Auto Update 2023/09/30 00:30:26

This commit is contained in:
motikan2010-bot 2023-09-30 09:30:26 +09:00
parent 6409915e88
commit 50a7aaf659
41 changed files with 192 additions and 153 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux",
"fork": false,
"created_at": "2017-07-07T06:15:56Z",
"updated_at": "2023-09-28T10:42:49Z",
"updated_at": "2023-09-29T19:19:58Z",
"pushed_at": "2017-08-19T06:49:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 24,
"watchers": 23,
"score": 0,
"subscribers_count": 3
}

View file

@ -1836,10 +1836,10 @@
"description": "ShellShock interactive-shell exploit",
"fork": false,
"created_at": "2022-04-02T07:30:31Z",
"updated_at": "2023-09-28T11:37:37Z",
"updated_at": "2023-09-29T18:43:04Z",
"pushed_at": "2022-04-02T07:31:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1852,7 +1852,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "PoC exploit for CVE-2016-4622",
"fork": false,
"created_at": "2016-10-09T15:22:06Z",
"updated_at": "2023-09-28T10:36:44Z",
"updated_at": "2023-09-29T19:19:41Z",
"pushed_at": "2023-09-18T16:58:56Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 94,
"watchers": 93,
"score": 0,
"subscribers_count": 11
},
@ -46,10 +46,10 @@
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
"fork": false,
"created_at": "2020-04-07T00:46:19Z",
"updated_at": "2023-08-19T02:28:20Z",
"updated_at": "2023-09-29T19:03:57Z",
"pushed_at": "2020-04-12T19:46:40Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "OS X 10.11.6 LPE PoC for CVE-2016-4655 \/ CVE-2016-4656",
"fork": false,
"created_at": "2016-10-02T12:42:14Z",
"updated_at": "2023-09-25T18:02:51Z",
"updated_at": "2023-09-29T19:16:07Z",
"pushed_at": "2016-10-04T16:36:18Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 97,
"watchers": 96,
"score": 0,
"subscribers_count": 7
},

View file

@ -46,10 +46,10 @@
"description": "code for webkit exploit, Nintendo Switch",
"fork": false,
"created_at": "2017-03-17T01:39:57Z",
"updated_at": "2022-09-01T14:16:51Z",
"updated_at": "2023-09-29T19:20:02Z",
"pushed_at": "2017-03-17T01:52:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -106,10 +106,10 @@
"description": " CVE-2016-4657 web-kit vulnerability for ios 9.3, nintendo switch browser vulnerability ",
"fork": false,
"created_at": "2018-11-11T14:22:18Z",
"updated_at": "2023-06-18T15:30:23Z",
"updated_at": "2023-09-29T19:20:01Z",
"pushed_at": "2018-11-11T14:50:14Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -118,7 +118,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 2
}

View file

@ -297,10 +297,10 @@
"description": "Universal Android root tool based on CVE-2016-5195. Watch this space.",
"fork": false,
"created_at": "2016-10-24T12:35:55Z",
"updated_at": "2023-06-27T01:00:11Z",
"updated_at": "2023-09-29T18:22:40Z",
"pushed_at": "2016-10-29T13:42:39Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 29,
"watchers": 28,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,7 +13,7 @@
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
"fork": false,
"created_at": "2016-09-16T07:34:50Z",
"updated_at": "2023-09-28T10:36:19Z",
"updated_at": "2023-09-29T21:04:14Z",
"pushed_at": "2016-09-18T06:55:38Z",
"stargazers_count": 86,
"watchers_count": 86,

View file

@ -13,10 +13,10 @@
"description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923",
"fork": false,
"created_at": "2017-12-06T15:31:08Z",
"updated_at": "2023-09-28T10:46:29Z",
"updated_at": "2023-09-29T19:20:00Z",
"pushed_at": "2017-12-06T15:41:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Webkit uxss exploit (CVE-2017-7089)",
"fork": false,
"created_at": "2017-10-03T12:13:43Z",
"updated_at": "2023-09-28T10:44:52Z",
"updated_at": "2023-09-29T19:19:55Z",
"pushed_at": "2017-10-03T12:23:43Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 65,
"watchers": 64,
"score": 0,
"subscribers_count": 8
},
@ -43,10 +43,10 @@
"description": "Exploit Safari CVE-2017-7089",
"fork": false,
"created_at": "2017-10-11T15:09:45Z",
"updated_at": "2023-09-28T10:45:02Z",
"updated_at": "2023-09-29T19:01:55Z",
"pushed_at": "2017-10-11T15:10:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This is the Pwn2Own 2017 Safari backup vul's exploit.",
"fork": false,
"created_at": "2017-09-26T04:10:32Z",
"updated_at": "2023-09-28T10:44:42Z",
"updated_at": "2023-09-29T19:02:08Z",
"pushed_at": "2019-03-25T02:38:06Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 116,
"watchers": 115,
"score": 0,
"subscribers_count": 2
}

