Auto Update 2024/01/29 18:26:09

This commit is contained in:
motikan2010-bot 2024-01-30 03:26:09 +09:00
parent 2ff60d53f5
commit 2d22872e6c
52 changed files with 319 additions and 237 deletions

View file

@ -867,6 +867,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "This exploit was written to study some concepts, enjoy!", "description": "This exploit was written to study some concepts, enjoy!",
"fork": false, "fork": false,
"created_at": "2017-10-28T20:37:26Z", "created_at": "2017-10-28T20:37:26Z",
"updated_at": "2024-01-05T10:33:00Z", "updated_at": "2024-01-29T13:22:07Z",
"pushed_at": "2017-10-22T19:46:37Z", "pushed_at": "2017-10-22T19:46:37Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T02:42:41Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1871, "stargazers_count": 1872,
"watchers_count": 1871, "watchers_count": 1872,
"has_discussions": true, "has_discussions": true,
"forks_count": 341, "forks_count": 341,
"allow_forking": true, "allow_forking": true,
@ -76,7 +76,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 341, "forks": 341,
"watchers": 1871, "watchers": 1872,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T02:42:41Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1871, "stargazers_count": 1872,
"watchers_count": 1871, "watchers_count": 1872,
"has_discussions": true, "has_discussions": true,
"forks_count": 341, "forks_count": 341,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 341, "forks": 341,
"watchers": 1871, "watchers": 1872,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -811,10 +811,10 @@
"description": "编译好的脏牛漏洞CVE-2016-5195EXP", "description": "编译好的脏牛漏洞CVE-2016-5195EXP",
"fork": false, "fork": false,
"created_at": "2018-05-27T08:06:50Z", "created_at": "2018-05-27T08:06:50Z",
"updated_at": "2024-01-22T14:35:29Z", "updated_at": "2024-01-29T17:31:19Z",
"pushed_at": "2018-05-27T08:24:17Z", "pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 127, "stargazers_count": 128,
"watchers_count": 127, "watchers_count": 128,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 38,
"allow_forking": true, "allow_forking": true,
@ -823,7 +823,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 38,
"watchers": 127, "watchers": 128,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ", "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false, "fork": false,
"created_at": "2017-10-05T23:41:52Z", "created_at": "2017-10-05T23:41:52Z",
"updated_at": "2024-01-04T16:17:44Z", "updated_at": "2024-01-29T17:50:38Z",
"pushed_at": "2017-10-11T07:43:50Z", "pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 378, "stargazers_count": 379,
"watchers_count": 378, "watchers_count": 379,
"has_discussions": false, "has_discussions": false,
"forks_count": 139, "forks_count": 139,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 139, "forks": 139,
"watchers": 378, "watchers": 379,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T02:42:41Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1871, "stargazers_count": 1872,
"watchers_count": 1871, "watchers_count": 1872,
"has_discussions": true, "has_discussions": true,
"forks_count": 341, "forks_count": 341,
"allow_forking": true, "allow_forking": true,
@ -76,7 +76,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 341, "forks": 341,
"watchers": 1871, "watchers": 1872,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -168,10 +168,10 @@
"description": "fixed msf module for cve-2017-7269", "description": "fixed msf module for cve-2017-7269",
"fork": false, "fork": false,
"created_at": "2017-03-30T22:20:36Z", "created_at": "2017-03-30T22:20:36Z",
"updated_at": "2023-10-28T05:13:02Z", "updated_at": "2024-01-29T15:43:14Z",
"pushed_at": "2017-03-30T22:20:51Z", "pushed_at": "2017-03-30T22:20:51Z",
"stargazers_count": 131, "stargazers_count": 132,
"watchers_count": 131, "watchers_count": 132,
"has_discussions": false, "has_discussions": false,
"forks_count": 69, "forks_count": 69,
"allow_forking": true, "allow_forking": true,
@ -180,7 +180,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 69, "forks": 69,
"watchers": 131, "watchers": 132,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -73,10 +73,10 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false, "fork": false,
"created_at": "2017-05-26T00:58:25Z", "created_at": "2017-05-26T00:58:25Z",
"updated_at": "2024-01-20T11:47:05Z", "updated_at": "2024-01-29T15:33:24Z",
"pushed_at": "2022-12-27T20:25:09Z", "pushed_at": "2022-12-27T20:25:09Z",
"stargazers_count": 366, "stargazers_count": 365,
"watchers_count": 366, "watchers_count": 365,
"has_discussions": false, "has_discussions": false,
"forks_count": 111, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
@ -91,7 +91,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 111, "forks": 111,
"watchers": 366, "watchers": 365,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },

