Auto Update 2023/12/22 18:52:44

This commit is contained in:
motikan2010-bot 2023-12-23 03:52:44 +09:00
parent 8eae4eb5a1
commit 54030fa21c
30 changed files with 382 additions and 75 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-21T04:37:29Z",
"updated_at": "2023-12-22T17:25:59Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1852,
"watchers_count": 1852,
"has_discussions": false,
"forks_count": 339,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 339,
"watchers": 1853,
"watchers": 1852,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-21T04:37:29Z",
"updated_at": "2023-12-22T17:25:59Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1852,
"watchers_count": 1852,
"has_discussions": false,
"forks_count": 339,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 339,
"watchers": 1853,
"watchers": 1852,
"score": 0,
"subscribers_count": 35
},

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 95974378,
"name": "CVE-2017-0213",
"full_name": "zcgonvh\/CVE-2017-0213",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
"description": "CVE-2017-0213 for command line",
"fork": false,
"created_at": "2017-07-01T16:07:04Z",
"updated_at": "2023-10-05T08:56:22Z",
"pushed_at": "2017-07-01T16:19:12Z",
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
{
"id": 105444160,
"name": "CVE-2017-0213",

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -27,6 +27,6 @@
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-21T04:37:29Z",
"updated_at": "2023-12-22T17:25:59Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1852,
"watchers_count": 1852,
"has_discussions": false,
"forks_count": 339,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 339,
"watchers": 1853,
"watchers": 1852,
"score": 0,
"subscribers_count": 35
},

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-21T04:37:29Z",
"updated_at": "2023-12-22T17:25:59Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1852,
"watchers_count": 1852,
"has_discussions": false,
"forks_count": 339,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 339,
"watchers": 1853,
"watchers": 1852,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,7 +43,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-12-22T10:35:01Z",
"updated_at": "2023-12-22T17:26:00Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3956,
"watchers_count": 3956,

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-21T04:37:29Z",
"updated_at": "2023-12-22T17:25:59Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1852,
"watchers_count": 1852,
"has_discussions": false,
"forks_count": 339,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 339,
"watchers": 1853,
"watchers": 1852,
"score": 0,
"subscribers_count": 35
}

View file

@ -13,7 +13,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-12-22T10:35:01Z",
"updated_at": "2023-12-22T17:26:00Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3956,
"watchers_count": 3956,

View file

@ -13,10 +13,10 @@
"description": "wpDiscuz 7.0.4 Remote Code Execution",
"fork": false,
"created_at": "2021-06-13T23:10:19Z",
"updated_at": "2023-10-07T17:28:53Z",
"updated_at": "2023-12-22T18:03:23Z",
"pushed_at": "2021-06-15T17:30:23Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 13,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-21T23:23:43Z",
"updated_at": "2023-12-22T11:49:55Z",
"updated_at": "2023-12-22T15:21:49Z",
"pushed_at": "2023-12-21T23:43:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-21T04:37:29Z",
"updated_at": "2023-12-22T17:25:59Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1853,
"watchers_count": 1853,
"stargazers_count": 1852,
"watchers_count": 1852,
"has_discussions": false,
"forks_count": 339,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 339,
"watchers": 1853,
"watchers": 1852,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "Patch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2",
"fork": false,
"created_at": "2021-12-09T21:49:33Z",
"updated_at": "2023-12-22T01:25:04Z",
"updated_at": "2023-12-22T18:01:08Z",
"pushed_at": "2023-01-27T17:34:36Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},
@ -3708,13 +3708,13 @@
"stargazers_count": 3320,
"watchers_count": 3320,
"has_discussions": true,
"forks_count": 752,
"forks_count": 751,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 752,
"forks": 751,
"watchers": 3320,
"score": 0,
"subscribers_count": 58

View file

@ -2667,10 +2667,10 @@
"description": "Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.",
"fork": false,
"created_at": "2023-10-15T20:13:11Z",
"updated_at": "2023-12-14T13:44:59Z",
"updated_at": "2023-12-22T16:22:04Z",
"pushed_at": "2023-10-15T22:23:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2685,7 +2685,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-36946 linux kernel panic in netfilter_queue",
"fork": false,
"created_at": "2022-07-28T11:22:13Z",
"updated_at": "2023-11-06T21:21:29Z",
"updated_at": "2023-12-22T15:35:27Z",
"pushed_at": "2023-09-08T20:50:43Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 4
},

View file

@ -1,4 +1,34 @@
[
{
"id": 586854096,
"name": "CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
"full_name": "bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
"owner": {
"login": "bAuh0lz",
"id": 15223611,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15223611?v=4",
"html_url": "https:\/\/github.com\/bAuh0lz"
},
"html_url": "https:\/\/github.com\/bAuh0lz\/CVE-2023-0297_Pre-auth_RCE_in_pyLoad",
"description": "CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad",
"fork": false,
"created_at": "2023-01-09T11:44:09Z",
"updated_at": "2023-11-20T11:52:23Z",
"pushed_at": "2023-01-14T04:40:47Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},
{
"id": 601937653,
"name": "CVE-2023-0297",

