mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/11/13 13:05:49
This commit is contained in:
parent
97853e058d
commit
4ac39f85a5
67 changed files with 1085 additions and 179 deletions
|
@ -28,35 +28,5 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 338099634,
|
||||
"name": "dns-zone-transfer-test",
|
||||
"full_name": "Rodney-O-C-Melby\/dns-zone-transfer-test",
|
||||
"owner": {
|
||||
"login": "Rodney-O-C-Melby",
|
||||
"id": 16503898,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16503898?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rodney-O-C-Melby\/dns-zone-transfer-test",
|
||||
"description": "Automates Domain Name System (DNS) zone transfer testing. Checks for CVE-1999-0532 by automatically finding a given domains nameservers, and tests for zone transfers, if successful, subdomains are printed to standard output.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T17:25:24Z",
|
||||
"updated_at": "2023-03-27T20:49:20Z",
|
||||
"pushed_at": "2022-05-02T13:11:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -452,7 +452,7 @@
|
|||
"stargazers_count": 774,
|
||||
"watchers_count": 774,
|
||||
"has_discussions": false,
|
||||
"forks_count": 435,
|
||||
"forks_count": 434,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 435,
|
||||
"forks": 434,
|
||||
"watchers": 774,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2023-11-10T15:24:06Z",
|
||||
"updated_at": "2023-11-13T06:19:37Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 97,
|
||||
"watchers": 98,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -363,10 +363,10 @@
|
|||
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T15:38:15Z",
|
||||
"updated_at": "2023-11-05T14:07:08Z",
|
||||
"updated_at": "2023-11-13T07:41:23Z",
|
||||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -375,7 +375,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 116,
|
||||
"watchers": 117,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2018-8440 standalone exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-31T17:00:43Z",
|
||||
"updated_at": "2023-10-19T06:40:46Z",
|
||||
"updated_at": "2023-11-13T06:19:45Z",
|
||||
"pushed_at": "2018-10-31T19:05:17Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 644570191,
|
||||
"name": "CVE-2019-19492",
|
||||
"full_name": "Chocapikk\/CVE-2019-19492",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2019-19492",
|
||||
"description": "FreeSWITCH Exploit (CVE-2019-19492)",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-23T19:53:54Z",
|
||||
"updated_at": "2023-11-13T09:05:52Z",
|
||||
"pushed_at": "2023-05-25T18:48:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 644577238,
|
||||
"name": "CVE-2019-19492",
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"has_discussions": false,
|
||||
"forks_count": 284,
|
||||
"forks_count": 285,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 284,
|
||||
"forks": 285,
|
||||
"watchers": 1095,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
|
@ -170,10 +170,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2023-11-10T07:02:32Z",
|
||||
"updated_at": "2023-11-13T08:52:43Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 560,
|
||||
"watchers_count": 560,
|
||||
"stargazers_count": 561,
|
||||
"watchers_count": 561,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -182,7 +182,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 560,
|
||||
"watchers": 561,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-11-13T03:19:59Z",
|
||||
"updated_at": "2023-11-13T08:56:00Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1153,
|
||||
"watchers_count": 1153,
|
||||
"stargazers_count": 1155,
|
||||
"watchers_count": 1155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 149,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 149,
|
||||
"watchers": 1153,
|
||||
"watchers": 1155,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T11:28:53Z",
|
||||
"updated_at": "2023-09-28T11:29:59Z",
|
||||
"updated_at": "2023-11-13T10:10:35Z",
|
||||
"pushed_at": "2021-07-30T11:35:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2021/CVE-2021-35064.json
Normal file
32
2021/CVE-2021-35064.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 498962746,
|
||||
"name": "CVE-2021-35064",
|
||||
"full_name": "Chocapikk\/CVE-2021-35064",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-35064",
|
||||
"description": "Python script to exploit CVE-2021-35064 and CVE-2021-36356",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-02T02:19:49Z",
|
||||
"updated_at": "2023-11-13T09:10:54Z",
|
||||
"pushed_at": "2022-06-02T17:29:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -322,10 +322,10 @@
|
|||
"description": "Polkit D-Bus Authentication Bypass Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T11:41:34Z",
|
||||
"updated_at": "2023-09-28T11:29:59Z",
|
||||
"updated_at": "2023-11-13T10:10:36Z",
|
||||
"pushed_at": "2021-07-30T11:43:32Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -334,7 +334,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2023-11-02T09:30:01Z",
|
||||
"updated_at": "2023-11-13T10:13:46Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Multiple Reflected XSS in TastyIgniter v3.0.7 Restaurtant CMS",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-12T21:12:04Z",
|
||||
"updated_at": "2023-10-10T13:10:08Z",
|
||||
"updated_at": "2023-11-13T10:18:58Z",
|
||||
"pushed_at": "2021-08-17T01:24:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Stored XSS in TastyIgniter v3.0.7 Restaurtant CMS",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-12T22:32:18Z",
|
||||
"updated_at": "2023-10-10T13:10:12Z",
|
||||
"updated_at": "2023-11-13T10:18:48Z",
|
||||
"pushed_at": "2021-08-15T23:33:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -2727,6 +2727,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 480821526,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "Chocapikk\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T13:25:58Z",
|
||||
"updated_at": "2023-11-13T09:12:47Z",
|
||||
"pushed_at": "2022-04-12T13:26:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 486245191,
|
||||
"name": "Apache_Penetration_Tool",
|
||||
|
|
|
@ -2489,10 +2489,10 @@
|
|||
