Auto Update 2023/11/17 06:37:56

This commit is contained in:
motikan2010-bot 2023-11-17 15:37:56 +09:00
parent 4f50c77afb
commit 29410b3541
61 changed files with 236 additions and 301 deletions

View file

@ -1,36 +1,32 @@
[ [
{ {
"id": 571343463, "id": 579367561,
"name": "CVE-2003-0358", "name": "CVE-2003-0358",
"full_name": "snowcra5h\/CVE-2003-0358", "full_name": "gmh5225\/CVE-2003-0358",
"owner": { "owner": {
"login": "snowcra5h", "login": "gmh5225",
"id": 90065760, "id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90065760?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/snowcra5h" "html_url": "https:\/\/github.com\/gmh5225"
}, },
"html_url": "https:\/\/github.com\/snowcra5h\/CVE-2003-0358", "html_url": "https:\/\/github.com\/gmh5225\/CVE-2003-0358",
"description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.", "description": "By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.",
"fork": false, "fork": false,
"created_at": "2022-11-27T22:45:43Z", "created_at": "2022-12-17T13:11:00Z",
"updated_at": "2023-09-28T11:44:05Z", "updated_at": "2022-11-27T22:57:19Z",
"pushed_at": "2022-12-16T19:58:21Z", "pushed_at": "2022-12-16T19:58:21Z",
"stargazers_count": 4, "stargazers_count": 0,
"watchers_count": 4, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [ "topics": [],
"cve",
"security",
"vulnerability"
],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 1,
"watchers": 4, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 0
} }
] ]

View file

@ -1,34 +1,4 @@
[ [
{
"id": 84927797,
"name": "CVE-2009-5147",
"full_name": "vpereira\/CVE-2009-5147",
"owner": {
"login": "vpereira",
"id": 37418,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37418?v=4",
"html_url": "https:\/\/github.com\/vpereira"
},
"html_url": "https:\/\/github.com\/vpereira\/CVE-2009-5147",
"description": "poc for CVE-2009-5147",
"fork": false,
"created_at": "2017-03-14T09:04:14Z",
"updated_at": "2017-03-14T09:06:07Z",
"pushed_at": "2017-03-14T09:16:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{ {
"id": 183373457, "id": 183373457,
"name": "-Ruby-dl-handle.c-CVE-2009-5147-", "name": "-Ruby-dl-handle.c-CVE-2009-5147-",

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-11T16:26:27Z", "updated_at": "2023-11-17T02:47:07Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1830, "stargazers_count": 1831,
"watchers_count": 1830, "watchers_count": 1831,
"has_discussions": false, "has_discussions": false,
"forks_count": 337, "forks_count": 337,
"allow_forking": true, "allow_forking": true,
@ -76,7 +76,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 337, "forks": 337,
"watchers": 1830, "watchers": 1831,
"score": 0, "score": 0,
"subscribers_count": 34 "subscribers_count": 34
}, },

View file

@ -43,7 +43,7 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2016-05-08T06:22:07Z", "created_at": "2016-05-08T06:22:07Z",
"updated_at": "2022-11-20T06:13:53Z", "updated_at": "2023-11-17T00:55:47Z",
"pushed_at": "2016-05-10T22:41:12Z", "pushed_at": "2016-05-10T22:41:12Z",
"stargazers_count": 41, "stargazers_count": 41,
"watchers_count": 41, "watchers_count": 41,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-11T16:26:27Z", "updated_at": "2023-11-17T02:47:07Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1830, "stargazers_count": 1831,
"watchers_count": 1830, "watchers_count": 1831,
"has_discussions": false, "has_discussions": false,
"forks_count": 337, "forks_count": 337,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 337, "forks": 337,
"watchers": 1830, "watchers": 1831,
"score": 0, "score": 0,
"subscribers_count": 34 "subscribers_count": 34
}, },

View file

@ -43,10 +43,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false, "fork": false,
"created_at": "2022-06-19T13:16:55Z", "created_at": "2022-06-19T13:16:55Z",
"updated_at": "2023-10-31T21:48:21Z", "updated_at": "2023-11-17T01:28:40Z",
"pushed_at": "2023-01-23T13:00:34Z", "pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 136, "stargazers_count": 137,
"watchers_count": 136, "watchers_count": 137,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 136, "watchers": 137,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -233,7 +233,7 @@
"stargazers_count": 44, "stargazers_count": 44,
"watchers_count": 44, "watchers_count": 44,
"has_discussions": false, "has_discussions": false,
"forks_count": 68, "forks_count": 69,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -241,7 +241,7 @@
"cve-2017-11882" "cve-2017-11882"
], ],
"visibility": "public", "visibility": "public",
"forks": 68, "forks": 69,
"watchers": 44, "watchers": 44,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4

