Auto Update 2023/11/17 00:31:38

This commit is contained in:
motikan2010-bot 2023-11-17 09:31:38 +09:00
parent 9a94df81af
commit 4f50c77afb
43 changed files with 270 additions and 103 deletions

32
2001/CVE-2001-3389.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 343972874,
"name": "Gaston",
"full_name": "becrevex\/Gaston",
"owner": {
"login": "becrevex",
"id": 8326868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4",
"html_url": "https:\/\/github.com\/becrevex"
},
"html_url": "https:\/\/github.com\/becrevex\/Gaston",
"description": "BEAST (CVE-2001-3389) Checker",
"fork": false,
"created_at": "2021-03-03T02:10:01Z",
"updated_at": "2022-10-14T16:45:23Z",
"pushed_at": "2021-03-03T02:14:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1819,6 +1819,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 319075797,
"name": "CVE-2017-5638",
"full_name": "jongmartinez\/CVE-2017-5638",
"owner": {
"login": "jongmartinez",
"id": 11743460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11743460?v=4",
"html_url": "https:\/\/github.com\/jongmartinez"
},
"html_url": "https:\/\/github.com\/jongmartinez\/CVE-2017-5638",
"description": "PoC for CVE: 2017-5638 - Apache Struts2 S2-045",
"fork": false,
"created_at": "2020-12-06T16:16:43Z",
"updated_at": "2022-06-16T02:49:49Z",
"pushed_at": "2020-12-06T16:39:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 379816029,
"name": "CVE-2017-5638",

View file

@ -78,13 +78,13 @@
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 34,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 33,
"watchers": 104,
"score": 0,
"subscribers_count": 6

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2023-11-01T10:22:56Z",
"updated_at": "2023-11-16T23:00:55Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 498,
"watchers_count": 498,
"stargazers_count": 499,
"watchers_count": 499,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 61,
"watchers": 498,
"watchers": 499,
"score": 0,
"subscribers_count": 57
},

View file

@ -963,8 +963,8 @@
"description": "Exploit for Webmin servers versions 1.890 through 1.920.",
"fork": false,
"created_at": "2023-11-09T12:19:09Z",
"updated_at": "2023-11-16T17:07:39Z",
"pushed_at": "2023-11-16T09:58:17Z",
"updated_at": "2023-11-16T22:16:18Z",
"pushed_at": "2023-11-16T22:24:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -455,7 +455,7 @@
"fork": false,
"created_at": "2023-11-05T14:32:11Z",
"updated_at": "2023-11-05T14:33:27Z",
"pushed_at": "2023-11-05T18:44:25Z",
"pushed_at": "2023-11-16T20:06:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -27,7 +27,7 @@
"forks": 18,
"watchers": 46,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 311421880,

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2023-11-12T04:16:35Z",
"updated_at": "2023-11-16T18:36:39Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 392,
"watchers_count": 392,
"stargazers_count": 393,
"watchers_count": 393,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 43,
"watchers": 392,
"watchers": 393,
"score": 0,
"subscribers_count": 7
}

View file

@ -87,7 +87,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 719429459,
@ -117,6 +117,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "osCommerce Phoenix CE <=1.0.5.4 Authenticated RCE",
"fork": false,
"created_at": "2020-10-30T13:59:23Z",
"updated_at": "2022-11-09T18:09:56Z",
"updated_at": "2023-11-17T00:14:05Z",
"pushed_at": "2020-10-30T14:18:06Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -1084,7 +1084,7 @@
"forks": 16,
"watchers": 46,
"score": 0,
"subscribers_count": 14
"subscribers_count": 15
},
{
"id": 352785704,

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1079,13 +1079,13 @@
"stargazers_count": 677,
"watchers_count": 677,
"has_discussions": false,
"forks_count": 168,
"forks_count": 169,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 168,
"forks": 169,
"watchers": 677,
"score": 0,
"subscribers_count": 11

View file

@ -117,6 +117,6 @@
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false,
"created_at": "2021-01-21T10:39:42Z",
"updated_at": "2023-11-16T15:22:21Z",
"updated_at": "2023-11-16T19:58:42Z",
"pushed_at": "2022-03-28T05:19:18Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 76,
"watchers": 75,
"score": 0,
"subscribers_count": 3
}

View file

@ -87,7 +87,7 @@
"forks": 14,
"watchers": 30,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 403092854,

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 47,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
"fork": false,
"created_at": "2022-05-27T21:09:03Z",
"updated_at": "2023-09-11T04:35:04Z",
"updated_at": "2023-11-17T00:14:19Z",
"pushed_at": "2022-10-19T21:24:35Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -712,7 +712,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 452234457,