View file

@ -272,7 +272,7 @@
"forks": 13, "forks": 13,
"watchers": 28, "watchers": 28,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 3
}, },
{ {
"id": 559816350, "id": 559816350,

View file

@ -44,7 +44,7 @@
"fork": false, "fork": false,
"created_at": "2024-01-04T21:44:21Z", "created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-01-05T06:29:51Z", "updated_at": "2024-01-05T06:29:51Z",
"pushed_at": "2024-01-29T09:28:35Z", "pushed_at": "2024-01-29T14:51:24Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320", "description": "Unsigned driver loader using CVE-2018-19320",
"fork": false, "fork": false,
"created_at": "2022-11-12T05:48:13Z", "created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-01-27T04:39:25Z", "updated_at": "2024-01-29T17:37:53Z",
"pushed_at": "2023-04-09T13:50:29Z", "pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 118, "stargazers_count": 119,
"watchers_count": 118, "watchers_count": 119,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 34,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 34,
"watchers": 118, "watchers": 119,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T02:42:41Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1871, "stargazers_count": 1872,
"watchers_count": 1871, "watchers_count": 1872,
"has_discussions": true, "has_discussions": true,
"forks_count": 341, "forks_count": 341,
"allow_forking": true, "allow_forking": true,
@ -620,7 +620,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 341, "forks": 341,
"watchers": 1871, "watchers": 1872,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-01-29T08:18:42Z", "updated_at": "2024-01-29T17:31:29Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3984, "stargazers_count": 3985,
"watchers_count": 3984, "watchers_count": 3985,
"has_discussions": false, "has_discussions": false,
"forks_count": 1093, "forks_count": 1093,
"allow_forking": true, "allow_forking": true,
@ -75,7 +75,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1093, "forks": 1093,
"watchers": 3984, "watchers": 3985,
"score": 0, "score": 0,
"subscribers_count": 154 "subscribers_count": 154
}, },

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept for CVE-2019-18634", "description": "Proof of Concept for CVE-2019-18634",
"fork": false, "fork": false,
"created_at": "2020-02-07T18:07:03Z", "created_at": "2020-02-07T18:07:03Z",
"updated_at": "2024-01-26T21:49:28Z", "updated_at": "2024-01-29T16:35:23Z",
"pushed_at": "2021-09-12T02:55:24Z", "pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 187, "stargazers_count": 188,
"watchers_count": 187, "watchers_count": 188,
"has_discussions": false, "has_discussions": false,
"forks_count": 47, "forks_count": 47,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 47, "forks": 47,
"watchers": 187, "watchers": 188,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持", "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false, "fork": false,
"created_at": "2019-06-21T09:22:43Z", "created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-01-22T14:35:34Z", "updated_at": "2024-01-29T17:31:25Z",
"pushed_at": "2020-04-26T10:49:25Z", "pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 922, "stargazers_count": 923,
"watchers_count": 922, "watchers_count": 923,
"has_discussions": false, "has_discussions": false,
"forks_count": 182, "forks_count": 182,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 182, "forks": 182,
"watchers": 922, "watchers": 923,
"score": 0, "score": 0,
"subscribers_count": 19 "subscribers_count": 19
}, },
@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T02:42:41Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1871, "stargazers_count": 1872,
"watchers_count": 1871, "watchers_count": 1872,
"has_discussions": true, "has_discussions": true,
"forks_count": 341, "forks_count": 341,
"allow_forking": true, "allow_forking": true,
@ -226,7 +226,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 341, "forks": 341,
"watchers": 1871, "watchers": 1872,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
} }

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-01-29T08:18:42Z", "updated_at": "2024-01-29T17:31:29Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3984, "stargazers_count": 3985,
"watchers_count": 3984, "watchers_count": 3985,
"has_discussions": false, "has_discussions": false,
"forks_count": 1093, "forks_count": 1093,
"allow_forking": true, "allow_forking": true,
@ -45,7 +45,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1093, "forks": 1093,
"watchers": 3984, "watchers": 3985,
"score": 0, "score": 0,
"subscribers_count": 154 "subscribers_count": 154
}, },

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-01-26T10:10:02Z", "updated_at": "2024-01-29T17:31:36Z",
"pushed_at": "2023-05-11T14:36:58Z", "pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1078, "stargazers_count": 1079,
"watchers_count": 1078, "watchers_count": 1079,
"has_discussions": false, "has_discussions": false,
"forks_count": 327, "forks_count": 327,
"allow_forking": true, "allow_forking": true,
@ -149,7 +149,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 327, "forks": 327,
"watchers": 1078, "watchers": 1079,
"score": 0, "score": 0,
"subscribers_count": 37 "subscribers_count": 37
} }

