Auto Update 2023/10/14 06:29:53

This commit is contained in:
motikan2010-bot 2023-10-14 15:29:53 +09:00
parent d17e7a7274
commit 3b5a4cd661
65 changed files with 759 additions and 172 deletions

View file

@ -13,10 +13,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
"updated_at": "2023-09-28T11:27:44Z",
"updated_at": "2023-10-14T00:54:03Z",
"pushed_at": "2023-09-05T12:25:25Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 4
}

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-10-11T13:44:58Z",
"updated_at": "2023-10-14T05:41:41Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1802,
"watchers_count": 1802,
"stargazers_count": 1804,
"watchers_count": 1804,
"has_discussions": false,
"forks_count": 335,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1802,
"watchers": 1804,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2023-09-23T04:10:20Z",
"updated_at": "2023-10-14T01:55:01Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 330,
"watchers_count": 330,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 329,
"watchers": 330,
"score": 0,
"subscribers_count": 48
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-10-11T13:44:58Z",
"updated_at": "2023-10-14T05:41:41Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1802,
"watchers_count": 1802,
"stargazers_count": 1804,
"watchers_count": 1804,
"has_discussions": false,
"forks_count": 335,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1802,
"watchers": 1804,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2023-09-23T04:10:20Z",
"updated_at": "2023-10-14T01:55:01Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 330,
"watchers_count": 330,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 329,
"watchers": 330,
"score": 0,
"subscribers_count": 48
}

View file

@ -1,4 +1,34 @@
[
{
"id": 137769369,
"name": "PIE-Stack-Clash-CVE-2017-1000253",
"full_name": "RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
"owner": {
"login": "RicterZ",
"id": 5282759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5282759?v=4",
"html_url": "https:\/\/github.com\/RicterZ"
},
"html_url": "https:\/\/github.com\/RicterZ\/PIE-Stack-Clash-CVE-2017-1000253",
"description": "Demo-ing CVE-2017-1000253 in a container",
"fork": false,
"created_at": "2018-06-18T15:22:01Z",
"updated_at": "2023-06-01T08:36:39Z",
"pushed_at": "2017-11-01T07:59:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 552591833,
"name": "CVE-2017-1000253",

View file

@ -149,6 +149,36 @@
"score": 0,
"subscribers_count": 4
},
{
"id": 116099094,
"name": "weblogic_wls_wsat_rce",
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
"owner": {
"login": "cjjduck",
"id": 23519154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
"html_url": "https:\/\/github.com\/cjjduck"
},
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-10-09T02:33:00Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 116430643,
"name": "CVE-2017-10271",

32
2017/CVE-2017-16997.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 116118639,
"name": "CVE-2017-16997-poc",
"full_name": "Xiami2012\/CVE-2017-16997-poc",
"owner": {
"login": "Xiami2012",
"id": 1927254,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1927254?v=4",
"html_url": "https:\/\/github.com\/Xiami2012"
},
"html_url": "https:\/\/github.com\/Xiami2012\/CVE-2017-16997-poc",
"description": "A proof-of-concept for CVE-2017-16997",
"fork": false,
"created_at": "2018-01-03T09:31:55Z",
"updated_at": "2018-01-03T09:33:01Z",
"pushed_at": "2018-01-03T10:39:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

32
2017/CVE-2017-17692.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 116205741,
"name": "CVE-2017-17692",
"full_name": "specloli\/CVE-2017-17692",
"owner": {
"login": "specloli",
"id": 10647366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10647366?v=4",
"html_url": "https:\/\/github.com\/specloli"
},
"html_url": "https:\/\/github.com\/specloli\/CVE-2017-17692",
"description": null,
"fork": false,
"created_at": "2018-01-04T02:40:13Z",
"updated_at": "2021-11-23T15:08:43Z",
"pushed_at": "2018-01-02T13:58:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-10-11T13:44:58Z",
"updated_at": "2023-10-14T05:41:41Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1802,
"watchers_count": 1802,
"stargazers_count": 1804,
"watchers_count": 1804,
"has_discussions": false,
"forks_count": 335,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1802,
"watchers": 1804,
"score": 0,
"subscribers_count": 34
},

