Auto Update 2024/03/04 18:27:01

This commit is contained in:
motikan2010-bot 2024-03-05 03:27:01 +09:00
parent c0d77dd5b2
commit 3d29a6cf0e
40 changed files with 615 additions and 124 deletions

View file

@ -82,10 +82,10 @@
"description": "RCE against WordPress 4.6; Python port of https:\/\/exploitbox.io\/vuln\/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html",
"fork": false,
"created_at": "2017-05-10T03:18:46Z",
"updated_at": "2023-09-28T10:41:19Z",
"updated_at": "2024-03-04T15:30:22Z",
"pushed_at": "2017-05-10T03:32:56Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -272,7 +272,7 @@
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 3
},
{
"id": 89314149,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 3
}
]

View file

@ -31,7 +31,7 @@
"forks": 51,
"watchers": 184,
"score": 0,
"subscribers_count": 5
"subscribers_count": 4
},
{
"id": 216503835,

View file

@ -2554,5 +2554,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 767077239,
"name": "smbGhostCVE-2020-0796",
"full_name": "AdamSonov\/smbGhostCVE-2020-0796",
"owner": {
"login": "AdamSonov",
"id": 96952084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96952084?v=4",
"html_url": "https:\/\/github.com\/AdamSonov"
},
"html_url": "https:\/\/github.com\/AdamSonov\/smbGhostCVE-2020-0796",
"description": "This script will help you to scan for smbGhost vulnerability(CVE-2020-0796)",
"fork": false,
"created_at": "2024-03-04T16:59:53Z",
"updated_at": "2024-03-04T18:05:44Z",
"pushed_at": "2024-03-04T18:05:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -58,35 +58,5 @@
"watchers": 30,
"score": 0,
"subscribers_count": 4
},
{
"id": 340598389,
"name": "SpringCloud-Config-CVE-2020-5410",
"full_name": "thelostworldFree\/SpringCloud-Config-CVE-2020-5410",
"owner": {
"login": "thelostworldFree",
"id": 24971604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24971604?v=4",
"html_url": "https:\/\/github.com\/thelostworldFree"
},
"html_url": "https:\/\/github.com\/thelostworldFree\/SpringCloud-Config-CVE-2020-5410",
"description": "Spring Cloud Config 目录穿越漏洞(CVE-2020-5410) 复现",
"fork": false,
"created_at": "2021-02-20T08:05:51Z",
"updated_at": "2021-02-20T08:11:26Z",
"pushed_at": "2021-02-20T08:11:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2024-02-01T07:34:40Z",
"updated_at": "2024-03-04T16:46:21Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 214,
"watchers_count": 214,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 212,
"watchers": 214,
"score": 0,
"subscribers_count": 14
},

View file

@ -907,7 +907,7 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-04T10:51:22Z",
"updated_at": "2024-03-04T16:02:02Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1721,
"watchers_count": 1721,
@ -1268,7 +1268,7 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-02-26T06:53:46Z",
"updated_at": "2024-03-04T15:02:32Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 764,
"watchers_count": 764,
@ -3671,13 +3671,13 @@
"stargazers_count": 3336,
"watchers_count": 3336,
"has_discussions": true,
"forks_count": 739,
"forks_count": 740,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 739,
"forks": 740,
"watchers": 3336,
"score": 0,
"subscribers_count": 58
@ -5200,7 +5200,7 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
"updated_at": "2024-01-29T09:28:49Z",
"updated_at": "2024-03-04T15:46:12Z",
"pushed_at": "2021-12-21T01:24:46Z",
"stargazers_count": 291,
"watchers_count": 291,

View file

@ -73,10 +73,10 @@
"description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.",
"fork": false,
"created_at": "2022-05-06T06:22:47Z",
"updated_at": "2024-01-24T11:19:43Z",
"updated_at": "2024-03-04T17:13:22Z",
"pushed_at": "2022-05-06T15:33:14Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2024-02-21T15:44:43Z",
"updated_at": "2024-03-04T15:20:05Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 239,
"watchers_count": 239,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 238,
"forks": 43,
"watchers": 239,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-03-01T12:35:48Z",
"updated_at": "2024-03-04T17:35:27Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1101,
"watchers_count": 1101,
"stargazers_count": 1102,
"watchers_count": 1102,
"has_discussions": true,
"forks_count": 186,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 186,
"watchers": 1101,
"watchers": 1102,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.",
"fork": false,
"created_at": "2024-01-08T21:53:46Z",
"updated_at": "2024-02-03T23:46:49Z",
"updated_at": "2024-03-04T15:23:45Z",
"pushed_at": "2024-01-08T22:39:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

