mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/10/20 18:27:44
This commit is contained in:
parent
b3d282365b
commit
350fd0036f
38 changed files with 331 additions and 160 deletions
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2023-10-17T13:07:33Z",
|
||||
"updated_at": "2023-10-20T17:14:39Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"has_discussions": false,
|
||||
"forks_count": 437,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 437,
|
||||
"watchers": 768,
|
||||
"watchers": 769,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "(CVE-2017-9841) PHPUnit_eval-stdin_php Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T12:33:44Z",
|
||||
"updated_at": "2022-10-24T11:04:31Z",
|
||||
"updated_at": "2023-10-20T15:52:01Z",
|
||||
"pushed_at": "2020-11-07T10:20:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Full unauthenticated RCE proof of concept for Rocket.Chat 3.12.1 CVE-2021-22911",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T21:44:18Z",
|
||||
"updated_at": "2022-02-28T15:50:54Z",
|
||||
"updated_at": "2023-10-20T17:01:19Z",
|
||||
"pushed_at": "2021-07-30T22:00:52Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -1070,10 +1070,10 @@
|
|||
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T01:12:48Z",
|
||||
"updated_at": "2023-09-28T11:26:06Z",
|
||||
"updated_at": "2023-10-20T14:28:38Z",
|
||||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -1082,7 +1082,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T16:45:42Z",
|
||||
"updated_at": "2023-09-28T11:25:23Z",
|
||||
"updated_at": "2023-10-20T13:00:31Z",
|
||||
"pushed_at": "2021-03-02T07:45:20Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -228,10 +228,10 @@
|
|||
"description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-20T16:29:48Z",
|
||||
"updated_at": "2023-09-28T11:31:36Z",
|
||||
"updated_at": "2023-10-20T14:58:21Z",
|
||||
"pushed_at": "2021-09-26T04:37:04Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -240,7 +240,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -3109,7 +3109,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-15T11:01:45Z",
|
||||
"updated_at": "2022-09-15T11:02:07Z",
|
||||
"pushed_at": "2023-05-13T05:03:34Z",
|
||||
"pushed_at": "2023-10-20T13:40:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -3199,7 +3199,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-15T14:17:45Z",
|
||||
"updated_at": "2022-09-16T01:01:16Z",
|
||||
"pushed_at": "2023-05-13T00:46:42Z",
|
||||
"pushed_at": "2023-10-20T13:00:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
@ -3229,7 +3229,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-20T03:45:24Z",
|
||||
"updated_at": "2022-09-20T03:45:37Z",
|
||||
"pushed_at": "2023-09-29T12:36:09Z",
|
||||
"pushed_at": "2023-10-20T12:57:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-08T07:30:52Z",
|
||||
"updated_at": "2023-10-20T01:41:29Z",
|
||||
"updated_at": "2023-10-20T14:09:09Z",
|
||||
"pushed_at": "2023-10-18T17:15:55Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-10-20T06:35:46Z",
|
||||
"updated_at": "2023-10-20T15:48:16Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1056,
|
||||
"watchers_count": 1056,
|
||||
"stargazers_count": 1055,
|
||||
"watchers_count": 1055,
|
||||
"has_discussions": true,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 1056,
|
||||
"watchers": 1055,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -282,10 +282,10 @@
|
|||
"description": "Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T10:44:38Z",
|
||||
"updated_at": "2023-03-10T12:12:43Z",
|
||||
"updated_at": "2023-10-20T18:21:27Z",
|
||||
"pushed_at": "2022-06-04T12:53:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -311,7 +311,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T16:43:28Z",
|
||||
"updated_at": "2023-09-28T11:43:07Z",
|
||||
"updated_at": "2023-10-20T13:02:25Z",
|
||||
"pushed_at": "2022-10-01T09:43:20Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 40,
|
||||
"forks": 11,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-38217",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-06T14:07:22Z",
|
||||
"updated_at": "2023-05-19T14:47:50Z",
|
||||
"updated_at": "2023-10-20T17:52:50Z",
|
||||
"pushed_at": "2022-09-07T03:20:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "WAGO系统远程代码执行漏洞(CVE-2023-1698)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T12:15:39Z",
|
||||
"updated_at": "2023-10-20T12:23:08Z",
|
||||
"pushed_at": "2023-10-20T12:23:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2023-10-20T12:32:19Z",
|
||||
"pushed_at": "2023-10-20T12:55:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-20198 Checkscript",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T08:00:18Z",
|
||||
"updated_at": "2023-10-20T01:41:59Z",
|
||||
"updated_at": "2023-10-20T12:29:48Z",
|
||||
"pushed_at": "2023-10-17T11:28:05Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -74,7 +74,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-17T15:44:01Z",
|
||||