View file

@ -118,5 +118,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 115962692,
"name": "CVE-2017-3881",
"full_name": "1337g\/CVE-2017-3881",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-3881",
"description": "credit to artkond",
"fork": false,
"created_at": "2018-01-02T01:45:15Z",
"updated_at": "2022-04-11T12:16:38Z",
"pushed_at": "2018-01-02T01:46:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -35,6 +35,96 @@
"score": 0,
"subscribers_count": 41
},
{
"id": 116268310,
"name": "Spectre-PoC",
"full_name": "EdwardOwusuAdjei\/Spectre-PoC",
"owner": {
"login": "EdwardOwusuAdjei",
"id": 16462560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16462560?v=4",
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei"
},
"html_url": "https:\/\/github.com\/EdwardOwusuAdjei\/Spectre-PoC",
"description": "Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book.",
"fork": false,
"created_at": "2018-01-04T14:20:13Z",
"updated_at": "2023-09-28T10:47:11Z",
"pushed_at": "2018-01-04T14:27:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 3
},
{
"id": 116347505,
"name": "spectre-attack-example",
"full_name": "poilynx\/spectre-attack-example",
"owner": {
"login": "poilynx",
"id": 8926090,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8926090?v=4",
"html_url": "https:\/\/github.com\/poilynx"
},
"html_url": "https:\/\/github.com\/poilynx\/spectre-attack-example",
"description": "2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) \"幽灵\" Spectre 漏洞利用",
"fork": false,
"created_at": "2018-01-05T05:51:34Z",
"updated_at": "2021-02-24T01:25:15Z",
"pushed_at": "2018-01-05T05:56:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 116442461,
"name": "spectre-attack-demo",
"full_name": "pedrolucasoliva\/spectre-attack-demo",
"owner": {
"login": "pedrolucasoliva",
"id": 10757421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10757421?v=4",
"html_url": "https:\/\/github.com\/pedrolucasoliva"
},
"html_url": "https:\/\/github.com\/pedrolucasoliva\/spectre-attack-demo",
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-06T01:08:15Z",
"updated_at": "2018-01-15T06:12:51Z",
"pushed_at": "2018-01-06T01:09:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 116505944,
"name": "spectreScope",

View file

@ -394,6 +394,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 201442014,
"name": "CVE-2017-7269",
"full_name": "ThanHuuTuan\/CVE-2017-7269",
"owner": {
"login": "ThanHuuTuan",
"id": 32167814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
"html_url": "https:\/\/github.com\/ThanHuuTuan"
},
"html_url": "https:\/\/github.com\/ThanHuuTuan\/CVE-2017-7269",
"description": null,
"fork": false,
"created_at": "2019-08-09T10:01:50Z",
"updated_at": "2019-08-09T10:01:53Z",
"pushed_at": "2017-04-04T17:20:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 386542444,
"name": "CVE-2017-7269",

