mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/08/02 06:32:14
This commit is contained in:
parent
18eac4756c
commit
21554932f6
54 changed files with 328 additions and 203 deletions
|
@ -1145,10 +1145,10 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2023-08-01T22:08:28Z",
|
||||
"updated_at": "2023-08-02T01:23:10Z",
|
||||
"pushed_at": "2023-02-02T02:17:30Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
|
@ -1157,7 +1157,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 246,
|
||||
"watchers": 248,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -119,7 +119,7 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -134,7 +134,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2023-07-31T23:51:10Z",
|
||||
"updated_at": "2023-08-02T01:02:28Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 337,
|
||||
"watchers_count": 337,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 336,
|
||||
"watchers": 337,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -1868,7 +1868,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-02-26T11:49:44Z",
|
||||
"updated_at": "2023-03-06T10:23:44Z",
|
||||
"pushed_at": "2023-07-25T19:38:04Z",
|
||||
"pushed_at": "2023-08-02T01:32:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -90,10 +90,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2023-08-01T14:57:17Z",
|
||||
"updated_at": "2023-08-02T05:56:03Z",
|
||||
"pushed_at": "2023-06-08T04:01:33Z",
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"has_discussions": false,
|
||||
"forks_count": 150,
|
||||
"allow_forking": true,
|
||||
|
@ -104,7 +104,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"watchers": 442,
|
||||
"watchers": 443,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -152,10 +152,10 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2023-07-29T20:36:10Z",
|
||||
"updated_at": "2023-08-02T05:55:07Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -164,7 +164,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 231,
|
||||
"watchers": 233,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-01T03:54:49Z",
|
||||
"updated_at": "2023-08-02T02:27:55Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 995,
|
||||
"watchers_count": 995,
|
||||
"stargazers_count": 996,
|
||||
"watchers_count": 996,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 995,
|
||||
"watchers": 996,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -768,5 +768,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 673613322,
|
||||
"name": "DejaVu-CVE-2021-22205",
|
||||
"full_name": "overgrowncarrot1\/DejaVu-CVE-2021-22205",
|
||||
"owner": {
|
||||
"login": "overgrowncarrot1",
|
||||
"id": 78485709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78485709?v=4",
|
||||
"html_url": "https:\/\/github.com\/overgrowncarrot1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/overgrowncarrot1\/DejaVu-CVE-2021-22205",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-02T03:15:59Z",
|
||||
"updated_at": "2023-08-02T03:18:20Z",
|
||||
"pushed_at": "2023-08-02T03:18:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC of CVE-2021-30731",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-13T06:13:24Z",
|
||||
"updated_at": "2023-07-19T16:03:32Z",
|
||||
"updated_at": "2023-08-02T03:25:08Z",
|
||||
"pushed_at": "2022-04-13T18:57:06Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
32
2021/CVE-2021-3281.json
Normal file
32
2021/CVE-2021-3281.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 383067956,
|
||||
"name": "CVE-2021-3281",
|
||||
"full_name": "lwzSoviet\/CVE-2021-3281",
|
||||
"owner": {
|
||||
"login": "lwzSoviet",
|
||||
"id": 30397594,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
|
||||
"html_url": "https:\/\/github.com\/lwzSoviet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T08:25:26Z",
|
||||
"updated_at": "2022-01-31T11:44:07Z",
|
||||
"pushed_at": "2021-07-05T08:47:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-13T06:15:21Z",
|
||||
"updated_at": "2023-07-07T19:10:41Z",
|
||||
"updated_at": "2023-08-02T06:13:53Z",
|
||||
"pushed_at": "2021-07-13T06:16:11Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -183,33 +183,33 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 667627206,
|
||||
"name": "hikvision_brute",
|
||||
"full_name": "r3t4k3r\/hikvision_brute",
|
||||
"id": 667633114,
|
||||
"name": "hikvision_brute-jnrxx",
|
||||
"full_name": "hheeyywweellccoommee\/hikvision_brute-jnrxx",
|
||||
"owner": {
|
||||
"login": "r3t4k3r",
|
||||
"id": 86055096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86055096?v=4",
|
||||
"html_url": "https:\/\/github.com\/r3t4k3r"
|
||||
"login": "hheeyywweellccoommee",
|
||||
"id": 131327252,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131327252?v=4",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r3t4k3r\/hikvision_brute",
