mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2024/03/04 18:27:01
This commit is contained in:
parent
c0d77dd5b2
commit
3d29a6cf0e
40 changed files with 615 additions and 124 deletions
|
@ -82,10 +82,10 @@
|
|||
"description": "RCE against WordPress 4.6; Python port of https:\/\/exploitbox.io\/vuln\/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-10T03:18:46Z",
|
||||
"updated_at": "2023-09-28T10:41:19Z",
|
||||
"updated_at": "2024-03-04T15:30:22Z",
|
||||
"pushed_at": "2017-05-10T03:32:56Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -272,7 +272,7 @@
|
|||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 89314149,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -31,7 +31,7 @@
|
|||
"forks": 51,
|
||||
"watchers": 184,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 216503835,
|
||||
|
|
|
@ -2554,5 +2554,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 767077239,
|
||||
"name": "smbGhostCVE-2020-0796",
|
||||
"full_name": "AdamSonov\/smbGhostCVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "AdamSonov",
|
||||
"id": 96952084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96952084?v=4",
|
||||
"html_url": "https:\/\/github.com\/AdamSonov"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AdamSonov\/smbGhostCVE-2020-0796",
|
||||
"description": "This script will help you to scan for smbGhost vulnerability(CVE-2020-0796)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T16:59:53Z",
|
||||
"updated_at": "2024-03-04T18:05:44Z",
|
||||
"pushed_at": "2024-03-04T18:05:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -58,35 +58,5 @@
|
|||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 340598389,
|
||||
"name": "SpringCloud-Config-CVE-2020-5410",
|
||||
"full_name": "thelostworldFree\/SpringCloud-Config-CVE-2020-5410",
|
||||
"owner": {
|
||||
"login": "thelostworldFree",
|
||||
"id": 24971604,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24971604?v=4",
|
||||
"html_url": "https:\/\/github.com\/thelostworldFree"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thelostworldFree\/SpringCloud-Config-CVE-2020-5410",
|
||||
"description": "Spring Cloud Config 目录穿越漏洞(CVE-2020-5410) 复现",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-20T08:05:51Z",
|
||||
"updated_at": "2021-02-20T08:11:26Z",
|
||||
"pushed_at": "2021-02-20T08:11:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2024-02-01T07:34:40Z",
|
||||
"updated_at": "2024-03-04T16:46:21Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 212,
|
||||
"watchers": 214,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -907,7 +907,7 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-03-04T10:51:22Z",
|
||||
"updated_at": "2024-03-04T16:02:02Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1721,
|
||||
"watchers_count": 1721,
|
||||
|
@ -1268,7 +1268,7 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-02-26T06:53:46Z",
|
||||
"updated_at": "2024-03-04T15:02:32Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 764,
|
||||
"watchers_count": 764,
|
||||
|
@ -3671,13 +3671,13 @@
|
|||
"stargazers_count": 3336,
|
||||
"watchers_count": 3336,
|
||||
"has_discussions": true,
|
||||
"forks_count": 739,
|
||||
"forks_count": 740,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 739,
|
||||
"forks": 740,
|
||||
"watchers": 3336,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
|
@ -5200,7 +5200,7 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2024-01-29T09:28:49Z",
|
||||
"updated_at": "2024-03-04T15:46:12Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-06T06:22:47Z",
|
||||
"updated_at": "2024-01-24T11:19:43Z",
|
||||
"updated_at": "2024-03-04T17:13:22Z",
|
||||
"pushed_at": "2022-05-06T15:33:14Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -92,7 +92,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2024-02-21T15:44:43Z",
|
||||
"updated_at": "2024-03-04T15:20:05Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 238,
|
||||
"forks": 43,
|
||||
"watchers": 239,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-03-01T12:35:48Z",
|
||||
"updated_at": "2024-03-04T17:35:27Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1101,
|
||||
"watchers_count": 1101,
|
||||
"stargazers_count": 1102,
|
||||
"watchers_count": 1102,
|
||||
"has_discussions": true,
|
||||