32
2017/CVE-2017-9097.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 116008243,
"name": "AntiWeb_testing-Suite",
"full_name": "MDudek-ICS\/AntiWeb_testing-Suite",
"owner": {
"login": "MDudek-ICS",
"id": 31083304,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31083304?v=4",
"html_url": "https:\/\/github.com\/MDudek-ICS"
},
"html_url": "https:\/\/github.com\/MDudek-ICS\/AntiWeb_testing-Suite",
"description": "Suite de herramientas que sacan partido del CVE-2017-9097 (+RCE)",
"fork": false,
"created_at": "2018-01-02T11:28:40Z",
"updated_at": "2023-09-28T10:47:07Z",
"pushed_at": "2017-11-21T20:19:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-10-11T13:44:58Z",
"updated_at": "2023-10-14T05:41:41Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1802,
"watchers_count": 1802,
"stargazers_count": 1804,
"watchers_count": 1804,
"has_discussions": false,
"forks_count": 335,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1802,
"watchers": 1804,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
"fork": false,
"created_at": "2019-07-17T07:54:38Z",
"updated_at": "2023-09-28T11:04:11Z",
"updated_at": "2023-10-14T03:31:41Z",
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-10-12T06:22:40Z",
"updated_at": "2023-10-14T05:13:30Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3894,
"watchers_count": 3894,
"stargazers_count": 3895,
"watchers_count": 3895,
"has_discussions": false,
"forks_count": 1089,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1089,
"watchers": 3894,
"watchers": 3895,
"score": 0,
"subscribers_count": 155
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-10-11T13:44:58Z",
"updated_at": "2023-10-14T05:41:41Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1802,
"watchers_count": 1802,
"stargazers_count": 1804,
"watchers_count": 1804,
"has_discussions": false,
"forks_count": 335,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1802,
"watchers": 1804,
"score": 0,
"subscribers_count": 34
}

View file

@ -1,4 +1,34 @@
[
{
"id": 167275161,
"name": "check_CVE-2019-3462",
"full_name": "tonejito\/check_CVE-2019-3462",
"owner": {
"login": "tonejito",
"id": 618588,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/618588?v=4",
"html_url": "https:\/\/github.com\/tonejito"
},
"html_url": "https:\/\/github.com\/tonejito\/check_CVE-2019-3462",
"description": "Check @Debian and @Ubuntu #GNU \/ #Linux for CVE-2019-3462 in APT",
"fork": false,
"created_at": "2019-01-24T00:30:15Z",
"updated_at": "2023-09-28T10:57:49Z",
"pushed_at": "2019-01-26T01:21:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 170573944,
"name": "update-apt-package",

36
2019/CVE-2019-5893.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 165075365,
"name": "OpenSource-ERP-SQL-Injection",
"full_name": "EmreOvunc\/OpenSource-ERP-SQL-Injection",
"owner": {
"login": "EmreOvunc",
"id": 15659223,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15659223?v=4",
"html_url": "https:\/\/github.com\/EmreOvunc"
},
"html_url": "https:\/\/github.com\/EmreOvunc\/OpenSource-ERP-SQL-Injection",
"description": "CVE-2019-5893 | OpenSource ERP application has SQL Injection vulnerability.",
"fork": false,
"created_at": "2019-01-10T14:36:55Z",
"updated_at": "2023-09-28T10:57:23Z",
"pushed_at": "2019-01-11T07:45:37Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2019-5893",
"erp",
"sql-injection"
],
"visibility": "public",
"forks": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}
]

32
2019/CVE-2019-6263.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 166368513,
"name": "CVE-2019-6263-Joomla-POC",
"full_name": "praveensutar\/CVE-2019-6263-Joomla-POC",
"owner": {
"login": "praveensutar",
"id": 12555214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12555214?v=4",
"html_url": "https:\/\/github.com\/praveensutar"
},
"html_url": "https:\/\/github.com\/praveensutar\/CVE-2019-6263-Joomla-POC",
"description": null,
"fork": false,
"created_at": "2019-01-18T08:10:11Z",
"updated_at": "2023-01-10T03:19:58Z",
"pushed_at": "2019-01-19T04:29:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

