Auto Update 2024/01/22 18:31:58

This commit is contained in:
motikan2010-bot 2024-01-23 03:31:58 +09:00
parent cf4568a22d
commit 585e7e0212
56 changed files with 625 additions and 240 deletions

View file

@ -1,32 +0,0 @@
[
{
"id": 132980512,
"name": "CVE-2001-0758",
"full_name": "alt3kx\/CVE-2001-0758",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0758",
"description": "Directory traversal vulnerability in Shambala 4.5 ",
"fork": false,
"created_at": "2018-05-11T02:47:18Z",
"updated_at": "2018-05-11T09:16:42Z",
"pushed_at": "2018-05-11T09:16:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -275,7 +275,7 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 679476726,

View file

@ -597,7 +597,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 18649488,

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-21T18:55:26Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1867,
"watchers_count": 1867,
"stargazers_count": 1866,
"watchers_count": 1866,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1867,
"watchers": 1866,
"score": 0,
"subscribers_count": 35
},

View file

@ -267,7 +267,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 24451053,

View file

@ -57,7 +57,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 66863858,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-21T18:55:26Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1867,
"watchers_count": 1867,
"stargazers_count": 1866,
"watchers_count": 1866,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1867,
"watchers": 1866,
"score": 0,
"subscribers_count": 35
},

View file

@ -811,10 +811,10 @@
"description": "编译好的脏牛漏洞CVE-2016-5195EXP",
"fork": false,
"created_at": "2018-05-27T08:06:50Z",
"updated_at": "2023-09-26T14:11:13Z",
"updated_at": "2024-01-22T14:35:29Z",
"pushed_at": "2018-05-27T08:24:17Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -823,7 +823,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 128,
"watchers": 127,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 323575291,
"name": "CVE-2017-11610",
"full_name": "yaunsky\/CVE-2017-11610",
"owner": {
"login": "yaunsky",
"id": 48243087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
"html_url": "https:\/\/github.com\/yaunsky"
},
"html_url": "https:\/\/github.com\/yaunsky\/CVE-2017-11610",
"description": "Supervisord远程命令执行漏洞脚本",
"fork": false,
"created_at": "2020-12-22T09:08:49Z",
"updated_at": "2022-03-20T05:21:38Z",
"pushed_at": "2020-12-22T09:12:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -636,6 +636,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 202340795,
"name": "CVE-2017-11882",
"full_name": "littlebin404\/CVE-2017-11882",
"owner": {
"login": "littlebin404",
"id": 54022042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54022042?v=4",
"html_url": "https:\/\/github.com\/littlebin404"
},
"html_url": "https:\/\/github.com\/littlebin404\/CVE-2017-11882",
"description": "CVE-2017-11882通杀Office 2003到2016",
"fork": false,
"created_at": "2019-08-14T11:55:00Z",
"updated_at": "2023-09-28T11:05:07Z",
"pushed_at": "2020-12-22T07:23:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 232606684,
"name": "Overflow-Demo-CVE-2017-11882",
@ -756,6 +786,49 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 332744031,
"name": "SignHere",
"full_name": "Retr0-code\/SignHere",
"owner": {
"login": "Retr0-code",
"id": 60541996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60541996?v=4",
"html_url": "https:\/\/github.com\/Retr0-code"
},
"html_url": "https:\/\/github.com\/Retr0-code\/SignHere",
"description": "SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.",
"fork": false,
"created_at": "2021-01-25T12:44:03Z",
"updated_at": "2023-02-12T18:04:41Z",
"pushed_at": "2021-01-26T16:29:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automation",
"build-tool",
"builder",
"cve",
"cve-2017-11882",
"equation",
"malicious",
"microsoft",
"office",
"python3",
"rtf",
"vulnerabilities"
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 431719997,
"name": "CVE-2017-11882-exp",

