Auto Update 2024/01/14 00:31:16

This commit is contained in:
motikan2010-bot 2024-01-14 09:31:16 +09:00
parent f51ba367e5
commit 23199e2d8d
35 changed files with 616 additions and 87 deletions

32
2009/CVE-2009-4137.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 112379736,
"name": "CVE-2009-4137",
"full_name": "Alexeyan\/CVE-2009-4137",
"owner": {
"login": "Alexeyan",
"id": 6674109,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6674109?v=4",
"html_url": "https:\/\/github.com\/Alexeyan"
},
"html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137",
"description": "Exploit for piwik CVE-2009-4140 RCE",
"fork": false,
"created_at": "2017-11-28T19:31:47Z",
"updated_at": "2019-12-19T19:46:29Z",
"pushed_at": "2018-01-15T10:40:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 84927797,
"name": "CVE-2009-5147",
"full_name": "vpereira\/CVE-2009-5147",
"owner": {
"login": "vpereira",
"id": 37418,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37418?v=4",
"html_url": "https:\/\/github.com\/vpereira"
},
"html_url": "https:\/\/github.com\/vpereira\/CVE-2009-5147",
"description": "poc for CVE-2009-5147",
"fork": false,
"created_at": "2017-03-14T09:04:14Z",
"updated_at": "2017-03-14T09:06:07Z",
"pushed_at": "2017-03-14T09:16:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
},
{
"id": 183373457,
"name": "-Ruby-dl-handle.c-CVE-2009-5147-",

32
2016/CVE-2016-2118.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2016/CVE-2016-3141.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2023-03-11T18:41:15Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -13,10 +13,10 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2024-01-10T14:12:02Z",
"updated_at": "2024-01-13T22:06:04Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"has_discussions": false,
"forks_count": 204,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 204,
"watchers": 512,
"watchers": 513,
"score": 0,
"subscribers_count": 34
},

View file

@ -171,10 +171,10 @@
"description": "Automated tool to exploit sharepoint CVE-2019-0604",
"fork": false,
"created_at": "2021-04-22T12:11:22Z",
"updated_at": "2022-10-10T00:04:00Z",
"updated_at": "2024-01-13T21:23:36Z",
"pushed_at": "2021-02-12T14:04:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -183,7 +183,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},

View file

@ -2494,5 +2494,35 @@
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 742980382,
"name": "https-github.com-jamf-CVE-2020-0796-RCE-POC",
"full_name": "Vladshambaryan\/https-github.com-jamf-CVE-2020-0796-RCE-POC",
"owner": {
"login": "Vladshambaryan",
"id": 132017930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132017930?v=4",
"html_url": "https:\/\/github.com\/Vladshambaryan"
},
"html_url": "https:\/\/github.com\/Vladshambaryan\/https-github.com-jamf-CVE-2020-0796-RCE-POC",
"description": null,
"fork": false,
"created_at": "2024-01-13T23:54:45Z",
"updated_at": "2024-01-13T23:54:45Z",
"pushed_at": "2024-01-13T23:54:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -60,7 +60,7 @@
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 352007665,

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-01-12T18:04:07Z",
"updated_at": "2024-01-13T19:20:57Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1767,
"watchers_count": 1767,
"stargazers_count": 1768,
"watchers_count": 1768,
"has_discussions": false,
"forks_count": 584,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 584,
"watchers": 1767,
"watchers": 1768,
"score": 0,
"subscribers_count": 44
},
@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2024-01-03T16:27:29Z",
"updated_at": "2024-01-13T19:21:00Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 951,
"watchers_count": 951,
"stargazers_count": 952,
"watchers_count": 952,
"has_discussions": false,
"forks_count": 229,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 229,
"watchers": 951,
"watchers": 952,
"score": 0,
"subscribers_count": 26
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -899,10 +899,10 @@
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
"updated_at": "2023-09-28T11:34:15Z",
"updated_at": "2024-01-13T18:39:54Z",
"pushed_at": "2021-12-19T08:27:33Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -911,7 +911,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 64,
"watchers": 65,
"score": 0,
"subscribers_count": 2
},

View file

@ -2451,7 +2451,7 @@
"forks": 31,
"watchers": 81,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 469576020,

View file

@ -7053,7 +7053,7 @@
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 438791130,
@ -10269,7 +10269,7 @@
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
"pushed_at": "2023-12-01T14:59:22Z",
"pushed_at": "2024-01-13T19:12:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

32
2022/CVE-2022-0219.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 450128440,
"name": "CVE-2022-0219",
"full_name": "Haxatron\/CVE-2022-0219",
"owner": {
"login": "Haxatron",
"id": 76475453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76475453?v=4",
"html_url": "https:\/\/github.com\/Haxatron"
},
"html_url": "https:\/\/github.com\/Haxatron\/CVE-2022-0219",
"description": null,
"fork": false,
"created_at": "2022-01-20T14:24:45Z",
"updated_at": "2022-01-20T14:24:45Z",
"pushed_at": "2022-01-20T14:35:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

