mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/10/14 06:29:53
This commit is contained in:
parent
d17e7a7274
commit
3b5a4cd661
65 changed files with 759 additions and 172 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T04:39:32Z",
|
||||
"updated_at": "2023-09-28T11:27:44Z",
|
||||
"updated_at": "2023-10-14T00:54:03Z",
|
||||
"pushed_at": "2023-09-05T12:25:25Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-10-11T13:44:58Z",
|
||||
"updated_at": "2023-10-14T05:41:41Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"stargazers_count": 1804,
|
||||
"watchers_count": 1804,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1802,
|
||||
"watchers": 1804,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2023-09-23T04:10:20Z",
|
||||
"updated_at": "2023-10-14T01:55:01Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"has_discussions": false,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 329,
|
||||
"watchers": 330,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-10-11T13:44:58Z",
|
||||
"updated_at": "2023-10-14T05:41:41Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"stargazers_count": 1804,
|
||||
"watchers_count": 1804,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1802,
|
||||
"watchers": 1804,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2023-09-23T04:10:20Z",
|
||||
"updated_at": "2023-10-14T01:55:01Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"has_discussions": false,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 329,
|
||||
"watchers": 330,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 137769369,
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"owner": {
|
||||
"login": "RicterZ",
|
||||
"id": 5282759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
|
||||
"html_url": "https:\/\/github.com\/RicterZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T15:22:01Z",
|
||||
"updated_at": "2023-06-01T08:36:39Z",
|
||||
"pushed_at": "2017-11-01T07:59:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 552591833,
|
||||
"name": "CVE-2017-1000253",
|
||||
|
|
|
@ -149,6 +149,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 116099094,
|
||||
"name": "weblogic_wls_wsat_rce",
|
||||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||||
"owner": {
|
||||
"login": "cjjduck",
|
||||
"id": 23519154,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
|
||||
"html_url": "https:\/\/github.com\/cjjduck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-10-09T02:33:00Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116430643,
|
||||
"name": "CVE-2017-10271",
|
||||
|
|
32
2017/CVE-2017-16997.json
Normal file
32
2017/CVE-2017-16997.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116118639,
|
||||
"name": "CVE-2017-16997-poc",
|
||||
"full_name": "Xiami2012\/CVE-2017-16997-poc",
|
||||
"owner": {
|
||||
"login": "Xiami2012",
|
||||
"id": 1927254,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
|
||||
"html_url": "https:\/\/github.com\/Xiami2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
|
||||
"description": "A proof-of-concept for CVE-2017-16997",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T09:31:55Z",
|
||||
"updated_at": "2018-01-03T09:33:01Z",
|
||||
"pushed_at": "2018-01-03T10:39:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
32
2017/CVE-2017-17692.json
Normal file
32
2017/CVE-2017-17692.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116205741,
|
||||
"name": "CVE-2017-17692",
|
||||
"full_name": "specloli\/CVE-2017-17692",
|
||||
"owner": {
|
||||
"login": "specloli",
|
||||
"id": 10647366,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
|
||||
"html_url": "https:\/\/github.com\/specloli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T02:40:13Z",
|
||||
"updated_at": "2021-11-23T15:08:43Z",
|
||||
"pushed_at": "2018-01-02T13:58:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-10-11T13:44:58Z",
|
||||
"updated_at": "2023-10-14T05:41:41Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"stargazers_count": 1804,
|
||||
"watchers_count": 1804,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1802,
|
||||
"watchers": 1804,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -118,5 +118,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 115962692,
|
||||
"name": "CVE-2017-3881",
|
||||
"full_name": "1337g\/CVE-2017-3881",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
|
||||
"description": "credit to artkond",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T01:45:15Z",
|
||||
"updated_at": "2022-04-11T12:16:38Z",
|
||||
"pushed_at": "2018-01-02T01:46:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -35,6 +35,96 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 41
|
||||
},
|
||||
{
|
||||
"id": 116268310,
|
||||
"name": "Spectre-PoC",