"updated_at": "2023-10-19T10:01:05Z",
|
||||
"pushed_at": "2023-10-17T15:50:59Z",
|
||||
"pushed_at": "2023-10-20T14:43:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
@ -228,13 +228,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
@ -362,5 +362,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 707768225,
|
||||
"name": "cve-2023-20198",
|
||||
"full_name": "iveresk\/cve-2023-20198",
|
||||
"owner": {
|
||||
"login": "iveresk",
|
||||
"id": 28754633,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
|
||||
"html_url": "https:\/\/github.com\/iveresk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/iveresk\/cve-2023-20198",
|
||||
"description": "1vere$k POC on the CVE-2023-20198",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T16:01:17Z",
|
||||
"updated_at": "2023-10-20T16:25:01Z",
|
||||
"pushed_at": "2023-10-20T16:24:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-06T20:29:44Z",
|
||||
"updated_at": "2023-10-19T14:13:09Z",
|
||||
"updated_at": "2023-10-20T14:34:24Z",
|
||||
"pushed_at": "2023-10-06T21:59:30Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2023-10-19T16:29:26Z",
|
||||
"updated_at": "2023-10-20T17:41:20Z",
|
||||
"pushed_at": "2023-10-17T22:04:13Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -112,10 +112,10 @@
|
|||
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T08:42:17Z",
|
||||
"updated_at": "2023-10-19T08:23:47Z",
|
||||
"updated_at": "2023-10-20T18:21:33Z",
|
||||
"pushed_at": "2023-10-16T02:24:02Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -804,5 +804,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 707706726,
|
||||
"name": "CVE-2023-23752",
|
||||
"full_name": "AlissoftCodes\/CVE-2023-23752",
|
||||
"owner": {
|
||||
"login": "AlissoftCodes",
|
||||
"id": 129133392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129133392?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlissoftCodes"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlissoftCodes\/CVE-2023-23752",
|
||||
"description": "Joomla Unauthenticated Information Disclosure (CVE-2023-23752) exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T13:32:28Z",
|
||||
"updated_at": "2023-10-20T13:41:07Z",
|
||||
"pushed_at": "2023-10-20T13:36:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-24488 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-01T17:47:17Z",
|
||||
"updated_at": "2023-10-13T14:51:12Z",
|
||||
"updated_at": "2023-10-20T18:12:49Z",
|
||||
"pushed_at": "2023-07-01T17:49:16Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-19T14:36:47Z",
|
||||
"updated_at": "2023-09-22T11:53:57Z",
|
||||
"pushed_at": "2023-06-22T07:19:36Z",
|
||||
"pushed_at": "2023-10-20T13:23:59Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for Veeam Backup and Replication CVE-2023-27532",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-18T16:20:53Z",
|
||||
"updated_at": "2023-09-28T11:45:34Z",
|
||||
"updated_at": "2023-10-20T17:41:12Z",
|
||||
"pushed_at": "2023-03-28T18:21:55Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-24T21:59:23Z",
|
||||
"updated_at": "2023-10-16T22:52:45Z",
|
||||
"updated_at": "2023-10-20T17:54:45Z",
|
||||
"pushed_at": "2023-10-12T19:18:32Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 54,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-15T04:16:46Z",
|
||||
"updated_at": "2023-10-18T20:18:12Z",
|
||||
"updated_at": "2023-10-20T13:26:19Z",
|
||||
"pushed_at": "2023-08-17T11:43:26Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 90,
|
||||
"forks": 24,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Spring-Kafka-Deserialization-Remote-Code-Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-28T11:18:35Z",
|
||||
"updated_at": "2023-10-20T09:10:08Z",
|
||||
"updated_at": "2023-10-20T15:38:33Z",
|
||||
"pushed_at": "2023-10-08T06:14:09Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2023/CVE-2023-34051.json
Normal file
32
2023/CVE-2023-34051.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 707743915,
|
||||
"name": "CVE-2023-34051",
|
||||
"full_name": "horizon3ai\/CVE-2023-34051",
|
||||
"owner": {
|
||||
"login": "horizon3ai",
|
||||
"id": 79593994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2023-34051",
|
||||
"description": "VMware Aria Operations for Logs CVE-2023-34051",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T14:59:45Z",
|
||||
"updated_at": "2023-10-20T15:40:28Z",
|
||||
"pushed_at": "2023-10-20T15:00:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -322,10 +322,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-10T18:22:57Z",
|
||||
"updated_at": "2023-10-19T16:32:11Z",
|
||||
"updated_at": "2023-10-20T14:51:06Z",
|
||||
"pushed_at": "2023-09-01T19:14:30Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -334,7 +334,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2023-10-19T09:54:52Z",
|
||||
"updated_at": "2023-10-20T15:07:45Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 98,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -73,19 +73,19 @@
|
|||