View file

@ -403,10 +403,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false, "fork": false,
"created_at": "2020-02-22T16:16:20Z", "created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-01-22T14:35:39Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2020-03-09T14:51:43Z", "pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 330, "stargazers_count": 331,
"watchers_count": 330, "watchers_count": 331,
"has_discussions": false, "has_discussions": false,
"forks_count": 113, "forks_count": 113,
"allow_forking": true, "allow_forking": true,
@ -421,7 +421,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 113, "forks": 113,
"watchers": 330, "watchers": 331,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-29T02:42:41Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1871, "stargazers_count": 1872,
"watchers_count": 1871, "watchers_count": 1872,
"has_discussions": true, "has_discussions": true,
"forks_count": 341, "forks_count": 341,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 341, "forks": 341,
"watchers": 1871, "watchers": 1872,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },
@ -154,10 +154,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。", "description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false, "fork": false,
"created_at": "2020-05-16T03:01:32Z", "created_at": "2020-05-16T03:01:32Z",
"updated_at": "2024-01-22T14:35:40Z", "updated_at": "2024-01-29T17:31:30Z",
"pushed_at": "2022-08-07T06:36:30Z", "pushed_at": "2022-08-07T06:36:30Z",
"stargazers_count": 86, "stargazers_count": 87,
"watchers_count": 86, "watchers_count": 87,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -166,7 +166,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 86, "watchers": 87,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-4464 \/ CVE-2020-4450", "description": "CVE-2020-4464 \/ CVE-2020-4450",
"fork": false, "fork": false,
"created_at": "2021-08-17T08:44:49Z", "created_at": "2021-08-17T08:44:49Z",
"updated_at": "2024-01-22T14:35:49Z", "updated_at": "2024-01-29T17:31:39Z",
"pushed_at": "2021-08-24T15:02:19Z", "pushed_at": "2021-08-24T15:02:19Z",
"stargazers_count": 32, "stargazers_count": 33,
"watchers_count": 32, "watchers_count": 33,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 32, "watchers": 33,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -13,10 +13,10 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC", "description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false, "fork": false,
"created_at": "2020-02-11T13:57:14Z", "created_at": "2020-02-11T13:57:14Z",
"updated_at": "2024-01-22T14:35:38Z", "updated_at": "2024-01-29T17:31:28Z",
"pushed_at": "2020-02-13T12:56:31Z", "pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 103, "stargazers_count": 104,
"watchers_count": 103, "watchers_count": 104,
"has_discussions": false, "has_discussions": false,
"forks_count": 22, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 22,
"watchers": 103, "watchers": 104,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-03-26T01:34:38Z", "created_at": "2020-03-26T01:34:38Z",
"updated_at": "2024-01-22T14:35:39Z", "updated_at": "2024-01-29T17:31:29Z",
"pushed_at": "2020-04-14T12:31:19Z", "pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 114, "stargazers_count": 115,
"watchers_count": 114, "watchers_count": 115,
"has_discussions": false, "has_discussions": false,
"forks_count": 47, "forks_count": 47,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 47, "forks": 47,
"watchers": 114, "watchers": 115,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },
@ -223,10 +223,10 @@
"description": "Exploit script for CVE-2020-7961", "description": "Exploit script for CVE-2020-7961",
"fork": false, "fork": false,
"created_at": "2021-01-14T19:18:13Z", "created_at": "2021-01-14T19:18:13Z",
"updated_at": "2024-01-23T15:25:03Z", "updated_at": "2024-01-29T17:31:35Z",
"pushed_at": "2021-01-15T10:51:58Z", "pushed_at": "2021-01-15T10:51:58Z",
"stargazers_count": 17, "stargazers_count": 18,
"watchers_count": 17, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -235,7 +235,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 17, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-01-27T15:12:03Z", "updated_at": "2024-01-29T17:31:45Z",
"pushed_at": "2023-12-06T15:30:56Z", "pushed_at": "2023-12-06T15:30:56Z",
"stargazers_count": 1198, "stargazers_count": 1199,
"watchers_count": 1198, "watchers_count": 1199,
"has_discussions": false, "has_discussions": false,
"forks_count": 154, "forks_count": 154,
"allow_forking": true, "allow_forking": true,
@ -870,7 +870,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 154, "forks": 154,
"watchers": 1198, "watchers": 1199,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
} }