View file

@ -170,10 +170,10 @@
"description": "RCE exploit for PHP Unit 5.6.2",
"fork": false,
"created_at": "2022-03-20T07:01:52Z",
"updated_at": "2023-09-28T11:37:12Z",
"updated_at": "2023-09-29T18:42:49Z",
"pushed_at": "2022-08-19T14:33:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -184,7 +184,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "macOS 10.13.3 (17D47) Safari Wasm Exploit ",
"fork": false,
"created_at": "2018-04-19T08:33:12Z",
"updated_at": "2023-09-28T10:49:59Z",
"updated_at": "2023-09-29T19:18:36Z",
"pushed_at": "2018-04-19T11:20:41Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 120,
"watchers": 119,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.",
"fork": false,
"created_at": "2018-02-27T00:58:39Z",
"updated_at": "2023-09-28T10:48:33Z",
"updated_at": "2023-09-29T19:12:44Z",
"pushed_at": "2018-03-07T08:07:29Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 86,
"watchers": 85,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
"updated_at": "2023-09-28T10:52:57Z",
"updated_at": "2023-09-29T19:01:16Z",
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 174,
"watchers": 173,
"score": 0,
"subscribers_count": 12
}

View file

@ -13,10 +13,10 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2023-09-28T10:59:11Z",
"updated_at": "2023-09-29T19:19:53Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 200,
"watchers_count": 200,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 201,
"watchers": 200,
"score": 0,
"subscribers_count": 33
}

View file

@ -1566,19 +1566,19 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2023-09-28T11:02:03Z",
"updated_at": "2023-09-29T20:38:08Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 885,
"watchers_count": 885,
"stargazers_count": 886,
"watchers_count": 886,
"has_discussions": false,
"forks_count": 292,
"forks_count": 293,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 292,
"watchers": 885,
"forks": 293,
"watchers": 886,
"score": 0,
"subscribers_count": 55
},

File diff suppressed because one or more lines are too long

View file

@ -43,7 +43,7 @@
"description": null,
"fork": false,
"created_at": "2023-09-01T21:35:40Z",
"updated_at": "2023-09-15T08:07:29Z",
"updated_at": "2023-09-29T20:01:40Z",
"pushed_at": "2023-09-02T10:41:51Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -355,10 +355,10 @@
"description": "Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration",
"fork": false,
"created_at": "2022-02-28T02:34:31Z",
"updated_at": "2023-09-05T05:28:30Z",
"updated_at": "2023-09-29T18:23:02Z",
"pushed_at": "2022-03-19T14:07:35Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -376,7 +376,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 16,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,7 +43,7 @@
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2023-09-27T12:56:24Z",
"updated_at": "2023-09-29T19:10:40Z",
"pushed_at": "2023-08-13T21:00:46Z",
"stargazers_count": 67,
"watchers_count": 67,

View file

@ -1224,10 +1224,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2023-09-28T11:27:15Z",
"updated_at": "2023-09-29T19:04:34Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 206,
"watchers_count": 206,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -1236,7 +1236,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 207,
"watchers": 206,
"score": 0,
"subscribers_count": 8
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-09-28T11:34:04Z",
"updated_at": "2023-09-29T18:36:49Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 642,
"watchers_count": 642,
"stargazers_count": 643,
"watchers_count": 643,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 642,
"watchers": 643,
"score": 0,
"subscribers_count": 12
},

View file

@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2023-09-28T18:00:03Z",
"updated_at": "2023-09-29T23:36:18Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 629,
"watchers": 630,
"score": 0,
"subscribers_count": 28
},