"description": "PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T02:05:27Z",
|
||||
"updated_at": "2023-10-20T02:06:54Z",
|
||||
"updated_at": "2023-10-20T18:11:34Z",
|
||||
"pushed_at": "2023-10-20T11:54:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ivanti Sentry CVE-2023-38035",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-23T17:34:36Z",
|
||||
"updated_at": "2023-10-09T09:37:44Z",
|
||||
"updated_at": "2023-10-20T15:41:29Z",
|
||||
"pushed_at": "2023-08-23T18:42:37Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -63,7 +63,7 @@
|
|||
"windows-11"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "socks5 heap buffer overflow",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-17T09:03:15Z",
|
||||
"updated_at": "2023-10-19T20:59:12Z",
|
||||
"updated_at": "2023-10-20T12:29:36Z",
|
||||
"pushed_at": "2023-10-17T09:04:55Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -758,5 +758,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 707752489,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "AnvithLobo\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "AnvithLobo",
|
||||
"id": 64419387,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64419387?v=4",
|
||||
"html_url": "https:\/\/github.com\/AnvithLobo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AnvithLobo\/CVE-2023-38646",
|
||||
"description": "RCE Exploit for CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T15:21:08Z",
|
||||
"updated_at": "2023-10-20T15:21:15Z",
|
||||
"pushed_at": "2023-10-20T15:21:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-10-20T08:00:31Z",
|
||||
"updated_at": "2023-10-20T14:42:43Z",
|
||||
"pushed_at": "2023-09-17T02:17:52Z",
|
||||
"stargazers_count": 688,
|
||||
"watchers_count": 688,
|
||||
"stargazers_count": 690,
|
||||
"watchers_count": 690,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 688,
|
||||
"watchers": 690,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -174,10 +174,10 @@
|
|||
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T04:56:10Z",
|
||||
"updated_at": "2023-10-20T07:07:56Z",
|
||||
"updated_at": "2023-10-20T13:05:39Z",
|
||||
"pushed_at": "2023-08-28T20:41:57Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -186,7 +186,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -239,13 +239,13 @@
|
|||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 10,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T21:03:07Z",
|
||||
"updated_at": "2023-10-14T10:21:36Z",
|
||||
"updated_at": "2023-10-20T13:15:43Z",
|
||||
"pushed_at": "2023-10-03T18:32:14Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2023/CVE-2023-3971.json
Normal file
32
2023/CVE-2023-3971.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 707815165,
|
||||
"name": "CVE-2023-3971",
|
||||
"full_name": "ashangp923\/CVE-2023-3971",
|
||||
"owner": {
|
||||
"login": "ashangp923",
|
||||
"id": 133530110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/133530110?v=4",
|
||||
"html_url": "https:\/\/github.com\/ashangp923"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ashangp923\/CVE-2023-3971",
|
||||
"description": "To find HTML injection and XSS ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T18:11:22Z",
|
||||
"updated_at": "2023-10-20T18:26:57Z",
|
||||
"pushed_at": "2023-10-20T18:11:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-16T05:08:06Z",
|
||||
"updated_at": "2023-10-20T01:42:36Z",
|
||||
"updated_at": "2023-10-20T12:32:11Z",
|
||||
"pushed_at": "2023-10-18T12:27:17Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2023-10-20T09:24:48Z",
|
||||
"updated_at": "2023-10-20T16:25:50Z",
|
||||
"pushed_at": "2023-10-19T18:30:15Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -74,7 +74,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-16T20:34:02Z",
|
||||
"updated_at": "2023-10-20T03:53:37Z",
|
||||
"pushed_at": "2023-10-20T06:18:17Z",
|
||||
"pushed_at": "2023-10-20T15:37:42Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "JumpServer 堡垒机未授权综合漏洞利用, CVE-2023-42442 \/ CVE-2023-42820 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T09:35:07Z",
|
||||
"updated_at": "2023-10-20T03:26:56Z",
|
||||
"updated_at": "2023-10-20T15:42:49Z",
|
||||
"pushed_at": "2023-10-15T01:28:07Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2023-10-19T13:57:43Z",
|
||||
"updated_at": "2023-10-20T16:16:42Z",
|
||||
"pushed_at": "2023-10-14T16:43:31Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 157,
|
||||
"forks": 36,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"proof-of-concept"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T14:49:22Z",
|
||||
"updated_at": "2023-10-17T04:09:12Z",
|
||||
"updated_at": "2023-10-20T15:02:33Z",
|
||||
"pushed_at": "2023-10-11T15:15:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
19
README.md
19
README.md
|
@ -589,6 +589,13 @@
|
|||
|
||||
- [zh-byte/CVE-2023-3836](https://github.com/zh-byte/CVE-2023-3836)
|
||||
|
||||
### CVE-2023-3971 (2023-10-04)
|
||||
|
||||
<code>An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.