View file

@ -133,10 +133,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE", "description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false, "fork": false,
"created_at": "2021-10-29T04:30:45Z", "created_at": "2021-10-29T04:30:45Z",
"updated_at": "2024-01-24T11:17:29Z", "updated_at": "2024-01-29T17:31:40Z",
"pushed_at": "2022-11-16T08:14:33Z", "pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 248, "stargazers_count": 249,
"watchers_count": 248, "watchers_count": 249,
"has_discussions": false, "has_discussions": false,
"forks_count": 102, "forks_count": 102,
"allow_forking": true, "allow_forking": true,
@ -147,7 +147,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 102, "forks": 102,
"watchers": 248, "watchers": 249,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-01-26T10:10:02Z", "updated_at": "2024-01-29T17:31:36Z",
"pushed_at": "2023-05-11T14:36:58Z", "pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1078, "stargazers_count": 1079,
"watchers_count": 1078, "watchers_count": 1079,
"has_discussions": false, "has_discussions": false,
"forks_count": 327, "forks_count": 327,
"allow_forking": true, "allow_forking": true,
@ -149,7 +149,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 327, "forks": 327,
"watchers": 1078, "watchers": 1079,
"score": 0, "score": 0,
"subscribers_count": 37 "subscribers_count": 37
}, },

View file

@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection", "description": "Confluence Server Webwork OGNL injection",
"fork": false, "fork": false,
"created_at": "2021-09-01T07:15:17Z", "created_at": "2021-09-01T07:15:17Z",
"updated_at": "2024-01-22T14:35:49Z", "updated_at": "2024-01-29T17:31:39Z",
"pushed_at": "2021-12-03T22:09:31Z", "pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 299, "stargazers_count": 300,
"watchers_count": 299, "watchers_count": 300,
"has_discussions": false, "has_discussions": false,
"forks_count": 84, "forks_count": 84,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 84, "forks": 84,
"watchers": 299, "watchers": 300,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-11T15:10:30Z", "created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-01-26T07:06:33Z", "updated_at": "2024-01-29T17:31:41Z",
"pushed_at": "2022-07-10T22:23:13Z", "pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 949, "stargazers_count": 950,
"watchers_count": 949, "watchers_count": 950,
"has_discussions": false, "has_discussions": false,
"forks_count": 192, "forks_count": 192,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 192, "forks": 192,
"watchers": 949, "watchers": 950,
"score": 0, "score": 0,
"subscribers_count": 26 "subscribers_count": 26
}, },

View file

@ -13,10 +13,10 @@
"description": "A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.", "description": "A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.",
"fork": false, "fork": false,
"created_at": "2021-11-09T12:14:45Z", "created_at": "2021-11-09T12:14:45Z",
"updated_at": "2024-01-05T10:31:52Z", "updated_at": "2024-01-29T13:21:47Z",
"pushed_at": "2021-11-11T01:22:24Z", "pushed_at": "2021-11-11T01:22:24Z",
"stargazers_count": 17, "stargazers_count": 18,
"watchers_count": 17, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 17, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
} }

View file

@ -401,10 +401,10 @@
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.", "description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
"fork": false, "fork": false,
"created_at": "2021-12-10T14:22:49Z", "created_at": "2021-12-10T14:22:49Z",
"updated_at": "2024-01-24T11:17:51Z", "updated_at": "2024-01-29T17:31:41Z",
"pushed_at": "2021-12-14T15:16:15Z", "pushed_at": "2021-12-14T15:16:15Z",
"stargazers_count": 125, "stargazers_count": 126,
"watchers_count": 125, "watchers_count": 126,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -420,7 +420,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 125, "watchers": 126,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },
@ -760,10 +760,10 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading", "description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false, "fork": false,
"created_at": "2021-12-10T21:46:18Z", "created_at": "2021-12-10T21:46:18Z",
"updated_at": "2024-01-26T09:40:54Z", "updated_at": "2024-01-29T17:31:41Z",
"pushed_at": "2021-12-13T22:27:25Z", "pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 191, "stargazers_count": 192,
"watchers_count": 191, "watchers_count": 192,
"has_discussions": false, "has_discussions": false,
"forks_count": 59, "forks_count": 59,
"allow_forking": true, "allow_forking": true,
@ -772,7 +772,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 59, "forks": 59,
"watchers": 191, "watchers": 192,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-01-27T07:15:29Z", "updated_at": "2024-01-29T17:31:41Z",
"pushed_at": "2023-06-13T09:17:54Z", "pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 760, "stargazers_count": 761,
"watchers_count": 760, "watchers_count": 761,
"has_discussions": false, "has_discussions": false,
"forks_count": 116, "forks_count": 116,
"allow_forking": true, "allow_forking": true,
@ -1285,7 +1285,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 116, "forks": 116,
"watchers": 760, "watchers": 761,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },
@ -3666,10 +3666,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false, "fork": false,
"created_at": "2021-12-13T03:57:50Z", "created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-01-26T09:40:55Z", "updated_at": "2024-01-29T17:31:41Z",
"pushed_at": "2022-11-23T18:23:24Z", "pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3333, "stargazers_count": 3334,
"watchers_count": 3333, "watchers_count": 3334,
"has_discussions": true, "has_discussions": true,
"forks_count": 748, "forks_count": 748,
"allow_forking": true, "allow_forking": true,
@ -3678,7 +3678,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 748, "forks": 748,
"watchers": 3333, "watchers": 3334,
"score": 0, "score": 0,
"subscribers_count": 58 "subscribers_count": 58
}, },