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T11:26:42Z",
|
||||
"updated_at": "2023-09-24T13:17:31Z",
|
||||
"updated_at": "2023-11-13T10:10:32Z",
|
||||
"pushed_at": "2021-12-12T17:37:11Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -2509,7 +2509,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -29,6 +29,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 505571322,
|
||||
"name": "CVE-2021-46422",
|
||||
"full_name": "Chocapikk\/CVE-2021-46422",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2021-46422",
|
||||
"description": "Telesquare SDT-CW3B1 1.1.0 - OS Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-20T19:24:55Z",
|
||||
"updated_at": "2023-11-13T09:09:09Z",
|
||||
"pushed_at": "2022-10-16T15:20:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 513717270,
|
||||
"name": "CVE-2021-46422_PoC",
|
||||
|
|
|
@ -1185,10 +1185,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-11-12T07:00:08Z",
|
||||
"updated_at": "2023-11-13T11:07:52Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"has_discussions": false,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
|
@ -1197,7 +1197,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 132,
|
||||
"watchers": 468,
|
||||
"watchers": 470,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 36,
|
||||
"watchers": 187,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-11-11T19:40:42Z",
|
||||
"updated_at": "2023-11-13T07:27:42Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -542,6 +542,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 498873517,
|
||||
"name": "CVE-2022-22954",
|
||||
"full_name": "Chocapikk\/CVE-2022-22954",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954",
|
||||
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T19:33:32Z",
|
||||
"updated_at": "2023-11-13T09:12:28Z",
|
||||
"pushed_at": "2022-06-01T23:50:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 498898344,
|
||||
"name": "CVE-2022-22954",
|
||||
|
@ -766,10 +796,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-11-13T03:19:59Z",
|
||||
"updated_at": "2023-11-13T08:56:00Z",
|
||||
"pushed_at": "2023-10-10T05:38:02Z",
|
||||
"stargazers_count": 1153,
|
||||
"watchers_count": 1153,
|
||||
"stargazers_count": 1155,
|
||||
"watchers_count": 1155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 149,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +815,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 149,
|
||||
"watchers": 1153,
|
||||
"watchers": 1155,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "phpMyAdmin XSS ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T17:02:03Z",
|
||||
"updated_at": "2023-09-28T11:35:32Z",
|
||||
"updated_at": "2023-11-13T10:32:41Z",
|
||||
"pushed_at": "2022-02-03T16:21:01Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 110,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
32
2022/CVE-2022-24227.json
Normal file
32
2022/CVE-2022-24227.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 718130267,
|
||||
"name": "CVE-2022-24227-updated",
|
||||
"full_name": "Cyber-Wo0dy\/CVE-2022-24227-updated",
|
||||
"owner": {
|
||||
"login": "Cyber-Wo0dy",
|
||||
"id": 148460873,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cyber-Wo0dy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2022-24227-updated",
|
||||
"description": "CVE-2022-24227 [Updated]: BoltWire v8.00 vulnerable to \"Stored Cross-site Scripting (XSS)\"",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T12:53:56Z",
|
||||
"updated_at": "2023-11-13T12:56:26Z",
|
||||
"pushed_at": "2023-11-13T12:54:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -133,10 +133,10 @@
|
|||
"description": "A PoC for CVE-2022-2588 that triggers a WARNING",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-18T21:35:19Z",
|
||||
"updated_at": "2023-09-28T11:42:50Z",
|
||||
"updated_at": "2023-11-13T07:45:26Z",
|
||||
"pushed_at": "2022-09-28T22:33:17Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1021,6 +1021,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 503139905,
|
||||
"name": "CVE-2022-26134",
|
||||
"full_name": "Chocapikk\/CVE-2022-26134",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-26134",
|
||||
"description": "CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-13T23:01:39Z",
|
||||
"updated_at": "2023-11-13T09:08:06Z",
|
||||
"pushed_at": "2022-10-19T16:27:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 505123172,
|
||||
"name": "CVE-2022-26134",
|
||||
|
|
|
@ -160,6 +160,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 529394141,
|
||||
"name": "CVE-2022-27925-Revshell",
|
||||
"full_name": "Chocapikk\/CVE-2022-27925-Revshell",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-27925-Revshell",
|
||||
"description": "Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-26T20:19:48Z",
|
||||
"updated_at": "2023-11-13T09:10:29Z",
|
||||
"pushed_at": "2022-09-17T16:56:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 535575434,
|
||||
"name": "CVE-2022-27925",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 498521480,
|
||||
"name": "CVE-2022-29303",
|
||||
"full_name": "Chocapikk\/CVE-2022-29303",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-29303",
|
||||
"description": "Python script to exploit CVE-2022-29303 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T22:55:05Z",
|
||||
"updated_at": "2023-11-13T09:11:39Z",
|
||||
"pushed_at": "2022-05-31T23:10:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 498647437,
|
||||
"name": "CVE-2022-29303",
|
||||
|
|
|
@ -441,6 +441,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 496760787,
|
||||
"name": "CVE-2022-29464",
|
||||
"full_name": "Chocapikk\/CVE-2022-29464",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-29464",
|
||||
"description": "Python script to exploit CVE-2022-29464 (mass mode)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-26T20:19:53Z",
|
||||
"updated_at": "2023-11-13T09:12:01Z",
|
||||
"pushed_at": "2022-06-01T03:29:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 499883723,
|
||||
"name": "Better-CVE-2022-29464",
|
||||
|
|
|
@ -214,6 +214,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 493718813,
|
||||
"name": "CVE-2022-30525-Reverse-Shell",
|
||||
