mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/03/16 12:26:28
This commit is contained in:
parent
e49bf8b295
commit
5277876904
32 changed files with 311 additions and 101 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-14T14:29:42Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1897,
|
||||
"watchers": 1896,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-14T14:29:42Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1897,
|
||||
"watchers": 1896,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-14T14:29:42Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1897,
|
||||
"watchers": 1896,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -557,10 +557,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-14T14:29:42Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -590,7 +590,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1897,
|
||||
"watchers": 1896,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2024-03-07T12:00:21Z",
|
||||
"updated_at": "2024-03-16T11:22:55Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"stargazers_count": 634,
|
||||
"watchers_count": 634,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"watchers": 635,
|
||||
"watchers": 634,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-03-13T14:58:30Z",
|
||||
"updated_at": "2024-03-16T11:25:50Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1778,
|
||||
"watchers_count": 1778,
|
||||
"stargazers_count": 1777,
|
||||
"watchers_count": 1777,
|
||||
"has_discussions": false,
|
||||
"forks_count": 259,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 259,
|
||||
"watchers": 1778,
|
||||
"watchers": 1777,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-03-16T03:18:43Z",
|
||||
"updated_at": "2024-03-16T11:07:56Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4002,
|
||||
"watchers_count": 4002,
|
||||
"stargazers_count": 4001,
|
||||
"watchers_count": 4001,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1080,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1080,
|
||||
"watchers": 4002,
|
||||
"watchers": 4001,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-14T14:29:42Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1897,
|
||||
"watchers": 1896,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -1444,10 +1444,10 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2024-03-05T21:54:08Z",
|
||||
"updated_at": "2024-03-16T11:24:21Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 510,
|
||||
"watchers_count": 510,
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"has_discussions": false,
|
||||
"forks_count": 164,
|
||||
"allow_forking": true,
|
||||
|
@ -1462,7 +1462,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 164,
|
||||
"watchers": 510,
|
||||
"watchers": 509,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -410,10 +410,10 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2024-02-28T21:17:24Z",
|
||||
"updated_at": "2024-03-16T06:42:58Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -422,7 +422,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-03-16T03:18:43Z",
|
||||
"updated_at": "2024-03-16T11:07:56Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4002,
|
||||
"watchers_count": 4002,
|
||||
"stargazers_count": 4001,
|
||||
"watchers_count": 4001,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1080,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1080,
|
||||
"watchers": 4002,
|
||||
"watchers": 4001,
|
||||
"score": 0,
|
||||
"subscribers_count": 151
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-03-14T14:29:42Z",
|
||||
"updated_at": "2024-03-16T11:08:04Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1897,
|
||||
"watchers_count": 1897,
|
||||
"stargazers_count": 1896,
|
||||
"watchers_count": 1896,
|
||||
"has_discussions": true,
|
||||
"forks_count": 331,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"watchers": 1897,
|
||||
"watchers": 1896,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -104,7 +104,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-30T11:23:52Z",
|
||||
"updated_at": "2023-06-08T16:39:23Z",
|
||||
"pushed_at": "2022-10-02T10:44:22Z",
|
||||
"pushed_at": "2024-03-16T08:25:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-03-13T15:11:59Z",
|
||||
"updated_at": "2024-03-16T11:14:52Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 967,
|
||||
"watchers_count": 967,
|
||||
"stargazers_count": 966,
|
||||
"watchers_count": 966,
|
||||
"has_discussions": false,
|
||||
"forks_count": 178,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 178,
|
||||
"watchers": 967,
|
||||
"watchers": 966,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-13T17:26:49Z",
|
||||