View file

@ -13,10 +13,10 @@
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388", "description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
"fork": false, "fork": false,
"created_at": "2022-05-05T10:35:35Z", "created_at": "2022-05-05T10:35:35Z",
"updated_at": "2024-01-24T11:19:42Z", "updated_at": "2024-01-29T17:31:43Z",
"pushed_at": "2022-05-09T21:09:45Z", "pushed_at": "2022-05-09T21:09:45Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 52, "watchers": 53,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },
@ -140,10 +140,10 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测", "description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false, "fork": false,
"created_at": "2022-05-07T17:54:08Z", "created_at": "2022-05-07T17:54:08Z",
"updated_at": "2024-01-24T11:19:44Z", "updated_at": "2024-01-29T17:31:43Z",
"pushed_at": "2022-05-09T11:15:27Z", "pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 93, "stargazers_count": 94,
"watchers_count": 93, "watchers_count": 94,
"has_discussions": false, "has_discussions": false,
"forks_count": 25, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
@ -152,7 +152,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 25,
"watchers": 93, "watchers": 94,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -290,10 +290,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE", "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
"fork": false, "fork": false,
"created_at": "2022-05-09T10:22:31Z", "created_at": "2022-05-09T10:22:31Z",
"updated_at": "2024-01-24T11:19:45Z", "updated_at": "2024-01-29T17:31:43Z",
"pushed_at": "2022-06-28T18:14:40Z", "pushed_at": "2022-06-28T18:14:40Z",
"stargazers_count": 85, "stargazers_count": 86,
"watchers_count": 85, "watchers_count": 86,
"has_discussions": false, "has_discussions": false,
"forks_count": 31, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
@ -302,7 +302,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 31, "forks": 31,
"watchers": 85, "watchers": 86,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -410,10 +410,10 @@
"description": "POC for CVE-2022-1388", "description": "POC for CVE-2022-1388",
"fork": false, "fork": false,
"created_at": "2022-05-09T11:46:45Z", "created_at": "2022-05-09T11:46:45Z",
"updated_at": "2024-01-24T11:19:45Z", "updated_at": "2024-01-29T17:31:44Z",
"pushed_at": "2022-05-09T20:52:07Z", "pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 232, "stargazers_count": 233,
"watchers_count": 232, "watchers_count": 233,
"has_discussions": false, "has_discussions": false,
"forks_count": 43, "forks_count": 43,
"allow_forking": true, "allow_forking": true,
@ -422,7 +422,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 43, "forks": 43,
"watchers": 232, "watchers": 233,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },
@ -473,10 +473,10 @@
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞", "description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
"fork": false, "fork": false,
"created_at": "2022-05-09T14:02:34Z", "created_at": "2022-05-09T14:02:34Z",
"updated_at": "2024-01-22T14:35:54Z", "updated_at": "2024-01-29T17:31:44Z",
"pushed_at": "2022-08-22T01:20:14Z", "pushed_at": "2022-08-22T01:20:14Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -485,7 +485,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 7, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-08-09T15:53:48Z", "created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-01-27T06:59:04Z", "updated_at": "2024-01-29T13:02:28Z",
"pushed_at": "2023-09-27T06:44:27Z", "pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 262, "stargazers_count": 261,
"watchers_count": 262, "watchers_count": 261,
"has_discussions": false, "has_discussions": false,
"forks_count": 60, "forks_count": 60,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 60, "forks": 60,
"watchers": 262, "watchers": 261,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },
@ -51,10 +51,10 @@
"description": "Example payload for CVE-2022-21894", "description": "Example payload for CVE-2022-21894",
"fork": false, "fork": false,
"created_at": "2022-08-18T23:45:47Z", "created_at": "2022-08-18T23:45:47Z",
"updated_at": "2024-01-27T07:03:56Z", "updated_at": "2024-01-29T13:02:28Z",
"pushed_at": "2023-09-27T06:18:45Z", "pushed_at": "2023-09-27T06:18:45Z",
"stargazers_count": 11, "stargazers_count": 10,
"watchers_count": 11, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -63,7 +63,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 11, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -796,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接", "description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false, "fork": false,