32
2019/CVE-2019-6487.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 166241615,
"name": "TP-Link-WDR-Router-Command-injection_POC",
"full_name": "afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"owner": {
"login": "afang5472",
"id": 18503100,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18503100?v=4",
"html_url": "https:\/\/github.com\/afang5472"
},
"html_url": "https:\/\/github.com\/afang5472\/TP-Link-WDR-Router-Command-injection_POC",
"description": "CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.",
"fork": false,
"created_at": "2019-01-17T14:44:12Z",
"updated_at": "2023-09-28T10:57:36Z",
"pushed_at": "2019-01-19T10:49:21Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 36,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-10-12T06:22:40Z",
"updated_at": "2023-10-14T05:13:30Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3894,
"watchers_count": 3894,
"stargazers_count": 3895,
"watchers_count": 3895,
"has_discussions": false,
"forks_count": 1089,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1089,
"watchers": 3894,
"watchers": 3895,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-10-11T13:44:58Z",
"updated_at": "2023-10-14T05:41:41Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1802,
"watchers_count": 1802,
"stargazers_count": 1804,
"watchers_count": 1804,
"has_discussions": false,
"forks_count": 335,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 335,
"watchers": 1802,
"watchers": 1804,
"score": 0,
"subscribers_count": 34
},

View file

@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2023-10-12T08:27:22Z",
"updated_at": "2023-10-14T06:14:35Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 941,
"watchers_count": 941,
"stargazers_count": 942,
"watchers_count": 942,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 941,
"watchers": 942,
"score": 0,
"subscribers_count": 26
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 406,
"watchers_count": 406,
"has_discussions": false,
"forks_count": 126,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 126,
"forks": 127,
"watchers": 406,
"score": 0,
"subscribers_count": 6

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-10-13T08:35:22Z",
"updated_at": "2023-10-14T05:20:28Z",
"pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1115,
"watchers_count": 1115,
"stargazers_count": 1116,
"watchers_count": 1116,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 143,
"watchers": 1115,
"watchers": 1116,
"score": 0,
"subscribers_count": 11
}

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-10-09T17:08:23Z",
"updated_at": "2023-10-14T05:50:13Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 891,
"watchers_count": 891,
"stargazers_count": 892,
"watchers_count": 892,
"has_discussions": false,
"forks_count": 241,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 241,
"watchers": 891,
"watchers": 892,
"score": 0,
"subscribers_count": 27
},

View file

@ -369,12 +369,12 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2023-10-13T12:11:31Z",
"updated_at": "2023-10-14T00:42:29Z",
"pushed_at": "2023-05-11T11:29:46Z",
"stargazers_count": 1071,
"watchers_count": 1071,
"stargazers_count": 1072,
"watchers_count": 1072,
"has_discussions": false,
"forks_count": 509,
"forks_count": 510,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -382,8 +382,8 @@
"log4shell"
],
"visibility": "public",
"forks": 509,
"watchers": 1071,
"forks": 510,
"watchers": 1072,
"score": 0,
"subscribers_count": 23
},
@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2023-10-12T18:07:22Z",
"pushed_at": "2023-10-14T00:43:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -27,6 +27,6 @@
"forks": 30,
"watchers": 148,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
}
]

View file

@ -27,6 +27,6 @@
"forks": 7,
"watchers": 20,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-10-13T08:35:22Z",
"updated_at": "2023-10-14T05:20:28Z",
"pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1115,
"watchers_count": 1115,
"stargazers_count": 1116,
"watchers_count": 1116,
"has_discussions": false,
"forks_count": 143,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 143,
"watchers": 1115,
"watchers": 1116,
"score": 0,
"subscribers_count": 11
},

View file

@ -27,6 +27,6 @@
"forks": 10,
"watchers": 17,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -27,7 +27,7 @@
"forks": 35,
"watchers": 241,
"score": 0,
"subscribers_count": 12
"subscribers_count": 13
},
{
"id": 517351313,