View file

@ -299,6 +299,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 328929654,
"name": "CVE-2017-12615-EXP",
"full_name": "w0x68y\/CVE-2017-12615-EXP",
"owner": {
"login": "w0x68y",
"id": 22195911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
"html_url": "https:\/\/github.com\/w0x68y"
},
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
"description": "CVE-2017-12615 任意文件写入exp写入webshell",
"fork": false,
"created_at": "2021-01-12T09:07:12Z",
"updated_at": "2022-10-23T07:40:44Z",
"pushed_at": "2021-01-13T03:23:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 565419626,
"name": "AttackTomcat",

32
2017/CVE-2017-16651.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 327169091,
"name": "CVE-2017-16651",
"full_name": "ropbear\/CVE-2017-16651",
"owner": {
"login": "ropbear",
"id": 11134586,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134586?v=4",
"html_url": "https:\/\/github.com\/ropbear"
},
"html_url": "https:\/\/github.com\/ropbear\/CVE-2017-16651",
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
"fork": false,
"created_at": "2021-01-06T01:46:39Z",
"updated_at": "2023-09-24T16:23:48Z",
"pushed_at": "2021-01-06T01:47:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-18T22:12:54Z",
"updated_at": "2024-01-19T14:15:44Z",
"updated_at": "2024-01-22T16:04:38Z",
"pushed_at": "2024-01-20T01:47:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-21T18:55:26Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1867,
"watchers_count": 1867,
"stargazers_count": 1866,
"watchers_count": 1866,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1867,
"watchers": 1866,
"score": 0,
"subscribers_count": 35
},

View file

@ -926,7 +926,7 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 93710291,

View file

@ -209,6 +209,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 330894535,
"name": "exploit-nginx-1.10.3",
"full_name": "gemboxteam\/exploit-nginx-1.10.3",
"owner": {
"login": "gemboxteam",
"id": 27276452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27276452?v=4",
"html_url": "https:\/\/github.com\/gemboxteam"
},
"html_url": "https:\/\/github.com\/gemboxteam\/exploit-nginx-1.10.3",
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
"fork": false,
"created_at": "2021-01-19T07:12:10Z",
"updated_at": "2023-12-26T17:34:28Z",
"pushed_at": "2021-01-19T07:17:52Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 331347189,
"name": "Remote-Integer-Overflow-Vulnerability",

View file

@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 312471106,
"name": "cve-2017-7921-golang",
"full_name": "MisakaMikato\/cve-2017-7921-golang",
"owner": {
"login": "MisakaMikato",
"id": 31957147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4",
"html_url": "https:\/\/github.com\/MisakaMikato"
},
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
"fork": false,
"created_at": "2020-11-13T04:15:31Z",
"updated_at": "2023-06-25T06:04:21Z",
"pushed_at": "2021-01-11T05:52:22Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 334195499,
"name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor",

View file

@ -1,4 +1,34 @@
[
{
"id": 117610085,
"name": "dp_crypto",
"full_name": "bao7uo\/dp_crypto",
"owner": {
"login": "bao7uo",
"id": 21125224,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4",
"html_url": "https:\/\/github.com\/bao7uo"
},
"html_url": "https:\/\/github.com\/bao7uo\/dp_crypto",
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2024-01-14T06:47:28Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 162,
"score": 0,
"subscribers_count": 8
},
{
"id": 143378191,
"name": "Telewreck",

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-21T18:55:26Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1867,
"watchers_count": 1867,
"stargazers_count": 1866,
"watchers_count": 1866,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1867,
"watchers": 1866,
"score": 0,
"subscribers_count": 35
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-01-22T09:28:44Z",
"updated_at": "2024-01-22T14:35:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3980,
"watchers_count": 3980,
"stargazers_count": 3979,
"watchers_count": 3979,
"has_discussions": false,
"forks_count": 1091,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1091,
"watchers": 3980,
"watchers": 3979,
"score": 0,
"subscribers_count": 155
},

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-01-15T16:13:52Z",
"updated_at": "2024-01-22T14:35:34Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 923,
"watchers_count": 923,
"stargazers_count": 922,
"watchers_count": 922,
"has_discussions": false,
"forks_count": 182,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 182,
"watchers": 923,
"watchers": 922,
"score": 0,
"subscribers_count": 19
},
@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-21T18:55:26Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1867,
"watchers_count": 1867,
"stargazers_count": 1866,
"watchers_count": 1866,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1867,
"watchers": 1866,
"score": 0,
"subscribers_count": 35
}