"full_name": "Chocapikk\/CVE-2022-30525-Reverse-Shell",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-30525-Reverse-Shell",
|
||||
"description": "Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-18T15:22:17Z",
|
||||
"updated_at": "2023-11-13T09:11:12Z",
|
||||
"pushed_at": "2022-05-19T11:29:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 494055901,
|
||||
"name": "CVE-2022-30525",
|
||||
|
|
|
@ -134,6 +134,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 618996369,
|
||||
"name": "CVE-2022-31814",
|
||||
"full_name": "Chocapikk\/CVE-2022-31814",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-31814",
|
||||
"description": "pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-26T00:18:04Z",
|
||||
"updated_at": "2023-11-13T09:06:37Z",
|
||||
"pushed_at": "2023-03-26T00:25:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 619242757,
|
||||
"name": "CVE-2022-31814",
|
||||
|
|
|
@ -194,6 +194,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 540400573,
|
||||
"name": "CVE-2022-36804-ReverseShell",
|
||||
"full_name": "Chocapikk\/CVE-2022-36804-ReverseShell",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-36804-ReverseShell",
|
||||
"description": "PoC exploit for CVE-2022-36804 (BitBucket Critical Command Injection)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-23T11:05:22Z",
|
||||
"updated_at": "2023-11-13T09:09:34Z",
|
||||
"pushed_at": "2022-09-24T15:19:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 540713828,
|
||||
"name": "CVE-2022-36804",
|
||||
|
|
|
@ -59,6 +59,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 606840385,
|
||||
"name": "CVE-2022-39952",
|
||||
"full_name": "Chocapikk\/CVE-2022-39952",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-39952",
|
||||
"description": "PoC for CVE-2022-39952 affecting Fortinet FortiNAC.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-26T18:10:04Z",
|
||||
"updated_at": "2023-11-13T09:07:00Z",
|
||||
"pushed_at": "2023-02-26T18:13:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 619925116,
|
||||
"name": "CVE-2022-39952-better",
|
||||
|
|
|
@ -249,6 +249,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 552028942,
|
||||
"name": "CVE-2022-40684",
|
||||
"full_name": "Chocapikk\/CVE-2022-40684",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-40684",
|
||||
"description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-15T16:51:25Z",
|
||||
"updated_at": "2023-11-13T09:08:42Z",
|
||||
"pushed_at": "2022-10-19T16:27:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 552033176,
|
||||
"name": "CVE-2022-40684",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-02T15:34:28Z",
|
||||
"updated_at": "2023-11-03T07:36:31Z",
|
||||
"updated_at": "2023-11-13T07:30:55Z",
|
||||
"pushed_at": "2023-02-02T16:53:37Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 262,
|
||||
"watchers": 263,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -89,6 +89,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 600549630,
|
||||
"name": "CVE-2022-44877",
|
||||
"full_name": "Chocapikk\/CVE-2022-44877",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-44877",
|
||||
"description": "Bash Script for Checking Command Injection Vulnerability on CentOS Web Panel [CWP] (CVE-2022-44877)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-11T20:45:08Z",
|
||||
"updated_at": "2023-11-13T09:07:19Z",
|
||||
"pushed_at": "2023-02-11T22:03:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 602139288,
|
||||
"name": "CVE-2022-44877-white-box",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 692207494,
|
||||
"name": "CVE-2023-1698",
|
||||
"full_name": "Chocapikk\/CVE-2023-1698",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-1698",
|
||||
"description": "WAGO Remote Exploit Tool for CVE-2023-1698",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-15T20:06:31Z",
|
||||
"updated_at": "2023-11-13T09:02:08Z",
|
||||
"pushed_at": "2023-09-15T20:07:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 707534264,
|
||||
"name": "CVE-2023-1698",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-21707 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-30T10:15:07Z",
|
||||
"updated_at": "2023-11-10T08:48:47Z",
|
||||
"updated_at": "2023-11-13T12:17:24Z",
|
||||
"pushed_at": "2023-07-06T07:43:24Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T13:54:42Z",
|
||||
"updated_at": "2023-10-27T14:57:30Z",
|
||||
"updated_at": "2023-11-13T07:24:11Z",
|
||||
"pushed_at": "2023-02-24T13:29:38Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -112,10 +112,10 @@
|
|||
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T08:42:17Z",
|
||||
"updated_at": "2023-11-11T14:58:24Z",
|
||||
"updated_at": "2023-11-13T12:37:27Z",
|
||||
"pushed_at": "2023-10-16T02:24:02Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 77,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -309,13 +309,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Exploit CVE-2023-22518",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T06:56:18Z",
|
||||
"updated_at": "2023-11-09T07:54:32Z",
|
||||
"updated_at": "2023-11-13T10:48:36Z",
|
||||
"pushed_at": "2023-11-09T07:42:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-14T01:18:09Z",
|
||||
"updated_at": "2023-06-16T01:30:41Z",
|
||||
"updated_at": "2023-11-13T09:01:36Z",
|
||||
"pushed_at": "2023-07-06T06:34:50Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -44,6 +44,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 658452469,
|
||||
"name": "CVE-2023-27372",
|
||||
"full_name": "Chocapikk\/CVE-2023-27372",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-27372",
|
||||
"description": "SPIP Vulnerability Scanner - CVE-2023-27372 Detector",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-25T19:30:08Z",
|
||||
"updated_at": "2023-11-13T09:01:41Z",
|
||||
"pushed_at": "2023-09-16T23:13:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 662629965,
|
||||
"name": "CVE-2023-27372-PoC",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-04T07:48:13Z",
|
||||
"updated_at": "2023-10-16T08:02:30Z",
|
||||
"updated_at": "2023-11-13T09:07:44Z",
|
||||
"pushed_at": "2023-09-04T07:51:58Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 147,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 718019226,