"created_at": "2022-10-04T03:39:27Z", "created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-01-27T15:12:03Z", "updated_at": "2024-01-29T17:31:45Z",
"pushed_at": "2023-12-06T15:30:56Z", "pushed_at": "2023-12-06T15:30:56Z",
"stargazers_count": 1198, "stargazers_count": 1199,
"watchers_count": 1198, "watchers_count": 1199,
"has_discussions": false, "has_discussions": false,
"forks_count": 154, "forks_count": 154,
"allow_forking": true, "allow_forking": true,
@ -815,7 +815,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 154, "forks": 154,
"watchers": 1198, "watchers": 1199,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -13,10 +13,10 @@
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963", "description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
"fork": false, "fork": false,
"created_at": "2022-03-26T01:40:04Z", "created_at": "2022-03-26T01:40:04Z",
"updated_at": "2024-01-24T11:19:12Z", "updated_at": "2024-01-29T17:31:43Z",
"pushed_at": "2023-03-05T12:41:19Z", "pushed_at": "2023-03-05T12:41:19Z",
"stargazers_count": 352, "stargazers_count": 353,
"watchers_count": 352, "watchers_count": 353,
"has_discussions": false, "has_discussions": false,
"forks_count": 86, "forks_count": 86,
"allow_forking": true, "allow_forking": true,
@ -35,7 +35,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 86, "forks": 86,
"watchers": 352, "watchers": 353,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -13,10 +13,10 @@
"description": "Attacks against QUIC (CVE-2022-30591)", "description": "Attacks against QUIC (CVE-2022-30591)",
"fork": false, "fork": false,
"created_at": "2022-06-30T18:25:23Z", "created_at": "2022-06-30T18:25:23Z",
"updated_at": "2023-12-11T07:30:29Z", "updated_at": "2024-01-29T18:03:53Z",
"pushed_at": "2022-12-31T01:55:15Z", "pushed_at": "2022-12-31T01:55:15Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 11, "watchers": 12,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W", "description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false, "fork": false,
"created_at": "2022-11-09T14:15:30Z", "created_at": "2022-11-09T14:15:30Z",
"updated_at": "2024-01-16T16:23:14Z", "updated_at": "2024-01-29T15:28:58Z",
"pushed_at": "2022-12-05T23:36:42Z", "pushed_at": "2022-12-05T23:36:42Z",
"stargazers_count": 165, "stargazers_count": 166,
"watchers_count": 165, "watchers_count": 166,
"has_discussions": false, "has_discussions": false,
"forks_count": 43, "forks_count": 43,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 43, "forks": 43,
"watchers": 165, "watchers": 166,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false, "fork": false,
"created_at": "2022-09-26T08:58:21Z", "created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-01-25T20:26:00Z", "updated_at": "2024-01-29T17:31:45Z",
"pushed_at": "2022-09-26T13:20:38Z", "pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 290, "stargazers_count": 291,
"watchers_count": 290, "watchers_count": 291,
"has_discussions": false, "has_discussions": false,
"forks_count": 50, "forks_count": 50,
"allow_forking": true, "allow_forking": true,
@ -243,7 +243,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 50, "forks": 50,
"watchers": 290, "watchers": 291,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2023-07-13T13:17:20Z", "created_at": "2023-07-13T13:17:20Z",
"updated_at": "2023-12-03T18:16:52Z", "updated_at": "2023-12-03T18:16:52Z",
"pushed_at": "2023-07-13T13:26:33Z", "pushed_at": "2024-01-29T16:24:16Z",
"stargazers_count": 25, "stargazers_count": 25,
"watchers_count": 25, "watchers_count": 25,
"has_discussions": false, "has_discussions": false,
@ -43,10 +43,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-01-24T11:58:54Z", "created_at": "2024-01-24T11:58:54Z",
"updated_at": "2024-01-28T13:42:42Z", "updated_at": "2024-01-29T17:15:46Z",
"pushed_at": "2024-01-29T00:03:02Z", "pushed_at": "2024-01-29T00:03:02Z",
"stargazers_count": 44, "stargazers_count": 45,
"watchers_count": 44, "watchers_count": 45,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 44, "watchers": 45,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -576,7 +576,7 @@
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.", "description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
"fork": false, "fork": false,
"created_at": "2023-05-01T20:00:23Z", "created_at": "2023-05-01T20:00:23Z",
"updated_at": "2024-01-27T00:55:35Z", "updated_at": "2024-01-29T13:30:42Z",
"pushed_at": "2023-09-11T17:56:27Z", "pushed_at": "2023-09-11T17:56:27Z",
"stargazers_count": 35, "stargazers_count": 35,
"watchers_count": 35, "watchers_count": 35,