|
||||
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"owner": {
|
||||
"login": "EdwardOwusuAdjei",
|
||||
"id": 16462560,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
|
||||
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T14:20:13Z",
|
||||
"updated_at": "2023-09-28T10:47:11Z",
|
||||
"pushed_at": "2018-01-04T14:27:29Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 116347505,
|
||||
"name": "spectre-attack-example",
|
||||
"full_name": "poilynx\/spectre-attack-example",
|
||||
"owner": {
|
||||
"login": "poilynx",
|
||||
"id": 8926090,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
|
||||
"html_url": "https:\/\/github.com\/poilynx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
|
||||
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-05T05:51:34Z",
|
||||
"updated_at": "2021-02-24T01:25:15Z",
|
||||
"pushed_at": "2018-01-05T05:56:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 116442461,
|
||||
"name": "spectre-attack-demo",
|
||||
"full_name": "pedrolucasoliva\/spectre-attack-demo",
|
||||
"owner": {
|
||||
"login": "pedrolucasoliva",
|
||||
"id": 10757421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
|
||||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-06T01:08:15Z",
|
||||
"updated_at": "2018-01-15T06:12:51Z",
|
||||
"pushed_at": "2018-01-06T01:09:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 116505944,
|
||||
"name": "spectreScope",
|
||||
|
|
|
@ -394,6 +394,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 201442014,
|
||||
"name": "CVE-2017-7269",
|
||||
"full_name": "ThanHuuTuan\/CVE-2017-7269",
|
||||
"owner": {
|
||||
"login": "ThanHuuTuan",
|
||||
"id": 32167814,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T10:01:50Z",
|
||||
"updated_at": "2019-08-09T10:01:53Z",
|
||||
"pushed_at": "2017-04-04T17:20:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 386542444,
|
||||
"name": "CVE-2017-7269",
|
||||
|
|
32
2017/CVE-2017-9097.json
Normal file
32
2017/CVE-2017-9097.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 116008243,
|
||||
"name": "AntiWeb_testing-Suite",
|
||||
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"owner": {
|
||||
"login": "MDudek-ICS",
|
||||
"id": 31083304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
|
||||
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-02T11:28:40Z",
|
||||
"updated_at": "2023-09-28T10:47:07Z",
|
||||
"pushed_at": "2017-11-21T20:19:08Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-10-11T13:44:58Z",
|
||||
"updated_at": "2023-10-14T05:41:41Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"stargazers_count": 1804,
|
||||
"watchers_count": 1804,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1802,
|
||||
"watchers": 1804,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2023-09-28T11:04:11Z",
|
||||
"updated_at": "2023-10-14T03:31:41Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-10-12T06:22:40Z",
|
||||
"updated_at": "2023-10-14T05:13:30Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3894,
|
||||
"watchers_count": 3894,
|
||||
"stargazers_count": 3895,
|
||||
"watchers_count": 3895,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1089,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1089,
|
||||
"watchers": 3894,
|
||||
"watchers": 3895,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-10-11T13:44:58Z",
|
||||
"updated_at": "2023-10-14T05:41:41Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"stargazers_count": 1804,
|
||||
"watchers_count": 1804,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1802,
|
||||
"watchers": 1804,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 167275161,
|
||||
"name": "check_CVE-2019-3462",
|
||||
"full_name": "tonejito\/check_CVE-2019-3462",
|
||||
"owner": {
|
||||
"login": "tonejito",
|
||||
"id": 618588,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/618588?v=4",
|
||||
"html_url": "https:\/\/github.com\/tonejito"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
|
||||
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T00:30:15Z",
|
||||
"updated_at": "2023-09-28T10:57:49Z",
|
||||
"pushed_at": "2019-01-26T01:21:36Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 170573944,
|
||||
"name": "update-apt-package",
|
||||
|
|
36
2019/CVE-2019-5893.json
Normal file
36
2019/CVE-2019-5893.json
Normal file
|
@ -0,0 +1,36 @@
|
|||
[
|
||||
{
|
||||
"id": 165075365,
|
||||
"name": "OpenSource-ERP-SQL-Injection",
|
||||
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
|
||||
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-10T14:36:55Z",
|
||||
"updated_at": "2023-09-28T10:57:23Z",
|
||||
"pushed_at": "2019-01-11T07:45:37Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2019-5893",
|
||||
"erp",
|
||||