View file

@ -103,10 +103,10 @@
"description": "Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)",
"fork": false,
"created_at": "2022-09-20T02:35:53Z",
"updated_at": "2023-05-28T03:24:15Z",
"updated_at": "2023-10-14T03:31:30Z",
"pushed_at": "2022-09-24T20:52:18Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-10-13T13:44:32Z",
"pushed_at": "2023-10-08T13:43:56Z",
"pushed_at": "2023-10-14T06:10:44Z",
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 23,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -654,6 +654,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -163,10 +163,10 @@
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。",
"fork": false,
"created_at": "2023-06-20T08:12:49Z",
"updated_at": "2023-09-04T01:39:58Z",
"updated_at": "2023-10-14T02:17:17Z",
"pushed_at": "2023-06-20T08:51:47Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -152,7 +152,7 @@
"forks": 14,
"watchers": 49,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
},
{
"id": 679512175,

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-07-16T15:57:37Z",
"updated_at": "2023-07-16T16:05:40Z",
"updated_at": "2023-10-14T04:56:23Z",
"pushed_at": "2023-07-16T16:05:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2023-10-13T22:50:51Z",
"updated_at": "2023-10-14T01:57:58Z",
"pushed_at": "2023-10-11T18:07:05Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 1
},
@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-10-13T17:26:20Z",
"updated_at": "2023-10-14T06:25:08Z",
"pushed_at": "2023-10-12T02:21:47Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -124,9 +124,9 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 41,
"watchers": 44,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 703506378,
@ -214,10 +214,10 @@
"description": "Confluence Data Center & Server 权限提升漏洞 Exploit",
"fork": false,
"created_at": "2023-10-13T05:18:54Z",
"updated_at": "2023-10-13T11:50:03Z",
"updated_at": "2023-10-14T05:29:44Z",
"pushed_at": "2023-10-13T05:21:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -226,9 +226,9 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 704422927,
@ -258,7 +258,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 704429158,
@ -288,6 +288,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -113,13 +113,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-20T18:43:54Z",
"updated_at": "2023-09-05T20:17:07Z",
"updated_at": "2023-10-14T03:31:25Z",
"pushed_at": "2023-07-05T20:02:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 23,
"watchers": 88,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-28T21:20:23Z",
"updated_at": "2023-10-13T18:08:01Z",
"updated_at": "2023-10-14T02:56:48Z",
"pushed_at": "2023-10-10T17:29:32Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,20 +13,20 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-10-14T00:07:39Z",
"updated_at": "2023-10-14T05:37:08Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 83,
"forks": 25,
"watchers": 85,
"score": 0,
"subscribers_count": 2
"subscribers_count": 4
}
]

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -31,6 +31,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": "Simple PoC causing overflow",
"fork": false,
"created_at": "2023-10-11T08:11:56Z",
"updated_at": "2023-10-12T14:33:51Z",
"updated_at": "2023-10-14T06:19:32Z",
"pushed_at": "2023-10-11T08:17:06Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"forks": 3,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -43,10 +43,10 @@
"description": "😄 CVE-2023-38545堆溢出的POC和分析文章",
"fork": false,
"created_at": "2023-10-12T07:16:49Z",
"updated_at": "2023-10-13T12:58:32Z",
"updated_at": "2023-10-14T06:23:19Z",
"pushed_at": "2023-10-12T08:46:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -73,19 +73,19 @@
"description": "Simple PoC causing overflow",
"fork": false,
"created_at": "2023-10-12T07:39:15Z",
"updated_at": "2023-10-13T13:57:35Z",
"updated_at": "2023-10-14T06:19:49Z",
"pushed_at": "2023-10-12T08:09:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -528,7 +528,7 @@
"description": "CVE-2023-38646 Metabase RCE",
"fork": false,
"created_at": "2023-10-11T03:18:09Z",
"updated_at": "2023-10-13T06:54:54Z",
"updated_at": "2023-10-14T04:57:01Z",
"pushed_at": "2023-10-11T04:06:43Z",
"stargazers_count": 12,
"watchers_count": 12,
@ -547,7 +547,7 @@
"forks": 1,
"watchers": 12,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 703617395,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,21 +13,21 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-14T00:26:04Z",
"updated_at": "2023-10-14T05:40:32Z",
"pushed_at": "2023-10-12T21:19:32Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 23,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 113,
"forks": 24,
"watchers": 122,
"score": 0,
"subscribers_count": 2
"subscribers_count": 5
},
{
"id": 703303512,
@ -43,10 +43,10 @@
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2023-10-13T13:23:21Z",
"updated_at": "2023-10-14T02:05:37Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -63,9 +63,9 @@
],
"visibility": "public",
"forks": 3,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 703845749,
@ -155,6 +155,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