View file

@ -475,7 +475,7 @@
"stargazers_count": 57, "stargazers_count": 57,
"watchers_count": 57, "watchers_count": 57,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -488,7 +488,7 @@
"vulnerability" "vulnerability"
], ],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 14,
"watchers": 57, "watchers": 57,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-06-27T12:22:05Z", "created_at": "2023-06-27T12:22:05Z",
"updated_at": "2024-01-29T09:13:45Z", "updated_at": "2024-01-29T13:40:50Z",
"pushed_at": "2023-07-10T16:57:44Z", "pushed_at": "2023-07-10T16:57:44Z",
"stargazers_count": 155, "stargazers_count": 156,
"watchers_count": 155, "watchers_count": 156,
"has_discussions": false, "has_discussions": false,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 155, "watchers": 156,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -133,10 +133,10 @@
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe", "description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false, "fork": false,
"created_at": "2024-01-22T10:38:02Z", "created_at": "2024-01-22T10:38:02Z",
"updated_at": "2024-01-29T10:40:59Z", "updated_at": "2024-01-29T15:38:07Z",
"pushed_at": "2024-01-24T13:45:56Z", "pushed_at": "2024-01-24T13:45:56Z",
"stargazers_count": 27, "stargazers_count": 28,
"watchers_count": 27, "watchers_count": 28,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 27, "watchers": 28,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "自用poc作者为Piotr Krysiuk在使用前请先阅读README.md", "description": "自用poc作者为Piotr Krysiuk在使用前请先阅读README.md",
"fork": false, "fork": false,
"created_at": "2023-05-16T02:22:26Z", "created_at": "2023-05-16T02:22:26Z",
"updated_at": "2023-05-16T07:23:48Z", "updated_at": "2024-01-29T13:54:14Z",
"pushed_at": "2023-05-16T02:31:34Z", "pushed_at": "2023-05-16T02:31:34Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

32
2023/CVE-2023-35636.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 749927569,
"name": "CVE-2023-35636",
"full_name": "duy-31\/CVE-2023-35636",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-35636",
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-01-29T17:08:05Z",
"updated_at": "2024-01-29T17:46:27Z",
"pushed_at": "2024-01-29T17:46:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -48,13 +48,13 @@
"stargazers_count": 14, "stargazers_count": 14,
"watchers_count": 14, "watchers_count": 14,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 14, "watchers": 14,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -104,10 +104,10 @@
"html_url": "https:\/\/github.com\/duy-31" "html_url": "https:\/\/github.com\/duy-31"
}, },
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887", "html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
"description": null, "description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
"fork": false, "fork": false,
"created_at": "2024-01-16T19:40:59Z", "created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-01-20T10:34:45Z", "updated_at": "2024-01-29T16:51:11Z",
"pushed_at": "2024-01-17T19:14:09Z", "pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,

View file

@ -13,10 +13,10 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)", "description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false, "fork": false,
"created_at": "2023-11-17T07:03:06Z", "created_at": "2023-11-17T07:03:06Z",
"updated_at": "2024-01-25T20:13:27Z", "updated_at": "2024-01-29T12:40:21Z",
"pushed_at": "2023-12-07T02:55:01Z", "pushed_at": "2023-12-07T02:55:01Z",
"stargazers_count": 45, "stargazers_count": 46,
"watchers_count": 45, "watchers_count": 46,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 45, "watchers": 46,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 16, "stargazers_count": 16,
"watchers_count": 16, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 12,
"watchers": 16, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