View file

@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-11-16T17:56:50Z", "updated_at": "2023-11-17T05:18:15Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 108, "stargazers_count": 112,
"watchers_count": 108, "watchers_count": 112,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -355,7 +355,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 108, "watchers": 112,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-11T16:26:27Z", "updated_at": "2023-11-17T02:47:07Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1830, "stargazers_count": 1831,
"watchers_count": 1830, "watchers_count": 1831,
"has_discussions": false, "has_discussions": false,
"forks_count": 337, "forks_count": 337,
"allow_forking": true, "allow_forking": true,
@ -76,7 +76,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 337, "forks": 337,
"watchers": 1830, "watchers": 1831,
"score": 0, "score": 0,
"subscribers_count": 34 "subscribers_count": 34
}, },

View file

@ -13,7 +13,7 @@
"description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133", "description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133",
"fork": false, "fork": false,
"created_at": "2019-03-15T14:25:20Z", "created_at": "2019-03-15T14:25:20Z",
"updated_at": "2023-11-10T18:35:29Z", "updated_at": "2023-11-17T00:56:15Z",
"pushed_at": "2019-03-15T14:48:18Z", "pushed_at": "2019-03-15T14:48:18Z",
"stargazers_count": 10, "stargazers_count": 10,
"watchers_count": 10, "watchers_count": 10,

View file

@ -13,10 +13,10 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false, "fork": false,
"created_at": "2019-02-22T04:52:08Z", "created_at": "2019-02-22T04:52:08Z",
"updated_at": "2023-10-28T14:54:39Z", "updated_at": "2023-11-17T01:29:12Z",
"pushed_at": "2019-08-05T10:45:34Z", "pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 493, "stargazers_count": 492,
"watchers_count": 493, "watchers_count": 492,
"has_discussions": false, "has_discussions": false,
"forks_count": 192, "forks_count": 192,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 192, "forks": 192,
"watchers": 493, "watchers": 492,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-11T16:26:27Z", "updated_at": "2023-11-17T02:47:07Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1830, "stargazers_count": 1831,
"watchers_count": 1830, "watchers_count": 1831,
"has_discussions": false, "has_discussions": false,
"forks_count": 337, "forks_count": 337,
"allow_forking": true, "allow_forking": true,
@ -620,7 +620,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 337, "forks": 337,
"watchers": 1830, "watchers": 1831,
"score": 0, "score": 0,
"subscribers_count": 34 "subscribers_count": 34
}, },

View file

@ -43,10 +43,10 @@
"description": "cve-2018-8453 exp", "description": "cve-2018-8453 exp",
"fork": false, "fork": false,
"created_at": "2019-01-18T10:40:03Z", "created_at": "2019-01-18T10:40:03Z",
"updated_at": "2023-09-28T10:57:37Z", "updated_at": "2023-11-17T03:01:54Z",
"pushed_at": "2019-12-13T02:24:39Z", "pushed_at": "2019-12-13T02:24:39Z",
"stargazers_count": 120, "stargazers_count": 119,
"watchers_count": 120, "watchers_count": 119,
"has_discussions": false, "has_discussions": false,
"forks_count": 62, "forks_count": 62,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 62, "forks": 62,
"watchers": 120, "watchers": 119,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability", "description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false, "fork": false,
"created_at": "2018-12-27T06:30:32Z", "created_at": "2018-12-27T06:30:32Z",
"updated_at": "2023-09-28T10:56:57Z", "updated_at": "2023-11-17T03:08:20Z",
"pushed_at": "2018-12-30T11:53:08Z", "pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 332, "stargazers_count": 331,
"watchers_count": 332, "watchers_count": 331,
"has_discussions": false, "has_discussions": false,
"forks_count": 115, "forks_count": 115,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 115, "forks": 115,
"watchers": 332, "watchers": 331,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },

View file

@ -48,13 +48,13 @@
"stargazers_count": 191, "stargazers_count": 191,
"watchers_count": 191, "watchers_count": 191,
"has_discussions": false, "has_discussions": false,
"forks_count": 108, "forks_count": 109,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 108, "forks": 109,
"watchers": 191, "watchers": 191,
"score": 0, "score": 0,
"subscribers_count": 9 "subscribers_count": 9

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-11T16:26:27Z", "updated_at": "2023-11-17T02:47:07Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1830, "stargazers_count": 1831,
"watchers_count": 1830, "watchers_count": 1831,
"has_discussions": false, "has_discussions": false,
"forks_count": 337, "forks_count": 337,
"allow_forking": true, "allow_forking": true,
@ -226,7 +226,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 337, "forks": 337,
"watchers": 1830, "watchers": 1831,
"score": 0, "score": 0,
"subscribers_count": 34 "subscribers_count": 34
} }

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-11-16T17:56:50Z", "updated_at": "2023-11-17T05:18:15Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 108, "stargazers_count": 112,
"watchers_count": 108, "watchers_count": 112,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -901,7 +901,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 108, "watchers": 112,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-11T16:26:27Z", "updated_at": "2023-11-17T02:47:07Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1830, "stargazers_count": 1831,
"watchers_count": 1830, "watchers_count": 1831,
"has_discussions": false, "has_discussions": false,
"forks_count": 337, "forks_count": 337,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 337, "forks": 337,
"watchers": 1830, "watchers": 1831,
"score": 0, "score": 0,
"subscribers_count": 34 "subscribers_count": 34
}, },

View file

@ -13,10 +13,10 @@
"description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE", "description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE",
"fork": false, "fork": false,
"created_at": "2020-10-30T13:59:23Z", "created_at": "2020-10-30T13:59:23Z",
"updated_at": "2023-11-17T00:14:05Z", "updated_at": "2023-11-17T00:56:42Z",
"pushed_at": "2020-10-30T14:18:06Z", "pushed_at": "2020-10-30T14:18:06Z",
"stargazers_count": 6, "stargazers_count": 5,
"watchers_count": 6, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 6, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -318,7 +318,7 @@
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.", "description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false, "fork": false,
"created_at": "2020-09-28T05:00:37Z", "created_at": "2020-09-28T05:00:37Z",
"updated_at": "2023-11-10T18:16:51Z", "updated_at": "2023-11-17T00:56:40Z",
"pushed_at": "2020-10-10T17:19:51Z", "pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 17, "stargazers_count": 17,
"watchers_count": 17, "watchers_count": 17,

View file

@ -48,13 +48,13 @@
"stargazers_count": 1754, "stargazers_count": 1754,
"watchers_count": 1754, "watchers_count": 1754,
"has_discussions": false, "has_discussions": false,
"forks_count": 587, "forks_count": 586,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 587, "forks": 586,
"watchers": 1754, "watchers": 1754,
"score": 0, "score": 0,
"subscribers_count": 44 "subscribers_count": 44

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-11-13T08:56:00Z", "updated_at": "2023-11-17T02:18:23Z",
"pushed_at": "2023-10-10T05:38:02Z", "pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1155, "stargazers_count": 1156,
"watchers_count": 1155, "watchers_count": 1156,
"has_discussions": false, "has_discussions": false,
"forks_count": 149, "forks_count": 149,
"allow_forking": true, "allow_forking": true,
@ -870,7 +870,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 149, "forks": 149,
"watchers": 1155, "watchers": 1156,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
} }

View file

@ -18,13 +18,13 @@
"stargazers_count": 21, "stargazers_count": 21,
"watchers_count": 21, "watchers_count": 21,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 12,
"watchers": 21, "watchers": 21,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -241,13 +241,13 @@
"stargazers_count": 738, "stargazers_count": 738,
"watchers_count": 738, "watchers_count": 738,
"has_discussions": false, "has_discussions": false,
"forks_count": 120, "forks_count": 119,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 120, "forks": 119,
"watchers": 738, "watchers": 738,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10