32
2023/CVE-2023-33565.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 657246757,
"name": "CVE-2023-33565",
"full_name": "yashpatelphd\/CVE-2023-33565",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33565",
"description": "Denial-of-Service (DoS) Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2023-06-22T16:26:55Z",
"updated_at": "2023-06-22T16:45:03Z",
"pushed_at": "2024-02-27T11:44:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-33566.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 657250385,
"name": "CVE-2023-33566",
"full_name": "yashpatelphd\/CVE-2023-33566",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33566",
"description": "Unauthorized Node Injection Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2023-06-22T16:36:33Z",
"updated_at": "2023-06-22T16:45:22Z",
"pushed_at": "2024-02-27T11:44:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-33567.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 657251638,
"name": "CVE-2023-33567",
"full_name": "yashpatelphd\/CVE-2023-33567",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33567",
"description": "Unauthorized Access Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2023-06-22T16:39:52Z",
"updated_at": "2023-06-22T16:46:00Z",
"pushed_at": "2024-02-27T11:45:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -48,13 +48,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 15,
"score": 0,
"subscribers_count": 3

View file

@ -88,5 +88,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 766985531,
"name": "Blue0DAY",
"full_name": "R4HUL-INDIAN\/Blue0DAY",
"owner": {
"login": "R4HUL-INDIAN",
"id": 106301889,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106301889?v=4",
"html_url": "https:\/\/github.com\/R4HUL-INDIAN"
},
"html_url": "https:\/\/github.com\/R4HUL-INDIAN\/Blue0DAY",
"description": "The Blue0DAY tool implements Unauthenticated Peering, leading to code execution via HID keyboard in Bluetooth CVE-2023-45866. 🚨",
"fork": false,
"created_at": "2024-03-04T13:55:16Z",
"updated_at": "2024-03-04T13:56:02Z",
"pushed_at": "2024-03-04T13:55:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,12 +43,12 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2024-02-27T13:25:34Z",
"updated_at": "2024-03-04T17:39:26Z",
"pushed_at": "2024-01-20T02:27:51Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,8 +60,8 @@
"redteam"
],
"visibility": "public",
"forks": 39,
"watchers": 168,
"forks": 40,
"watchers": 169,
"score": 0,
"subscribers_count": 2
},