"sql-injection"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2019/CVE-2019-6263.json
Normal file
32
2019/CVE-2019-6263.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 166368513,
|
||||
"name": "CVE-2019-6263-Joomla-POC",
|
||||
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
|
||||
"owner": {
|
||||
"login": "praveensutar",
|
||||
"id": 12555214,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12555214?v=4",
|
||||
"html_url": "https:\/\/github.com\/praveensutar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-01-18T08:10:11Z",
|
||||
"updated_at": "2023-01-10T03:19:58Z",
|
||||
"pushed_at": "2019-01-19T04:29:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2019/CVE-2019-6487.json
Normal file
32
2019/CVE-2019-6487.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 166241615,
|
||||
"name": "TP-Link-WDR-Router-Command-injection_POC",
|
||||
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
|
||||
"owner": {
|
||||
"login": "afang5472",
|
||||
"id": 18503100,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18503100?v=4",
|
||||
"html_url": "https:\/\/github.com\/afang5472"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
|
||||
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-17T14:44:12Z",
|
||||
"updated_at": "2023-09-28T10:57:36Z",
|
||||
"pushed_at": "2019-01-19T10:49:21Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-10-12T06:22:40Z",
|
||||
"updated_at": "2023-10-14T05:13:30Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3894,
|
||||
"watchers_count": 3894,
|
||||
"stargazers_count": 3895,
|
||||
"watchers_count": 3895,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1089,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1089,
|
||||
"watchers": 3894,
|
||||
"watchers": 3895,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-10-11T13:44:58Z",
|
||||
"updated_at": "2023-10-14T05:41:41Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1802,
|
||||
"watchers_count": 1802,
|
||||
"stargazers_count": 1804,
|
||||
"watchers_count": 1804,
|
||||
"has_discussions": false,
|
||||
"forks_count": 335,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 335,
|
||||
"watchers": 1802,
|
||||
"watchers": 1804,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -301,10 +301,10 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2023-10-12T08:27:22Z",
|
||||
"updated_at": "2023-10-14T06:14:35Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 941,
|
||||
"watchers_count": 941,
|
||||
"stargazers_count": 942,
|
||||
"watchers_count": 942,
|
||||
"has_discussions": false,
|
||||
"forks_count": 230,
|
||||
"allow_forking": true,
|
||||
|
@ -313,7 +313,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 230,
|
||||
"watchers": 941,
|
||||
"watchers": 942,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
"has_discussions": false,
|
||||
"forks_count": 126,
|
||||
"forks_count": 127,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"forks": 127,
|
||||
"watchers": 406,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-10-13T08:35:22Z",
|
||||
"updated_at": "2023-10-14T05:20:28Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1115,
|
||||
"watchers_count": 1115,
|
||||
"stargazers_count": 1116,
|
||||
"watchers_count": 1116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 1115,
|
||||
"watchers": 1116,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -470,10 +470,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-10-09T17:08:23Z",
|
||||
"updated_at": "2023-10-14T05:50:13Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 891,
|
||||
"watchers_count": 891,
|
||||
"stargazers_count": 892,
|
||||
"watchers_count": 892,
|
||||
"has_discussions": false,
|
||||
"forks_count": 241,
|
||||
"allow_forking": true,
|
||||
|
@ -482,7 +482,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 241,
|
||||
"watchers": 891,
|
||||
"watchers": 892,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -369,12 +369,12 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2023-10-13T12:11:31Z",
|
||||
"updated_at": "2023-10-14T00:42:29Z",
|
||||
"pushed_at": "2023-05-11T11:29:46Z",
|
||||
"stargazers_count": 1071,
|
||||
"watchers_count": 1071,
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"has_discussions": false,
|
||||
"forks_count": 509,
|
||||
"forks_count": 510,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -382,8 +382,8 @@
|
|||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 509,
|
||||
"watchers": 1071,
|
||||
"forks": 510,
|
||||
"watchers": 1072,
|
||||
"score": 0,
|
||||
"subscribers_count": 23
|
||||
},
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2023-10-12T18:07:22Z",
|
||||
"pushed_at": "2023-10-14T00:43:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 30,
|
||||
