Auto Update 2023/04/13 06:29:27

This commit is contained in:
motikan2010-bot 2023-04-13 15:29:27 +09:00
parent 020bdfd3d5
commit 3a0f9cb84d
43 changed files with 261 additions and 218 deletions

View file

@ -71,10 +71,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2023-04-07T16:37:40Z",
"updated_at": "2023-04-13T04:05:10Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2023-04-12T11:35:28Z",
"updated_at": "2023-04-13T04:12:20Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 602,
"watchers_count": 602,
"stargazers_count": 603,
"watchers_count": 603,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 602,
"watchers": 603,
"score": 0
}
]

View file

@ -2993,10 +2993,10 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2023-03-29T01:49:30Z",
"updated_at": "2023-04-13T06:08:23Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -3005,7 +3005,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 315,
"watchers": 316,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Directory transversal to remote code execution",
"fork": false,
"created_at": "2019-10-15T03:40:13Z",
"updated_at": "2023-02-28T01:23:12Z",
"updated_at": "2023-04-13T04:11:36Z",
"pushed_at": "2019-10-15T03:53:55Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 68,
"watchers": 69,
"score": 0
},
{

View file

@ -27,5 +27,34 @@
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 612464747,
"name": "CVE-2019-6111-poc",
"full_name": "Sigmw\/CVE-2019-6111-poc",
"owner": {
"login": "Sigmw",
"id": 89428643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89428643?v=4",
"html_url": "https:\/\/github.com\/Sigmw"
},
"html_url": "https:\/\/github.com\/Sigmw\/CVE-2019-6111-poc",
"description": "PoC made in Python to CVE-2019-6111.",
"fork": false,
"created_at": "2023-03-11T02:49:00Z",
"updated_at": "2023-04-13T04:03:30Z",
"pushed_at": "2023-03-11T04:11:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2022-11-09T18:02:31Z",
"updated_at": "2023-04-13T04:11:26Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 148,
"watchers": 149,
"score": 0
},
{

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-04-11T12:15:24Z",
"updated_at": "2023-04-13T03:02:43Z",
"pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -901,7 +901,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 55,
"watchers": 57,
"score": 0
}
]

View file

@ -279,13 +279,13 @@
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"forks": 43,
"watchers": 153,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Argument Injection in Dragonfly Ruby Gem",
"fork": false,
"created_at": "2021-05-25T02:48:08Z",
"updated_at": "2023-02-21T05:45:07Z",
"updated_at": "2023-04-13T06:01:10Z",
"pushed_at": "2021-05-26T21:30:29Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2021-08-16T11:27:13Z",
"updated_at": "2023-04-04T00:48:03Z",
"updated_at": "2023-04-13T03:54:25Z",
"pushed_at": "2021-08-16T09:00:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 30,
"watchers": 29,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
"fork": false,
"created_at": "2022-03-14T05:03:54Z",
"updated_at": "2023-02-28T01:28:48Z",
"updated_at": "2023-04-13T04:11:28Z",
"pushed_at": "2022-03-14T05:07:01Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 38,
"watchers": 39,
"score": 0
}
]

View file

@ -77,10 +77,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-04-12T17:28:10Z",
"updated_at": "2023-04-13T05:42:09Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1783,
"watchers_count": 1783,
"stargazers_count": 1784,
"watchers_count": 1784,
"has_discussions": false,
"forks_count": 505,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 505,
"watchers": 1783,
"watchers": 1784,
"score": 0
},
{

View file

@ -860,10 +860,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-04-08T16:54:48Z",
"updated_at": "2023-04-13T04:34:06Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 883,
"watchers_count": 883,
"stargazers_count": 884,
"watchers_count": 884,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -892,7 +892,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 883,
"watchers": 884,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0
},

View file

@ -29,34 +29,5 @@
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 9,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 8,
"watchers": 9,
"score": 0
},

View file

@ -135,10 +135,10 @@
"description": "OpenSSL",
"fork": false,
"created_at": "2022-09-01T07:00:00Z",
"updated_at": "2022-10-26T14:11:43Z",
"updated_at": "2023-04-13T06:04:58Z",
"pushed_at": "2022-09-01T07:00:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -147,7 +147,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -125,14 +125,14 @@
{
"id": 489745068,
"name": "CVE-2022-1388-EXP",
"full_name": "ByteCaps\/CVE-2022-1388-EXP",
"full_name": "doocop\/CVE-2022-1388-EXP",
"owner": {
"login": "ByteCaps",
"login": "doocop",
"id": 52679771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
"html_url": "https:\/\/github.com\/ByteCaps"
"html_url": "https:\/\/github.com\/doocop"
},
"html_url": "https:\/\/github.com\/ByteCaps\/CVE-2022-1388-EXP",
"html_url": "https:\/\/github.com\/doocop\/CVE-2022-1388-EXP",
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",