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-01-22T09:28:44Z",
"updated_at": "2024-01-22T14:35:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3980,
"watchers_count": 3980,
"stargazers_count": 3979,
"watchers_count": 3979,
"has_discussions": false,
"forks_count": 1091,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1091,
"watchers": 3980,
"watchers": 3979,
"score": 0,
"subscribers_count": 155
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-01-12T13:09:45Z",
"updated_at": "2024-01-22T14:35:46Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079,
"watchers_count": 1079,
"stargazers_count": 1078,
"watchers_count": 1078,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1079,
"watchers": 1078,
"score": 0,
"subscribers_count": 37
}

View file

@ -403,10 +403,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-01-19T21:15:40Z",
"updated_at": "2024-01-22T14:35:39Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 330,
"watchers_count": 330,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -421,7 +421,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 331,
"watchers": 330,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-01-21T18:55:26Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1867,
"watchers_count": 1867,
"stargazers_count": 1866,
"watchers_count": 1866,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1867,
"watchers": 1866,
"score": 0,
"subscribers_count": 35
},
@ -154,10 +154,10 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2023-09-14T03:04:31Z",
"updated_at": "2024-01-22T14:35:40Z",
"pushed_at": "2022-08-07T06:36:30Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -166,7 +166,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 87,
"watchers": 86,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-4464 \/ CVE-2020-4450",
"fork": false,
"created_at": "2021-08-17T08:44:49Z",
"updated_at": "2023-07-25T03:14:10Z",
"updated_at": "2024-01-22T14:35:49Z",
"pushed_at": "2021-08-24T15:02:19Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 33,
"watchers": 32,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2024-01-09T13:17:46Z",
"updated_at": "2024-01-22T14:35:38Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 104,
"watchers": 103,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2020-03-26T01:34:38Z",
"updated_at": "2023-12-22T03:30:07Z",
"updated_at": "2024-01-22T14:35:39Z",
"pushed_at": "2020-04-14T12:31:19Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 115,
"watchers": 114,
"score": 0,
"subscribers_count": 7
},
@ -223,10 +223,10 @@
"description": "Exploit script for CVE-2020-7961",
"fork": false,
"created_at": "2021-01-14T19:18:13Z",
"updated_at": "2024-01-11T07:41:23Z",
"updated_at": "2024-01-22T14:35:45Z",
"pushed_at": "2021-01-15T10:51:58Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 20,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
"fork": false,
"created_at": "2022-01-11T02:25:25Z",
"updated_at": "2024-01-17T16:03:47Z",
"updated_at": "2024-01-22T17:34:48Z",
"pushed_at": "2022-01-11T11:22:06Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 4
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-01-20T08:41:57Z",
"updated_at": "2024-01-22T14:35:55Z",
"pushed_at": "2023-12-06T15:30:56Z",
"stargazers_count": 1197,
"watchers_count": 1197,
"stargazers_count": 1196,
"watchers_count": 1196,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 155,
"watchers": 1197,
"watchers": 1196,
"score": 0,
"subscribers_count": 11
}

View file

@ -133,10 +133,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2024-01-19T10:16:01Z",
"updated_at": "2024-01-22T14:35:50Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 247,
"watchers_count": 247,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 103,
"watchers": 248,
"watchers": 247,
"score": 0,
"subscribers_count": 3
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2024-01-12T13:09:45Z",
"updated_at": "2024-01-22T14:35:46Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079,
"watchers_count": 1079,
"stargazers_count": 1078,
"watchers_count": 1078,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1079,
"watchers": 1078,
"score": 0,
"subscribers_count": 37
},