"forks_count": 186,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 186,
|
||||
"watchers": 1101,
|
||||
"watchers": 1102,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-08T21:53:46Z",
|
||||
"updated_at": "2024-02-03T23:46:49Z",
|
||||
"updated_at": "2024-03-04T15:23:45Z",
|
||||
"pushed_at": "2024-01-08T22:39:33Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
32
2023/CVE-2023-33565.json
Normal file
32
2023/CVE-2023-33565.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 657246757,
|
||||
"name": "CVE-2023-33565",
|
||||
"full_name": "yashpatelphd\/CVE-2023-33565",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33565",
|
||||
"description": "Denial-of-Service (DoS) Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-22T16:26:55Z",
|
||||
"updated_at": "2023-06-22T16:45:03Z",
|
||||
"pushed_at": "2024-02-27T11:44:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-33566.json
Normal file
32
2023/CVE-2023-33566.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 657250385,
|
||||
"name": "CVE-2023-33566",
|
||||
"full_name": "yashpatelphd\/CVE-2023-33566",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33566",
|
||||
"description": "Unauthorized Node Injection Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-22T16:36:33Z",
|
||||
"updated_at": "2023-06-22T16:45:22Z",
|
||||
"pushed_at": "2024-02-27T11:44:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-33567.json
Normal file
32
2023/CVE-2023-33567.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 657251638,
|
||||
"name": "CVE-2023-33567",
|
||||
"full_name": "yashpatelphd\/CVE-2023-33567",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-33567",
|
||||
"description": "Unauthorized Access Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-22T16:39:52Z",
|
||||
"updated_at": "2023-06-22T16:46:00Z",
|
||||
"pushed_at": "2024-02-27T11:45:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -88,5 +88,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 766985531,
|
||||
"name": "Blue0DAY",
|
||||
"full_name": "R4HUL-INDIAN\/Blue0DAY",
|
||||
"owner": {
|
||||
"login": "R4HUL-INDIAN",
|
||||
"id": 106301889,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106301889?v=4",
|
||||
"html_url": "https:\/\/github.com\/R4HUL-INDIAN"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R4HUL-INDIAN\/Blue0DAY",
|
||||
"description": "The Blue0DAY tool implements Unauthenticated Peering, leading to code execution via HID keyboard in Bluetooth CVE-2023-45866. 🚨",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T13:55:16Z",
|
||||
"updated_at": "2024-03-04T13:56:02Z",
|
||||
"pushed_at": "2024-03-04T13:55:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,12 +43,12 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2024-02-27T13:25:34Z",
|
||||
"updated_at": "2024-03-04T17:39:26Z",
|
||||
"pushed_at": "2024-01-20T02:27:51Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -60,8 +60,8 @@
|
|||
"redteam"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 168,
|
||||
"forks": 40,
|
||||
"watchers": 169,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2023/CVE-2023-51197.json
Normal file
32
2023/CVE-2023-51197.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741526927,
|
||||
"name": "CVE-2023-51197",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51197",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51197",
|
||||
"description": "Shell Injection Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T15:25:10Z",
|
||||
"updated_at": "2024-01-10T15:36:03Z",
|
||||
"pushed_at": "2024-02-27T11:45:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51198.json
Normal file
32
2023/CVE-2023-51198.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741532916,
|
||||
"name": "CVE-2023-51198",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51198",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51198",
|
||||
"description": "Privilege Escalation Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T15:39:19Z",
|
||||
"updated_at": "2024-01-10T15:41:00Z",
|
||||
"pushed_at": "2024-02-27T11:46:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51199.json
Normal file
32
2023/CVE-2023-51199.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741538841,
|
||||