|
||||
"html_url": "https:\/\/github.com\/hheeyywweellccoommee\/hikvision_brute-jnrxx",
|
||||
"description": "Brute Hikvision CAMS with CVE-2021-36260 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-18T00:31:47Z",
|
||||
"updated_at": "2023-07-20T10:23:55Z",
|
||||
"pushed_at": "2023-07-29T17:41:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"created_at": "2023-07-18T01:01:25Z",
|
||||
"updated_at": "2023-07-18T01:01:25Z",
|
||||
"pushed_at": "2023-07-18T00:38:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -453,7 +453,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T05:42:40Z",
|
||||
"updated_at": "2022-01-26T08:44:26Z",
|
||||
"updated_at": "2023-08-02T02:44:40Z",
|
||||
"pushed_at": "2022-01-26T05:42:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -10305,12 +10305,12 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2023-07-31T03:39:48Z",
|
||||
"updated_at": "2023-08-02T03:21:35Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -10321,8 +10321,8 @@
|
|||
"vmsa-2021-0028"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 163,
|
||||
"forks": 35,
|
||||
"watchers": 164,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:36:50Z",
|
||||
"updated_at": "2023-08-01T22:08:28Z",
|
||||
"updated_at": "2023-08-02T01:23:10Z",
|
||||
"pushed_at": "2023-02-02T02:17:30Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"has_discussions": false,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 246,
|
||||
"watchers": 248,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -1316,10 +1316,10 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2023-08-01T02:44:14Z",
|
||||
"updated_at": "2023-08-02T01:31:17Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -1328,7 +1328,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-08-01T03:54:49Z",
|
||||
"updated_at": "2023-08-02T02:27:55Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 995,
|
||||
"watchers_count": 995,
|
||||
"stargazers_count": 996,
|
||||
"watchers_count": 996,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 995,
|
||||
"watchers": 996,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23277 POC to write a webshell to aspnet_client",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T13:35:18Z",
|
||||
"updated_at": "2023-04-24T13:24:18Z",
|
||||
"updated_at": "2023-08-02T06:25:05Z",
|
||||
"pushed_at": "2022-10-24T15:01:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 203,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-07-31T07:39:51Z",
|
||||
"updated_at": "2023-08-02T03:55:09Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 266,
|
||||
"watchers": 267,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2023-07-30T14:28:42Z",
|
||||
"updated_at": "2023-08-02T03:55:37Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"has_discussions": false,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 324,
|
||||
"watchers": 325,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -810,6 +810,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-07-30T18:58:17Z",
|
||||
"updated_at": "2023-08-02T06:22:36Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 816,
|
||||
"watchers_count": 816,
|
||||
"stargazers_count": 818,
|
||||
"watchers_count": 818,
|
||||
"has_discussions": false,
|
||||
"forks_count": 64,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 816,
|
||||
"forks": 66,
|
||||
"watchers": 818,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T02:20:52Z",
|
||||
"updated_at": "2023-08-01T08:56:07Z",
|
||||
"updated_at": "2023-08-02T05:20:01Z",
|
||||
"pushed_at": "2023-03-16T02:22:28Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -225,19 +225,19 @@
|
|||
"description": "非常简单的CVE-2023-0386's exp and analysis.Use c and sh.",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T07:49:52Z",
|
||||
"updated_at": "2023-08-01T19:44:45Z",
|
||||
"updated_at": "2023-08-02T01:33:04Z",
|
||||
"pushed_at": "2023-06-28T07:55:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -71,6 +71,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-2023",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T12:57:22Z",
|
||||
"updated_at": "2023-07-31T14:37:46Z",
|
||||
"updated_at": "2023-08-02T03:57:49Z",
|
||||
"pushed_at": "2023-07-25T02:38:31Z",
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"has_discussions": false,
|
||||
"forks_count": 164,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 164,
|
||||
"watchers": 422,
|
||||
"forks": 165,
|
||||
"watchers": 423,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -61,6 +61,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:17:23Z",
|
||||
"updated_at": "2023-08-01T01:08:29Z",
|
||||
"updated_at": "2023-08-02T03:40:09Z",
|
||||
"pushed_at": "2023-06-13T14:39:17Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 210,