View file

@ -138,10 +138,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-02T11:55:30Z",
"updated_at": "2023-11-30T04:58:15Z",
"updated_at": "2023-12-22T13:00:08Z",
"pushed_at": "2023-08-15T03:31:13Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 6
},

62
2023/CVE-2023-20918.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 699801559,
"name": "platform_frameworks_base_AOSP_10_r33_CVE-2023-20918",
"full_name": "pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918",
"owner": {
"login": "pazhanivel07",
"id": 97434034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4",
"html_url": "https:\/\/github.com\/pazhanivel07"
},
"html_url": "https:\/\/github.com\/pazhanivel07\/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918",
"description": null,
"fork": false,
"created_at": "2023-10-03T11:21:35Z",
"updated_at": "2023-10-03T11:29:10Z",
"pushed_at": "2023-10-03T11:29:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 699813635,
"name": "platform_frameworks_base_CVE-2023-20918",
"full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-20918",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-20918",
"description": null,
"fork": false,
"created_at": "2023-10-03T11:52:16Z",
"updated_at": "2023-10-03T11:59:03Z",
"pushed_at": "2023-10-03T11:58:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2023/CVE-2023-21286.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 699793027,
"name": "platform_frameworks_base_CVE-2023-21286",
"full_name": "Trinadh465\/platform_frameworks_base_CVE-2023-21286",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/platform_frameworks_base_CVE-2023-21286",
"description": null,
"fork": false,
"created_at": "2023-10-03T10:58:51Z",
"updated_at": "2023-10-03T11:06:54Z",
"pushed_at": "2023-10-03T11:06:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 587377595,
"name": "CVE-2023-21752",
"full_name": "Wh04m1001\/CVE-2023-21752",
"owner": {
"login": "Wh04m1001",
"id": 44291883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
"html_url": "https:\/\/github.com\/Wh04m1001"
},
"html_url": "https:\/\/github.com\/Wh04m1001\/CVE-2023-21752",
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2023-12-13T13:10:19Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 293,
"watchers_count": 293,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 293,
"score": 0,
"subscribers_count": 5
},
{
"id": 677068156,
"name": "CVE-2023-21752",

View file

@ -18,13 +18,13 @@
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 152,
"score": 0,
"subscribers_count": 2

View file

@ -28,5 +28,35 @@
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 699866265,
"name": "Elasticsearch-CVE-2023-31419",
"full_name": "u238\/Elasticsearch-CVE-2023-31419",
"owner": {
"login": "u238",
"id": 2368573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2368573?v=4",
"html_url": "https:\/\/github.com\/u238"
},
"html_url": "https:\/\/github.com\/u238\/Elasticsearch-CVE-2023-31419",
"description": "Elasticsearch DoS CVE-2023-31419 exploit",
"fork": false,
"created_at": "2023-10-03T13:51:37Z",
"updated_at": "2023-10-03T13:57:41Z",
"pushed_at": "2023-10-03T13:57:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "testing poc",
"fork": false,
"created_at": "2023-10-16T15:43:50Z",
"updated_at": "2023-11-28T20:07:36Z",
"updated_at": "2023-12-22T18:37:47Z",
"pushed_at": "2023-10-18T17:58:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit",
"fork": false,
"created_at": "2023-09-29T06:43:35Z",
"updated_at": "2023-12-20T03:42:39Z",
"updated_at": "2023-12-22T18:06:37Z",
"pushed_at": "2023-12-14T06:07:44Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
"fork": false,
"created_at": "2023-11-19T22:20:10Z",
"updated_at": "2023-12-18T09:37:49Z",
"updated_at": "2023-12-22T13:02:02Z",
"pushed_at": "2023-11-20T01:02:44Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 4
},

View file

@ -193,10 +193,10 @@
"description": "This tool calculates tricky canonical huffman histogram for CVE-2023-4863.",
"fork": false,
"created_at": "2023-12-19T01:32:45Z",
"updated_at": "2023-12-22T10:50:29Z",
"updated_at": "2023-12-22T15:30:19Z",
"pushed_at": "2023-12-20T15:50:01Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
}

32
2023/CVE-2023-49438.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 731811886,
"name": "CVE-2023-49438",
"full_name": "brandon-t-elliott\/CVE-2023-49438",
"owner": {
"login": "brandon-t-elliott",
"id": 126433368,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126433368?v=4",
"html_url": "https:\/\/github.com\/brandon-t-elliott"
},
"html_url": "https:\/\/github.com\/brandon-t-elliott\/CVE-2023-49438",
"description": "CVE-2023-49438 - Open Redirect Vulnerability in Flask-Security-Too",
"fork": false,
"created_at": "2023-12-14T23:58:42Z",
"updated_at": "2023-12-22T18:10:52Z",
"pushed_at": "2023-12-22T18:09:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0