View file

@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2024-01-19T23:20:57Z",
"updated_at": "2024-01-22T14:35:49Z",
"pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 299,
"watchers_count": 299,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 300,
"watchers": 299,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2023-12-20T10:39:17Z",
"updated_at": "2024-01-22T15:18:15Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 281,
"watchers_count": 281,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 280,
"watchers": 281,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2024-01-18T15:35:11Z",
"updated_at": "2024-01-22T14:35:51Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 950,
"watchers_count": 950,
"stargazers_count": 948,
"watchers_count": 948,
"has_discussions": false,
"forks_count": 192,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 950,
"watchers": 948,
"score": 0,
"subscribers_count": 26
},

View file

@ -133,10 +133,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
"fork": false,
"created_at": "2022-12-22T06:39:07Z",
"updated_at": "2023-08-07T08:43:00Z",
"updated_at": "2024-01-22T18:02:15Z",
"pushed_at": "2023-01-12T09:05:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -401,10 +401,10 @@
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
"fork": false,
"created_at": "2021-12-10T14:22:49Z",
"updated_at": "2024-01-04T17:04:04Z",
"updated_at": "2024-01-22T14:35:51Z",
"pushed_at": "2021-12-14T15:16:15Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -420,7 +420,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 125,
"watchers": 124,
"score": 0,
"subscribers_count": 7
},
@ -760,10 +760,10 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
"updated_at": "2024-01-11T07:41:27Z",
"updated_at": "2024-01-22T14:35:51Z",
"pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -772,7 +772,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 193,
"watchers": 191,
"score": 0,
"subscribers_count": 6
},
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-01-20T06:15:16Z",
"updated_at": "2024-01-22T14:35:51Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 760,
"watchers_count": 760,
"stargazers_count": 759,
"watchers_count": 759,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 116,
"watchers": 760,
"watchers": 759,
"score": 0,
"subscribers_count": 10
},
@ -3546,10 +3546,10 @@
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
"fork": false,
"created_at": "2021-12-13T01:55:51Z",
"updated_at": "2024-01-02T13:31:49Z",
"updated_at": "2024-01-22T16:55:42Z",
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -3558,7 +3558,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 2
},
@ -3666,10 +3666,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-01-21T08:54:48Z",
"updated_at": "2024-01-22T14:35:52Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3331,
"watchers_count": 3331,
"stargazers_count": 3330,
"watchers_count": 3330,
"has_discussions": true,
"forks_count": 748,
"allow_forking": true,
@ -3678,7 +3678,7 @@
"topics": [],
"visibility": "public",
"forks": 748,
"watchers": 3331,
"watchers": 3330,
"score": 0,
"subscribers_count": 58
},
@ -5715,10 +5715,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2024-01-16T02:05:08Z",
"updated_at": "2024-01-22T14:32:44Z",
"pushed_at": "2022-12-27T17:57:19Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 434,
"watchers_count": 434,
"has_discussions": true,
"forks_count": 96,
"allow_forking": true,
@ -5736,7 +5736,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 436,
"watchers": 434,
"score": 0,
"subscribers_count": 21
},

View file

@ -13,10 +13,10 @@
"description": "A script for exploiting CVE-2022-1227",
"fork": false,
"created_at": "2023-04-01T07:28:15Z",
"updated_at": "2023-12-07T11:08:12Z",
"updated_at": "2024-01-22T13:04:24Z",
"pushed_at": "2023-04-13T12:36:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T10:35:35Z",
"updated_at": "2023-12-27T09:56:14Z",
"updated_at": "2024-01-22T14:35:53Z",
"pushed_at": "2022-05-09T21:09:45Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 52,
"watchers": 51,
"score": 0,
"subscribers_count": 4
},
@ -140,10 +140,10 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2024-01-04T17:08:24Z",
"updated_at": "2024-01-22T14:35:54Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -152,7 +152,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 93,
"watchers": 92,
"score": 0,
"subscribers_count": 1
},
@ -290,10 +290,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
"fork": false,
"created_at": "2022-05-09T10:22:31Z",
"updated_at": "2024-01-10T06:17:42Z",
"updated_at": "2024-01-22T14:35:54Z",
"pushed_at": "2022-06-28T18:14:40Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 84,
"watchers_count": 84,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -302,7 +302,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 85,
"watchers": 84,
"score": 0,
"subscribers_count": 2
},
@ -410,10 +410,10 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2024-01-17T16:04:02Z",
"updated_at": "2024-01-22T14:35:54Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 232,
"watchers_count": 232,
"stargazers_count": 231,
"watchers_count": 231,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -422,7 +422,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 232,
"watchers": 231,
"score": 0,
"subscribers_count": 6
},
@ -473,10 +473,10 @@
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
"fork": false,
"created_at": "2022-05-09T14:02:34Z",
"updated_at": "2022-10-07T14:45:05Z",
"updated_at": "2024-01-22T14:35:54Z",
"pushed_at": "2022-08-22T01:20:14Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -485,7 +485,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
"fork": false,
"created_at": "2022-02-07T15:53:21Z",
"updated_at": "2024-01-19T10:16:11Z",
"updated_at": "2024-01-22T13:40:37Z",
"pushed_at": "2022-02-07T15:55:03Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 237,
"watchers": 238,
"score": 0,
"subscribers_count": 12
},