View file

@ -43,10 +43,10 @@
"description": "Webkit (Safari) - Exploit",
"fork": false,
"created_at": "2022-08-04T07:11:39Z",
"updated_at": "2023-04-13T02:20:19Z",
"updated_at": "2023-09-29T19:20:03Z",
"pushed_at": "2022-08-09T13:43:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22629 Proof of Concept",
"fork": false,
"created_at": "2022-09-09T17:21:27Z",
"updated_at": "2023-09-28T11:42:36Z",
"updated_at": "2023-09-29T19:17:20Z",
"pushed_at": "2022-09-09T21:23:08Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 50,
"watchers": 49,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
"fork": false,
"created_at": "2022-07-21T13:09:50Z",
"updated_at": "2023-09-23T23:05:03Z",
"updated_at": "2023-09-29T19:15:18Z",
"pushed_at": "2022-07-21T13:44:32Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 97,
"watchers": 96,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml",
"fork": false,
"created_at": "2022-10-31T13:24:34Z",
"updated_at": "2023-09-08T18:38:53Z",
"updated_at": "2023-09-29T23:48:54Z",
"pushed_at": "2023-02-08T17:24:05Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2023-09-28T11:44:50Z",
"updated_at": "2023-09-29T19:11:58Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 61,
"watchers": 60,
"score": 0,
"subscribers_count": 5
}

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-09-28T11:44:31Z",
"updated_at": "2023-09-29T19:12:34Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 841,
"watchers_count": 841,
"stargazers_count": 840,
"watchers_count": 840,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 841,
"watchers": 840,
"score": 0,
"subscribers_count": 24
},

View file

@ -13,10 +13,10 @@
"description": "simple urls < 115 - Reflected XSS",
"fork": false,
"created_at": "2023-09-18T06:44:44Z",
"updated_at": "2023-09-27T17:33:46Z",
"updated_at": "2023-09-29T23:26:24Z",
"pushed_at": "2023-09-18T06:52:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-27T12:22:05Z",
"updated_at": "2023-09-29T13:42:40Z",
"updated_at": "2023-09-29T20:10:41Z",
"pushed_at": "2023-07-10T16:57:44Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 136,
"watchers": 137,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2023-09-29T17:08:49Z",
"updated_at": "2023-09-29T21:06:43Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 115,
"watchers": 116,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
"updated_at": "2023-09-29T14:08:49Z",
"updated_at": "2023-09-30T00:12:16Z",
"pushed_at": "2023-09-26T09:49:37Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 39,
"watchers": 41,
"score": 0,
"subscribers_count": 1
}

View file

@ -108,7 +108,7 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -118,7 +118,7 @@
"rce"
],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 16,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-09-29T11:25:09Z",
"updated_at": "2023-09-29T22:34:57Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 191,
"watchers": 192,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-09-28T19:26:33Z",
"updated_at": "2023-09-28T19:26:34Z",
"pushed_at": "2023-09-28T19:26:34Z",
"pushed_at": "2023-09-29T20:59:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -43,19 +43,19 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-09-29T16:55:02Z",
"updated_at": "2023-09-29T21:27:12Z",
"pushed_at": "2023-09-22T04:31:47Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 168,
"forks": 27,
"watchers": 170,
"score": 0,
"subscribers_count": 6
},

32
2023/CVE-2023-5074.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 698443120,
"name": "CVE-2023-5074-PoC",
"full_name": "codeb0ss\/CVE-2023-5074-PoC",
"owner": {
"login": "codeb0ss",
"id": 135759201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
"html_url": "https:\/\/github.com\/codeb0ss"
},
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-5074-PoC",
"description": "Mass Exploit - CVE-2023-5074 \/ D-Link D-View < Authentication Bypass",
"fork": false,
"created_at": "2023-09-30T00:07:52Z",
"updated_at": "2023-09-30T00:07:53Z",
"pushed_at": "2023-09-30T00:08:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -725,6 +725,13 @@
- [PH03N1XSP/CVE-2023-5024](https://github.com/PH03N1XSP/CVE-2023-5024)
### CVE-2023-5074 (2023-09-20)
<code>Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
</code>
- [codeb0ss/CVE-2023-5074-PoC](https://github.com/codeb0ss/CVE-2023-5074-PoC)
### CVE-2023-5546
- [obelia01/CVE-2023-5546](https://github.com/obelia01/CVE-2023-5546)