVE-2023-33160)
### CVE-2023-33242 (2023-08-09)
<code>Crypto wallets implementing the Lindell17 TSS protocol might allow an attacker to extract the full ECDSA private key by exfiltrating a single bit in every signature attempt (256 in total) because of not adhering to the paper's security proof's assumption regarding handling aborts after a failed signature.
@ -2834,6 +2849,9 @@
### CVE-2023-40297
- [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297)
### CVE-2023-40477
- [whalersplonk/CVE-2023-40477](https://github.com/whalersplonk/CVE-2023-40477)
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -4414,9 +4432,9 @@
- [Greetdawn/CVE-2022-22947](https://github.com/Greetdawn/CVE-2022-22947)
- [Summer177/Spring-Cloud-Gateway-CVE-2022-22947](https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947)
- [BerMalBerIst/CVE-2022-22947](https://github.com/BerMalBerIst/CVE-2022-22947)
- [york-cmd/CVE-2022-22947-goby](https://github.com/york-cmd/CVE-2022-22947-goby)
- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway)
- [dingxiao77/-cve-2022-22947-](https://github.com/dingxiao77/-cve-2022-22947-)
- [flying0er/CVE-2022-22947-goby](https://github.com/flying0er/CVE-2022-22947-goby)
- [dbgee/CVE-2022-22947](https://github.com/dbgee/CVE-2022-22947)
- [nu0l/cve-2022-22947](https://github.com/nu0l/cve-2022-22947)
- [nanaao/CVE-2022-22947-POC](https://github.com/nanaao/CVE-2022-22947-POC)