64
2022/CVE-2022-0236.json Normal file
View file

@ -0,0 +1,64 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2023-01-28T03:56:57Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

36
2022/CVE-2022-21658.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 450374545,
"name": "cve-2022-21658",
"full_name": "sagittarius-a\/cve-2022-21658",
"owner": {
"login": "sagittarius-a",
"id": 8809698,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8809698?v=4",
"html_url": "https:\/\/github.com\/sagittarius-a"
},
"html_url": "https:\/\/github.com\/sagittarius-a\/cve-2022-21658",
"description": "POC for cve-2022-21658",
"fork": false,
"created_at": "2022-01-21T06:09:16Z",
"updated_at": "2023-10-03T02:34:46Z",
"pushed_at": "2022-01-21T06:09:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21658",
"poc",
"rust"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 446296593,
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"owner": {
"login": "UzJu",
"id": 50813806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
"html_url": "https:\/\/github.com\/UzJu"
},
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"description": "CVE-2022-21660",
"fork": false,
"created_at": "2022-01-10T05:50:35Z",
"updated_at": "2023-08-04T05:22:54Z",
"pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
{
"id": 462232980,
"name": "CVE-2022-21660",

View file

@ -79,6 +79,66 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2024-01-12T14:50:41Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 361,
"watchers_count": 361,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 361,
"score": 0,
"subscribers_count": 10
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
@ -116,6 +176,36 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2023-12-27T10:23:02Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},
{
"id": 477659433,
"name": "CVE-2022-21907",

32
2022/CVE-2022-22296.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 450430110,
"name": "CVE-2022-22296",
"full_name": "vlakhani28\/CVE-2022-22296",
"owner": {
"login": "vlakhani28",
"id": 42069316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42069316?v=4",
"html_url": "https:\/\/github.com\/vlakhani28"
},
"html_url": "https:\/\/github.com\/vlakhani28\/CVE-2022-22296",
"description": "All Details about CVE-2022-22296",
"fork": false,
"created_at": "2022-01-21T09:29:21Z",
"updated_at": "2023-09-28T11:35:14Z",
"pushed_at": "2022-01-21T09:45:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -48,6 +48,38 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 450360735,
"name": "CVE-2022-RCE",
"full_name": "AlphabugX\/CVE-2022-RCE",
"owner": {
"login": "AlphabugX",
"id": 27001865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27001865?v=4",
"html_url": "https:\/\/github.com\/AlphabugX"
},
"html_url": "https:\/\/github.com\/AlphabugX\/CVE-2022-RCE",
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
"fork": false,
"created_at": "2022-01-21T05:07:59Z",
"updated_at": "2022-11-05T22:58:02Z",
"pushed_at": "2022-01-21T05:21:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 670307374,
"name": "CVE-2022-23305_POC",

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)",
"fork": false,
"created_at": "2023-04-13T13:19:04Z",
"updated_at": "2023-07-14T06:01:23Z",
"updated_at": "2024-01-13T18:37:05Z",
"pushed_at": "2023-06-15T17:08:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-01-12T01:49:22Z",
"updated_at": "2024-01-13T23:47:46Z",
"pushed_at": "2024-01-01T13:58:49Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": true,
"forks_count": 20,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 144,
"watchers": 145,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
"fork": false,
"created_at": "2023-06-13T13:17:23Z",
"updated_at": "2024-01-07T11:05:49Z",
"updated_at": "2024-01-13T19:26:06Z",
"pushed_at": "2023-06-13T14:39:17Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 221,
"watchers": 222,
"score": 0,
"subscribers_count": 4
},

View file

@ -199,10 +199,10 @@
"description": "OpenSSH 9.1漏洞大规模扫描和利用",
"fork": false,
"created_at": "2023-06-30T09:34:36Z",
"updated_at": "2023-12-28T06:43:17Z",
"updated_at": "2024-01-14T00:20:17Z",
"pushed_at": "2023-06-30T09:36:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -211,7 +211,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
"fork": false,
"created_at": "2024-01-11T19:17:13Z",
"updated_at": "2024-01-13T16:40:40Z",
"updated_at": "2024-01-13T22:29:12Z",
"pushed_at": "2024-01-11T19:42:03Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 46,
"watchers": 49,
"score": 0,
"subscribers_count": 1
}

View file

@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2024-01-13T14:15:06Z",
"updated_at": "2024-01-13T22:26:48Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 3
}