32
2023/CVE-2023-51281.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 734782806,
"name": "CVE-2023-51281",
"full_name": "geraldoalcantara\/CVE-2023-51281",
"owner": {
"login": "geraldoalcantara",
"id": 152064551,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
"html_url": "https:\/\/github.com\/geraldoalcantara"
},
"html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-51281",
"description": "Multiple cross-site scripting (XSS) vulnerabilities in \/customer_support\/ajax.php?action=save_customer in Customer Support System 1.0 allow authenticated attackers to execute to execute arbitrary web scripts or HTML via a crafted payload injected into the “firstname”, \"lastname\", \"middlename\", \"contact\" or “address” parameters.",
"fork": false,
"created_at": "2023-12-22T15:51:43Z",
"updated_at": "2023-12-22T16:08:00Z",
"pushed_at": "2023-12-22T16:07:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -57,6 +57,7 @@
<code>Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
</code>
- [bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad](https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad)
- [Small-ears/CVE-2023-0297](https://github.com/Small-ears/CVE-2023-0297)
- [JacobEbben/CVE-2023-0297](https://github.com/JacobEbben/CVE-2023-0297)
- [overgrowncarrot1/CVE-2023-0297](https://github.com/overgrowncarrot1/CVE-2023-0297)
@ -1152,6 +1153,14 @@
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20911](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-20911)
### CVE-2023-20918 (2023-07-12)
<code>In getPendingIntentLaunchFlags of ActivityOptions.java, there is a possible elevation of privilege due to a confused deputy with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
</code>
- [pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918](https://github.com/pazhanivel07/platform_frameworks_base_AOSP_10_r33_CVE-2023-20918)
- [Trinadh465/platform_frameworks_base_CVE-2023-20918](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-20918)
### CVE-2023-20921 (2023-01-24)
<code>In onPackageRemoved of AccessibilityManagerService.java, there is a possibility to automatically grant accessibility services due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243378132
@ -1317,6 +1326,13 @@
- [uthrasri/framework_base_CVE-2023-21285_NoPatch](https://github.com/uthrasri/framework_base_CVE-2023-21285_NoPatch)
### CVE-2023-21286 (2023-08-14)
<code>In visitUris of RemoteViews.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
</code>
- [Trinadh465/platform_frameworks_base_CVE-2023-21286](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21286)
### CVE-2023-21288 (2023-08-14)
<code>In visitUris of Notification.java, there is a possible way to reveal images across users due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.\n\n
@ -1388,6 +1404,7 @@
<code>Windows Backup Service Elevation of Privilege Vulnerability
</code>
- [Wh04m1001/CVE-2023-21752](https://github.com/Wh04m1001/CVE-2023-21752)
- [yosef0x01/CVE-2023-21752](https://github.com/yosef0x01/CVE-2023-21752)
### CVE-2023-21766 (2023-01-10)
@ -2801,6 +2818,7 @@
</code>
- [sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419](https://github.com/sqrtZeroKnowledge/Elasticsearch-Exploit-CVE-2023-31419)
- [u238/Elasticsearch-CVE-2023-31419](https://github.com/u238/Elasticsearch-CVE-2023-31419)
### CVE-2023-31433 (2023-05-02)
@ -5774,6 +5792,9 @@
- [louiselalanne/CVE-2023-49314](https://github.com/louiselalanne/CVE-2023-49314)
### CVE-2023-49438
- [brandon-t-elliott/CVE-2023-49438](https://github.com/brandon-t-elliott/CVE-2023-49438)
### CVE-2023-49440
- [NyaMeeEain/Reserve_CVE-2023-49440_Boolean-based-SQL-injection](https://github.com/NyaMeeEain/Reserve_CVE-2023-49440_Boolean-based-SQL-injection)
@ -5900,7 +5921,11 @@
- [miles3719/cve-2023-50164](https://github.com/miles3719/cve-2023-50164)
- [aaronm-sysdig/cve-2023-50164](https://github.com/aaronm-sysdig/cve-2023-50164)
### CVE-2023-50254
### CVE-2023-50254 (2023-12-22)
<code>Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue.
</code>
- [febinrev/deepin-linux_reader_RCE-exploit](https://github.com/febinrev/deepin-linux_reader_RCE-exploit)
### CVE-2023-50596
@ -5919,6 +5944,9 @@
### CVE-2023-51214
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
### CVE-2023-51281
- [geraldoalcantara/CVE-2023-51281](https://github.com/geraldoalcantara/CVE-2023-51281)
### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -31307,6 +31335,7 @@
</code>
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)