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-11-03T08:32:26Z",
"updated_at": "2023-11-16T23:13:22Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1495,
"watchers_count": 1495,
"stargazers_count": 1496,
"watchers_count": 1496,
"has_discussions": false,
"forks_count": 493,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 493,
"watchers": 1495,
"watchers": 1496,
"score": 0,
"subscribers_count": 28
},

View file

@ -3359,10 +3359,10 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2023-09-28T11:34:03Z",
"updated_at": "2023-11-17T00:14:27Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -3371,7 +3371,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 347,
"watchers": 348,
"score": 0,
"subscribers_count": 6
},
@ -3703,10 +3703,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-11-09T10:48:17Z",
"updated_at": "2023-11-17T00:14:27Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3315,
"watchers_count": 3315,
"stargazers_count": 3316,
"watchers_count": 3316,
"has_discussions": true,
"forks_count": 750,
"allow_forking": true,
@ -3715,7 +3715,7 @@
"topics": [],
"visibility": "public",
"forks": 750,
"watchers": 3315,
"watchers": 3316,
"score": 0,
"subscribers_count": 58
},
@ -6278,10 +6278,10 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2023-11-10T02:04:23Z",
"updated_at": "2023-11-17T00:14:26Z",
"pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 347,
"watchers_count": 347,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@ -6290,7 +6290,7 @@
"topics": [],
"visibility": "public",
"forks": 91,
"watchers": 346,
"watchers": 347,
"score": 0,
"subscribers_count": 35
},
@ -12391,7 +12391,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 718233980,

View file

@ -133,10 +133,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2023-11-16T11:54:27Z",
"updated_at": "2023-11-17T00:14:06Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1058,
"watchers_count": 1058,
"stargazers_count": 1059,
"watchers_count": 1059,
"has_discussions": false,
"forks_count": 223,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 223,
"watchers": 1058,
"watchers": 1059,
"score": 0,
"subscribers_count": 17
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-10-29T17:31:23Z",
"updated_at": "2023-10-29T17:31:49Z",
"pushed_at": "2023-10-31T20:08:59Z",
"pushed_at": "2023-11-16T20:17:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)",
"fork": false,
"created_at": "2022-05-27T21:09:03Z",
"updated_at": "2023-09-11T04:35:04Z",
"updated_at": "2023-11-17T00:14:19Z",
"pushed_at": "2022-10-19T21:24:35Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -671,7 +671,7 @@
"fork": false,
"created_at": "2023-11-14T21:54:17Z",
"updated_at": "2023-11-14T22:02:19Z",
"pushed_at": "2023-11-14T22:08:29Z",
"pushed_at": "2023-11-16T23:00:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -60,10 +60,10 @@
"description": "Checker for CVE-2023-22518 vulnerability on Confluence",
"fork": false,
"created_at": "2023-11-02T22:52:15Z",
"updated_at": "2023-11-14T22:45:17Z",
"updated_at": "2023-11-16T22:32:08Z",
"pushed_at": "2023-11-03T00:36:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -72,7 +72,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 12,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-22T20:37:15Z",
"updated_at": "2023-08-30T00:21:44Z",
"updated_at": "2023-11-17T00:14:18Z",
"pushed_at": "2023-07-22T21:06:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -388,5 +388,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 719748102,
"name": "CVE-2023-29489",
"full_name": "SynixCyberCrimeMy\/CVE-2023-29489",
"owner": {
"login": "SynixCyberCrimeMy",
"id": 151055664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151055664?v=4",
"html_url": "https:\/\/github.com\/SynixCyberCrimeMy"
},
"html_url": "https:\/\/github.com\/SynixCyberCrimeMy\/CVE-2023-29489",
"description": "SynixCyberCrimeMY CVE-2023-29489 Scanner By SamuraiMelayu1337 & h4zzzzzz@scc",
"fork": false,
"created_at": "2023-11-16T20:24:11Z",
"updated_at": "2023-11-16T20:25:12Z",
"pushed_at": "2023-11-16T20:30:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-11-09T23:16:49Z",
"updated_at": "2023-11-17T00:19:15Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 431,
"watchers_count": 431,
"stargazers_count": 432,
"watchers_count": 432,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 431,
"watchers": 432,
"score": 0,
"subscribers_count": 14
}

View file

@ -13,19 +13,19 @@
"description": "Report and exploit of CVE-2023-36427",
"fork": false,
"created_at": "2023-10-09T16:55:18Z",
"updated_at": "2023-11-16T16:05:57Z",
"updated_at": "2023-11-16T23:26:38Z",
"pushed_at": "2023-11-16T04:24:37Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 43,
"forks": 9,
"watchers": 44,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "A tool to discover Juniper firewalls vulnerable to CVE-2023-36845",
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2023-10-22T04:48:13Z",
"updated_at": "2023-11-17T00:26:49Z",
"pushed_at": "2023-09-17T09:14:32Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
"fork": false,
"created_at": "2023-09-13T04:00:14Z",
"updated_at": "2023-11-06T14:04:01Z",
"updated_at": "2023-11-16T22:57:08Z",
"pushed_at": "2023-09-13T04:50:29Z",
"stargazers_count": 162,
"watchers_count": 162,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 162,
"watchers": 161,
"score": 0,
"subscribers_count": 4
},

