Auto Update 2023/03/04 18:27:42

This commit is contained in:
motikan2010-bot 2023-03-05 03:27:42 +09:00
parent 004d534494
commit 455fa0b4d0
34 changed files with 206 additions and 133 deletions

View file

@ -13,10 +13,10 @@
"description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
"fork": false,
"created_at": "2014-06-12T04:44:13Z",
"updated_at": "2022-11-11T12:19:14Z",
"updated_at": "2023-03-04T14:40:23Z",
"pushed_at": "2014-07-24T20:47:27Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 34,
"watchers": 35,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-04T08:24:30Z",
"updated_at": "2023-03-04T15:37:19Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1633,
"watchers_count": 1633,
"stargazers_count": 1635,
"watchers_count": 1635,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1633,
"watchers": 1635,
"score": 0
},
{

View file

@ -260,7 +260,7 @@
"stargazers_count": 272,
"watchers_count": 272,
"has_discussions": false,
"forks_count": 121,
"forks_count": 122,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -270,7 +270,7 @@
"dirtycow"
],
"visibility": "public",
"forks": 121,
"forks": 122,
"watchers": 272,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-06T17:55:44Z",
"updated_at": "2023-02-04T05:36:06Z",
"updated_at": "2023-03-04T12:57:21Z",
"pushed_at": "2017-01-06T23:34:03Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-04T08:24:30Z",
"updated_at": "2023-03-04T15:37:19Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1633,
"watchers_count": 1633,
"stargazers_count": 1635,
"watchers_count": 1635,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1633,
"watchers": 1635,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-9506 - SSRF",
"fork": false,
"created_at": "2018-04-25T11:25:18Z",
"updated_at": "2023-01-10T18:09:37Z",
"updated_at": "2023-03-04T14:40:45Z",
"pushed_at": "2022-02-14T22:00:28Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 50,
"watchers": 170,
"watchers": 171,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-04T08:24:30Z",
"updated_at": "2023-03-04T15:37:19Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1633,
"watchers_count": 1633,
"stargazers_count": 1635,
"watchers_count": 1635,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1633,
"watchers": 1635,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-03-03T23:04:41Z",
"updated_at": "2023-03-04T15:27:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3686,
"watchers_count": 3686,
"stargazers_count": 3687,
"watchers_count": 3687,
"has_discussions": false,
"forks_count": 1059,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1059,
"watchers": 3686,
"watchers": 3687,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-04T08:24:30Z",
"updated_at": "2023-03-04T15:37:19Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1633,
"watchers_count": 1633,
"stargazers_count": 1635,
"watchers_count": 1635,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1633,
"watchers": 1635,
"score": 0
}
]

View file

@ -43,7 +43,7 @@
"fork": false,
"created_at": "2020-03-28T22:09:39Z",
"updated_at": "2022-11-09T18:06:56Z",
"pushed_at": "2023-02-24T17:24:03Z",
"pushed_at": "2023-03-04T16:37:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-03-03T23:04:41Z",
"updated_at": "2023-03-04T15:27:20Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3686,
"watchers_count": 3686,
"stargazers_count": 3687,
"watchers_count": 3687,
"has_discussions": false,
"forks_count": 1059,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1059,
"watchers": 3686,
"watchers": 3687,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-03-04T08:24:30Z",
"updated_at": "2023-03-04T15:37:19Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1633,
"watchers_count": 1633,
"stargazers_count": 1635,
"watchers_count": 1635,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 321,
"watchers": 1633,
"watchers": 1635,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
"fork": false,
"created_at": "2020-03-07T18:58:09Z",
"updated_at": "2023-02-23T12:45:49Z",
"updated_at": "2023-03-04T13:40:15Z",
"pushed_at": "2022-12-15T00:36:55Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 173,
"watchers": 174,
"score": 0
},
{