View file

@ -133,10 +133,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具", "description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false, "fork": false,
"created_at": "2022-08-03T17:27:59Z", "created_at": "2022-08-03T17:27:59Z",
"updated_at": "2023-11-02T00:26:46Z", "updated_at": "2023-11-17T02:56:11Z",
"pushed_at": "2022-08-05T19:57:30Z", "pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 111, "stargazers_count": 112,
"watchers_count": 111, "watchers_count": 112,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
@ -148,7 +148,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 111, "watchers": 112,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)", "description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
"fork": false, "fork": false,
"created_at": "2022-05-27T21:09:03Z", "created_at": "2022-05-27T21:09:03Z",
"updated_at": "2023-11-17T00:14:19Z", "updated_at": "2023-11-17T00:57:16Z",
"pushed_at": "2022-10-19T21:24:35Z", "pushed_at": "2022-10-19T21:24:35Z",
"stargazers_count": 10, "stargazers_count": 9,
"watchers_count": 10, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 10, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,8 +13,8 @@
"description": "Working in Progress POC for CVE2021-38297", "description": "Working in Progress POC for CVE2021-38297",
"fork": false, "fork": false,
"created_at": "2023-11-15T20:52:36Z", "created_at": "2023-11-15T20:52:36Z",
"updated_at": "2023-11-15T20:53:33Z", "updated_at": "2023-11-17T04:28:20Z",
"pushed_at": "2023-11-15T20:56:06Z", "pushed_at": "2023-11-17T04:28:17Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -369,10 +369,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false, "fork": false,
"created_at": "2021-12-10T12:38:20Z", "created_at": "2021-12-10T12:38:20Z",
"updated_at": "2023-11-15T09:49:53Z", "updated_at": "2023-11-17T04:21:40Z",
"pushed_at": "2023-05-11T11:29:46Z", "pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1074, "stargazers_count": 1075,
"watchers_count": 1074, "watchers_count": 1075,
"has_discussions": false, "has_discussions": false,
"forks_count": 515, "forks_count": 515,
"allow_forking": true, "allow_forking": true,
@ -383,7 +383,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 515, "forks": 515,
"watchers": 1074, "watchers": 1075,
"score": 0, "score": 0,
"subscribers_count": 23 "subscribers_count": 23
}, },
@ -3359,10 +3359,10 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false, "fork": false,
"created_at": "2021-12-12T22:52:02Z", "created_at": "2021-12-12T22:52:02Z",
"updated_at": "2023-11-17T00:14:27Z", "updated_at": "2023-11-17T00:57:07Z",
"pushed_at": "2021-12-20T15:34:21Z", "pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 348, "stargazers_count": 347,
"watchers_count": 348, "watchers_count": 347,
"has_discussions": false, "has_discussions": false,
"forks_count": 52, "forks_count": 52,
"allow_forking": true, "allow_forking": true,
@ -3371,7 +3371,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 52, "forks": 52,
"watchers": 348, "watchers": 347,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },
@ -3703,10 +3703,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false, "fork": false,
"created_at": "2021-12-13T03:57:50Z", "created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-11-17T00:14:27Z", "updated_at": "2023-11-17T04:21:10Z",
"pushed_at": "2022-11-23T18:23:24Z", "pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3316, "stargazers_count": 3314,
"watchers_count": 3316, "watchers_count": 3314,
"has_discussions": true, "has_discussions": true,
"forks_count": 750, "forks_count": 750,
"allow_forking": true, "allow_forking": true,
@ -3715,7 +3715,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 750, "forks": 750,
"watchers": 3316, "watchers": 3314,
"score": 0, "score": 0,
"subscribers_count": 58 "subscribers_count": 58
}, },
@ -6278,10 +6278,10 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-14T23:33:51Z", "created_at": "2021-12-14T23:33:51Z",
"updated_at": "2023-11-17T00:14:26Z", "updated_at": "2023-11-17T00:57:07Z",
"pushed_at": "2022-03-23T18:12:51Z", "pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 347, "stargazers_count": 345,
"watchers_count": 347, "watchers_count": 345,
"has_discussions": false, "has_discussions": false,
"forks_count": 91, "forks_count": 91,
"allow_forking": true, "allow_forking": true,
@ -6290,7 +6290,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 91, "forks": 91,
"watchers": 347, "watchers": 345,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -133,10 +133,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false, "fork": false,
"created_at": "2022-03-07T18:55:20Z", "created_at": "2022-03-07T18:55:20Z",
"updated_at": "2023-11-17T00:14:06Z", "updated_at": "2023-11-17T00:57:11Z",
"pushed_at": "2022-03-08T06:20:05Z", "pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1059, "stargazers_count": 1057,
"watchers_count": 1059, "watchers_count": 1057,
"has_discussions": false, "has_discussions": false,
"forks_count": 223, "forks_count": 223,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 223, "forks": 223,
"watchers": 1059, "watchers": 1057,
"score": 0, "score": 0,
"subscribers_count": 17 "subscribers_count": 17
}, },