View file

@ -1,33 +1,4 @@
[
{
"id": 446296593,
"name": "Gin-Vue-admin-poc-CVE-2022-21660",
"full_name": "UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"owner": {
"login": "UzJu",
"id": 50813806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50813806?v=4",
"html_url": "https:\/\/github.com\/UzJu"
},
"html_url": "https:\/\/github.com\/UzJu\/Gin-Vue-admin-poc-CVE-2022-21660",
"description": "CVE-2022-21660",
"fork": false,
"created_at": "2022-01-10T05:50:35Z",
"updated_at": "2023-04-09T03:29:12Z",
"pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 25,
"score": 0
},
{
"id": 462232980,
"name": "CVE-2022-21660",

View file

@ -13,19 +13,19 @@
"description": "CVE-2022-22620: Use-after-free in Safari",
"fork": false,
"created_at": "2022-06-14T22:08:14Z",
"updated_at": "2022-07-01T21:40:35Z",
"updated_at": "2023-04-13T02:19:47Z",
"pushed_at": "2022-06-17T23:07:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"forks": 3,
"watchers": 3,
"score": 0
},
{
@ -42,19 +42,19 @@
"description": "Webkit (Safari) - Exploit",
"fork": false,
"created_at": "2022-08-04T07:11:39Z",
"updated_at": "2023-03-21T03:58:19Z",
"updated_at": "2023-04-13T02:20:19Z",
"pushed_at": "2022-08-09T13:43:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 5,
"score": 0
},
{
@ -71,19 +71,19 @@
"description": "POC for cve-2022-22620",
"fork": false,
"created_at": "2022-11-11T06:35:25Z",
"updated_at": "2022-11-11T07:11:00Z",
"updated_at": "2023-04-13T02:20:37Z",
"pushed_at": "2023-01-08T05:31:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-24T20:19:55Z",
"updated_at": "2023-03-16T04:13:49Z",
"updated_at": "2023-04-13T04:11:20Z",
"pushed_at": "2022-05-26T16:07:18Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 152,
"watchers": 153,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2023-04-02T22:01:17Z",
"updated_at": "2023-04-13T04:11:22Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 528,
"watchers_count": 528,
"stargazers_count": 529,
"watchers_count": 529,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 91,
"watchers": 528,
"watchers": 529,
"score": 0
},
{

View file

@ -154,10 +154,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2023-04-01T11:14:43Z",
"updated_at": "2023-04-13T04:11:21Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -170,7 +170,7 @@
],
"visibility": "public",
"forks": 43,
"watchers": 149,
"watchers": 150,
"score": 0
},
{

View file

@ -249,10 +249,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2023-04-12T00:00:56Z",
"updated_at": "2023-04-13T02:48:45Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 344,
"watchers_count": 344,
"stargazers_count": 345,
"watchers_count": 345,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -261,7 +261,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 344,
"watchers": 345,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 195,
"score": 0
},

View file

@ -157,14 +157,14 @@
{
"id": 498322212,
"name": "CVE-2022-30190",
"full_name": "ByteCaps\/CVE-2022-30190",
"full_name": "doocop\/CVE-2022-30190",
"owner": {
"login": "ByteCaps",
"login": "doocop",
"id": 52679771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
"html_url": "https:\/\/github.com\/ByteCaps"
"html_url": "https:\/\/github.com\/doocop"
},
"html_url": "https:\/\/github.com\/ByteCaps\/CVE-2022-30190",
"html_url": "https:\/\/github.com\/doocop\/CVE-2022-30190",
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
"fork": false,
"created_at": "2022-05-31T12:15:18Z",

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-19T12:46:45Z",
"updated_at": "2023-03-23T23:56:51Z",
"updated_at": "2023-04-13T04:11:30Z",
"pushed_at": "2022-09-06T14:05:22Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 221,
"watchers": 222,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Windows LPE exploit for CVE-2022-37969",
"fork": false,
"created_at": "2023-03-09T21:17:44Z",
"updated_at": "2023-04-12T16:48:39Z",
"updated_at": "2023-04-13T03:41:26Z",
"pushed_at": "2023-04-03T17:47:07Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"forks": 7,
"watchers": 28,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2022-39952",
"fork": false,
"created_at": "2023-02-20T15:12:33Z",
"updated_at": "2023-04-06T18:52:28Z",
"updated_at": "2023-04-13T05:28:23Z",
"pushed_at": "2023-02-25T08:52:03Z",
"stargazers_count": 254,
"watchers_count": 254,
"stargazers_count": 255,
"watchers_count": 255,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 254,
"watchers": 255,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
"fork": false,
"created_at": "2022-11-18T13:19:23Z",
"updated_at": "2023-03-01T16:10:54Z",
"updated_at": "2023-04-13T04:11:27Z",
"pushed_at": "2022-11-19T10:35:50Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