View file

@ -796,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-01-20T08:41:57Z",
"updated_at": "2024-01-22T14:35:55Z",
"pushed_at": "2023-12-06T15:30:56Z",
"stargazers_count": 1197,
"watchers_count": 1197,
"stargazers_count": 1196,
"watchers_count": 1196,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -815,7 +815,7 @@
],
"visibility": "public",
"forks": 155,
"watchers": 1197,
"watchers": 1196,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
"fork": false,
"created_at": "2022-03-26T01:40:04Z",
"updated_at": "2024-01-11T07:41:28Z",
"updated_at": "2024-01-22T14:35:53Z",
"pushed_at": "2023-03-05T12:41:19Z",
"stargazers_count": 353,
"watchers_count": 353,
"stargazers_count": 351,
"watchers_count": 351,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 86,
"watchers": 353,
"watchers": 351,
"score": 0,
"subscribers_count": 11
},

View file

@ -242,5 +242,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 746721441,
"name": "CVE-2022-25765",
"full_name": "lowercasenumbers\/CVE-2022-25765",
"owner": {
"login": "lowercasenumbers",
"id": 95596630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95596630?v=4",
"html_url": "https:\/\/github.com\/lowercasenumbers"
},
"html_url": "https:\/\/github.com\/lowercasenumbers\/CVE-2022-25765",
"description": "Exploit for CVE-2022-25765",
"fork": false,
"created_at": "2024-01-22T14:45:34Z",
"updated_at": "2024-01-22T14:49:17Z",
"pushed_at": "2024-01-22T15:04:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-01-13T08:10:08Z",
"updated_at": "2024-01-22T14:35:55Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 289,
"watchers_count": 289,
"stargazers_count": 287,
"watchers_count": 287,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 50,
"watchers": 289,
"watchers": 287,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,8 +73,38 @@
"description": null,
"fork": false,
"created_at": "2024-01-22T11:38:55Z",
"updated_at": "2024-01-22T11:38:56Z",
"updated_at": "2024-01-22T15:44:40Z",
"pushed_at": "2024-01-22T12:07:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 746667961,
"name": "CVE-2023-22527",
"full_name": "cleverg0d\/CVE-2023-22527",
"owner": {
"login": "cleverg0d",
"id": 108401157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4",
"html_url": "https:\/\/github.com\/cleverg0d"
},
"html_url": "https:\/\/github.com\/cleverg0d\/CVE-2023-22527",
"description": "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.",
"fork": false,
"created_at": "2024-01-22T13:26:45Z",
"updated_at": "2024-01-22T13:26:45Z",
"pushed_at": "2024-01-22T13:31:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -148,5 +148,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 746664124,
"name": "CVE-2023-28588_G2.5_singlefile",
"full_name": "uthrasri\/CVE-2023-28588_G2.5_singlefile",
"owner": {
"login": "uthrasri",
"id": 145666390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
"html_url": "https:\/\/github.com\/uthrasri"
},
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-28588_G2.5_singlefile",
"description": null,
"fork": false,
"created_at": "2024-01-22T13:17:35Z",
"updated_at": "2024-01-22T13:18:30Z",
"pushed_at": "2024-01-22T13:19:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -478,5 +478,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 746752421,
"name": "CVE-2023-29489",
"full_name": "Praveenms13\/CVE-2023-29489",
"owner": {
"login": "Praveenms13",
"id": 60701202,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60701202?v=4",
"html_url": "https:\/\/github.com\/Praveenms13"
},
"html_url": "https:\/\/github.com\/Praveenms13\/CVE-2023-29489",
"description": null,
"fork": false,
"created_at": "2024-01-22T15:54:49Z",
"updated_at": "2024-01-22T15:55:28Z",
"pushed_at": "2024-01-22T17:57:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
"fork": false,
"created_at": "2024-01-11T19:17:13Z",
"updated_at": "2024-01-22T12:03:07Z",
"updated_at": "2024-01-22T13:27:36Z",
"pushed_at": "2024-01-11T19:42:03Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 80,
"watchers": 81,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2024-01-22T01:34:31Z",
"updated_at": "2024-01-22T14:45:18Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 142,
"watchers": 143,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for file upload vulnerability in BoidCMS version <=2.0.0",
"fork": false,
"created_at": "2023-08-16T14:30:30Z",
"updated_at": "2023-10-24T07:56:24Z",
"updated_at": "2024-01-22T17:53:30Z",
"pushed_at": "2023-09-06T05:59:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-01-22T11:59:38Z",
"updated_at": "2024-01-22T14:46:22Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 31,
"watchers": 34,
"score": 0,
"subscribers_count": 1
}