View file

@ -250,10 +250,10 @@
"description": "CVE-2020-7247 Remote Code Execution POC",
"fork": false,
"created_at": "2023-03-03T07:21:06Z",
"updated_at": "2023-03-04T11:08:31Z",
"updated_at": "2023-03-04T12:35:47Z",
"pushed_at": "2023-03-04T11:03:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -266,7 +266,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -498,5 +498,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 609599518,
"name": "CVE-2021-3129-exp",
"full_name": "ajisai-babu\/CVE-2021-3129-exp",
"owner": {
"login": "ajisai-babu",
"id": 30685957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30685957?v=4",
"html_url": "https:\/\/github.com\/ajisai-babu"
},
"html_url": "https:\/\/github.com\/ajisai-babu\/CVE-2021-3129-exp",
"description": "Laravel Debug mode RCE漏洞CVE-2021-3129poc \/ exp",
"fork": false,
"created_at": "2023-03-04T17:04:38Z",
"updated_at": "2023-03-04T17:14:12Z",
"pushed_at": "2023-03-04T17:10:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system",
"fork": false,
"created_at": "2023-02-23T06:36:47Z",
"updated_at": "2023-03-03T18:08:18Z",
"updated_at": "2023-03-04T18:22:34Z",
"pushed_at": "2023-03-03T17:39:43Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -196,13 +196,13 @@
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 29,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 28,
"watchers": 72,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2023-03-03T21:12:14Z",
"updated_at": "2023-03-04T13:58:43Z",
"pushed_at": "2023-01-01T21:12:20Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0
},
{

View file

@ -10241,7 +10241,7 @@
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
"pushed_at": "2023-02-07T03:53:52Z",
"pushed_at": "2023-03-04T15:30:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,19 +13,19 @@
"description": "Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) feature",
"fork": false,
"created_at": "2023-03-03T17:54:34Z",
"updated_at": "2023-03-04T07:49:48Z",
"updated_at": "2023-03-04T18:22:31Z",
"pushed_at": "2023-03-03T18:11:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"forks": 4,
"watchers": 9,
"score": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2023-03-04T10:42:38Z",
"updated_at": "2023-03-04T17:48:59Z",
"pushed_at": "2023-03-02T19:43:36Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"windows-boot"
],
"visibility": "public",
"forks": 29,
"watchers": 139,
"forks": 30,
"watchers": 144,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2023-02-02T00:58:48Z",
"updated_at": "2023-03-04T14:50:29Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 287,
"watchers_count": 287,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 286,
"watchers": 287,
"score": 0
},
{

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-14T08:21:10Z",
"updated_at": "2023-01-16T14:36:24Z",
"updated_at": "2023-03-04T13:56:58Z",
"pushed_at": "2022-04-14T08:23:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

31
2022/CVE-2022-32548.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 609523432,
"name": "draytek-RCE",
"full_name": "uicres\/draytek-RCE",
"owner": {
"login": "uicres",
"id": 126958497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126958497?v=4",
"html_url": "https:\/\/github.com\/uicres"
},
"html_url": "https:\/\/github.com\/uicres\/draytek-RCE",
"description": "mass exploiter for draytek vigor (CVE-2022-32548)",
"fork": false,
"created_at": "2023-03-04T12:44:50Z",
"updated_at": "2023-03-04T12:44:50Z",
"pushed_at": "2023-03-04T12:53:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 231,
"watchers_count": 231,
"has_discussions": false,
"forks_count": 46,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 46,
"forks": 45,
"watchers": 231,
"score": 0
},

View file

@ -190,10 +190,10 @@
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
"fork": false,
"created_at": "2023-02-05T18:42:27Z",
"updated_at": "2023-03-01T22:25:26Z",
"updated_at": "2023-03-04T16:21:49Z",
"pushed_at": "2023-02-05T19:35:03Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -202,7 +202,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -349,10 +349,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-26T19:52:30Z",
"updated_at": "2023-03-04T03:13:34Z",
"updated_at": "2023-03-04T16:05:54Z",
"pushed_at": "2023-03-01T07:20:02Z",
"stargazers_count": 135,
"watchers_count": 135,
"stargazers_count": 137,
"watchers_count": 137,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -361,7 +361,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 135,
"watchers": 137,
"score": 0
},
{