|
||||
"name": "CVE-2023-28252-",
|
||||
"full_name": "Danasuley\/CVE-2023-28252-",
|
||||
"owner": {
|
||||
"login": "Danasuley",
|
||||
"id": 148750257,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148750257?v=4",
|
||||
"html_url": "https:\/\/github.com\/Danasuley"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Danasuley\/CVE-2023-28252-",
|
||||
"description": "Обнаружение эксплойта CVE-2023-28252 ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T07:46:38Z",
|
||||
"updated_at": "2023-11-13T07:46:39Z",
|
||||
"pushed_at": "2023-11-13T07:55:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -392,6 +392,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 687511506,
|
||||
"name": "CVE-2023-28432",
|
||||
"full_name": "Chocapikk\/CVE-2023-28432",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-28432",
|
||||
"description": "Automated vulnerability scanner for CVE-2023-28432 in Minio deployments, revealing sensitive environment variables.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-05T14:01:53Z",
|
||||
"updated_at": "2023-11-13T09:02:41Z",
|
||||
"pushed_at": "2023-09-05T14:02:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 707634565,
|
||||
"name": "CVE-2023-28432",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T09:19:23Z",
|
||||
"updated_at": "2023-11-12T00:26:06Z",
|
||||
"updated_at": "2023-11-13T12:12:09Z",
|
||||
"pushed_at": "2023-11-09T09:21:12Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 645969054,
|
||||
"name": "CVE-2023-33617",
|
||||
"full_name": "Chocapikk\/CVE-2023-33617",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-33617",
|
||||
"description": "Authenticated OS command injection vulnerability (CVE-2023-33617)",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-26T22:16:00Z",
|
||||
"updated_at": "2023-11-13T09:05:24Z",
|
||||
"pushed_at": "2023-05-26T22:29:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 645969733,
|
||||
"name": "CVE-2023-33617",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 129,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
32
2023/CVE-2023-35082.json
Normal file
32
2023/CVE-2023-35082.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 674733856,
|
||||
"name": "CVE-2023-35082",
|
||||
"full_name": "Chocapikk\/CVE-2023-35082",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-35082",
|
||||
"description": "Remote Unauthenticated API Access Vulnerability in MobileIron Core 11.2 and older",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-04T16:25:24Z",
|
||||
"updated_at": "2023-11-13T09:04:26Z",
|
||||
"pushed_at": "2023-08-07T18:56:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -338,6 +338,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 682553540,
|
||||
"name": "CVE-2023-3519",
|
||||
"full_name": "Chocapikk\/CVE-2023-3519",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-3519",
|
||||
"description": "Citrix ADC RCE CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T12:24:24Z",
|
||||
"updated_at": "2023-11-13T09:03:16Z",
|
||||
"pushed_at": "2023-08-30T15:47:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 685454983,
|
||||
"name": "CVE-2023-3519-BackdoorCheck",
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 684030388,
|
||||
"name": "CVE-2023-35885",
|
||||
"full_name": "Chocapikk\/CVE-2023-35885",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-35885",
|
||||
"description": "CloudPanel 2 Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-28T09:58:41Z",
|
||||
"updated_at": "2023-11-13T09:04:03Z",
|
||||
"pushed_at": "2023-08-28T12:29:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T19:06:36Z",
|
||||
"updated_at": "2023-11-12T03:35:13Z",
|
||||
"updated_at": "2023-11-13T12:20:04Z",
|
||||
"pushed_at": "2023-10-29T11:12:26Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 113,
|
||||
"forks": 41,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 684738638,
|
||||
"name": "CVE-2023-36846",
|
||||
"full_name": "Chocapikk\/CVE-2023-36846",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-36846",
|
||||
"description": "Remote Code Execution on Junos OS CVE-2023-36846",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-29T18:50:49Z",
|
||||
"updated_at": "2023-11-13T09:03:38Z",
|
||||
"pushed_at": "2023-08-29T18:51:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 694700558,
|
||||
"name": "CVE-2023-36846",
|
||||
|
|
|
@ -95,6 +95,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 672405863,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "Chocapikk\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-38646",
|
||||
"description": "Remote Code Execution on Metabase CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-30T01:12:24Z",
|
||||
"updated_at": "2023-11-13T09:05:01Z",
|
||||
"pushed_at": "2023-07-30T01:12:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 672496252,
|
||||
"name": "CVE-2023-38646-Poc",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-11-10T12:32:25Z",
|
||||
"updated_at": "2023-11-13T09:29:29Z",
|
||||
"pushed_at": "2023-11-06T10:49:40Z",
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"has_discussions": false,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 128,
|
||||
"watchers": 703,
|
||||
"watchers": 704,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Prestashop fix vulnerability CVE-2023-39526 & CVE-2023-39527",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-10T16:51:56Z",
|
||||
"updated_at": "2023-10-20T08:34:18Z",
|
||||
"updated_at": "2023-11-13T10:41:25Z",
|
||||
"pushed_at": "2023-08-10T16:57:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "CVE-2023-42793",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-29T06:43:35Z",
|
||||
"updated_at": "2023-10-31T15:03:28Z",
|
||||
"updated_at": "2023-11-13T10:30:47Z",
|
||||
"pushed_at": "2023-09-29T06:52:00Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,8 +26,8 @@
|
|||
"cve-2023-42793"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-42820",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T06:32:51Z",
|
||||
"updated_at": "2023-11-09T12:11:14Z",
|
||||
"updated_at": "2023-11-13T06:38:38Z",
|
||||
