mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/12/20 00:34:26
This commit is contained in:
parent
69fffd1bd5
commit
321c78ee5f
30 changed files with 152 additions and 276 deletions
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"forks": 78,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"forks": 40,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -313,36 +313,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
{
|
||||
"id": 72274348,
|
||||
"name": "scan-dirtycow",
|
||||
"full_name": "aishee\/scan-dirtycow",
|
||||
"owner": {
|
||||
"login": "aishee",
|
||||
"id": 8377283,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8377283?v=4",
|
||||
"html_url": "https:\/\/github.com\/aishee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aishee\/scan-dirtycow",
|
||||
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-29T08:45:45Z",
|
||||
"updated_at": "2023-09-28T10:37:06Z",
|
||||
"pushed_at": "2016-10-29T08:50:34Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 72304503,
|
||||
"name": "ansible_CVE-2016-5195_check",
|
||||
|
@ -373,66 +343,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 72996573,
|
||||
"name": "CVE-2016-5195",
|
||||
"full_name": "ldenevi\/CVE-2016-5195",
|
||||
"owner": {
|
||||
"login": "ldenevi",
|
||||
"id": 1868312,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1868312?v=4",
|
||||
"html_url": "https:\/\/github.com\/ldenevi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ldenevi\/CVE-2016-5195",
|
||||
"description": "Recent Linux privilege escalation exploit",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-06T14:38:04Z",
|
||||
"updated_at": "2016-11-06T14:45:08Z",
|
||||
"pushed_at": "2016-11-06T14:45:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 73981418,
|
||||
"name": "CVE-2016-5195",
|
||||
"full_name": "whu-enjoy\/CVE-2016-5195",
|
||||
"owner": {
|
||||
"login": "whu-enjoy",
|
||||
"id": 17870213,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17870213?v=4",
|
||||
"html_url": "https:\/\/github.com\/whu-enjoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whu-enjoy\/CVE-2016-5195",
|
||||
"description": "这里保留着部分脏牛漏洞的利用代码",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-17T02:20:09Z",
|
||||
"updated_at": "2020-01-16T14:04:30Z",
|
||||
"pushed_at": "2016-11-17T05:29:34Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 74788180,
|
||||
"name": "dirtycow",
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 72594729,
|
||||
"name": "CVE-2016-6663",
|
||||
"full_name": "firebroo\/CVE-2016-6663",
|
||||
"owner": {
|
||||
"login": "firebroo",
|
||||
"id": 7047962,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7047962?v=4",
|
||||
"html_url": "https:\/\/github.com\/firebroo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/firebroo\/CVE-2016-6663",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-11-02T02:05:45Z",
|
||||
"updated_at": "2021-06-09T05:51:41Z",
|
||||
"pushed_at": "2016-11-02T07:06:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -29,41 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 73386147,
|
||||
"name": "JoomlaCVE20168869",
|
||||
"full_name": "rustyJ4ck\/JoomlaCVE20168869",
|
||||
"owner": {
|
||||
"login": "rustyJ4ck",
|
||||
"id": 1773112,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1773112?v=4",
|
||||
"html_url": "https:\/\/github.com\/rustyJ4ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rustyJ4ck\/JoomlaCVE20168869",
|
||||
"description": "Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-10T13:47:01Z",
|
||||
"updated_at": "2023-09-28T10:37:20Z",
|
||||
"pushed_at": "2016-11-10T13:47:45Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"joomla",
|
||||
"php",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 165309082,
|
||||
"name": "cve-2016-8869",
|
||||
|
|
32
2017/CVE-2017-1000250.json
Normal file
32
2017/CVE-2017-1000250.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 110457097,
|
||||
"name": "CVE-2017-1000250-PoC",
|
||||
"full_name": "olav-st\/CVE-2017-1000250-PoC",
|
||||
"owner": {
|
||||
"login": "olav-st",
|
||||
"id": 1856634,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1856634?v=4",
|
||||
"html_url": "https:\/\/github.com\/olav-st"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/olav-st\/CVE-2017-1000250-PoC",
|
||||
"description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-12T18:18:52Z",
|
||||
"updated_at": "2019-03-20T07:23:31Z",
|
||||
"pushed_at": "2017-11-12T19:46:35Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-09-08T07:27:13Z",
|
||||
"updated_at": "2022-11-09T17:57:59Z",
|
||||
"updated_at": "2023-12-19T20:12:26Z",
|
||||
"pushed_at": "2017-09-13T14:40:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -75,10 +75,10 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-09T01:32:57Z",
|
||||
"updated_at": "2023-12-19T17:40:58Z",
|
||||
"updated_at": "2023-12-19T23:28:25Z",