View file

@ -179,6 +179,36 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 733255762,
"name": "webp-CVE-2023-4863",
"full_name": "LiveOverflow\/webp-CVE-2023-4863",
"owner": {
"login": "LiveOverflow",
"id": 12161158,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
"html_url": "https:\/\/github.com\/LiveOverflow"
},
"html_url": "https:\/\/github.com\/LiveOverflow\/webp-CVE-2023-4863",
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-01-22T17:47:25Z",
"pushed_at": "2024-01-22T14:29:21Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},
{
"id": 733283933,
"name": "NotEnough",

View file

@ -13,10 +13,10 @@
"description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false,
"created_at": "2023-12-26T17:02:20Z",
"updated_at": "2024-01-06T15:16:31Z",
"updated_at": "2024-01-22T15:36:20Z",
"pushed_at": "2023-12-26T20:16:45Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-01-22T12:24:32Z",
"updated_at": "2024-01-22T15:25:22Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 1
}

View file

@ -912,6 +912,7 @@
- [OITApps/Find-VulnerableElectronVersion](https://github.com/OITApps/Find-VulnerableElectronVersion)
- [GTGalaxi/ElectronVulnerableVersion](https://github.com/GTGalaxi/ElectronVulnerableVersion)
- [murphysecurity/libwebp-checker](https://github.com/murphysecurity/libwebp-checker)
- [LiveOverflow/webp-CVE-2023-4863](https://github.com/LiveOverflow/webp-CVE-2023-4863)
- [caoweiquan322/NotEnough](https://github.com/caoweiquan322/NotEnough)
### CVE-2023-4911 (2023-10-03)
@ -1728,6 +1729,7 @@
- [Sudistark/patch-diff-CVE-2023-22527](https://github.com/Sudistark/patch-diff-CVE-2023-22527)
- [ga0we1/CVE-2023-22527_Confluence_RCE](https://github.com/ga0we1/CVE-2023-22527_Confluence_RCE)
- [Drun1baby/CVE-2023-22527](https://github.com/Drun1baby/CVE-2023-22527)
- [cleverg0d/CVE-2023-22527](https://github.com/cleverg0d/CVE-2023-22527)
### CVE-2023-22551 (2023-01-01)
@ -2679,6 +2681,7 @@
- [uthrasri/CVE-2023-28588_system_bt](https://github.com/uthrasri/CVE-2023-28588_system_bt)
- [uthrasri/CVE-2023-28588_Singlefile](https://github.com/uthrasri/CVE-2023-28588_Singlefile)
- [uthrasri/G2.5_CVE-2023-28588](https://github.com/uthrasri/G2.5_CVE-2023-28588)
- [uthrasri/CVE-2023-28588_G2.5_singlefile](https://github.com/uthrasri/CVE-2023-28588_G2.5_singlefile)
### CVE-2023-28771 (2023-04-24)
@ -2815,6 +2818,7 @@
- [SynixCyberCrimeMy/CVE-2023-29489](https://github.com/SynixCyberCrimeMy/CVE-2023-29489)
- [Makurorororororororo/Validate-CVE-2023-29489-scanner-](https://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner-)
- [prasad-1808/tool-29489](https://github.com/prasad-1808/tool-29489)
- [Praveenms13/CVE-2023-29489](https://github.com/Praveenms13/CVE-2023-29489)
### CVE-2023-29808 (2023-05-11)
@ -6563,7 +6567,7 @@
### CVE-2023-51764 (2023-12-24)
<code>Postfix through 3.8.4 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports &lt;LF&gt;.&lt;CR&gt;&lt;LF&gt; but some other popular e-mail servers do not. To prevent attack variants (by always disallowing &lt;LF&gt; without &lt;CR&gt;), a different solution is required: the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