32
2023/CVE-2023-51197.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741526927,
"name": "CVE-2023-51197",
"full_name": "yashpatelphd\/CVE-2023-51197",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51197",
"description": "Shell Injection Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T15:25:10Z",
"updated_at": "2024-01-10T15:36:03Z",
"pushed_at": "2024-02-27T11:45:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51198.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741532916,
"name": "CVE-2023-51198",
"full_name": "yashpatelphd\/CVE-2023-51198",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51198",
"description": "Privilege Escalation Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T15:39:19Z",
"updated_at": "2024-01-10T15:41:00Z",
"pushed_at": "2024-02-27T11:46:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51199.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741538841,
"name": "CVE-2023-51199",
"full_name": "yashpatelphd\/CVE-2023-51199",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51199",
"description": "Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T15:53:14Z",
"updated_at": "2024-01-10T16:12:31Z",
"pushed_at": "2024-02-27T11:46:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51200.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741549154,
"name": "CVE-2023-51200",
"full_name": "yashpatelphd\/CVE-2023-51200",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51200",
"description": "Security Misconfiguration in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T16:17:59Z",
"updated_at": "2024-01-10T16:32:49Z",
"pushed_at": "2024-02-27T11:47:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51201.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741562121,
"name": "CVE-2023-51201",
"full_name": "yashpatelphd\/CVE-2023-51201",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51201",
"description": "Information Leakage in ROS2 Foxy Fitzroy via Plaintext Message Transmission",
"fork": false,
"created_at": "2024-01-10T16:46:56Z",
"updated_at": "2024-01-10T16:54:06Z",
"pushed_at": "2024-02-27T11:48:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51202.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741581614,
"name": "CVE-2023-51202",
"full_name": "yashpatelphd\/CVE-2023-51202",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51202",
"description": "OS Command Injection Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T17:33:19Z",
"updated_at": "2024-01-10T17:43:05Z",
"pushed_at": "2024-02-27T11:48:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51204.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741590400,
"name": "CVE-2023-51204",
"full_name": "yashpatelphd\/CVE-2023-51204",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51204",
"description": "Insecure Deserialization Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T17:54:59Z",
"updated_at": "2024-01-10T18:08:19Z",
"pushed_at": "2024-02-27T11:49:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-51208.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 741595744,
"name": "CVE-2023-51208",
"full_name": "yashpatelphd\/CVE-2023-51208",
"owner": {
"login": "yashpatelphd",
"id": 137430106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
"html_url": "https:\/\/github.com\/yashpatelphd"
},
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51208",
"description": "Arbitrary File Upload Vulnerability in ROS2 Foxy Fitzroy",
"fork": false,
"created_at": "2024-01-10T18:08:37Z",
"updated_at": "2024-01-10T18:12:26Z",
"pushed_at": "2024-02-27T11:49:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
"fork": false,
"created_at": "2024-03-04T08:57:27Z",
"updated_at": "2024-03-04T09:36:33Z",
"updated_at": "2024-03-04T18:10:05Z",
"pushed_at": "2024-03-04T09:36:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Execute arbitrary code on the victims device, compromising data security and system integrity in Chrome 120.0.6099",
"fork": false,
"created_at": "2024-03-04T10:25:06Z",
"updated_at": "2024-03-04T10:40:12Z",
"updated_at": "2024-03-04T18:08:20Z",
"pushed_at": "2024-03-04T10:40:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -28,5 +28,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 767118935,
"name": "CVE-2024-1071-Docker",
"full_name": "Trackflaw\/CVE-2024-1071-Docker",
"owner": {
"login": "Trackflaw",
"id": 78696986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
"html_url": "https:\/\/github.com\/Trackflaw"
},
"html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-1071-Docker",
"description": "CVE-2024-1071 with Docker",
"fork": false,
"created_at": "2024-03-04T18:29:17Z",
"updated_at": "2024-03-04T18:29:17Z",
"pushed_at": "2024-03-04T18:29:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Sensitive Information Exposure via API in LearnDash.",
"fork": false,
"created_at": "2024-02-05T17:46:41Z",
"updated_at": "2024-02-05T21:15:51Z",
"updated_at": "2024-03-04T17:31:59Z",
"pushed_at": "2024-02-05T17:58:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -33,7 +33,7 @@
"screenconnect"
],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 81,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
"updated_at": "2024-03-01T09:34:51Z",
"updated_at": "2024-03-04T18:08:31Z",
"pushed_at": "2024-02-02T02:05:01Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 117,
"score": 0,
"subscribers_count": 4
@ -43,19 +43,19 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-03-03T17:21:38Z",
"updated_at": "2024-03-04T17:49:00Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 509,
"watchers_count": 509,
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
"forks_count": 114,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 509,
"forks": 116,
"watchers": 510,
"score": 0,
"subscribers_count": 6
},

View file

@ -73,10 +73,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2024-03-04T08:34:24Z",
"updated_at": "2024-03-04T14:38:20Z",
"pushed_at": "2024-03-01T20:02:52Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -73,10 +73,10 @@
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
"updated_at": "2024-02-26T07:16:55Z",
"updated_at": "2024-03-04T18:00:30Z",
"pushed_at": "2024-01-17T00:38:28Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-02T22:59:21Z",
"updated_at": "2024-02-29T00:24:20Z",
"updated_at": "2024-03-04T17:57:22Z",
"pushed_at": "2024-02-02T23:27:10Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 2
},
@ -43,10 +43,10 @@
"description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit",
"fork": false,
"created_at": "2024-02-03T11:33:40Z",
"updated_at": "2024-02-24T12:35:26Z",
"updated_at": "2024-03-04T18:00:58Z",
"pushed_at": "2024-02-03T11:48:37Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -500,10 +500,10 @@
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
"fork": false,
"created_at": "2024-02-04T20:56:42Z",
"updated_at": "2024-03-03T20:44:03Z",
"updated_at": "2024-03-04T17:15:36Z",
"pushed_at": "2024-02-05T14:10:26Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": true,
"forks_count": 2,
"allow_forking": true,
@ -512,7 +512,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-03-04T11:15:15Z",
"updated_at": "2024-03-04T13:25:07Z",
"pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 1
},