|
||||
"pushed_at": "2017-11-07T19:24:00Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 247,
|
||||
"watchers": 248,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2018-10-17T14:14:12Z",
|
||||
"updated_at": "2023-11-24T19:44:07Z",
|
||||
"pushed_at": "2023-02-20T02:06:22Z",
|
||||
"pushed_at": "2023-12-19T20:46:55Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -398,7 +398,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-08T10:29:00Z",
|
||||
"updated_at": "2020-05-08T12:07:54Z",
|
||||
"pushed_at": "2022-03-29T22:00:21Z",
|
||||
"pushed_at": "2023-12-19T20:44:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"whatsapp"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"forks": 38,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 1658,
|
||||
"watchers_count": 1658,
|
||||
"has_discussions": false,
|
||||
"forks_count": 365,
|
||||
"forks_count": 366,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 365,
|
||||
"forks": 366,
|
||||
"watchers": 1658,
|
||||
"score": 0,
|
||||
"subscribers_count": 88
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2020–7961 Mass exploit for Script Kiddies",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-02T13:57:59Z",
|
||||
"updated_at": "2023-12-17T18:30:44Z",
|
||||
"updated_at": "2023-12-19T20:52:49Z",
|
||||
"pushed_at": "2021-01-03T10:54:20Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2023-11-30T16:04:58Z",
|
||||
"updated_at": "2023-12-19T21:29:32Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-28T09:48:36Z",
|
||||
"updated_at": "2023-10-16T18:39:19Z",
|
||||
"updated_at": "2023-12-20T00:02:36Z",
|
||||
"pushed_at": "2022-02-21T08:30:22Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 43,
|
||||
"forks": 17,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -1084,7 +1084,7 @@
|
|||
"forks": 16,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
"subscribers_count": 17
|
||||
},
|
||||
{
|
||||
"id": 352785704,
|
||||
|
|
|
@ -2458,10 +2458,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2023-12-15T00:42:59Z",
|
||||
"updated_at": "2023-12-19T20:57:43Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -2479,7 +2479,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -610,13 +610,13 @@
|
|||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1170,5 +1170,40 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 733652712,
|
||||
"name": "CVE-2023-23752",
|
||||
"full_name": "gunzf0x\/CVE-2023-23752",
|
||||
"owner": {
|
||||
"login": "gunzf0x",
|
||||
"id": 31874167,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31874167?v=4",
|
||||
"html_url": "https:\/\/github.com\/gunzf0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gunzf0x\/CVE-2023-23752",
|
||||
"description": "Binaries for \"CVE-2023-23752\"",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-19T20:18:49Z",
|
||||
"updated_at": "2023-12-19T20:32:57Z",
|
||||
"pushed_at": "2023-12-19T20:31:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"binaries-included",
|
||||
"cve-2023-23752",
|
||||
"go",
|
||||
"golang"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-11T19:23:13Z",
|
||||
"updated_at": "2023-12-15T02:37:52Z",
|
||||
"updated_at": "2023-12-19T20:49:03Z",
|
||||
"pushed_at": "2023-12-11T20:27:56Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T16:18:41Z",
|
||||
"updated_at": "2023-12-19T11:43:58Z",
|
||||
"updated_at": "2023-12-19T21:58:21Z",
|
||||
"pushed_at": "2023-09-26T19:04:21Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -31,8 +31,8 @@
|
|||
"sharepoint"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 188,
|
||||
"forks": 27,
|
||||
"watchers": 187,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T08:32:26Z",
|
||||
"updated_at": "2023-12-18T10:54:21Z",
|
||||
"updated_at": "2023-12-19T20:54:47Z",
|
||||
"pushed_at": "2023-12-14T20:09:23Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1163,11 +1163,11 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-12-12T14:54:30Z",
|
||||
"updated_at": "2023-12-13T20:06:39Z",
|
||||
"pushed_at": "2023-12-18T18:13:49Z",
|
||||
"pushed_at": "2023-12-19T22:06:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1179,7 +1179,7 @@
|
|||
"rust"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -259,36 +259,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 713730410,
|
||||
"name": "CVE-2023-4966",
|
||||
"full_name": "fdevsectest\/CVE-2023-4966",
|
||||
"owner": {
|
||||
"login": "fdevsectest",
|
||||
"id": 143382993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143382993?v=4",
|
||||
"html_url": "https:\/\/github.com\/fdevsectest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fdevsectest\/CVE-2023-4966",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-03T05:59:14Z",
|
||||
"updated_at": "2023-11-24T08:55:30Z",
|
||||
"pushed_at": "2023-11-03T05:59:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 721262627,