"name": "CVE-2023-51199",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51199",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51199",
|
||||
"description": "Buffer Overflow Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T15:53:14Z",
|
||||
"updated_at": "2024-01-10T16:12:31Z",
|
||||
"pushed_at": "2024-02-27T11:46:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51200.json
Normal file
32
2023/CVE-2023-51200.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741549154,
|
||||
"name": "CVE-2023-51200",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51200",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51200",
|
||||
"description": "Security Misconfiguration in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T16:17:59Z",
|
||||
"updated_at": "2024-01-10T16:32:49Z",
|
||||
"pushed_at": "2024-02-27T11:47:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51201.json
Normal file
32
2023/CVE-2023-51201.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741562121,
|
||||
"name": "CVE-2023-51201",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51201",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51201",
|
||||
"description": "Information Leakage in ROS2 Foxy Fitzroy via Plaintext Message Transmission",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T16:46:56Z",
|
||||
"updated_at": "2024-01-10T16:54:06Z",
|
||||
"pushed_at": "2024-02-27T11:48:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51202.json
Normal file
32
2023/CVE-2023-51202.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741581614,
|
||||
"name": "CVE-2023-51202",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51202",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51202",
|
||||
"description": "OS Command Injection Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T17:33:19Z",
|
||||
"updated_at": "2024-01-10T17:43:05Z",
|
||||
"pushed_at": "2024-02-27T11:48:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51204.json
Normal file
32
2023/CVE-2023-51204.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741590400,
|
||||
"name": "CVE-2023-51204",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51204",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51204",
|
||||
"description": "Insecure Deserialization Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T17:54:59Z",
|
||||
"updated_at": "2024-01-10T18:08:19Z",
|
||||
"pushed_at": "2024-02-27T11:49:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-51208.json
Normal file
32
2023/CVE-2023-51208.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 741595744,
|
||||
"name": "CVE-2023-51208",
|
||||
"full_name": "yashpatelphd\/CVE-2023-51208",
|
||||
"owner": {
|
||||
"login": "yashpatelphd",
|
||||
"id": 137430106,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430106?v=4",
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yashpatelphd\/CVE-2023-51208",
|
||||
"description": "Arbitrary File Upload Vulnerability in ROS2 Foxy Fitzroy",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-10T18:08:37Z",
|
||||
"updated_at": "2024-01-10T18:12:26Z",
|
||||
"pushed_at": "2024-02-27T11:49:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "0day for Citrix Netscaler ADC and NetScaler Gateway latest versions",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T08:57:27Z",
|
||||
"updated_at": "2024-03-04T09:36:33Z",
|
||||
"updated_at": "2024-03-04T18:10:05Z",
|
||||
"pushed_at": "2024-03-04T09:36:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Execute arbitrary code on the victim’s device, compromising data security and system integrity in Chrome 120.0.6099",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T10:25:06Z",
|
||||
"updated_at": "2024-03-04T10:40:12Z",
|
||||
"updated_at": "2024-03-04T18:08:20Z",
|
||||
"pushed_at": "2024-03-04T10:40:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 767118935,
|
||||
"name": "CVE-2024-1071-Docker",
|
||||
"full_name": "Trackflaw\/CVE-2024-1071-Docker",
|
||||
"owner": {
|
||||
"login": "Trackflaw",
|
||||
"id": 78696986,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trackflaw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-1071-Docker",
|
||||
"description": "CVE-2024-1071 with Docker",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-04T18:29:17Z",
|
||||
"updated_at": "2024-03-04T18:29:17Z",
|
||||