View file

@ -72,6 +72,7 @@
### CVE-2024-1071
- [gbrsh/CVE-2024-1071](https://github.com/gbrsh/CVE-2024-1071)
- [Trackflaw/CVE-2024-1071-Docker](https://github.com/Trackflaw/CVE-2024-1071-Docker)
### CVE-2024-1208 (2024-02-05)
@ -4470,6 +4471,27 @@
- [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517)
### CVE-2023-33565 (2023-06-23)
<code>ROS2 (Robot Operating System 2) Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 are vulnerable to Denial-of-Service (DoS) attacks. A malicious user potentially exploited the vulnerability remotely and crashed the ROS2 nodes.
</code>
- [yashpatelphd/CVE-2023-33565](https://github.com/yashpatelphd/CVE-2023-33565)
### CVE-2023-33566 (2023-06-27)
<code>An unauthorized node injection vulnerability has been identified in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could allow a malicious user to inject malicious ROS2 nodes into the system remotely. Once injected, these nodes could disrupt the normal operations of the system or cause other potentially harmful behavior.
</code>
- [yashpatelphd/CVE-2023-33566](https://github.com/yashpatelphd/CVE-2023-33566)
### CVE-2023-33567 (2023-06-27)
<code>An unauthorized access vulnerability has been discovered in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information.
</code>
- [yashpatelphd/CVE-2023-33567](https://github.com/yashpatelphd/CVE-2023-33567)
### CVE-2023-33592 (2023-06-28)
<code>Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information.
@ -6800,6 +6822,7 @@
- [pentestfunctions/BlueDucky](https://github.com/pentestfunctions/BlueDucky)
- [Eason-zz/BluetoothDucky](https://github.com/Eason-zz/BluetoothDucky)
- [jjjjjjjj987/cve-2023-45866-py](https://github.com/jjjjjjjj987/cve-2023-45866-py)
- [R4HUL-INDIAN/Blue0DAY](https://github.com/R4HUL-INDIAN/Blue0DAY)
### CVE-2023-45966 (2023-10-23)
@ -7720,6 +7743,62 @@
- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127)
### CVE-2023-51197 (2024-01-30)
<code>An issue discovered in shell command execution in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows an attacker to run arbitrary commands and cause other impacts.
</code>
- [yashpatelphd/CVE-2023-51197](https://github.com/yashpatelphd/CVE-2023-51197)
### CVE-2023-51198 (2024-01-30)
<code>An issue in the permission and access control components within ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to gain escalate privileges.
</code>
- [yashpatelphd/CVE-2023-51198](https://github.com/yashpatelphd/CVE-2023-51198)
### CVE-2023-51199 (2024-01-23)
<code>Buffer Overflow vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code or cause a denial of service via improper handling of arrays or strings.
</code>
- [yashpatelphd/CVE-2023-51199](https://github.com/yashpatelphd/CVE-2023-51199)
### CVE-2023-51200 (2024-01-23)
<code>An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials.
</code>
- [yashpatelphd/CVE-2023-51200](https://github.com/yashpatelphd/CVE-2023-51200)
### CVE-2023-51201 (2024-01-23)
<code>Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack.
</code>
- [yashpatelphd/CVE-2023-51201](https://github.com/yashpatelphd/CVE-2023-51201)
### CVE-2023-51202 (2024-01-30)
<code>OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands.
</code>
- [yashpatelphd/CVE-2023-51202](https://github.com/yashpatelphd/CVE-2023-51202)
### CVE-2023-51204 (2024-01-30)
<code>Insecure deserialization in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary code via a crafted input.
</code>
- [yashpatelphd/CVE-2023-51204](https://github.com/yashpatelphd/CVE-2023-51204)
### CVE-2023-51208 (2024-01-23)
<code>An Arbitrary File Upload vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code and cause other impacts via upload of crafted file.
</code>
- [yashpatelphd/CVE-2023-51208](https://github.com/yashpatelphd/CVE-2023-51208)
### CVE-2023-51214
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
@ -21525,6 +21604,7 @@
- [Ajomix/CVE-2020-0796](https://github.com/Ajomix/CVE-2020-0796)
- [Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC](https://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC)
- [hungdnvp/POC-CVE-2020-0796](https://github.com/hungdnvp/POC-CVE-2020-0796)
- [AdamSonov/smbGhostCVE-2020-0796](https://github.com/AdamSonov/smbGhostCVE-2020-0796)
### CVE-2020-0799 (2020-03-12)
@ -22236,7 +22316,6 @@
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC)
- [thelostworldFree/SpringCloud-Config-CVE-2020-5410](https://github.com/thelostworldFree/SpringCloud-Config-CVE-2020-5410)
### CVE-2020-5421 (2020-09-18)