"pushed_at": "2023-10-29T12:12:32Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -171,10 +171,10 @@
|
|||
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-16T11:07:50Z",
|
||||
"updated_at": "2023-10-27T15:01:43Z",
|
||||
"updated_at": "2023-11-13T11:04:08Z",
|
||||
"pushed_at": "2023-10-16T12:32:50Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -193,7 +193,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2023-11-12T10:09:10Z",
|
||||
"updated_at": "2023-11-13T08:15:51Z",
|
||||
"pushed_at": "2023-11-03T12:50:06Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -225,10 +225,10 @@
|
|||
"description": "This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-12T11:26:46Z",
|
||||
"updated_at": "2023-11-12T15:09:34Z",
|
||||
"updated_at": "2023-11-13T09:41:31Z",
|
||||
"pushed_at": "2023-11-12T13:50:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -237,7 +237,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2023-11-10T16:59:29Z",
|
||||
"updated_at": "2023-11-13T10:09:32Z",
|
||||
"pushed_at": "2023-11-10T02:12:38Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2023/CVE-2023-47129.json
Normal file
32
2023/CVE-2023-47129.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 718117758,
|
||||
"name": "CVE-2023-47129",
|
||||
"full_name": "Cyber-Wo0dy\/CVE-2023-47129",
|
||||
"owner": {
|
||||
"login": "Cyber-Wo0dy",
|
||||
"id": 148460873,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148460873?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cyber-Wo0dy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cyber-Wo0dy\/CVE-2023-47129",
|
||||
"description": "Statamic CMS versions <4.33.0 vulnerable to \"Remote Code Execution\" ",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T12:21:52Z",
|
||||
"updated_at": "2023-11-13T12:25:09Z",
|
||||
"pushed_at": "2023-11-13T12:24:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-47529.json
Normal file
32
2023/CVE-2023-47529.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 718085174,
|
||||
"name": "CVE-2023-47529",
|
||||
"full_name": "RandomRobbieBF\/CVE-2023-47529",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2023-47529",
|
||||
"description": "Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T10:50:25Z",
|
||||
"updated_at": "2023-11-13T10:50:26Z",
|
||||
"pushed_at": "2023-11-13T10:51:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -347,7 +347,7 @@
|
|||
"description": "Looney Tunables CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-08T09:34:04Z",
|
||||
"updated_at": "2023-11-09T07:19:14Z",
|
||||
"updated_at": "2023-11-13T08:09:54Z",
|
||||
"pushed_at": "2023-11-08T09:40:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -221,5 +221,37 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 718129350,
|
||||
"name": "CVE-2023-5360",
|
||||
"full_name": "1337r0j4n\/CVE-2023-5360",
|
||||
"owner": {
|
||||
"login": "1337r0j4n",
|
||||
"id": 84887432,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84887432?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337r0j4n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337r0j4n\/CVE-2023-5360",
|
||||
"description": "CVE-2023-5360 Exploit\/POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-13T12:51:34Z",
|
||||
"updated_at": "2023-11-13T12:59:12Z",
|
||||
"pushed_at": "2023-11-13T12:58:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2023-5360"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
56
README.md
56
README.md
|
@ -233,6 +233,7 @@
|
|||
<code>In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2023-1698](https://github.com/Chocapikk/CVE-2023-1698)
|
||||
- [deIndra/CVE-2023-1698](https://github.com/deIndra/CVE-2023-1698)
|
||||
- [thedarknessdied/WAGO-CVE-2023-1698](https://github.com/thedarknessdied/WAGO-CVE-2023-1698)
|
||||
|
||||
|
@ -573,6 +574,7 @@
|
|||
- [passwa11/CVE-2023-3519](https://github.com/passwa11/CVE-2023-3519)
|
||||
- [rwincey/cve-2023-3519](https://github.com/rwincey/cve-2023-3519)
|
||||
- [mandiant/citrix-ioc-scanner-cve-2023-3519](https://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519)
|
||||
- [Chocapikk/CVE-2023-3519](https://github.com/Chocapikk/CVE-2023-3519)
|
||||
- [JonaNeidhart/CVE-2023-3519-BackdoorCheck](https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck)
|
||||
- [Aicks/Citrix-CVE-2023-3519](https://github.com/Aicks/Citrix-CVE-2023-3519)
|
||||
- [Mohammaddvd/CVE-2023-3519](https://github.com/Mohammaddvd/CVE-2023-3519)
|
||||
|
@ -859,6 +861,7 @@
|
|||
- [tucommenceapousser/CVE-2023-5360](https://github.com/tucommenceapousser/CVE-2023-5360)
|
||||
- [Jenderal92/WP-CVE-2023-5360](https://github.com/Jenderal92/WP-CVE-2023-5360)
|
||||
- [Pushkarup/CVE-2023-5360](https://github.com/Pushkarup/CVE-2023-5360)
|
||||
- [1337r0j4n/CVE-2023-5360](https://github.com/1337r0j4n/CVE-2023-5360)
|
||||
|
||||
### CVE-2023-5412 (2023-10-31)
|
||||
|
||||
|
@ -1976,6 +1979,7 @@
|
|||
</code>
|
||||
|
||||
- [nuts7/CVE-2023-27372](https://github.com/nuts7/CVE-2023-27372)
|
||||
- [Chocapikk/CVE-2023-27372](https://github.com/Chocapikk/CVE-2023-27372)
|
||||
- [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC)
|
||||
- [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC)
|
||||
- [Pari-Malam/CVE-2023-27372](https://github.com/Pari-Malam/CVE-2023-27372)
|
||||
|
@ -2124,6 +2128,7 @@
|
|||
</code>
|
||||
|
||||
- [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252)
|
||||
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
|
||||
|
||||
### CVE-2023-28310 (2023-06-14)
|
||||
|
||||
|
@ -2173,6 +2178,7 @@
|
|||
- [CHINA-china/MinIO_CVE-2023-28432_EXP](https://github.com/CHINA-china/MinIO_CVE-2023-28432_EXP)
|
||||
- [TaroballzChen/CVE-2023-28432-metasploit-scanner](https://github.com/TaroballzChen/CVE-2023-28432-metasploit-scanner)
|
||||
- [bingtangbanli/CVE-2023-28432](https://github.com/bingtangbanli/CVE-2023-28432)
|
||||
- [Chocapikk/CVE-2023-28432](https://github.com/Chocapikk/CVE-2023-28432)
|
||||
- [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432)
|
||||
|
||||
### CVE-2023-28434 (2023-03-22)
|
||||
|
@ -3032,6 +3038,7 @@
|
|||
<code>An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2.1.14_X000 was found via the /boaform/admin/formPing target_addr parameter.