View file

@ -133,7 +133,7 @@
"description": "CVE-2022-42475 飞塔RCE漏洞 POC",
"fork": false,
"created_at": "2023-03-23T06:48:14Z",
"updated_at": "2023-03-25T22:09:48Z",
"updated_at": "2023-04-13T05:00:57Z",
"pushed_at": "2023-03-23T06:59:22Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
"fork": false,
"created_at": "2023-02-02T15:34:28Z",
"updated_at": "2023-04-11T14:18:10Z",
"updated_at": "2023-04-13T01:28:19Z",
"pushed_at": "2023-02-02T16:53:37Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 226,
"watchers": 227,
"score": 0
},
{
@ -190,10 +190,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2023-04-08T16:53:26Z",
"updated_at": "2023-04-13T04:11:31Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -202,7 +202,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 140,
"watchers": 141,
"score": 0
},
{

View file

@ -129,8 +129,8 @@
"description": "Red Team utilities for setting up CWP CentOS 7 payload & reverse shell (Red Team 9 - CW2023)",
"fork": false,
"created_at": "2023-02-15T15:22:48Z",
"updated_at": "2023-03-11T16:28:02Z",
"pushed_at": "2023-04-09T09:04:22Z",
"updated_at": "2023-04-13T04:13:15Z",
"pushed_at": "2023-04-13T04:47:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-04-12T04:16:17Z",
"updated_at": "2023-04-13T01:58:03Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 793,
"watchers_count": 793,
"stargazers_count": 794,
"watchers_count": 794,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 793,
"watchers": 794,
"score": 0
},
{

View file

@ -42,19 +42,19 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false,
"created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-12T16:29:44Z",
"updated_at": "2023-04-13T06:00:50Z",
"pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 139,
"forks": 19,
"watchers": 160,
"score": 0
}
]

View file

@ -129,7 +129,7 @@
"description": "GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept)",
"fork": false,
"created_at": "2023-04-06T03:40:03Z",
"updated_at": "2023-04-07T03:46:08Z",
"updated_at": "2023-04-13T06:10:40Z",
"pushed_at": "2023-04-07T03:53:56Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -138,7 +138,11 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2023-0669",
"deserialization-vulnerabilities",
"licenseresponseservlet"
],
"visibility": "public",
"forks": 1,
"watchers": 0,

31
2023/CVE-2023-1177.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 627221018,
"name": "ml-CVE-2023-1177",
"full_name": "hh-hunter\/ml-CVE-2023-1177",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/ml-CVE-2023-1177",
"description": null,
"fork": false,
"created_at": "2023-04-13T02:56:24Z",
"updated_at": "2023-04-13T02:56:31Z",
"pushed_at": "2023-04-13T03:02:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -56,5 +56,34 @@
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 627250763,
"name": "CVE-2023-1454-EXP",
"full_name": "CKevens\/CVE-2023-1454-EXP",
"owner": {
"login": "CKevens",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/CKevens"
},
"html_url": "https:\/\/github.com\/CKevens\/CVE-2023-1454-EXP",
"description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability",
"fork": false,
"created_at": "2023-04-13T04:51:41Z",
"updated_at": "2023-04-13T04:57:31Z",
"pushed_at": "2023-04-13T04:53:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for the MSMQ vulnerability recently discovered also known as CVE-2023-21554",
"fork": false,
"created_at": "2023-04-12T22:36:29Z",
"updated_at": "2023-04-12T22:39:53Z",
"updated_at": "2023-04-13T05:33:55Z",
"pushed_at": "2023-04-12T22:43:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-04-13T00:15:47Z",
"updated_at": "2023-04-13T03:09:32Z",
"pushed_at": "2023-03-10T08:58:44Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 379,
"watchers_count": 379,
"has_discussions": false,
"forks_count": 138,
"forks_count": 139,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 376,
"forks": 139,
"watchers": 379,
"score": 0
},
{
@ -166,7 +166,7 @@
"description": "CVE-2023-21768 Windows 11 22H2 系统本地提权 POC",
"fork": false,
"created_at": "2023-03-22T07:24:36Z",
"updated_at": "2023-03-30T08:55:21Z",
"updated_at": "2023-04-13T04:57:54Z",
"pushed_at": "2023-03-22T07:34:53Z",
"stargazers_count": 8,
"watchers_count": 8,