View file

@ -43,10 +43,10 @@
"description": "Takeover Account OpenSSH",
"fork": false,
"created_at": "2023-11-09T04:34:39Z",
"updated_at": "2024-01-09T15:15:00Z",
"updated_at": "2024-01-13T18:36:08Z",
"pushed_at": "2023-11-09T04:36:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-01-12T13:09:45Z",
"updated_at": "2024-01-13T21:48:44Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 730,
"watchers_count": 730,
"stargazers_count": 732,
"watchers_count": 732,
"has_discussions": false,
"forks_count": 132,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 132,
"watchers": 730,
"watchers": 732,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-01-12T11:01:49Z",
"updated_at": "2024-01-13T23:13:28Z",
"pushed_at": "2024-01-04T16:03:13Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 183,
"watchers_count": 183,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 182,
"watchers": 183,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2024-01-12T02:58:13Z",
"updated_at": "2024-01-13T23:27:32Z",
"pushed_at": "2023-12-07T03:10:06Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 159,
"watchers": 160,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-25T10:33:09Z",
"updated_at": "2023-11-20T15:46:28Z",
"updated_at": "2024-01-13T19:41:48Z",
"pushed_at": "2023-09-25T16:09:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -89,10 +89,10 @@
"description": "A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass",
"fork": false,
"created_at": "2023-12-29T17:47:54Z",
"updated_at": "2024-01-12T22:04:57Z",
"updated_at": "2024-01-13T22:16:10Z",
"pushed_at": "2023-12-31T21:29:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -106,7 +106,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T10:53:50Z",
"updated_at": "2024-01-13T16:24:51Z",
"updated_at": "2024-01-14T00:30:19Z",
"pushed_at": "2024-01-12T13:56:38Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 15,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
@ -106,19 +106,19 @@
"description": "This repository presents a proof-of-concept of CVE-2023-7028",
"fork": false,
"created_at": "2024-01-12T18:29:27Z",
"updated_at": "2024-01-13T18:23:32Z",
"updated_at": "2024-01-14T00:30:24Z",
"pushed_at": "2024-01-13T13:50:20Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 9,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 80,
"forks": 13,
"watchers": 91,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-01-13T18:15:26Z",
"updated_at": "2024-01-13T22:22:24Z",
"pushed_at": "2024-01-12T15:16:59Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 41,
"score": 0,
"subscribers_count": 1
}

View file

@ -6326,6 +6326,21 @@
- [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion)
- [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit)
### CVE-2022-0219 (2022-01-20)
<code>Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.
</code>
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
### CVE-2022-0236 (2022-01-18)
<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
<code>Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
@ -7610,11 +7625,19 @@
- [rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit](https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit)
- [sahabrifki/CVE-2022-21587-Oracle-EBS-](https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS-)
### CVE-2022-21658 (2022-01-20)
<code>Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.
</code>
- [sagittarius-a/cve-2022-21658](https://github.com/sagittarius-a/cve-2022-21658)
### CVE-2022-21660 (2022-02-09)
<code>Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
</code>
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@ -7706,7 +7729,10 @@
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)
- [gpiechnik2/nmap-CVE-2022-21907](https://github.com/gpiechnik2/nmap-CVE-2022-21907)
- [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys)
@ -7784,6 +7810,13 @@
- [4lucardSec/Sonic_CVE-2022-22274_poc](https://github.com/4lucardSec/Sonic_CVE-2022-22274_poc)
- [forthisvideo/CVE-2022-22274_poc](https://github.com/forthisvideo/CVE-2022-22274_poc)
### CVE-2022-22296 (2022-01-24)
<code>Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.
</code>
- [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296)
### CVE-2022-22536 (2022-02-09)
<code>SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n
@ -8290,6 +8323,7 @@
</code>
- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder)
- [AlphabugX/CVE-2022-RCE](https://github.com/AlphabugX/CVE-2022-RCE)
- [tkomlodi/CVE-2022-23305_POC](https://github.com/tkomlodi/CVE-2022-23305_POC)
### CVE-2022-23342 (2022-06-21)
@ -19864,6 +19898,7 @@
- [OldDream666/cve-2020-0796](https://github.com/OldDream666/cve-2020-0796)
- [heeloo123/CVE-2020-0796](https://github.com/heeloo123/CVE-2020-0796)
- [Ajomix/CVE-2020-0796](https://github.com/Ajomix/CVE-2020-0796)
- [Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC](https://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC)
### CVE-2020-0799 (2020-03-12)
@ -34246,6 +34281,13 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@ -34367,6 +34409,13 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
### CVE-2016-3141 (2016-03-31)
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;
@ -38105,6 +38154,13 @@
- [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118)
### CVE-2009-4137 (2009-12-24)
<code>The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
</code>
- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137)
### CVE-2009-4623 (2010-01-18)
<code>Multiple PHP remote file inclusion vulnerabilities in Advanced Comment System 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the ACS_path parameter to (1) index.php and (2) admin.php in advanced_comment_system/. NOTE: this might only be a vulnerability when the administrator has not followed installation instructions in install.php. NOTE: this might be the same as CVE-2020-35598.
@ -38126,6 +38182,7 @@
<code>DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
</code>
- [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147)
- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-)