"updated_at": "2024-01-08T18:05:40Z",
|
||||
"pushed_at": "2023-02-19T22:08:03Z",
|
||||
"pushed_at": "2024-03-16T08:25:52Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-03-13T02:27:56Z",
|
||||
"updated_at": "2024-03-16T11:11:19Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1724,
|
||||
"watchers_count": 1724,
|
||||
"stargazers_count": 1725,
|
||||
"watchers_count": 1725,
|
||||
"has_discussions": false,
|
||||
"forks_count": 513,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 513,
|
||||
"watchers": 1724,
|
||||
"watchers": 1725,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-03-15T10:46:36Z",
|
||||
"updated_at": "2024-03-16T10:08:41Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 761,
|
||||
"watchers_count": 761,
|
||||
"stargazers_count": 762,
|
||||
"watchers_count": 762,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 761,
|
||||
"watchers": 762,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -3546,10 +3546,10 @@
|
|||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2024-02-20T07:02:42Z",
|
||||
"updated_at": "2024-03-16T11:15:43Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -3558,7 +3558,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 62,
|
||||
"watchers": 61,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -5231,7 +5231,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-13T21:47:41Z",
|
||||
"updated_at": "2024-02-19T09:59:39Z",
|
||||
"pushed_at": "2023-12-20T13:58:44Z",
|
||||
"pushed_at": "2024-03-16T12:10:33Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2024-03-05T16:35:27Z",
|
||||
"updated_at": "2024-03-16T11:14:04Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1066,
|
||||
"watchers_count": 1066,
|
||||
"stargazers_count": 1065,
|
||||
"watchers_count": 1065,
|
||||
"has_discussions": false,
|
||||
"forks_count": 218,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 218,
|
||||
"watchers": 1066,
|
||||
"watchers": 1065,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -154,7 +154,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-17T15:42:37Z",
|
||||
"updated_at": "2024-01-26T09:40:56Z",
|
||||
"pushed_at": "2023-10-02T08:37:41Z",
|
||||
"pushed_at": "2024-03-16T08:26:06Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-03-13T08:34:24Z",
|
||||
"updated_at": "2024-03-16T11:07:51Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1109,
|
||||
"watchers_count": 1109,
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-18T12:01:17Z",
|
||||
"updated_at": "2023-09-28T11:38:54Z",
|
||||
"pushed_at": "2022-06-16T09:29:27Z",
|
||||
"pushed_at": "2024-03-16T08:26:24Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T05:08:20Z",
|
||||
"updated_at": "2024-03-12T02:07:27Z",
|
||||
"updated_at": "2024-03-16T10:07:00Z",
|
||||
"pushed_at": "2023-01-19T08:12:40Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2023/CVE-2023-40275.json
Normal file
32
2023/CVE-2023-40275.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 772884248,
|
||||
"name": "CVE-2023-40275",
|
||||
"full_name": "BugBountyHunterCVE\/CVE-2023-40275",
|
||||
"owner": {
|
||||
"login": "BugBountyHunterCVE",
|
||||
"id": 163620550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163620550?v=4",
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE\/CVE-2023-40275",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-16T06:20:30Z",
|
||||
"updated_at": "2024-03-16T09:03:57Z",
|
||||
"pushed_at": "2024-03-16T06:24:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40276.json
Normal file
32
2023/CVE-2023-40276.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 772880701,
|
||||
"name": "CVE-2023-40276",
|
||||
"full_name": "BugBountyHunterCVE\/CVE-2023-40276",
|
||||
"owner": {
|
||||
"login": "BugBountyHunterCVE",
|
||||
"id": 163620550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163620550?v=4",
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE\/CVE-2023-40276",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-16T06:06:12Z",
|
||||
"updated_at": "2024-03-16T09:07:27Z",
|
||||
"pushed_at": "2024-03-16T06:18:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40277.json
Normal file
32
2023/CVE-2023-40277.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 772850986,
|
||||
"name": "CVE-2023-40277",
|
||||
"full_name": "BugBountyHunterCVE\/CVE-2023-40277",
|
||||
"owner": {
|
||||
"login": "BugBountyHunterCVE",
|
||||
"id": 163620550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163620550?v=4",
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE\/CVE-2023-40277",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-16T03:52:54Z",
|
||||
"updated_at": "2024-03-16T09:08:30Z",
|
||||
"pushed_at": "2024-03-16T06:18:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40278.json