|
||||
"watchers": 211,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2023-07-30T02:39:26Z",
|
||||
"updated_at": "2023-08-02T06:20:20Z",
|
||||
"pushed_at": "2023-02-27T04:51:20Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,8 +34,8 @@
|
|||
"use-after-free"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 238,
|
||||
"forks": 55,
|
||||
"watchers": 239,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-08-02T00:12:51Z",
|
||||
"updated_at": "2023-08-02T05:40:08Z",
|
||||
"pushed_at": "2023-07-10T16:35:49Z",
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"has_discussions": false,
|
||||
"forks_count": 157,
|
||||
"forks_count": 158,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"watchers": 422,
|
||||
"forks": 158,
|
||||
"watchers": 423,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-22884 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T09:26:36Z",
|
||||
"updated_at": "2023-08-01T12:52:20Z",
|
||||
"updated_at": "2023-08-02T04:00:04Z",
|
||||
"pushed_at": "2023-07-30T09:48:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
40
2023/CVE-2023-2333.json
Normal file
40
2023/CVE-2023-2333.json
Normal file
|
@ -0,0 +1,40 @@
|
|||
[
|
||||
{
|
||||
"id": 673576455,
|
||||
"name": "CVE-2023-2333-EXP",
|
||||
"full_name": "codeb0ss\/CVE-2023-2333-EXP",
|
||||
"owner": {
|
||||
"login": "codeb0ss",
|
||||
"id": 135759201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeb0ss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-2333-EXP",
|
||||
"description": "CVE-2023-2333-EXP",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-02T00:36:27Z",
|
||||
"updated_at": "2023-08-02T00:40:01Z",
|
||||
"pushed_at": "2023-08-02T00:39:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"0day",
|
||||
"codeb0ss",
|
||||
"codeboss",
|
||||
"cve",
|
||||
"cve-2023",
|
||||
"kurdistan",
|
||||
"uncodeboss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -122,6 +122,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -475,10 +475,10 @@
|
|||
"description": "Proof of Concept for CVE-2023-23397 in Python",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-21T18:38:00Z",
|
||||
"updated_at": "2023-07-27T08:51:47Z",
|
||||
"updated_at": "2023-08-02T03:11:57Z",
|
||||
"pushed_at": "2023-03-21T18:43:50Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -487,7 +487,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Apache Dubbo (CVE-2023-23638)漏洞利用的工程化实践",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-11T07:37:52Z",
|
||||
"updated_at": "2023-08-01T03:14:06Z",
|
||||
"updated_at": "2023-08-02T04:10:49Z",
|
||||
"pushed_at": "2023-06-15T01:25:03Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 195,
|
||||
"watchers": 196,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-24078 for FuguHub \/ BarracudaDrive",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-17T03:39:35Z",
|
||||
"updated_at": "2023-07-07T17:22:26Z",
|
||||
"updated_at": "2023-08-02T01:51:51Z",
|
||||
"pushed_at": "2023-06-19T01:21:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -148,18 +148,22 @@
|
|||
"description": "Perform With Mass Remote Code Execution In SPIP Version (4.2.1)",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-31T20:32:36Z",
|
||||
"updated_at": "2023-08-01T10:08:36Z",
|
||||
"updated_at": "2023-08-02T02:53:59Z",
|
||||
"pushed_at": "2023-07-31T20:54:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"rce-exploit",
|
||||
"remote-code-execution",
|
||||
"spip-plugin"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-25T13:25:10Z",
|
||||
"updated_at": "2023-07-24T07:23:23Z",
|
||||
"updated_at": "2023-08-02T03:55:56Z",
|
||||
"pushed_at": "2023-06-02T12:10:06Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 29,
|
||||
"watchers": 115,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-29T14:21:08Z",
|
||||
"updated_at": "2023-07-30T19:28:30Z",
|
||||
"updated_at": "2023-08-02T03:45:19Z",
|
||||
"pushed_at": "2023-07-06T08:14:17Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "rce",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-14T09:43:31Z",
|
||||
"updated_at": "2023-08-01T22:19:45Z",
|
||||
"updated_at": "2023-08-02T02:42:09Z",
|
||||
"pushed_at": "2023-06-15T01:35:51Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -130,10 +130,10 @@
|
|||
"html_url": "https:\/\/github.com\/Pari-Malam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pari-Malam\/CVE-2023-32315",
|
||||
"description": null,
|
||||
"description": "Perform With Massive Openfire Unauthenticated Users",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-02T20:38:14Z",
|
||||
"updated_at": "2023-07-08T11:03:21Z",
|
||||
"updated_at": "2023-08-02T02:57:32Z",
|
||||
"pushed_at": "2023-07-24T22:21:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