32
2023/CVE-2023-45540.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 701340984,
"name": "CVE-2023-45540",
"full_name": "soundarkutty\/CVE-2023-45540",
"owner": {
"login": "soundarkutty",
"id": 26168410,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26168410?v=4",
"html_url": "https:\/\/github.com\/soundarkutty"
},
"html_url": "https:\/\/github.com\/soundarkutty\/CVE-2023-45540",
"description": "CVE-2023-45540 Jorani Leave Management System v1.0.3 HTML Injection",
"fork": false,
"created_at": "2023-10-06T12:43:54Z",
"updated_at": "2023-10-14T05:12:25Z",
"pushed_at": "2023-10-06T16:04:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-45542.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 696796100,
"name": "CVE-2023-45542",
"full_name": "ahrixia\/CVE-2023-45542",
"owner": {
"login": "ahrixia",
"id": 35935843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
"html_url": "https:\/\/github.com\/ahrixia"
},
"html_url": "https:\/\/github.com\/ahrixia\/CVE-2023-45542",
"description": "mooSocial v3.1.8 is vulnerable to cross-site scripting on search function.",
"fork": false,
"created_at": "2023-09-26T12:59:31Z",
"updated_at": "2023-10-14T04:47:03Z",
"pushed_at": "2023-10-14T04:47:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,7 +27,7 @@
"forks": 5,
"watchers": 21,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 697340903,

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-10-12T14:58:45Z",
"updated_at": "2023-10-14T02:05:10Z",
"pushed_at": "2023-10-05T23:33:49Z",
"stargazers_count": 225,
"watchers_count": 225,
@ -27,7 +27,7 @@
"forks": 37,
"watchers": 225,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
},
{
"id": 696220876,