View file

@ -57,35 +57,6 @@
"watchers": 0,
"score": 0
},
{
"id": 590961091,
"name": "CVE-2022-47966",
"full_name": "p33d\/CVE-2022-47966",
"owner": {
"login": "p33d",
"id": 123099747,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
"html_url": "https:\/\/github.com\/p33d"
},
"html_url": "https:\/\/github.com\/p33d\/CVE-2022-47966",
"description": "Multiple Zoho ManageEngine on-premise products",
"fork": false,
"created_at": "2023-01-19T16:06:56Z",
"updated_at": "2023-01-23T09:13:57Z",
"pushed_at": "2023-01-19T17:26:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 592261667,
"name": "CVE-2022-47966",

View file

@ -13,10 +13,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-03-03T16:33:34Z",
"updated_at": "2023-03-04T13:54:25Z",
"pushed_at": "2023-03-03T03:30:04Z",
"stargazers_count": 421,
"watchers_count": 421,
"stargazers_count": 422,
"watchers_count": 422,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 60,
"watchers": 421,
"watchers": 422,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated SQL Injection - Paid Memberships Pro < 2.9.8 (WordPress Plugin)",
"fork": false,
"created_at": "2023-01-24T18:26:10Z",
"updated_at": "2023-02-25T10:06:59Z",
"updated_at": "2023-03-04T14:46:33Z",
"pushed_at": "2023-01-24T18:33:26Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -47,13 +47,13 @@
"stargazers_count": 232,
"watchers_count": 232,
"has_discussions": false,
"forks_count": 38,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 37,
"watchers": 232,
"score": 0
},

31
2023/CVE-2023-24362.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 592126630,
"name": "CVE-2023-24362",
"full_name": "cavetownie\/CVE-2023-24362",
"owner": {
"login": "cavetownie",
"id": 43811607,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43811607?v=4",
"html_url": "https:\/\/github.com\/cavetownie"
},
"html_url": "https:\/\/github.com\/cavetownie\/CVE-2023-24362",
"description": null,
"fork": false,
"created_at": "2023-01-23T01:10:08Z",
"updated_at": "2023-03-04T13:18:48Z",
"pushed_at": "2023-02-18T14:57:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -71,10 +71,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-03-03T09:04:19Z",
"updated_at": "2023-03-04T13:17:47Z",
"pushed_at": "2023-03-01T08:21:32Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 64,
"watchers": 65,
"score": 0
}
]

View file

@ -207,6 +207,9 @@ Grand Theft Auto V for PC allows attackers to achieve partial remote code execut
- [gmh5225/CVE-2023-24059](https://github.com/gmh5225/CVE-2023-24059)
### CVE-2023-24362
- [cavetownie/CVE-2023-24362](https://github.com/cavetownie/CVE-2023-24362)
### CVE-2023-24610 (2023-02-01)
<code>
@ -4330,6 +4333,14 @@ Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypa
- [Lay0us1/CVE-2022-32532](https://github.com/Lay0us1/CVE-2022-32532)
### CVE-2022-32548 (2022-08-29)
<code>
An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.
</code>
- [uicres/draytek-RCE](https://github.com/uicres/draytek-RCE)
### CVE-2022-32832 (2022-09-23)
<code>
@ -6157,7 +6168,6 @@ Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through
- [horizon3ai/CVE-2022-47966](https://github.com/horizon3ai/CVE-2022-47966)
- [shameem-testing/PoC-for-ME-SAML-Vulnerability](https://github.com/shameem-testing/PoC-for-ME-SAML-Vulnerability)
- [p33d/CVE-2022-47966](https://github.com/p33d/CVE-2022-47966)
- [Inplex-sys/CVE-2022-47966](https://github.com/Inplex-sys/CVE-2022-47966)
- [ACE-Responder/CVE-2022-47966_checker](https://github.com/ACE-Responder/CVE-2022-47966_checker)
- [vonahisec/CVE-2022-47966-Scan](https://github.com/vonahisec/CVE-2022-47966-Scan)
@ -7028,6 +7038,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
- [hupe1980/CVE-2021-3129](https://github.com/hupe1980/CVE-2021-3129)
- [0nion1/CVE-2021-3129](https://github.com/0nion1/CVE-2021-3129)
- [MadExploits/Laravel-debug-Checker](https://github.com/MadExploits/Laravel-debug-Checker)
- [ajisai-babu/CVE-2021-3129-exp](https://github.com/ajisai-babu/CVE-2021-3129-exp)
### CVE-2021-3130 (2021-01-20)