Auto Update 2023/10/20 18:27:44

This commit is contained in:
motikan2010-bot 2023-10-21 03:27:44 +09:00
parent b3d282365b
commit 350fd0036f
38 changed files with 331 additions and 160 deletions

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-10-17T13:07:33Z",
"updated_at": "2023-10-20T17:14:39Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 768,
"watchers_count": 768,
"stargazers_count": 769,
"watchers_count": 769,
"has_discussions": false,
"forks_count": 437,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 437,
"watchers": 768,
"watchers": 769,
"score": 0,
"subscribers_count": 11
},

View file

@ -107,10 +107,10 @@
"description": "(CVE-2017-9841) PHPUnit_eval-stdin_php Remote Code Execution",
"fork": false,
"created_at": "2020-09-14T12:33:44Z",
"updated_at": "2022-10-24T11:04:31Z",
"updated_at": "2023-10-20T15:52:01Z",
"pushed_at": "2020-11-07T10:20:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,7 +43,7 @@
"description": "Full unauthenticated RCE proof of concept for Rocket.Chat 3.12.1 CVE-2021-22911",
"fork": false,
"created_at": "2021-07-30T21:44:18Z",
"updated_at": "2022-02-28T15:50:54Z",
"updated_at": "2023-10-20T17:01:19Z",
"pushed_at": "2021-07-30T22:00:52Z",
"stargazers_count": 6,
"watchers_count": 6,

View file

@ -1070,10 +1070,10 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2023-09-28T11:26:06Z",
"updated_at": "2023-10-20T14:28:38Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -1082,7 +1082,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 45,
"watchers": 46,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-01T16:45:42Z",
"updated_at": "2023-09-28T11:25:23Z",
"updated_at": "2023-10-20T13:00:31Z",
"pushed_at": "2021-03-02T07:45:20Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 5
}

View file

@ -228,10 +228,10 @@
"description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD",
"fork": false,
"created_at": "2021-09-20T16:29:48Z",
"updated_at": "2023-09-28T11:31:36Z",
"updated_at": "2023-10-20T14:58:21Z",
"pushed_at": "2021-09-26T04:37:04Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 5
},

View file

@ -3109,7 +3109,7 @@
"fork": false,
"created_at": "2022-09-15T11:01:45Z",
"updated_at": "2022-09-15T11:02:07Z",
"pushed_at": "2023-05-13T05:03:34Z",
"pushed_at": "2023-10-20T13:40:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -3199,7 +3199,7 @@
"fork": false,
"created_at": "2022-09-15T14:17:45Z",
"updated_at": "2022-09-16T01:01:16Z",
"pushed_at": "2023-05-13T00:46:42Z",
"pushed_at": "2023-10-20T13:00:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -3229,7 +3229,7 @@
"fork": false,
"created_at": "2022-09-20T03:45:24Z",
"updated_at": "2022-09-20T03:45:37Z",
"pushed_at": "2023-09-29T12:36:09Z",
"pushed_at": "2023-10-20T12:57:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
"fork": false,
"created_at": "2023-02-08T07:30:52Z",
"updated_at": "2023-10-20T01:41:29Z",
"updated_at": "2023-10-20T14:09:09Z",
"pushed_at": "2023-10-18T17:15:55Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-10-20T06:35:46Z",
"updated_at": "2023-10-20T15:48:16Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1056,
"watchers_count": 1056,
"stargazers_count": 1055,
"watchers_count": 1055,
"has_discussions": true,
"forks_count": 181,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 181,
"watchers": 1056,
"watchers": 1055,
"score": 0,
"subscribers_count": 18
},
@ -282,10 +282,10 @@
"description": "Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC",
"fork": false,
"created_at": "2022-06-04T10:44:38Z",
"updated_at": "2023-03-10T12:12:43Z",
"updated_at": "2023-10-20T18:21:27Z",
"pushed_at": "2022-06-04T12:53:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -311,7 +311,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2022-09-30T16:43:28Z",
"updated_at": "2023-09-28T11:43:07Z",
"updated_at": "2023-10-20T13:02:25Z",
"pushed_at": "2022-10-01T09:43:20Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 40,
"forks": 11,
"watchers": 41,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-38217",
"fork": false,
"created_at": "2022-09-06T14:07:22Z",
"updated_at": "2023-05-19T14:47:50Z",
"updated_at": "2023-10-20T17:52:50Z",
"pushed_at": "2022-09-07T03:20:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "WAGO系统远程代码执行漏洞(CVE-2023-1698)",
"fork": false,
"created_at": "2023-10-20T12:15:39Z",
"updated_at": "2023-10-20T12:23:08Z",
"pushed_at": "2023-10-20T12:23:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2023-10-20T12:32:19Z",
"pushed_at": "2023-10-20T12:55:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-20198 Checkscript",
"fork": false,
"created_at": "2023-10-17T08:00:18Z",
"updated_at": "2023-10-20T01:41:59Z",
"updated_at": "2023-10-20T12:29:48Z",
"pushed_at": "2023-10-17T11:28:05Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 0
},
@ -74,7 +74,7 @@
"fork": false,
"created_at": "2023-10-17T15:44:01Z",
"updated_at": "2023-10-19T10:01:05Z",
"pushed_at": "2023-10-17T15:50:59Z",
"pushed_at": "2023-10-20T14:43:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@ -228,13 +228,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0
@ -362,5 +362,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 707768225,
"name": "cve-2023-20198",
"full_name": "iveresk\/cve-2023-20198",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2023-20198",
"description": "1vere$k POC on the CVE-2023-20198",
"fork": false,
"created_at": "2023-10-20T16:01:17Z",
"updated_at": "2023-10-20T16:25:01Z",
"pushed_at": "2023-10-20T16:24:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence",
"fork": false,
"created_at": "2023-10-06T20:29:44Z",
"updated_at": "2023-10-19T14:13:09Z",
"updated_at": "2023-10-20T14:34:24Z",
"pushed_at": "2023-10-06T21:59:30Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},
@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-10-19T16:29:26Z",
"updated_at": "2023-10-20T17:41:20Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 1
},
@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-10-19T08:23:47Z",
"updated_at": "2023-10-20T18:21:33Z",
"pushed_at": "2023-10-16T02:24:02Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 3
},