"pushed_at": "2024-03-04T18:29:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Sensitive Information Exposure via API in LearnDash.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-05T17:46:41Z",
|
||||
"updated_at": "2024-02-05T21:15:51Z",
|
||||
"updated_at": "2024-03-04T17:31:59Z",
|
||||
"pushed_at": "2024-02-05T17:58:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
"screenconnect"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The Poc for CVE-2024-20931",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T01:58:49Z",
|
||||
"updated_at": "2024-03-01T09:34:51Z",
|
||||
"updated_at": "2024-03-04T18:08:31Z",
|
||||
"pushed_at": "2024-02-02T02:05:01Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 117,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
@ -43,19 +43,19 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-03-03T17:21:38Z",
|
||||
"updated_at": "2024-03-04T17:49:00Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"stargazers_count": 510,
|
||||
"watchers_count": 510,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 509,
|
||||
"forks": 116,
|
||||
"watchers": 510,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T21:16:10Z",
|
||||
"updated_at": "2024-03-04T08:34:24Z",
|
||||
"updated_at": "2024-03-04T14:38:20Z",
|
||||
"pushed_at": "2024-03-01T20:02:52Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T20:59:38Z",
|
||||
"updated_at": "2024-02-26T07:16:55Z",
|
||||
"updated_at": "2024-03-04T18:00:30Z",
|
||||
"pushed_at": "2024-01-17T00:38:28Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T22:59:21Z",
|
||||
"updated_at": "2024-02-29T00:24:20Z",
|
||||
"updated_at": "2024-03-04T17:57:22Z",
|
||||
"pushed_at": "2024-02-02T23:27:10Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-03T11:33:40Z",
|
||||
"updated_at": "2024-02-24T12:35:26Z",
|
||||
"updated_at": "2024-03-04T18:00:58Z",
|
||||
"pushed_at": "2024-02-03T11:48:37Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -500,10 +500,10 @@
|
|||
"description": "Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-04T20:56:42Z",
|
||||
"updated_at": "2024-03-03T20:44:03Z",
|
||||
"updated_at": "2024-03-04T17:15:36Z",
|
||||
"pushed_at": "2024-02-05T14:10:26Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": true,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -512,7 +512,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-20T20:16:09Z",
|
||||
"updated_at": "2024-03-04T11:15:15Z",
|
||||
"updated_at": "2024-03-04T13:25:07Z",
|
||||
"pushed_at": "2024-02-25T21:50:09Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
81
README.md
81
README.md
|
@ -72,6 +72,7 @@
|
|||
|
||||
### CVE-2024-1071
|
||||
- [gbrsh/CVE-2024-1071](https://github.com/gbrsh/CVE-2024-1071)
|
||||
- [Trackflaw/CVE-2024-1071-Docker](https://github.com/Trackflaw/CVE-2024-1071-Docker)
|
||||
|
||||
### CVE-2024-1208 (2024-02-05)
|
||||
|
||||
|
@ -4470,6 +4471,27 @@
|
|||
|
||||
- [wushigudan/CVE-2023-33517](https://github.com/wushigudan/CVE-2023-33517)
|
||||
|
||||
### CVE-2023-33565 (2023-06-23)
|
||||
|
||||
<code>ROS2 (Robot Operating System 2) Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 are vulnerable to Denial-of-Service (DoS) attacks. A malicious user potentially exploited the vulnerability remotely and crashed the ROS2 nodes.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-33565](https://github.com/yashpatelphd/CVE-2023-33565)
|
||||
|
||||
### CVE-2023-33566 (2023-06-27)
|
||||
|
||||
<code>An unauthorized node injection vulnerability has been identified in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could allow a malicious user to inject malicious ROS2 nodes into the system remotely. Once injected, these nodes could disrupt the normal operations of the system or cause other potentially harmful behavior.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-33566](https://github.com/yashpatelphd/CVE-2023-33566)
|
||||
|
||||
### CVE-2023-33567 (2023-06-27)
|
||||
|
||||
<code>An unauthorized access vulnerability has been discovered in ROS2 Foxy Fitzroy versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-33567](https://github.com/yashpatelphd/CVE-2023-33567)
|
||||
|
||||
### CVE-2023-33592 (2023-06-28)
|
||||
|
||||
<code>Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information.