View file

@ -673,10 +673,10 @@
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell", "description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
"fork": false, "fork": false,
"created_at": "2022-03-08T09:32:36Z", "created_at": "2022-03-08T09:32:36Z",
"updated_at": "2023-09-29T14:18:43Z", "updated_at": "2023-11-17T01:34:26Z",
"pushed_at": "2022-03-08T09:36:31Z", "pushed_at": "2022-03-08T09:36:31Z",
"stargazers_count": 30, "stargazers_count": 31,
"watchers_count": 30, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -685,7 +685,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 30, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -796,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-11-13T08:56:00Z", "updated_at": "2023-11-17T02:18:23Z",
"pushed_at": "2023-10-10T05:38:02Z", "pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1155, "stargazers_count": 1156,
"watchers_count": 1155, "watchers_count": 1156,
"has_discussions": false, "has_discussions": false,
"forks_count": 149, "forks_count": 149,
"allow_forking": true, "allow_forking": true,
@ -815,7 +815,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 149, "forks": 149,
"watchers": 1155, "watchers": 1156,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -1913,10 +1913,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977", "description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false, "fork": false,
"created_at": "2022-06-19T13:16:55Z", "created_at": "2022-06-19T13:16:55Z",
"updated_at": "2023-10-31T21:48:21Z", "updated_at": "2023-11-17T01:28:40Z",
"pushed_at": "2023-01-23T13:00:34Z", "pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 136, "stargazers_count": 137,
"watchers_count": 136, "watchers_count": 137,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -1925,7 +1925,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 136, "watchers": 137,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -907,6 +907,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)", "description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
"fork": false, "fork": false,
"created_at": "2022-05-27T21:09:03Z", "created_at": "2022-05-27T21:09:03Z",
"updated_at": "2023-11-17T00:14:19Z", "updated_at": "2023-11-17T00:57:16Z",
"pushed_at": "2022-10-19T21:24:35Z", "pushed_at": "2022-10-19T21:24:35Z",
"stargazers_count": 10, "stargazers_count": 9,
"watchers_count": 10, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 10, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -626,8 +626,8 @@
"description": "CVE-2023-20198 Exploit PoC", "description": "CVE-2023-20198 Exploit PoC",
"fork": false, "fork": false,
"created_at": "2023-11-16T16:39:38Z", "created_at": "2023-11-16T16:39:38Z",
"updated_at": "2023-11-16T16:39:39Z", "updated_at": "2023-11-17T03:33:23Z",
"pushed_at": "2023-11-16T16:43:16Z", "pushed_at": "2023-11-17T03:56:09Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
@ -640,6 +640,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-08-21T00:31:50Z", "created_at": "2023-08-21T00:31:50Z",
"updated_at": "2023-11-16T09:33:28Z", "updated_at": "2023-11-17T05:58:11Z",
"pushed_at": "2023-08-21T00:33:08Z", "pushed_at": "2023-08-21T00:33:08Z",
"stargazers_count": 47, "stargazers_count": 49,
"watchers_count": 47, "watchers_count": 49,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 47, "watchers": 49,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具", "description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false, "fork": false,
"created_at": "2023-10-11T08:42:17Z", "created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-11-16T11:12:56Z", "updated_at": "2023-11-17T01:24:39Z",
"pushed_at": "2023-10-16T02:24:02Z", "pushed_at": "2023-10-16T02:24:02Z",
"stargazers_count": 94, "stargazers_count": 95,
"watchers_count": 94, "watchers_count": 95,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -124,7 +124,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 94, "watchers": 95,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -424,10 +424,10 @@
"description": "CVE-2023-22515", "description": "CVE-2023-22515",
"fork": false, "fork": false,
"created_at": "2023-10-30T00:17:45Z", "created_at": "2023-10-30T00:17:45Z",
"updated_at": "2023-11-16T05:28:28Z", "updated_at": "2023-11-17T03:45:59Z",
"pushed_at": "2023-11-10T17:43:40Z", "pushed_at": "2023-11-10T17:43:40Z",
"stargazers_count": 18, "stargazers_count": 21,
"watchers_count": 18, "watchers_count": 21,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -445,7 +445,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 18, "watchers": 21,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -95,13 +95,13 @@
"stargazers_count": 23, "stargazers_count": 23,
"watchers_count": 23, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 12,
"watchers": 23, "watchers": 23,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "POC for CVE-2023-24488", "description": "POC for CVE-2023-24488",
"fork": false, "fork": false,
"created_at": "2023-07-04T18:02:50Z", "created_at": "2023-07-04T18:02:50Z",
"updated_at": "2023-10-17T15:37:05Z", "updated_at": "2023-11-17T06:33:09Z",
"pushed_at": "2023-07-04T18:39:03Z", "pushed_at": "2023-07-04T18:39:03Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -48,13 +48,13 @@
"stargazers_count": 19, "stargazers_count": 19,
"watchers_count": 19, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 14,
"watchers": 19, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
@ -78,13 +78,13 @@
"stargazers_count": 105, "stargazers_count": 105,
"watchers_count": 105, "watchers_count": 105,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 24,
"watchers": 105, "watchers": 105,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3