|
||||
</code>
|
||||
|
||||
- [ashangp923/CVE-2023-3971](https://github.com/ashangp923/CVE-2023-3971)
|
||||
|
||||
### CVE-2023-4128 (2023-08-10)
|
||||
|
||||
<code>A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue.
|
||||
|
@ -873,6 +880,7 @@
|
|||
- [ditekshen/ansible-cve-2023-20198](https://github.com/ditekshen/ansible-cve-2023-20198)
|
||||
- [reket99/Cisco_CVE-2023-20198](https://github.com/reket99/Cisco_CVE-2023-20198)
|
||||
- [m474r5/CVE-2023-20198-RCE](https://github.com/m474r5/CVE-2023-20198-RCE)
|
||||
- [iveresk/cve-2023-20198](https://github.com/iveresk/cve-2023-20198)
|
||||
|
||||
### CVE-2023-20209 (2023-08-16)
|
||||
|
||||
|
@ -1175,7 +1183,7 @@
|
|||
|
||||
### CVE-2023-22515 (2023-10-04)
|
||||
|
||||
<code>Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. \n\nFor more details, please review the linked advisory on this CVE.
|
||||
<code>Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
|
||||
</code>
|
||||
|
||||
- [ErikWynter/CVE-2023-22515-Scan](https://github.com/ErikWynter/CVE-2023-22515-Scan)
|
||||
|
@ -1394,6 +1402,7 @@
|
|||
- [MrP4nda1337/CVE-2023-23752](https://github.com/MrP4nda1337/CVE-2023-23752)
|
||||
- [k0valskia/CVE-2023-23752](https://github.com/k0valskia/CVE-2023-23752)
|
||||
- [yTxZx/CVE-2023-23752](https://github.com/yTxZx/CVE-2023-23752)
|
||||
- [AlissoftCodes/CVE-2023-23752](https://github.com/AlissoftCodes/CVE-2023-23752)
|
||||
|
||||
### CVE-2023-23924 (2023-01-31)
|
||||
|
||||
|
@ -2945,6 +2954,13 @@
|
|||
|
||||
- [X1r0z/spring-amqp-deserialization](https://github.com/X1r0z/spring-amqp-deserialization)
|
||||
|
||||
### CVE-2023-34051 (2023-10-20)
|
||||
|
||||
<code>VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\n
|
||||
</code>
|
||||
|
||||
- [horizon3ai/CVE-2023-34051](https://github.com/horizon3ai/CVE-2023-34051)
|
||||
|
||||
### CVE-2023-34096 (2023-06-08)
|
||||
|
||||
<code>Thruk is a multibackend monitoring webinterface which currently supports Naemon, Icinga, Shinken and Nagios as backends. In versions 3.06 and prior, the file `panorama.pm` is vulnerable to a Path Traversal vulnerability which allows an attacker to upload a file to any folder which has write permissions on the affected system. The parameter location is not filtered, validated or sanitized and it accepts any kind of characters. For a path traversal attack, the only characters required were the dot (`.`) and the slash (`/`). A fix is available in version 3.06.2.
|
||||
|
@ -3686,6 +3702,7 @@
|
|||
- [asepsaepdin/CVE-2023-38646](https://github.com/asepsaepdin/CVE-2023-38646)
|
||||
- [Pyr0sec/CVE-2023-38646](https://github.com/Pyr0sec/CVE-2023-38646)
|
||||
- [birdm4nw/CVE-2023-38646](https://github.com/birdm4nw/CVE-2023-38646)
|
||||
- [AnvithLobo/CVE-2023-38646](https://github.com/AnvithLobo/CVE-2023-38646)
|
||||
|
||||
### CVE-2023-38743 (2023-09-11)
|
||||
|
||||
|
|
Loading…
Reference in a new issue