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2023-33617](https://github.com/Chocapikk/CVE-2023-33617)
|
||||
- [tucommenceapousser/CVE-2023-33617](https://github.com/tucommenceapousser/CVE-2023-33617)
|
||||
|
||||
### CVE-2023-33668 (2023-07-12)
|
||||
|
@ -3372,6 +3379,13 @@
|
|||
- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
|
||||
- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
|
||||
|
||||
### CVE-2023-35082 (2023-08-15)
|
||||
|
||||
<code>An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier.
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2023-35082](https://github.com/Chocapikk/CVE-2023-35082)
|
||||
|
||||
### CVE-2023-35086 (2023-07-21)
|
||||
|
||||
<code>\nIt is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\nThis issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.\n\n
|
||||
|
@ -3466,6 +3480,7 @@
|
|||
</code>
|
||||
|
||||
- [datackmy/FallingSkies-CVE-2023-35885](https://github.com/datackmy/FallingSkies-CVE-2023-35885)
|
||||
- [Chocapikk/CVE-2023-35885](https://github.com/Chocapikk/CVE-2023-35885)
|
||||
|
||||
### CVE-2023-36076 (2023-09-01)
|
||||
|
||||
|
@ -3634,6 +3649,7 @@
|
|||
<code>A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2023-36846](https://github.com/Chocapikk/CVE-2023-36846)
|
||||
- [Dreamy-elfland/CVE-2023-36846](https://github.com/Dreamy-elfland/CVE-2023-36846)
|
||||
|
||||
### CVE-2023-36874 (2023-07-11)
|
||||
|
@ -3926,6 +3942,7 @@
|
|||
- [adriyansyah-mf/CVE-2023-38646--Metabase-](https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-)
|
||||
- [Pumpkin-Garden/POC_Metabase_CVE-2023-38646](https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646)
|
||||
- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
|
||||
- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
|
||||
- [Xuxfff/CVE-2023-38646-Poc](https://github.com/Xuxfff/CVE-2023-38646-Poc)
|
||||
- [securezeron/CVE-2023-38646](https://github.com/securezeron/CVE-2023-38646)
|
||||
- [LazyySec/CVE-2023-38646](https://github.com/LazyySec/CVE-2023-38646)
|
||||
|
@ -5087,6 +5104,13 @@
|
|||
|
||||
- [BaadMaro/CVE-2023-47119](https://github.com/BaadMaro/CVE-2023-47119)
|
||||
|
||||
### CVE-2023-47129 (2023-11-10)
|
||||
|
||||
<code>Statmic is a core Laravel content management system Composer package. Prior to versions 3.4.13 and 4.33.0, on front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel. This issue has been patched in 3.4.13 and 4.33.0.\n
|
||||
</code>
|
||||
|
||||
- [Cyber-Wo0dy/CVE-2023-47129](https://github.com/Cyber-Wo0dy/CVE-2023-47129)
|
||||
|
||||
### CVE-2023-47179
|
||||
- [RandomRobbieBF/CVE-2023-47179](https://github.com/RandomRobbieBF/CVE-2023-47179)
|
||||
|
||||
|
@ -5103,6 +5127,9 @@
|
|||
### CVE-2023-47460
|
||||
- [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460)
|
||||
|
||||
### CVE-2023-47529
|
||||
- [RandomRobbieBF/CVE-2023-47529](https://github.com/RandomRobbieBF/CVE-2023-47529)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
||||
|
@ -6800,6 +6827,7 @@
|
|||
- [MLX15/CVE-2022-22954](https://github.com/MLX15/CVE-2022-22954)
|
||||
- [mhurts/CVE-2022-22954-POC](https://github.com/mhurts/CVE-2022-22954-POC)
|
||||
- [nguyenv1nK/CVE-2022-22954](https://github.com/nguyenv1nK/CVE-2022-22954)
|
||||
- [Chocapikk/CVE-2022-22954](https://github.com/Chocapikk/CVE-2022-22954)
|
||||
- [secfb/CVE-2022-22954](https://github.com/secfb/CVE-2022-22954)
|
||||
- [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954)
|
||||
- [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954)
|
||||
|
@ -7276,6 +7304,13 @@
|
|||
|
||||
- [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181)
|
||||
|
||||
### CVE-2022-24227 (2022-02-15)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in BoltWire v7.10 and v 8.00 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters.