View file

@ -13,7 +13,7 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-09-04T07:48:13Z", "created_at": "2023-09-04T07:48:13Z",
"updated_at": "2023-11-16T09:10:21Z", "updated_at": "2023-11-17T00:57:51Z",
"pushed_at": "2023-09-04T07:51:58Z", "pushed_at": "2023-09-04T07:51:58Z",
"stargazers_count": 111, "stargazers_count": 111,
"watchers_count": 111, "watchers_count": 111,

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-07-22T20:37:15Z", "created_at": "2023-07-22T20:37:15Z",
"updated_at": "2023-11-17T00:14:18Z", "updated_at": "2023-11-17T00:57:47Z",
"pushed_at": "2023-07-22T21:06:26Z", "pushed_at": "2023-07-22T21:06:26Z",
"stargazers_count": 6, "stargazers_count": 5,
"watchers_count": 6, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 6, "watchers": 5,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -417,6 +417,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-08-15T04:16:46Z", "created_at": "2023-08-15T04:16:46Z",
"updated_at": "2023-11-14T20:27:59Z", "updated_at": "2023-11-17T06:00:49Z",
"pushed_at": "2023-08-17T11:43:26Z", "pushed_at": "2023-08-17T11:43:26Z",
"stargazers_count": 98, "stargazers_count": 99,
"watchers_count": 98, "watchers_count": 99,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 98, "watchers": 99,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
} }

View file

@ -43,10 +43,10 @@
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640", "description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
"fork": false, "fork": false,
"created_at": "2023-11-09T09:19:23Z", "created_at": "2023-11-09T09:19:23Z",
"updated_at": "2023-11-16T16:53:22Z", "updated_at": "2023-11-17T06:29:33Z",
"pushed_at": "2023-11-15T08:35:06Z", "pushed_at": "2023-11-15T08:35:06Z",
"stargazers_count": 86, "stargazers_count": 87,
"watchers_count": 86, "watchers_count": 87,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 86, "watchers": 87,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false, "fork": false,
"created_at": "2023-06-28T13:22:26Z", "created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-11-17T00:19:15Z", "updated_at": "2023-11-17T00:57:45Z",
"pushed_at": "2023-07-28T13:20:45Z", "pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 432, "stargazers_count": 431,
"watchers_count": 432, "watchers_count": 431,
"has_discussions": false, "has_discussions": false,
"forks_count": 44, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 44, "forks": 44,
"watchers": 432, "watchers": 431,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
} }

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2023-36427", "description": "Report and exploit of CVE-2023-36427",
"fork": false, "fork": false,
"created_at": "2023-10-09T16:55:18Z", "created_at": "2023-10-09T16:55:18Z",
"updated_at": "2023-11-16T23:26:38Z", "updated_at": "2023-11-17T06:29:01Z",
"pushed_at": "2023-11-16T04:24:37Z", "pushed_at": "2023-11-16T04:24:37Z",
"stargazers_count": 44, "stargazers_count": 47,
"watchers_count": 44, "watchers_count": 47,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 44, "watchers": 47,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -18,13 +18,13 @@
"stargazers_count": 119, "stargazers_count": 119,
"watchers_count": 119, "watchers_count": 119,
"has_discussions": false, "has_discussions": false,
"forks_count": 41, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 41, "forks": 42,
"watchers": 119, "watchers": 119,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5