"watchers": 148,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 11
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-10-13T08:35:22Z",
|
||||
"updated_at": "2023-10-14T05:20:28Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1115,
|
||||
"watchers_count": 1115,
|
||||
"stargazers_count": 1116,
|
||||
"watchers_count": 1116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 1115,
|
||||
"watchers": 1116,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 10,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 35,
|
||||
"watchers": 241,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
"subscribers_count": 13
|
||||
},
|
||||
{
|
||||
"id": 517351313,
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-20T02:35:53Z",
|
||||
"updated_at": "2023-05-28T03:24:15Z",
|
||||
"updated_at": "2023-10-14T03:31:30Z",
|
||||
"pushed_at": "2022-09-24T20:52:18Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-10-13T13:44:32Z",
|
||||
"pushed_at": "2023-10-08T13:43:56Z",
|
||||
"pushed_at": "2023-10-14T06:10:44Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -654,6 +654,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -163,10 +163,10 @@
|
|||
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T08:12:49Z",
|
||||
"updated_at": "2023-09-04T01:39:58Z",
|
||||
"updated_at": "2023-10-14T02:17:17Z",
|
||||
"pushed_at": "2023-06-20T08:51:47Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -152,7 +152,7 @@
|
|||
"forks": 14,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 679512175,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-16T15:57:37Z",
|
||||
"updated_at": "2023-07-16T16:05:40Z",
|
||||
"updated_at": "2023-10-14T04:56:23Z",
|
||||
"pushed_at": "2023-07-16T16:05:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T21:40:09Z",
|
||||
"updated_at": "2023-10-13T22:50:51Z",
|
||||
"updated_at": "2023-10-14T01:57:58Z",
|
||||
"pushed_at": "2023-10-11T18:07:05Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -112,10 +112,10 @@
|
|||
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T08:42:17Z",
|
||||
"updated_at": "2023-10-13T17:26:20Z",
|
||||
"updated_at": "2023-10-14T06:25:08Z",
|
||||
"pushed_at": "2023-10-12T02:21:47Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -124,9 +124,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 41,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 703506378,
|
||||
|
@ -214,10 +214,10 @@
|
|||
"description": "Confluence Data Center & Server 权限提升漏洞 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-13T05:18:54Z",
|
||||
"updated_at": "2023-10-13T11:50:03Z",
|
||||
"updated_at": "2023-10-14T05:29:44Z",
|
||||
"pushed_at": "2023-10-13T05:21:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -226,9 +226,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704422927,
|
||||
|
@ -258,7 +258,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704429158,
|
||||
|
@ -288,6 +288,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -113,13 +113,13 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T18:43:54Z",
|
||||
"updated_at": "2023-09-05T20:17:07Z",
|
||||
"updated_at": "2023-10-14T03:31:25Z",
|
||||
"pushed_at": "2023-07-05T20:02:55Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 23,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-28T21:20:23Z",
|
||||
"updated_at": "2023-10-13T18:08:01Z",
|
||||
"updated_at": "2023-10-14T02:56:48Z",
|
||||
"pushed_at": "2023-10-10T17:29:32Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,20 +13,20 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2023-10-14T00:07:39Z",
|
||||
"updated_at": "2023-10-14T05:37:08Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 83,
|
||||
"forks": 25,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -31,6 +31,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -31,6 +31,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -31,6 +31,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Simple PoC causing overflow",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T08:11:56Z",
|
||||
"updated_at": "2023-10-12T14:33:51Z",
|
||||
"updated_at": "2023-10-14T06:19:32Z",
|
||||
"pushed_at": "2023-10-11T08:17:06Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "😄 CVE-2023-38545堆溢出的POC和分析文章",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T07:16:49Z",
|
||||
"updated_at": "2023-10-13T12:58:32Z",
|
||||
"updated_at": "2023-10-14T06:23:19Z",
|
||||
"pushed_at": "2023-10-12T08:46:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,19 +73,19 @@
|
|||
"description": "Simple PoC causing overflow",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T07:39:15Z",
|
||||
"updated_at": "2023-10-13T13:57:35Z",
|
||||
"updated_at": "2023-10-14T06:19:49Z",
|
||||
"pushed_at": "2023-10-12T08:09:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -528,7 +528,7 @@