|
||||
"name": "CVE-2023-4966",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SQL Injection in 3CX CRM Integration",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-14T18:38:28Z",
|
||||
"updated_at": "2023-12-17T07:13:24Z",
|
||||
"updated_at": "2023-12-19T21:05:59Z",
|
||||
"pushed_at": "2023-12-18T07:00:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T20:47:52Z",
|
||||
"updated_at": "2023-12-11T10:07:53Z",
|
||||
"updated_at": "2023-12-19T20:54:31Z",
|
||||
"pushed_at": "2023-12-09T10:54:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T09:31:36Z",
|
||||
"updated_at": "2023-12-19T02:13:09Z",
|
||||
"updated_at": "2023-12-19T20:51:40Z",
|
||||
"pushed_at": "2023-12-13T13:18:18Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-17T14:18:54Z",
|
||||
"updated_at": "2023-12-19T17:44:09Z",
|
||||
"updated_at": "2023-12-19T21:09:05Z",
|
||||
"pushed_at": "2023-12-18T02:46:21Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": true,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2023-12-19T11:35:46Z",
|
||||
"updated_at": "2023-12-19T20:50:14Z",
|
||||
"pushed_at": "2023-12-15T18:13:06Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
20
README.md
20
README.md
|
@ -858,7 +858,6 @@
|
|||
- [0xKayala/CVE-2023-4966](https://github.com/0xKayala/CVE-2023-4966)
|
||||
- [certat/citrix-logchecker](https://github.com/certat/citrix-logchecker)
|
||||
- [sanjai-AK47/CVE-2023-4966](https://github.com/sanjai-AK47/CVE-2023-4966)
|
||||
- [fdevsectest/CVE-2023-4966](https://github.com/fdevsectest/CVE-2023-4966)
|
||||
- [s-bt/CVE-2023-4966](https://github.com/s-bt/CVE-2023-4966)
|
||||
- [byte4RR4Y/CVE-2023-4966](https://github.com/byte4RR4Y/CVE-2023-4966)
|
||||
- [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs)
|
||||
|
@ -1768,6 +1767,7 @@
|
|||
- [hadrian3689/CVE-2023-23752_Joomla](https://github.com/hadrian3689/CVE-2023-23752_Joomla)
|
||||
- [C1ph3rX13/CVE-2023-23752](https://github.com/C1ph3rX13/CVE-2023-23752)
|
||||
- [JeneralMotors/CVE-2023-23752](https://github.com/JeneralMotors/CVE-2023-23752)
|
||||
- [gunzf0x/CVE-2023-23752](https://github.com/gunzf0x/CVE-2023-23752)
|
||||
|
||||
### CVE-2023-23924 (2023-01-31)
|
||||
|
||||
|
@ -33314,6 +33314,13 @@
|
|||
|
||||
- [Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal](https://github.com/Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal)
|
||||
|
||||
### CVE-2017-1000250 (2017-09-12)
|
||||
|
||||
<code>All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
|
||||
</code>
|
||||
|
||||
- [olav-st/CVE-2017-1000250-PoC](https://github.com/olav-st/CVE-2017-1000250-PoC)
|
||||
|
||||
### CVE-2017-1000251 (2017-09-12)
|
||||
|
||||
<code>The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
|
||||
|
@ -34065,10 +34072,7 @@
|
|||
- [scumjr/dirtycow-vdso](https://github.com/scumjr/dirtycow-vdso)
|
||||
- [gbonacini/CVE-2016-5195](https://github.com/gbonacini/CVE-2016-5195)
|
||||
- [DavidBuchanan314/cowroot](https://github.com/DavidBuchanan314/cowroot)
|
||||
- [aishee/scan-dirtycow](https://github.com/aishee/scan-dirtycow)
|
||||
- [oleg-fiksel/ansible_CVE-2016-5195_check](https://github.com/oleg-fiksel/ansible_CVE-2016-5195_check)
|
||||
- [ldenevi/CVE-2016-5195](https://github.com/ldenevi/CVE-2016-5195)
|
||||
- [whu-enjoy/CVE-2016-5195](https://github.com/whu-enjoy/CVE-2016-5195)
|
||||
- [firefart/dirtycow](https://github.com/firefart/dirtycow)
|
||||
- [ndobson/inspec_CVE-2016-5195](https://github.com/ndobson/inspec_CVE-2016-5195)
|
||||
- [linhlt247/DirtyCOW_CVE-2016-5195](https://github.com/linhlt247/DirtyCOW_CVE-2016-5195)
|
||||
|
@ -34244,13 +34248,6 @@
|
|||
- [boompig/cve-2016-6662](https://github.com/boompig/cve-2016-6662)
|
||||
- [MAYASEVEN/CVE-2016-6662](https://github.com/MAYASEVEN/CVE-2016-6662)
|
||||
|
||||
### CVE-2016-6663 (2016-12-13)
|
||||
|
||||
<code>Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
|
||||
</code>
|
||||
|
||||
- [firebroo/CVE-2016-6663](https://github.com/firebroo/CVE-2016-6663)
|
||||
|
||||
### CVE-2016-6754 (2016-11-25)
|
||||
|
||||
<code>A remote code execution vulnerability in Webview in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-05 could enable a remote attacker to execute arbitrary code when the user is navigating to a website. This issue is rated as High due to the possibility of remote code execution in an unprivileged process. Android ID: A-31217937.
|
||||
|
@ -34429,7 +34426,6 @@
|
|||
</code>
|
||||
|
||||
- [sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870](https://github.com/sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870)
|
||||
- [rustyJ4ck/JoomlaCVE20168869](https://github.com/rustyJ4ck/JoomlaCVE20168869)
|
||||
- [cved-sources/cve-2016-8869](https://github.com/cved-sources/cve-2016-8869)
|
||||
|
||||
### CVE-2016-8870 (2016-11-04)
|
||||
|
|
Loading…
Add table
Reference in a new issue