View file

@ -73,7 +73,7 @@
"description": "PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy", "description": "PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy",
"fork": false, "fork": false,
"created_at": "2023-10-20T02:05:27Z", "created_at": "2023-10-20T02:05:27Z",
"updated_at": "2023-11-08T15:41:23Z", "updated_at": "2023-11-17T00:57:56Z",
"pushed_at": "2023-10-24T15:56:46Z", "pushed_at": "2023-10-24T15:56:46Z",
"stargazers_count": 29, "stargazers_count": 29,
"watchers_count": 29, "watchers_count": 29,
@ -103,18 +103,18 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver", "description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false, "fork": false,
"created_at": "2023-10-23T18:33:41Z", "created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-11-15T03:59:09Z", "updated_at": "2023-11-17T00:57:57Z",
"pushed_at": "2023-10-26T11:44:46Z", "pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 77, "stargazers_count": 77,
"watchers_count": 77, "watchers_count": 77,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 18,
"watchers": 77, "watchers": 77,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845", "description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845",
"fork": false, "fork": false,
"created_at": "2023-09-16T09:11:21Z", "created_at": "2023-09-16T09:11:21Z",
"updated_at": "2023-11-17T00:26:49Z", "updated_at": "2023-11-17T00:57:52Z",
"pushed_at": "2023-09-17T09:14:32Z", "pushed_at": "2023-09-17T09:14:32Z",
"stargazers_count": 55, "stargazers_count": 54,
"watchers_count": 55, "watchers_count": 54,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -27,7 +27,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 55, "watchers": 54,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -1,37 +1,4 @@
[ [
{
"id": 668949521,
"name": "CVE-2023-38408",
"full_name": "snowcra5h\/CVE-2023-38408",
"owner": {
"login": "snowcra5h",
"id": 90065760,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90065760?v=4",
"html_url": "https:\/\/github.com\/snowcra5h"
},
"html_url": "https:\/\/github.com\/snowcra5h\/CVE-2023-38408",
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-11-08T09:19:25Z",
"pushed_at": "2023-07-25T22:16:44Z",
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-38408",
"exploit-development"
],
"visibility": "public",
"forks": 21,
"watchers": 67,
"score": 0,
"subscribers_count": 4
},
{ {
"id": 676698139, "id": 676698139,
"name": "CVE-2023-38408", "name": "CVE-2023-38408",

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit", "description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
"fork": false, "fork": false,
"created_at": "2023-10-14T09:35:07Z", "created_at": "2023-10-14T09:35:07Z",
"updated_at": "2023-11-14T09:54:25Z", "updated_at": "2023-11-17T02:01:51Z",
"pushed_at": "2023-10-15T01:28:07Z", "pushed_at": "2023-10-15T01:28:07Z",
"stargazers_count": 68, "stargazers_count": 69,
"watchers_count": 68, "watchers_count": 69,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 68, "watchers": 69,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.", "description": "PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.",
"fork": false, "fork": false,
"created_at": "2023-08-30T22:40:10Z", "created_at": "2023-08-30T22:40:10Z",
"updated_at": "2023-10-24T19:11:18Z", "updated_at": "2023-11-17T06:36:28Z",
"pushed_at": "2023-09-04T17:53:27Z", "pushed_at": "2023-09-04T17:53:27Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 20, "watchers": 21,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言", "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false, "fork": false,
"created_at": "2023-10-27T05:57:21Z", "created_at": "2023-10-27T05:57:21Z",
"updated_at": "2023-11-15T16:22:38Z", "updated_at": "2023-11-17T02:50:50Z",
"pushed_at": "2023-11-03T12:50:06Z", "pushed_at": "2023-11-03T12:50:06Z",
"stargazers_count": 148, "stargazers_count": 149,
"watchers_count": 148, "watchers_count": 149,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 148, "watchers": 149,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -43,10 +43,10 @@
"description": "CVE-2023-46604", "description": "CVE-2023-46604",
"fork": false, "fork": false,
"created_at": "2023-10-27T12:22:43Z", "created_at": "2023-10-27T12:22:43Z",
"updated_at": "2023-11-10T12:06:26Z", "updated_at": "2023-11-17T02:39:01Z",
"pushed_at": "2023-11-03T14:14:31Z", "pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 14, "watchers": 15,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -299,6 +299,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -27,6 +27,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -27,6 +27,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -27,6 +27,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -1,22 +1,22 @@
[ [
{ {
"id": 719121139, "id": 719849140,
"name": "CVE-2023-54436", "name": "CVE-2023-48123",
"full_name": "NHPT\/CVE-2023-54436", "full_name": "NHPT\/CVE-2023-48123",
"owner": { "owner": {
"login": "NHPT", "login": "NHPT",
"id": 42366434, "id": 42366434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
"html_url": "https:\/\/github.com\/NHPT" "html_url": "https:\/\/github.com\/NHPT"
}, },
"html_url": "https:\/\/github.com\/NHPT\/CVE-2023-54436", "html_url": "https:\/\/github.com\/NHPT\/CVE-2023-48123",
"description": "CVE-2023-54436", "description": "CVE-2023-54436 Exp",
"fork": false, "fork": false,
"created_at": "2023-11-15T13:54:56Z", "created_at": "2023-11-17T02:56:26Z",
"updated_at": "2023-11-15T13:54:57Z", "updated_at": "2023-11-17T04:12:44Z",
"pushed_at": "2023-11-15T13:54:57Z", "pushed_at": "2023-11-17T02:56:53Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,8 +25,8 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 0
} }
] ]