36
2023/CVE-2023-6985.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 749919472,
"name": "CVE-2023-6985",
"full_name": "RandomRobbieBF\/CVE-2023-6985",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-6985",
"description": "10Web AI Assistant AI content writing assistant <= 1.0.18 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation\/Activation Description",
"fork": false,
"created_at": "2024-01-29T16:51:53Z",
"updated_at": "2024-01-29T16:55:00Z",
"pushed_at": "2024-01-29T16:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai-assistant-by-10web",
"cve-2023-6985",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -70,10 +70,10 @@
"html_url": "https:\/\/github.com\/duy-31" "html_url": "https:\/\/github.com\/duy-31"
}, },
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887", "html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
"description": null, "description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
"fork": false, "fork": false,
"created_at": "2024-01-16T19:40:59Z", "created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-01-20T10:34:45Z", "updated_at": "2024-01-29T16:51:11Z",
"pushed_at": "2024-01-17T19:14:09Z", "pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2024-01-27T18:17:48Z", "created_at": "2024-01-27T18:17:48Z",
"updated_at": "2024-01-27T18:17:48Z", "updated_at": "2024-01-27T18:17:48Z",
"pushed_at": "2024-01-29T11:00:53Z", "pushed_at": "2024-01-29T14:38:55Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-01-26T08:02:00Z", "created_at": "2024-01-26T08:02:00Z",
"updated_at": "2024-01-29T09:22:22Z", "updated_at": "2024-01-29T17:38:34Z",
"pushed_at": "2024-01-26T08:03:10Z", "pushed_at": "2024-01-26T08:03:10Z",
"stargazers_count": 70, "stargazers_count": 71,
"watchers_count": 70, "watchers_count": 71,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 70, "watchers": 71,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -73,10 +73,10 @@
"description": "CVE-2024-23897", "description": "CVE-2024-23897",
"fork": false, "fork": false,
"created_at": "2024-01-26T09:44:32Z", "created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-01-29T09:23:14Z", "updated_at": "2024-01-29T17:24:40Z",
"pushed_at": "2024-01-28T06:47:28Z", "pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 72, "stargazers_count": 76,
"watchers_count": 72, "watchers_count": 76,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 72, "watchers": 76,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false, "fork": false,
"created_at": "2024-01-27T19:34:48Z", "created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-01-29T09:27:14Z", "updated_at": "2024-01-29T17:27:00Z",
"pushed_at": "2024-01-28T15:02:45Z", "pushed_at": "2024-01-28T15:02:45Z",
"stargazers_count": 6, "stargazers_count": 8,
"watchers_count": 6, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -272,7 +272,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 6, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
@ -350,10 +350,10 @@
"description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE", "description": "Jenkins POC of Arbitrary file read vulnerability through the CLI can lead to RCE",
"fork": false, "fork": false,
"created_at": "2024-01-29T04:41:53Z", "created_at": "2024-01-29T04:41:53Z",
"updated_at": "2024-01-29T04:57:05Z", "updated_at": "2024-01-29T13:57:01Z",
"pushed_at": "2024-01-29T04:54:04Z", "pushed_at": "2024-01-29T04:54:04Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -362,7 +362,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
}, },
@ -380,10 +380,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-01-29T12:00:25Z", "created_at": "2024-01-29T12:00:25Z",
"updated_at": "2024-01-29T12:01:13Z", "updated_at": "2024-01-29T18:02:51Z",
"pushed_at": "2024-01-29T12:14:08Z", "pushed_at": "2024-01-29T12:14:08Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -392,7 +392,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -170,7 +170,11 @@
### CVE-2024-23746 ### CVE-2024-23746
- [louiselalanne/CVE-2024-23746](https://github.com/louiselalanne/CVE-2024-23746) - [louiselalanne/CVE-2024-23746](https://github.com/louiselalanne/CVE-2024-23746)
### CVE-2024-23747 ### CVE-2024-23747 (-)
<code>The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability. This vulnerability resides in the system's handling of user data access through a /Modernanet/LAUDO/LAU0000100/Laudo?id= URI. By manipulating this id parameter, an attacker can gain access to sensitive medical information.
</code>
- [louiselalanne/CVE-2024-23747](https://github.com/louiselalanne/CVE-2024-23747) - [louiselalanne/CVE-2024-23747](https://github.com/louiselalanne/CVE-2024-23747)
### CVE-2024-23897 (-) ### CVE-2024-23897 (-)
@ -1298,6 +1302,9 @@
### CVE-2023-6933 ### CVE-2023-6933
- [w2xim3/CVE-2023-6933](https://github.com/w2xim3/CVE-2023-6933) - [w2xim3/CVE-2023-6933](https://github.com/w2xim3/CVE-2023-6933)
### CVE-2023-6985
- [RandomRobbieBF/CVE-2023-6985](https://github.com/RandomRobbieBF/CVE-2023-6985)
### CVE-2023-7028 (2024-01-12) ### CVE-2023-7028 (2024-01-12)
<code>An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. <code>An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
@ -4118,6 +4125,13 @@
- [tin-z/CVE-2023-35086-POC](https://github.com/tin-z/CVE-2023-35086-POC) - [tin-z/CVE-2023-35086-POC](https://github.com/tin-z/CVE-2023-35086-POC)
### CVE-2023-35636 (2023-12-12)
<code>Microsoft Outlook Information Disclosure Vulnerability
</code>
- [duy-31/CVE-2023-35636](https://github.com/duy-31/CVE-2023-35636)
### CVE-2023-35671 (2023-09-11) ### CVE-2023-35671 (2023-09-11)
<code>In onHostEmulationData of HostEmulationManager.java, there is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. <code>In onHostEmulationData of HostEmulationManager.java, there is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.