View file

@ -804,5 +804,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 707706726,
"name": "CVE-2023-23752",
"full_name": "AlissoftCodes\/CVE-2023-23752",
"owner": {
"login": "AlissoftCodes",
"id": 129133392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129133392?v=4",
"html_url": "https:\/\/github.com\/AlissoftCodes"
},
"html_url": "https:\/\/github.com\/AlissoftCodes\/CVE-2023-23752",
"description": "Joomla Unauthenticated Information Disclosure (CVE-2023-23752) exploit",
"fork": false,
"created_at": "2023-10-20T13:32:28Z",
"updated_at": "2023-10-20T13:41:07Z",
"pushed_at": "2023-10-20T13:36:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-24488 PoC",
"fork": false,
"created_at": "2023-07-01T17:47:17Z",
"updated_at": "2023-10-13T14:51:12Z",
"updated_at": "2023-10-20T18:12:49Z",
"pushed_at": "2023-07-01T17:49:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-06-19T14:36:47Z",
"updated_at": "2023-09-22T11:53:57Z",
"pushed_at": "2023-06-22T07:19:36Z",
"pushed_at": "2023-10-20T13:23:59Z",
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "POC for Veeam Backup and Replication CVE-2023-27532",
"fork": false,
"created_at": "2023-03-18T16:20:53Z",
"updated_at": "2023-09-28T11:45:34Z",
"updated_at": "2023-10-20T17:41:12Z",
"pushed_at": "2023-03-28T18:21:55Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 45,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2023-10-16T22:52:45Z",
"updated_at": "2023-10-20T17:54:45Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 54,
"watchers": 61,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
"updated_at": "2023-10-18T20:18:12Z",
"updated_at": "2023-10-20T13:26:19Z",
"pushed_at": "2023-08-17T11:43:26Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 90,
"forks": 24,
"watchers": 91,
"score": 0,
"subscribers_count": 6
}

View file

@ -43,10 +43,10 @@
"description": "Spring-Kafka-Deserialization-Remote-Code-Execution",
"fork": false,
"created_at": "2023-09-28T11:18:35Z",
"updated_at": "2023-10-20T09:10:08Z",
"updated_at": "2023-10-20T15:38:33Z",
"pushed_at": "2023-10-08T06:14:09Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