View file

@ -212,5 +212,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 704757696,
"name": "CVE-2023-4911",
"full_name": "guffre\/CVE-2023-4911",
"owner": {
"login": "guffre",
"id": 21281361,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21281361?v=4",
"html_url": "https:\/\/github.com\/guffre"
},
"html_url": "https:\/\/github.com\/guffre\/CVE-2023-4911",
"description": "PoC for CVE-2023-4911 LooneyTuneables",
"fork": false,
"created_at": "2023-10-14T02:24:52Z",
"updated_at": "2023-10-14T02:25:44Z",
"pushed_at": "2023-10-14T02:34:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -768,6 +768,7 @@
- [silent6trinity/looney-tuneables](https://github.com/silent6trinity/looney-tuneables)
- [hadrian3689/looney-tunables-CVE-2023-4911](https://github.com/hadrian3689/looney-tunables-CVE-2023-4911)
- [ruycr4ft/CVE-2023-4911](https://github.com/ruycr4ft/CVE-2023-4911)
- [guffre/CVE-2023-4911](https://github.com/guffre/CVE-2023-4911)
### CVE-2023-5024 (2023-09-17)
@ -4475,6 +4476,12 @@
- [ggb0n/CVE-2023-44962](https://github.com/ggb0n/CVE-2023-44962)
### CVE-2023-45540
- [soundarkutty/CVE-2023-45540](https://github.com/soundarkutty/CVE-2023-45540)
### CVE-2023-45542
- [ahrixia/CVE-2023-45542](https://github.com/ahrixia/CVE-2023-45542)
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -22776,6 +22783,7 @@
<code>Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
</code>
- [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462)
- [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package)
### CVE-2019-3663 (2019-11-13)
@ -23039,6 +23047,13 @@
- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825)
### CVE-2019-5893 (2019-01-10)
<code>Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.xml query parameter.
</code>
- [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection)
### CVE-2019-6111 (2019-01-31)
<code>An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
@ -23085,6 +23100,13 @@
- [nikitapbst/cve-2019-6260](https://github.com/nikitapbst/cve-2019-6260)
### CVE-2019-6263 (2019-01-16)
<code>An issue was discovered in Joomla! before 3.9.2. Inadequate checks of the Global Configuration Text Filter settings allowed stored XSS.
</code>
- [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC)
### CVE-2019-6329 (2019-06-25)
<code>HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege and allows unauthorized modification of directories or files. Note: A different vulnerability than CVE-2019-6328.
@ -23161,6 +23183,13 @@
- [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467)
### CVE-2019-6487 (2019-01-18)
<code>TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
</code>
- [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC)
### CVE-2019-6690 (2019-03-17)
<code>python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a &quot;CWE-20: Improper Input Validation&quot; issue affecting the affect functionality component.
@ -29465,6 +29494,7 @@
- [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-)
- [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco)
- [mzakyz666/PoC-CVE-2017-3881](https://github.com/mzakyz666/PoC-CVE-2017-3881)
- [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881)
### CVE-2017-4490
- [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-)
@ -29672,6 +29702,9 @@
</code>
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
@ -29861,6 +29894,7 @@
- [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool)
- [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269)
- [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269)
- [ThanHuuTuan/CVE-2017-7269](https://github.com/ThanHuuTuan/CVE-2017-7269)
- [crypticdante/CVE-2017-7269](https://github.com/crypticdante/CVE-2017-7269)
- [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3)
- [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269)
@ -30194,6 +30228,13 @@
- [jakabakos/CVE-2017-9096-iText-XXE](https://github.com/jakabakos/CVE-2017-9096-iText-XXE)
### CVE-2017-9097 (2017-06-15)
<code>In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file.
</code>
- [MDudek-ICS/AntiWeb_testing-Suite](https://github.com/MDudek-ICS/AntiWeb_testing-Suite)
### CVE-2017-9101 (2017-05-21)
<code>import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
@ -30425,6 +30466,7 @@
- [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271)
- [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271)
- [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271)
- [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce)
- [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271)
- [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271)
- [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc)
@ -31050,6 +31092,13 @@
- [fei9747/CVE-2017-16995](https://github.com/fei9747/CVE-2017-16995)
- [anldori/CVE-2017-16995](https://github.com/anldori/CVE-2017-16995)
### CVE-2017-16997 (2017-12-17)
<code>elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the &quot;./&quot; directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
</code>
- [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc)
### CVE-2017-17058 (2017-11-29)
<code>** DISPUTED ** The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have &quot;if (!defined('ABSPATH')) {exit;}&quot; code.
@ -31104,6 +31153,13 @@
- [nu11pointer/goahead-rce-exploit](https://github.com/nu11pointer/goahead-rce-exploit)
- [freitzzz/bash-CVE-2017-17562](https://github.com/freitzzz/bash-CVE-2017-17562)
### CVE-2017-17692 (2017-12-21)
<code>Samsung Internet Browser 5.4.02.3 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that redirects to a child tab and rewrites the innerHTML property.
</code>
- [specloli/CVE-2017-17692](https://github.com/specloli/CVE-2017-17692)
### CVE-2017-17736 (2018-03-23)
<code>Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
@ -31241,6 +31297,7 @@
<code>Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm-&gt;mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm-&gt;mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm-&gt;mmap_base into the are that is supposed to be the &quot;gap&quot; between the stack and the binary.
</code>
- [RicterZ/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253)
- [sxlmnwb/CVE-2017-1000253](https://github.com/sxlmnwb/CVE-2017-1000253)
### CVE-2017-1000353 (2018-01-29)