Normal file
32
2023/CVE-2023-40278.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 772882363,
|
||||
"name": "CVE-2023-40278",
|
||||
"full_name": "BugBountyHunterCVE\/CVE-2023-40278",
|
||||
"owner": {
|
||||
"login": "BugBountyHunterCVE",
|
||||
"id": 163620550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163620550?v=4",
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE\/CVE-2023-40278",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-16T06:12:56Z",
|
||||
"updated_at": "2024-03-16T09:09:51Z",
|
||||
"pushed_at": "2024-03-16T06:18:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40279.json
Normal file
32
2023/CVE-2023-40279.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 772886746,
|
||||
"name": "CVE-2023-40279",
|
||||
"full_name": "BugBountyHunterCVE\/CVE-2023-40279",
|
||||
"owner": {
|
||||
"login": "BugBountyHunterCVE",
|
||||
"id": 163620550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163620550?v=4",
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE\/CVE-2023-40279",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-16T06:30:03Z",
|
||||
"updated_at": "2024-03-16T09:11:10Z",
|
||||
"pushed_at": "2024-03-16T06:33:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40280.json
Normal file
32
2023/CVE-2023-40280.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 772885598,
|
||||
"name": "CVE-2023-40280",
|
||||
"full_name": "BugBountyHunterCVE\/CVE-2023-40280",
|
||||
"owner": {
|
||||
"login": "BugBountyHunterCVE",
|
||||
"id": 163620550,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163620550?v=4",
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BugBountyHunterCVE\/CVE-2023-40280",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-16T06:25:42Z",
|
||||
"updated_at": "2024-03-16T09:12:01Z",
|
||||
"pushed_at": "2024-03-16T06:29:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -645,10 +645,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 回显利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-05T07:09:21Z",
|
||||
"updated_at": "2024-03-06T06:52:47Z",
|
||||
"updated_at": "2024-03-16T12:04:53Z",
|
||||
"pushed_at": "2024-03-05T09:16:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -657,7 +657,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Apache Solr Backup\/Restore APIs RCE Poc (CVE-2023-50386)",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-29T08:57:47Z",
|
||||
"updated_at": "2024-03-15T14:13:12Z",
|
||||
"updated_at": "2024-03-16T09:46:51Z",
|
||||
"pushed_at": "2024-02-29T12:54:56Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-03-15T16:01:08Z",
|
||||
"updated_at": "2024-03-16T10:14:55Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -256,10 +256,10 @@
|
|||
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-27T19:34:48Z",
|
||||
"updated_at": "2024-03-13T07:15:48Z",
|
||||
"pushed_at": "2024-01-28T15:02:45Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"updated_at": "2024-03-16T07:54:08Z",
|
||||
"pushed_at": "2024-03-16T07:55:41Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -272,7 +272,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-14T17:48:49Z",
|
||||
"updated_at": "2024-03-16T02:49:32Z",
|
||||
"updated_at": "2024-03-16T12:27:03Z",
|
||||
"pushed_at": "2024-03-14T17:49:48Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
18
README.md
18
README.md
|
@ -6012,6 +6012,24 @@
|
|||
- [hshivhare67/platform_frameworks_base_android-4.2.2_r1_CVE-2023-40140](https://github.com/hshivhare67/platform_frameworks_base_android-4.2.2_r1_CVE-2023-40140)
|
||||
- [hshivhare67/platform_frameworks_base_AOSP6_r22_CVE-2023-40140](https://github.com/hshivhare67/platform_frameworks_base_AOSP6_r22_CVE-2023-40140)
|
||||
|
||||
### CVE-2023-40275
|
||||
- [BugBountyHunterCVE/CVE-2023-40275](https://github.com/BugBountyHunterCVE/CVE-2023-40275)
|
||||
|
||||
### CVE-2023-40276
|
||||
- [BugBountyHunterCVE/CVE-2023-40276](https://github.com/BugBountyHunterCVE/CVE-2023-40276)
|
||||
|
||||
### CVE-2023-40277
|
||||
- [BugBountyHunterCVE/CVE-2023-40277](https://github.com/BugBountyHunterCVE/CVE-2023-40277)
|
||||
|
||||
### CVE-2023-40278
|
||||
- [BugBountyHunterCVE/CVE-2023-40278](https://github.com/BugBountyHunterCVE/CVE-2023-40278)
|
||||
|
||||
### CVE-2023-40279
|
||||
- [BugBountyHunterCVE/CVE-2023-40279](https://github.com/BugBountyHunterCVE/CVE-2023-40279)
|
||||
|
||||
### CVE-2023-40280
|
||||
- [BugBountyHunterCVE/CVE-2023-40280](https://github.com/BugBountyHunterCVE/CVE-2023-40280)
|
||||
|
||||
### CVE-2023-40294 (2023-08-13)
|
||||
|
||||
<code>libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_parseBlockI at i_parse_blk.c.
|
||||
|
|
Loading…
Reference in a new issue