View file

@ -80,7 +80,7 @@
"description": "CVE-2023-22809 Linux Sudo",
"fork": false,
"created_at": "2023-04-06T03:11:48Z",
"updated_at": "2023-04-07T08:15:59Z",
"updated_at": "2023-04-13T04:59:34Z",
"pushed_at": "2023-04-06T03:17:33Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -168,10 +168,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-04-12T16:38:57Z",
"updated_at": "2023-04-13T03:09:15Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -180,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 288,
"watchers": 289,
"score": 0
},
{
@ -634,7 +634,7 @@
"description": "CVE-2023-23397漏洞的简单PoC有效载荷通过电子邮件发送。",
"fork": false,
"created_at": "2023-03-31T03:35:30Z",
"updated_at": "2023-03-31T03:36:44Z",
"updated_at": "2023-04-13T05:00:34Z",
"pushed_at": "2023-03-31T03:37:30Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -95,6 +95,14 @@ Es wurde eine kritische Schwachstelle in Drag and Drop Multiple File Upload Cont
- [Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal](https://github.com/Nickguitar/Drag-and-Drop-Multiple-File-Uploader-PRO-Path-Traversal)
### CVE-2023-1177 (2023-03-24)
<code>
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
</code>
- [hh-hunter/ml-CVE-2023-1177](https://github.com/hh-hunter/ml-CVE-2023-1177)
### CVE-2023-1337 (2023-03-10)
<code>
@ -119,6 +127,7 @@ Es wurde eine Schwachstelle in jeecg-boot 3.5.0 entdeckt. Sie wurde als kritisch
- [gobysec/CVE-2023-1454](https://github.com/gobysec/CVE-2023-1454)
- [MzzdToT/CVE-2023-1454](https://github.com/MzzdToT/CVE-2023-1454)
- [CKevens/CVE-2023-1454-EXP](https://github.com/CKevens/CVE-2023-1454-EXP)
### CVE-2023-1665 (2023-03-27)
@ -800,7 +809,6 @@ The WP Import Export WordPress plugin (both free and premium versions) is vulner
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
@ -1242,7 +1250,7 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- [jheeree/CVE-2022-1388-checker](https://github.com/jheeree/CVE-2022-1388-checker)
- [MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed](https://github.com/MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed)
- [Osyanina/westone-CVE-2022-1388-scanner](https://github.com/Osyanina/westone-CVE-2022-1388-scanner)
- [ByteCaps/CVE-2022-1388-EXP](https://github.com/ByteCaps/CVE-2022-1388-EXP)
- [doocop/CVE-2022-1388-EXP](https://github.com/doocop/CVE-2022-1388-EXP)
- [blind-intruder/CVE-2022-1388-RCE-checker-and-POC-Exploit](https://github.com/blind-intruder/CVE-2022-1388-RCE-checker-and-POC-Exploit)
- [Hudi233/CVE-2022-1388](https://github.com/Hudi233/CVE-2022-1388)
- [sherlocksecurity/CVE-2022-1388-Exploit-POC](https://github.com/sherlocksecurity/CVE-2022-1388-Exploit-POC)
@ -1974,7 +1982,6 @@ Rust is a multi-paradigm, general-purpose programming language designed for perf
Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.
</code>
- [UzJu/Gin-Vue-admin-poc-CVE-2022-21660](https://github.com/UzJu/Gin-Vue-admin-poc-CVE-2022-21660)
- [UzJu/CVE-2022-21660](https://github.com/UzJu/CVE-2022-21660)
### CVE-2022-21661 (2022-01-06)
@ -4273,7 +4280,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
- [zkl21hoang/msdt-follina-office-rce](https://github.com/zkl21hoang/msdt-follina-office-rce)
- [onecloudemoji/CVE-2022-30190](https://github.com/onecloudemoji/CVE-2022-30190)
- [2867a0/CVE-2022-30190](https://github.com/2867a0/CVE-2022-30190)
- [ByteCaps/CVE-2022-30190](https://github.com/ByteCaps/CVE-2022-30190)
- [doocop/CVE-2022-30190](https://github.com/doocop/CVE-2022-30190)
- [archanchoudhury/MSDT_CVE-2022-30190](https://github.com/archanchoudhury/MSDT_CVE-2022-30190)
- [rickhenderson/cve-2022-30190](https://github.com/rickhenderson/cve-2022-30190)
- [DOV3Y/CVE-2022-30190-ASR-Senintel-Process-Pickup](https://github.com/DOV3Y/CVE-2022-30190-ASR-Senintel-Process-Pickup)
@ -20327,6 +20334,7 @@ An issue was discovered in OpenSSH 7.9. Due to the scp implementation being deri
</code>
- [53n7hu/SNP](https://github.com/53n7hu/SNP)
- [Sigmw/CVE-2019-6111-poc](https://github.com/Sigmw/CVE-2019-6111-poc)
### CVE-2019-6203 (2020-04-17)