|
||||
|
@ -6800,6 +6822,7 @@
|
|||
- [pentestfunctions/BlueDucky](https://github.com/pentestfunctions/BlueDucky)
|
||||
- [Eason-zz/BluetoothDucky](https://github.com/Eason-zz/BluetoothDucky)
|
||||
- [jjjjjjjj987/cve-2023-45866-py](https://github.com/jjjjjjjj987/cve-2023-45866-py)
|
||||
- [R4HUL-INDIAN/Blue0DAY](https://github.com/R4HUL-INDIAN/Blue0DAY)
|
||||
|
||||
### CVE-2023-45966 (2023-10-23)
|
||||
|
||||
|
@ -7720,6 +7743,62 @@
|
|||
|
||||
- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127)
|
||||
|
||||
### CVE-2023-51197 (2024-01-30)
|
||||
|
||||
<code>An issue discovered in shell command execution in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows an attacker to run arbitrary commands and cause other impacts.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51197](https://github.com/yashpatelphd/CVE-2023-51197)
|
||||
|
||||
### CVE-2023-51198 (2024-01-30)
|
||||
|
||||
<code>An issue in the permission and access control components within ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to gain escalate privileges.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51198](https://github.com/yashpatelphd/CVE-2023-51198)
|
||||
|
||||
### CVE-2023-51199 (2024-01-23)
|
||||
|
||||
<code>Buffer Overflow vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code or cause a denial of service via improper handling of arrays or strings.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51199](https://github.com/yashpatelphd/CVE-2023-51199)
|
||||
|
||||
### CVE-2023-51200 (2024-01-23)
|
||||
|
||||
<code>An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51200](https://github.com/yashpatelphd/CVE-2023-51200)
|
||||
|
||||
### CVE-2023-51201 (2024-01-23)
|
||||
|
||||
<code>Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51201](https://github.com/yashpatelphd/CVE-2023-51201)
|
||||
|
||||
### CVE-2023-51202 (2024-01-30)
|
||||
|
||||
<code>OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51202](https://github.com/yashpatelphd/CVE-2023-51202)
|
||||
|
||||
### CVE-2023-51204 (2024-01-30)
|
||||
|
||||
<code>Insecure deserialization in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary code via a crafted input.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51204](https://github.com/yashpatelphd/CVE-2023-51204)
|
||||
|
||||
### CVE-2023-51208 (2024-01-23)
|
||||
|
||||
<code>An Arbitrary File Upload vulnerability in ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary code and cause other impacts via upload of crafted file.
|
||||
</code>
|
||||
|
||||
- [yashpatelphd/CVE-2023-51208](https://github.com/yashpatelphd/CVE-2023-51208)
|
||||
|
||||
### CVE-2023-51214
|
||||
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
|
||||
|
||||
|
@ -21525,6 +21604,7 @@
|
|||
- [Ajomix/CVE-2020-0796](https://github.com/Ajomix/CVE-2020-0796)
|
||||
- [Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC](https://github.com/Vladshambaryan/https-github.com-jamf-CVE-2020-0796-RCE-POC)
|
||||
- [hungdnvp/POC-CVE-2020-0796](https://github.com/hungdnvp/POC-CVE-2020-0796)
|
||||
- [AdamSonov/smbGhostCVE-2020-0796](https://github.com/AdamSonov/smbGhostCVE-2020-0796)
|
||||
|
||||
### CVE-2020-0799 (2020-03-12)
|
||||
|
||||
|
@ -22236,7 +22316,6 @@
|
|||
|
||||
- [dead5nd/config-demo](https://github.com/dead5nd/config-demo)
|
||||
- [osamahamad/CVE-2020-5410-POC](https://github.com/osamahamad/CVE-2020-5410-POC)
|
||||
- [thelostworldFree/SpringCloud-Config-CVE-2020-5410](https://github.com/thelostworldFree/SpringCloud-Config-CVE-2020-5410)
|
||||
|
||||
### CVE-2020-5421 (2020-09-18)
|
||||
|
||||
|
|
Loading…
Reference in a new issue