|
|||
"description": "CVE-2023-38646 Metabase RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T03:18:09Z",
|
||||
"updated_at": "2023-10-13T06:54:54Z",
|
||||
"updated_at": "2023-10-14T04:57:01Z",
|
||||
"pushed_at": "2023-10-11T04:06:43Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
|
@ -547,7 +547,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 703617395,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,21 +13,21 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2023-10-14T00:26:04Z",
|
||||
"updated_at": "2023-10-14T05:40:32Z",
|
||||
"pushed_at": "2023-10-12T21:19:32Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 113,
|
||||
"forks": 24,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 703303512,
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Proof of concept for DoS exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T01:59:47Z",
|
||||
"updated_at": "2023-10-13T13:23:21Z",
|
||||
"updated_at": "2023-10-14T02:05:37Z",
|
||||
"pushed_at": "2023-10-13T11:19:10Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -63,9 +63,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 703845749,
|
||||
|
@ -155,6 +155,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-45540.json
Normal file
32
2023/CVE-2023-45540.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 701340984,
|
||||
"name": "CVE-2023-45540",
|
||||
"full_name": "soundarkutty\/CVE-2023-45540",
|
||||
"owner": {
|
||||
"login": "soundarkutty",
|
||||
"id": 26168410,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26168410?v=4",
|
||||
"html_url": "https:\/\/github.com\/soundarkutty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/soundarkutty\/CVE-2023-45540",
|
||||
"description": "CVE-2023-45540 Jorani Leave Management System v1.0.3 – HTML Injection",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-06T12:43:54Z",
|
||||
"updated_at": "2023-10-14T05:12:25Z",
|
||||
"pushed_at": "2023-10-06T16:04:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-45542.json
Normal file
32
2023/CVE-2023-45542.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 696796100,
|
||||
"name": "CVE-2023-45542",
|
||||
"full_name": "ahrixia\/CVE-2023-45542",
|
||||
"owner": {
|
||||
"login": "ahrixia",
|
||||
"id": 35935843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
|
||||
"html_url": "https:\/\/github.com\/ahrixia"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-45542",
|
||||
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on search function.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T12:59:31Z",
|
||||
"updated_at": "2023-10-14T04:47:03Z",
|
||||
"pushed_at": "2023-10-14T04:47:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 697340903,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-10-12T14:58:45Z",
|
||||
"updated_at": "2023-10-14T02:05:10Z",
|
||||
"pushed_at": "2023-10-05T23:33:49Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"forks": 37,
|
||||
"watchers": 225,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
"subscribers_count": 11
|
||||
},
|
||||
{
|
||||
"id": 696220876,
|
||||
|
|
|
@ -212,5 +212,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 704757696,
|
||||
"name": "CVE-2023-4911",
|
||||
"full_name": "guffre\/CVE-2023-4911",
|
||||
"owner": {
|
||||
"login": "guffre",
|
||||
"id": 21281361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21281361?v=4",
|
||||
"html_url": "https:\/\/github.com\/guffre"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guffre\/CVE-2023-4911",
|
||||
"description": "PoC for CVE-2023-4911 LooneyTuneables",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-14T02:24:52Z",
|
||||
"updated_at": "2023-10-14T02:25:44Z",
|
||||
"pushed_at": "2023-10-14T02:34:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
57
README.md
57
README.md
|
@ -768,6 +768,7 @@
|
|||
- [silent6trinity/looney-tuneables](https://github.com/silent6trinity/looney-tuneables)
|
||||
- [hadrian3689/looney-tunables-CVE-2023-4911](https://github.com/hadrian3689/looney-tunables-CVE-2023-4911)
|
||||
- [ruycr4ft/CVE-2023-4911](https://github.com/ruycr4ft/CVE-2023-4911)
|
||||
- [guffre/CVE-2023-4911](https://github.com/guffre/CVE-2023-4911)
|
||||
|
||||
### CVE-2023-5024 (2023-09-17)
|
||||
|
||||
|
@ -4475,6 +4476,12 @@
|
|||
|
||||
- [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962)
|
||||
|
||||
### CVE-2023-45540
|
||||
- [soundarkutty/CVE-2023-45540](https://github.com/soundarkutty/CVE-2023-45540)
|
||||
|
||||
### CVE-2023-45542
|
||||
- [ahrixia/CVE-2023-45542](https://github.com/ahrixia/CVE-2023-45542)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
|
@ -22776,6 +22783,7 @@
|
|||
<code>Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
|
||||
</code>
|
||||
|
||||
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