32
2023/CVE-2023-34051.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 707743915,
"name": "CVE-2023-34051",
"full_name": "horizon3ai\/CVE-2023-34051",
"owner": {
"login": "horizon3ai",
"id": 79593994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
"html_url": "https:\/\/github.com\/horizon3ai"
},
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2023-34051",
"description": "VMware Aria Operations for Logs CVE-2023-34051",
"fork": false,
"created_at": "2023-10-20T14:59:45Z",
"updated_at": "2023-10-20T15:40:28Z",
"pushed_at": "2023-10-20T15:00:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -322,10 +322,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-10T18:22:57Z",
"updated_at": "2023-10-19T16:32:11Z",
"updated_at": "2023-10-20T14:51:06Z",
"pushed_at": "2023-09-01T19:14:30Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -334,7 +334,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-10-19T09:54:52Z",
"updated_at": "2023-10-20T15:07:45Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 98,
"watchers": 100,
"score": 0,
"subscribers_count": 4
},
@ -73,19 +73,19 @@
"description": "PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy",
"fork": false,
"created_at": "2023-10-20T02:05:27Z",
"updated_at": "2023-10-20T02:06:54Z",
"updated_at": "2023-10-20T18:11:34Z",
"pushed_at": "2023-10-20T11:54:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Ivanti Sentry CVE-2023-38035",
"fork": false,
"created_at": "2023-08-23T17:34:36Z",
"updated_at": "2023-10-09T09:37:44Z",
"updated_at": "2023-10-20T15:41:29Z",
"pushed_at": "2023-08-23T18:42:37Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 4
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -63,7 +63,7 @@
"windows-11"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -193,10 +193,10 @@
"description": "socks5 heap buffer overflow",
"fork": false,
"created_at": "2023-10-17T09:03:15Z",
"updated_at": "2023-10-19T20:59:12Z",
"updated_at": "2023-10-20T12:29:36Z",
"pushed_at": "2023-10-17T09:04:55Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 2
}

View file

@ -758,5 +758,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 707752489,
"name": "CVE-2023-38646",
"full_name": "AnvithLobo\/CVE-2023-38646",
"owner": {
"login": "AnvithLobo",
"id": 64419387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64419387?v=4",
"html_url": "https:\/\/github.com\/AnvithLobo"
},
"html_url": "https:\/\/github.com\/AnvithLobo\/CVE-2023-38646",
"description": "RCE Exploit for CVE-2023-38646",
"fork": false,
"created_at": "2023-10-20T15:21:08Z",
"updated_at": "2023-10-20T15:21:15Z",
"pushed_at": "2023-10-20T15:21:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-10-20T08:00:31Z",
"updated_at": "2023-10-20T14:42:43Z",
"pushed_at": "2023-09-17T02:17:52Z",
"stargazers_count": 688,
"watchers_count": 688,
"stargazers_count": 690,
"watchers_count": 690,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 120,
"watchers": 688,
"watchers": 690,
"score": 0,
"subscribers_count": 8
},
@ -174,10 +174,10 @@
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2023-10-20T07:07:56Z",
"updated_at": "2023-10-20T13:05:39Z",
"pushed_at": "2023-08-28T20:41:57Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -186,7 +186,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 0
},
@ -239,13 +239,13 @@
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 38,
"score": 0,
"subscribers_count": 5

View file

@ -13,10 +13,10 @@
"description": "A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.",
"fork": false,
"created_at": "2022-09-18T21:03:07Z",
"updated_at": "2023-10-14T10:21:36Z",
"updated_at": "2023-10-20T13:15:43Z",
"pushed_at": "2023-10-03T18:32:14Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
}

32
2023/CVE-2023-3971.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 707815165,
"name": "CVE-2023-3971",
"full_name": "ashangp923\/CVE-2023-3971",
"owner": {
"login": "ashangp923",
"id": 133530110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133530110?v=4",
"html_url": "https:\/\/github.com\/ashangp923"
},
"html_url": "https:\/\/github.com\/ashangp923\/CVE-2023-3971",
"description": "To find HTML injection and XSS ",
"fork": false,
"created_at": "2023-10-20T18:11:22Z",
"updated_at": "2023-10-20T18:26:57Z",
"pushed_at": "2023-10-20T18:11:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
"fork": false,
"created_at": "2023-10-16T05:08:06Z",
"updated_at": "2023-10-20T01:42:36Z",
"updated_at": "2023-10-20T12:32:11Z",
"pushed_at": "2023-10-18T12:27:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2023-10-20T09:24:48Z",
"updated_at": "2023-10-20T16:25:50Z",
"pushed_at": "2023-10-19T18:30:15Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 6
},
@ -74,7 +74,7 @@
"fork": false,
"created_at": "2023-10-16T20:34:02Z",
"updated_at": "2023-10-20T03:53:37Z",
"pushed_at": "2023-10-20T06:18:17Z",
"pushed_at": "2023-10-20T15:37:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2023-10-20T03:26:56Z",
"updated_at": "2023-10-20T15:42:49Z",
"pushed_at": "2023-10-15T01:28:07Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 62,
"watchers": 63,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-19T13:57:43Z",
"updated_at": "2023-10-20T16:16:42Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 35,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 157,
"forks": 36,
"watchers": 158,
"score": 0,
"subscribers_count": 5
},
@ -48,7 +48,7 @@
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -62,7 +62,7 @@
"proof-of-concept"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 31,
"score": 0,
"subscribers_count": 2