|
||||
</code>
|
||||
|
||||
- [Cyber-Wo0dy/CVE-2022-24227-updated](https://github.com/Cyber-Wo0dy/CVE-2022-24227-updated)
|
||||
|
||||
### CVE-2022-24342 (2022-02-25)
|
||||
|
||||
<code>In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
|
||||
|
@ -7788,6 +7823,7 @@
|
|||
- [cai-niao98/CVE-2022-26134](https://github.com/cai-niao98/CVE-2022-26134)
|
||||
- [sunny-kathuria/exploit_CVE-2022-26134](https://github.com/sunny-kathuria/exploit_CVE-2022-26134)
|
||||
- [KeepWannabe/BotCon](https://github.com/KeepWannabe/BotCon)
|
||||
- [Chocapikk/CVE-2022-26134](https://github.com/Chocapikk/CVE-2022-26134)
|
||||
- [AmoloHT/CVE-2022-26134](https://github.com/AmoloHT/CVE-2022-26134)
|
||||
- [kh4sh3i/CVE-2022-26134](https://github.com/kh4sh3i/CVE-2022-26134)
|
||||
- [ColdFusionX/CVE-2022-26134](https://github.com/ColdFusionX/CVE-2022-26134)
|
||||
|
@ -8091,6 +8127,7 @@
|
|||
- [miko550/CVE-2022-27925](https://github.com/miko550/CVE-2022-27925)
|
||||
- [navokus/CVE-2022-27925](https://github.com/navokus/CVE-2022-27925)
|
||||
- [Josexv1/CVE-2022-27925](https://github.com/Josexv1/CVE-2022-27925)
|
||||
- [Chocapikk/CVE-2022-27925-Revshell](https://github.com/Chocapikk/CVE-2022-27925-Revshell)
|
||||
- [akincibor/CVE-2022-27925](https://github.com/akincibor/CVE-2022-27925)
|
||||
- [lolminerxmrig/CVE-2022-27925-Revshell](https://github.com/lolminerxmrig/CVE-2022-27925-Revshell)
|
||||
- [touchmycrazyredhat/CVE-2022-27925-Revshell](https://github.com/touchmycrazyredhat/CVE-2022-27925-Revshell)
|
||||
|
@ -8375,6 +8412,7 @@
|
|||
<code>SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2022-29303](https://github.com/Chocapikk/CVE-2022-29303)
|
||||
- [1f3lse/CVE-2022-29303](https://github.com/1f3lse/CVE-2022-29303)
|
||||
|
||||
### CVE-2022-29337 (2022-05-24)
|
||||
|
@ -8437,6 +8475,7 @@
|
|||
- [axin2019/CVE-2022-29464](https://github.com/axin2019/CVE-2022-29464)
|
||||
- [LinJacck/CVE-2022-29464](https://github.com/LinJacck/CVE-2022-29464)
|
||||
- [Inplex-sys/CVE-2022-29464-loader](https://github.com/Inplex-sys/CVE-2022-29464-loader)
|
||||
- [Chocapikk/CVE-2022-29464](https://github.com/Chocapikk/CVE-2022-29464)
|
||||
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
|
||||
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
|
||||
- [xinghonghaoyue/CVE-2022-29464](https://github.com/xinghonghaoyue/CVE-2022-29464)
|
||||
|
@ -8786,6 +8825,7 @@
|
|||
- [M4fiaB0y/CVE-2022-30525](https://github.com/M4fiaB0y/CVE-2022-30525)
|
||||
- [k0sf/CVE-2022-30525](https://github.com/k0sf/CVE-2022-30525)
|
||||
- [superzerosec/CVE-2022-30525](https://github.com/superzerosec/CVE-2022-30525)
|
||||
- [Chocapikk/CVE-2022-30525-Reverse-Shell](https://github.com/Chocapikk/CVE-2022-30525-Reverse-Shell)
|
||||
- [160Team/CVE-2022-30525](https://github.com/160Team/CVE-2022-30525)
|
||||
- [zhefox/CVE-2022-30525-Reverse-Shell](https://github.com/zhefox/CVE-2022-30525-Reverse-Shell)
|
||||
- [iveresk/cve-2022-30525](https://github.com/iveresk/cve-2022-30525)
|
||||
|
@ -9075,6 +9115,7 @@
|
|||
- [Madliife0/CVE-2022-31814](https://github.com/Madliife0/CVE-2022-31814)
|
||||
- [TheUnknownSoul/CVE-2022-31814](https://github.com/TheUnknownSoul/CVE-2022-31814)
|
||||
- [drcayber/RCE](https://github.com/drcayber/RCE)
|
||||
- [Chocapikk/CVE-2022-31814](https://github.com/Chocapikk/CVE-2022-31814)
|
||||
- [dkstar11q/CVE-2022-31814](https://github.com/dkstar11q/CVE-2022-31814)
|
||||
|
||||
### CVE-2022-31854 (2022-07-07)
|
||||
|
@ -9664,6 +9705,7 @@
|
|||
- [fed-speak/CVE-2022-36804-PoC-Exploit](https://github.com/fed-speak/CVE-2022-36804-PoC-Exploit)
|
||||
- [Vulnmachines/bitbucket-cve-2022-36804](https://github.com/Vulnmachines/bitbucket-cve-2022-36804)
|
||||
- [kljunowsky/CVE-2022-36804-POC](https://github.com/kljunowsky/CVE-2022-36804-POC)
|
||||
- [Chocapikk/CVE-2022-36804-ReverseShell](https://github.com/Chocapikk/CVE-2022-36804-ReverseShell)
|
||||
- [khal4n1/CVE-2022-36804](https://github.com/khal4n1/CVE-2022-36804)
|
||||
- [vj4336/CVE-2022-36804-ReverseShell](https://github.com/vj4336/CVE-2022-36804-ReverseShell)
|
||||
- [tahtaciburak/cve-2022-36804](https://github.com/tahtaciburak/cve-2022-36804)