|
||||
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
|
||||
|
||||
### CVE-2019-3663 (2019-11-13)
|
||||
|
@ -23039,6 +23047,13 @@
|
|||
|
||||
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
|
||||
|
||||
### CVE-2019-5893 (2019-01-10)
|
||||
|
||||
<code>Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
|
||||
</code>
|
||||
|
||||
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
|
||||
|
||||
### CVE-2019-6111 (2019-01-31)
|
||||
|
||||
<code>An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
|
||||
|
@ -23085,6 +23100,13 @@
|
|||
|
||||
- [nikitapbst/cve-2019-6260](https://github.com/nikitapbst/cve-2019-6260)
|
||||
|
||||
### CVE-2019-6263 (2019-01-16)
|
||||
|
||||
<code>An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
|
||||
</code>
|
||||
|
||||
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
|
||||
|
||||
### CVE-2019-6329 (2019-06-25)
|
||||
|
||||
<code>HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6328.
|
||||
|
@ -23161,6 +23183,13 @@
|
|||
|
||||
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
|
||||
|
||||
### CVE-2019-6487 (2019-01-18)
|
||||
|
||||
<code>TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
|
||||
</code>
|
||||
|
||||
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
|
||||
|
||||
### CVE-2019-6690 (2019-03-17)
|
||||
|
||||
<code>python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
|
||||
|
@ -29465,6 +29494,7 @@
|
|||
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
|
||||
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
|
||||
- [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881)
|
||||
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
|
||||
|
||||
### CVE-2017-4490
|
||||
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
|
||||
|
@ -29672,6 +29702,9 @@
|
|||
</code>
|
||||
|
||||
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
|
||||
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
|
||||
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
|
||||
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
|
||||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
|
||||
|
@ -29861,6 +29894,7 @@
|
|||
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
|
||||
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
|
||||
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
|
||||
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
|
||||
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
|
||||
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
|
||||
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
|
||||
|
@ -30194,6 +30228,13 @@
|
|||
|
||||
- [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE)
|
||||
|
||||
### CVE-2017-9097 (2017-06-15)
|
||||
|
||||
<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
|
||||
</code>
|
||||
|
||||
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
|
||||
|
||||
### CVE-2017-9101 (2017-05-21)
|
||||
|
||||
<code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
|
||||
|
@ -30425,6 +30466,7 @@
|
|||
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
|
||||
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
|
||||
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
|
||||
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
|
||||
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
|
||||
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
|
||||
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
|
||||
|
@ -31050,6 +31092,13 @@
|
|||
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
|
||||
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
|
||||
|
||||
### CVE-2017-16997 (2017-12-17)
|
||||
|
||||
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
|
||||
</code>
|
||||
|
||||
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
|
||||
|
||||
### CVE-2017-17058 (2017-11-29)
|
||||
|
||||
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code.
|
||||
|
@ -31104,6 +31153,13 @@
|
|||
- [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit)
|
||||
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
|
||||
|
||||
### CVE-2017-17692 (2017-12-21)
|
||||
|
||||
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
|
||||
</code>
|
||||
|
||||
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
|
||||
|
||||
### CVE-2017-17736 (2018-03-23)
|
||||
|
||||
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
|
||||
|
@ -31241,6 +31297,7 @@
|
|||
<code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
|
||||
</code>
|
||||
|
||||
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
|
||||
- [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253)
|
||||
|
||||
### CVE-2017-1000353 (2018-01-29)
|
||||
|
|
Loading…
Reference in a new issue