View file

@ -239,13 +239,13 @@
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 39,
"score": 0,
"subscribers_count": 5

View file

@ -146,13 +146,13 @@
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 24,
"score": 0,
"subscribers_count": 2

View file

@ -256,7 +256,7 @@
"fork": false,
"created_at": "2023-11-15T19:11:01Z",
"updated_at": "2023-11-15T19:11:02Z",
"pushed_at": "2023-11-15T19:13:47Z",
"pushed_at": "2023-11-16T21:21:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

32
2023/CVE-2023-48028.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 719728314,
"name": "CVE-2023-48028",
"full_name": "nitipoom-jar\/CVE-2023-48028",
"owner": {
"login": "nitipoom-jar",
"id": 149907798,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
"html_url": "https:\/\/github.com\/nitipoom-jar"
},
"html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48028",
"description": null,
"fork": false,
"created_at": "2023-11-16T19:22:30Z",
"updated_at": "2023-11-16T19:29:53Z",
"pushed_at": "2023-11-16T19:32:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-48029.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 719714263,
"name": "CVE-2023-48029",
"full_name": "nitipoom-jar\/CVE-2023-48029",
"owner": {
"login": "nitipoom-jar",
"id": 149907798,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
"html_url": "https:\/\/github.com\/nitipoom-jar"
},
"html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-48029",
"description": null,
"fork": false,
"created_at": "2023-11-16T18:42:12Z",
"updated_at": "2023-11-16T19:01:29Z",
"pushed_at": "2023-11-16T19:30:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -213,10 +213,10 @@
"description": "Parse citrix netscaler logs to check for signs of CVE-2023-4966 exploitation",
"fork": false,
"created_at": "2023-10-28T11:44:42Z",
"updated_at": "2023-11-10T07:49:34Z",
"updated_at": "2023-11-17T00:13:17Z",
"pushed_at": "2023-11-03T17:09:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -225,7 +225,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,7 +13,7 @@
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
"fork": false,
"created_at": "2023-11-15T14:53:03Z",
"updated_at": "2023-11-16T17:14:22Z",
"updated_at": "2023-11-16T23:01:00Z",
"pushed_at": "2023-11-15T14:53:48Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -2343,6 +2343,7 @@
- [tucommenceapousser/CVE-2023-29489.py](https://github.com/tucommenceapousser/CVE-2023-29489.py)
- [ViperM4sk/cpanel-xss-177](https://github.com/ViperM4sk/cpanel-xss-177)
- [S4muraiMelayu1337/CVE-2023-29489](https://github.com/S4muraiMelayu1337/CVE-2023-29489)
- [SynixCyberCrimeMy/CVE-2023-29489](https://github.com/SynixCyberCrimeMy/CVE-2023-29489)
### CVE-2023-29552 (2023-04-25)
@ -5245,6 +5246,12 @@
### CVE-2023-47668
- [RandomRobbieBF/CVE-2023-47668](https://github.com/RandomRobbieBF/CVE-2023-47668)
### CVE-2023-48028
- [nitipoom-jar/CVE-2023-48028](https://github.com/nitipoom-jar/CVE-2023-48028)
### CVE-2023-48029
- [nitipoom-jar/CVE-2023-48029](https://github.com/nitipoom-jar/CVE-2023-48029)
### CVE-2023-48031
- [nitipoom-jar/CVE-2023-48031](https://github.com/nitipoom-jar/CVE-2023-48031)
@ -30916,6 +30923,7 @@
- [injcristianrojas/cve-2017-5638](https://github.com/injcristianrojas/cve-2017-5638)
- [ludy-dev/XworkStruts-RCE](https://github.com/ludy-dev/XworkStruts-RCE)
- [sonatype-workshops/struts2-rce](https://github.com/sonatype-workshops/struts2-rce)
- [jongmartinez/CVE-2017-5638](https://github.com/jongmartinez/CVE-2017-5638)
- [Badbird3/CVE-2017-5638](https://github.com/Badbird3/CVE-2017-5638)
- [jptr218/struts_hack](https://github.com/jptr218/struts_hack)
- [testpilot031/vulnerability_struts-2.3.31](https://github.com/testpilot031/vulnerability_struts-2.3.31)
@ -37479,6 +37487,9 @@
- [alt3kx/CVE-2001-1442](https://github.com/alt3kx/CVE-2001-1442)
### CVE-2001-3389
- [becrevex/Gaston](https://github.com/becrevex/Gaston)
## 2000
### CVE-2000-0170 (2000-04-10)