|
||||
|
@ -9997,6 +10039,7 @@
|
|||
|
||||
- [horizon3ai/CVE-2022-39952](https://github.com/horizon3ai/CVE-2022-39952)
|
||||
- [shiyeshu/CVE-2022-39952_webshell](https://github.com/shiyeshu/CVE-2022-39952_webshell)
|
||||
- [Chocapikk/CVE-2022-39952](https://github.com/Chocapikk/CVE-2022-39952)
|
||||
- [dkstar11q/CVE-2022-39952-better](https://github.com/dkstar11q/CVE-2022-39952-better)
|
||||
|
||||
### CVE-2022-39959 (2022-10-07)
|
||||
|
@ -10131,6 +10174,7 @@
|
|||
- [iveresk/CVE-2022-40684](https://github.com/iveresk/CVE-2022-40684)
|
||||
- [mhd108/CVE-2022-40684](https://github.com/mhd108/CVE-2022-40684)
|
||||
- [ClickCyber/cve-2022-40684](https://github.com/ClickCyber/cve-2022-40684)
|
||||
- [Chocapikk/CVE-2022-40684](https://github.com/Chocapikk/CVE-2022-40684)
|
||||
- [mohamedbenchikh/CVE-2022-40684](https://github.com/mohamedbenchikh/CVE-2022-40684)
|
||||
- [HAWA771/CVE-2022-40684](https://github.com/HAWA771/CVE-2022-40684)
|
||||
- [NeriaBasha/CVE-2022-40684](https://github.com/NeriaBasha/CVE-2022-40684)
|
||||
|
@ -10805,6 +10849,7 @@
|
|||
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
|
||||
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
|
||||
- [ColdFusionX/CVE-2022-44877-CWP7](https://github.com/ColdFusionX/CVE-2022-44877-CWP7)
|
||||
- [Chocapikk/CVE-2022-44877](https://github.com/Chocapikk/CVE-2022-44877)
|
||||
- [hotpotcookie/CVE-2022-44877-white-box](https://github.com/hotpotcookie/CVE-2022-44877-white-box)
|
||||
- [RicYaben/CVE-2022-44877-LAB](https://github.com/RicYaben/CVE-2022-44877-LAB)
|
||||
- [dkstar11q/CVE-2022-44877](https://github.com/dkstar11q/CVE-2022-44877)
|
||||
|
@ -14990,6 +15035,13 @@
|
|||
- [zer0qs/CVE-2021-35042](https://github.com/zer0qs/CVE-2021-35042)
|
||||
- [LUUANHDUC/CVE-2021-35042](https://github.com/LUUANHDUC/CVE-2021-35042)
|
||||
|
||||
### CVE-2021-35064 (2021-07-12)
|
||||
|
||||
<code>KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg.
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2021-35064](https://github.com/Chocapikk/CVE-2021-35064)
|
||||
|
||||
### CVE-2021-35211 (2021-07-14)
|
||||
|
||||
<code>Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
|
||||
|
@ -16191,6 +16243,7 @@
|
|||
- [bernardas/netsec-polygon](https://github.com/bernardas/netsec-polygon)
|
||||
- [CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit](https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit)
|
||||
- [vuongnv3389-sec/cve-2021-41773](https://github.com/vuongnv3389-sec/cve-2021-41773)
|
||||
- [Chocapikk/CVE-2021-41773](https://github.com/Chocapikk/CVE-2021-41773)
|
||||
- [wangfly-me/Apache_Penetration_Tool](https://github.com/wangfly-me/Apache_Penetration_Tool)
|
||||
- [anldori/CVE-2021-41773-Scanner](https://github.com/anldori/CVE-2021-41773-Scanner)
|
||||
- [iosifache/ApacheRCEEssay](https://github.com/iosifache/ApacheRCEEssay)
|
||||
|
@ -17736,6 +17789,7 @@
|
|||
</code>
|
||||
|
||||
- [nobodyatall648/CVE-2021-46422](https://github.com/nobodyatall648/CVE-2021-46422)
|
||||
- [Chocapikk/CVE-2021-46422](https://github.com/Chocapikk/CVE-2021-46422)
|
||||
- [twoning/CVE-2021-46422_PoC](https://github.com/twoning/CVE-2021-46422_PoC)
|
||||
- [Awei507/CVE-RCE](https://github.com/Awei507/CVE-RCE)
|
||||
- [yigexioabai/CVE-2021-46422_RCE](https://github.com/yigexioabai/CVE-2021-46422_RCE)
|
||||
|
@ -26310,6 +26364,7 @@
|
|||
<code>FreeSWITCH 1.6.10 through 1.10.1 has a default password in event_socket.conf.xml.
|
||||
</code>
|
||||
|
||||
- [Chocapikk/CVE-2019-19492](https://github.com/Chocapikk/CVE-2019-19492)
|
||||
- [tucommenceapousser/CVE-2019-19492](https://github.com/tucommenceapousser/CVE-2019-19492)
|
||||
- [tucommenceapousser/CVE-2019-19492-2](https://github.com/tucommenceapousser/CVE-2019-19492-2)
|
||||
|
||||
|
@ -37102,7 +37157,6 @@
|
|||
</code>
|
||||
|
||||
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)
|
||||
- [Rodney-O-C-Melby/dns-zone-transfer-test](https://github.com/Rodney-O-C-Melby/dns-zone-transfer-test)
|
||||
|
||||
### CVE-1999-1053 (2001-09-12)
|
||||
|
||||
|
|
Loading…
Reference in a new issue