View file

@ -213,10 +213,10 @@
"description": "Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation", "description": "Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation",
"fork": false, "fork": false,
"created_at": "2023-10-28T11:44:42Z", "created_at": "2023-10-28T11:44:42Z",
"updated_at": "2023-11-17T00:13:17Z", "updated_at": "2023-11-17T00:57:57Z",
"pushed_at": "2023-11-03T17:09:05Z", "pushed_at": "2023-11-03T17:09:05Z",
"stargazers_count": 5, "stargazers_count": 4,
"watchers_count": 5, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -225,7 +225,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 5, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -57,7 +57,7 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
}, },
{ {
"id": 719689698, "id": 719689698,
@ -87,6 +87,6 @@
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -3928,7 +3928,6 @@
<code>The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009. <code>The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
</code> </code>
- [snowcra5h/CVE-2023-38408](https://github.com/snowcra5h/CVE-2023-38408)
- [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408) - [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408)
- [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408) - [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408)
@ -5252,9 +5251,16 @@
### CVE-2023-48029 ### CVE-2023-48029
- [nitipoom-jar/CVE-2023-48029](https://github.com/nitipoom-jar/CVE-2023-48029) - [nitipoom-jar/CVE-2023-48029](https://github.com/nitipoom-jar/CVE-2023-48029)
### CVE-2023-48031 ### CVE-2023-48031 (2023-11-16)
<code>OpenSupports v4.11.0 is vulnerable to Unrestricted Upload of File with Dangerous Type. In the comment function, an attacker can bypass security restrictions and upload a .bat file by manipulating the file's magic bytes to masquerade as an allowed type. This can enable the attacker to execute arbitrary code or establish a reverse shell, leading to unauthorized file writes or control over the victim's station via a crafted file upload operation.
</code>
- [nitipoom-jar/CVE-2023-48031](https://github.com/nitipoom-jar/CVE-2023-48031) - [nitipoom-jar/CVE-2023-48031](https://github.com/nitipoom-jar/CVE-2023-48031)
### CVE-2023-48123
- [NHPT/CVE-2023-48123](https://github.com/NHPT/CVE-2023-48123)
### CVE-2023-48197 (2023-11-15) ### CVE-2023-48197 (2023-11-15)
<code>Cross Site Scripting vulnerability in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the QR code function in the manageapikeys component. <code>Cross Site Scripting vulnerability in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the QR code function in the manageapikeys component.
@ -5286,9 +5292,6 @@
### CVE-2023-51504 ### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
### CVE-2023-54436
- [NHPT/CVE-2023-54436](https://github.com/NHPT/CVE-2023-54436)
## 2022 ## 2022
### CVE-2022-0165 (2022-03-14) ### CVE-2022-0165 (2022-03-14)
@ -36837,7 +36840,6 @@
<code>DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names. <code>DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
</code> </code>
- [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147)
- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-) - [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-)
@ -37327,7 +37329,7 @@
<code>Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges via a long -s command line option. <code>Buffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges via a long -s command line option.
</code> </code>
- [snowcra5h/CVE-2003-0358](https://github.com/snowcra5h/CVE-2003-0358) - [gmh5225/CVE-2003-0358](https://github.com/gmh5225/CVE-2003-0358)
## 2002 ## 2002