@ -142,7 +142,11 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"openfire",
|
||||
"rce-exploit",
|
||||
"unauthenticated"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-28T03:06:10Z",
|
||||
"updated_at": "2023-07-31T13:31:30Z",
|
||||
"updated_at": "2023-08-02T01:54:31Z",
|
||||
"pushed_at": "2023-07-28T03:06:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-08-01T12:10:42Z",
|
||||
"updated_at": "2023-08-02T01:12:01Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 352,
|
||||
"forks": 34,
|
||||
"watchers": 354,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -197,10 +197,10 @@
|
|||
"description": "RocketMQ RCE (CVE-2023-33246) woodpecker 利用插件",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-05T09:23:25Z",
|
||||
"updated_at": "2023-07-24T08:30:41Z",
|
||||
"updated_at": "2023-08-02T05:51:19Z",
|
||||
"pushed_at": "2023-06-15T11:20:48Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-34312",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-27T12:44:42Z",
|
||||
"updated_at": "2023-08-01T15:29:34Z",
|
||||
"updated_at": "2023-08-02T06:10:22Z",
|
||||
"pushed_at": "2023-05-27T12:45:10Z",
|
||||
"stargazers_count": 393,
|
||||
"watchers_count": 393,
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 393,
|
||||
"watchers": 395,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -211,6 +211,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T05:06:27Z",
|
||||
"updated_at": "2023-08-01T15:57:37Z",
|
||||
"updated_at": "2023-08-02T03:12:43Z",
|
||||
"pushed_at": "2023-07-29T16:58:16Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 76,
|
||||
"forks": 21,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -147,6 +147,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC of CVE-2023-35086 only DoS",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-25T01:36:07Z",
|
||||
"updated_at": "2023-07-30T04:21:45Z",
|
||||
"updated_at": "2023-08-02T01:43:53Z",
|
||||
"pushed_at": "2023-07-25T01:42:02Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Lightdash文件读取漏洞(CVE-2023-35844)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-26T10:14:29Z",
|
||||
"updated_at": "2023-07-12T03:42:06Z",
|
||||
"updated_at": "2023-08-02T03:02:34Z",
|
||||
"pushed_at": "2023-06-26T10:23:59Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Cloudpanel 0-day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T09:20:22Z",
|
||||
"updated_at": "2023-08-01T08:43:21Z",
|
||||
"updated_at": "2023-08-02T04:47:10Z",
|
||||
"pushed_at": "2023-07-24T01:43:17Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 673329586,
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-28T03:39:07Z",
|
||||
"updated_at": "2023-07-28T03:40:31Z",
|
||||
"updated_at": "2023-08-02T03:02:30Z",
|
||||
"pushed_at": "2023-07-28T03:39:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"zeroday"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
17
README.md
17
README.md
|
@ -253,6 +253,13 @@
|
|||
|
||||
- [elweth-sec/CVE-2023-2255](https://github.com/elweth-sec/CVE-2023-2255)
|
||||
|
||||
### CVE-2023-2333 (2023-07-04)
|
||||
|
||||
<code>The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
||||
</code>
|
||||
|
||||
- [codeb0ss/CVE-2023-2333-EXP](https://github.com/codeb0ss/CVE-2023-2333-EXP)
|
||||
|
||||
### CVE-2023-2516 (2023-05-05)
|
||||
|
||||
<code>Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
|
||||
|
@ -9433,6 +9440,13 @@
|
|||
|
||||
- [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279)
|
||||
|
||||
### CVE-2021-3281 (2021-02-02)
|
||||
|
||||
<code>In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
|
||||
</code>
|
||||
|
||||
- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
|
||||
|
||||
### CVE-2021-3291 (2021-01-26)
|
||||
|
||||
<code>Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
|
||||
|
@ -10354,6 +10368,7 @@
|
|||
- [keven1z/CVE-2021-22205](https://github.com/keven1z/CVE-2021-22205)
|
||||
- [hhhotdrink/CVE-2021-22205](https://github.com/hhhotdrink/CVE-2021-22205)
|
||||
- [sei-fish/CVE-2021-22205](https://github.com/sei-fish/CVE-2021-22205)
|
||||
- [overgrowncarrot1/DejaVu-CVE-2021-22205](https://github.com/overgrowncarrot1/DejaVu-CVE-2021-22205)
|
||||
|
||||
### CVE-2021-22206 (2021-05-06)
|
||||
|
||||
|
@ -12239,7 +12254,7 @@
|
|||
- [tuntin9x/CheckHKRCE](https://github.com/tuntin9x/CheckHKRCE)
|
||||
- [Cuerz/CVE-2021-36260](https://github.com/Cuerz/CVE-2021-36260)
|
||||
- [TakenoSite/Simple-CVE-2021-36260](https://github.com/TakenoSite/Simple-CVE-2021-36260)
|
||||
- [r3t4k3r/hikvision_brute](https://github.com/r3t4k3r/hikvision_brute)
|
||||
- [hheeyywweellccoommee/hikvision_brute-jnrxx](https://github.com/hheeyywweellccoommee/hikvision_brute-jnrxx)
|
||||
|
||||
### CVE-2021-36394 (2023-03-06)
|
||||
|
||||
|
|
Loading…
Reference in a new issue