View file

@ -193,10 +193,10 @@
"description": "CVE-2023-4911",
"fork": false,
"created_at": "2023-10-11T14:49:22Z",
"updated_at": "2023-10-17T04:09:12Z",
"updated_at": "2023-10-20T15:02:33Z",
"pushed_at": "2023-10-11T15:15:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -209,7 +209,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -589,6 +589,13 @@
- [zh-byte/CVE-2023-3836](https://github.com/zh-byte/CVE-2023-3836)
### CVE-2023-3971 (2023-10-04)
<code>An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
</code>
- [ashangp923/CVE-2023-3971](https://github.com/ashangp923/CVE-2023-3971)
### CVE-2023-4128 (2023-08-10)
<code>A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
@ -873,6 +880,7 @@
- [ditekshen/ansible-cve-2023-20198](https://github.com/ditekshen/ansible-cve-2023-20198)
- [reket99/Cisco_CVE-2023-20198](https://github.com/reket99/Cisco_CVE-2023-20198)
- [m474r5/CVE-2023-20198-RCE](https://github.com/m474r5/CVE-2023-20198-RCE)
- [iveresk/cve-2023-20198](https://github.com/iveresk/cve-2023-20198)
### CVE-2023-20209 (2023-08-16)
@ -1175,7 +1183,7 @@
### CVE-2023-22515 (2023-10-04)
<code>Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. \n\nFor more details, please review the linked advisory on this CVE.
<code>Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
</code>
- [ErikWynter/CVE-2023-22515-Scan](https://github.com/ErikWynter/CVE-2023-22515-Scan)
@ -1394,6 +1402,7 @@
- [MrP4nda1337/CVE-2023-23752](https://github.com/MrP4nda1337/CVE-2023-23752)
- [k0valskia/CVE-2023-23752](https://github.com/k0valskia/CVE-2023-23752)
- [yTxZx/CVE-2023-23752](https://github.com/yTxZx/CVE-2023-23752)
- [AlissoftCodes/CVE-2023-23752](https://github.com/AlissoftCodes/CVE-2023-23752)
### CVE-2023-23924 (2023-01-31)
@ -2945,6 +2954,13 @@
- [X1r0z/spring-amqp-deserialization](https://github.com/X1r0z/spring-amqp-deserialization)
### CVE-2023-34051 (2023-10-20)
<code>VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\n
</code>
- [horizon3ai/CVE-2023-34051](https://github.com/horizon3ai/CVE-2023-34051)
### CVE-2023-34096 (2023-06-08)
<code>Thruk is a multibackend monitoring webinterface which currently supports Naemon, Icinga, Shinken and Nagios as backends. In versions 3.06 and prior, the file `panorama.pm` is vulnerable to a Path Traversal vulnerability which allows an attacker to upload a file to any folder which has write permissions on the affected system. The parameter location is not filtered, validated or sanitized and it accepts any kind of characters. For a path traversal attack, the only characters required were the dot (`.`) and the slash (`/`). A fix is available in version 3.06.2.
@ -3686,6 +3702,7 @@
- [asepsaepdin/CVE-2023-38646](https://github.com/asepsaepdin/CVE-2023-38646)
- [Pyr0sec/CVE-2023-38646](https://github.com/Pyr0sec/CVE-2023-38646)
- [birdm4nw/CVE-2023-38646](https://github.com/birdm4nw/CVE-2023-38646)
- [AnvithLobo/CVE-2023-38646](https://github.com/AnvithLobo/CVE-2023-38646)
### CVE-2023-38743 (2023-09-11)