<code>Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports &lt;LF&gt;.&lt;CR&gt;&lt;LF&gt; but some other popular e-mail servers do not. To prevent attack variants (by always disallowing &lt;LF&gt; without &lt;CR&gt;), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
</code>
- [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764)
@ -9270,6 +9274,7 @@
- [nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765](https://github.com/nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765)
- [UNICORDev/exploit-CVE-2022-25765](https://github.com/UNICORDev/exploit-CVE-2022-25765)
- [lekosbelas/PDFkit-CMD-Injection](https://github.com/lekosbelas/PDFkit-CMD-Injection)
- [lowercasenumbers/CVE-2022-25765](https://github.com/lowercasenumbers/CVE-2022-25765)
### CVE-2022-25813 (2022-09-02)
@ -32896,6 +32901,7 @@
- [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529)
- [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529)
- [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow)
- [gemboxteam/exploit-nginx-1.10.3](https://github.com/gemboxteam/exploit-nginx-1.10.3)
- [fardeen-ahmed/Remote-Integer-Overflow-Vulnerability](https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability)
- [mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability](https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability)
- [fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit](https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit)
@ -32938,6 +32944,7 @@
- [JrDw0/CVE-2017-7921-EXP](https://github.com/JrDw0/CVE-2017-7921-EXP)
- [BurnyMcDull/CVE-2017-7921](https://github.com/BurnyMcDull/CVE-2017-7921)
- [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang)
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
- [p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
@ -33163,6 +33170,7 @@
<code>Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
</code>
- [bao7uo/dp_crypto](https://github.com/bao7uo/dp_crypto)
- [capt-meelo/Telewreck](https://github.com/capt-meelo/Telewreck)
- [ictnamanh/CVE-2017-9248](https://github.com/ictnamanh/CVE-2017-9248)
- [ZhenwarX/Telerik-CVE-2017-9248-PoC](https://github.com/ZhenwarX/Telerik-CVE-2017-9248-PoC)
@ -33498,6 +33506,7 @@
</code>
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
### CVE-2017-11611 (2017-09-08)
@ -33553,10 +33562,12 @@
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882)
- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882)
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882)
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)
- [HaoJame/CVE-2017-11882](https://github.com/HaoJame/CVE-2017-11882)
- [5l1v3r1/rtfkit](https://github.com/5l1v3r1/rtfkit)
- [ActorExpose/CVE-2017-11882](https://github.com/ActorExpose/CVE-2017-11882)
- [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere)
- [lisinan988/CVE-2017-11882-exp](https://github.com/lisinan988/CVE-2017-11882-exp)
- [tzwlhack/CVE-2017-11882](https://github.com/tzwlhack/CVE-2017-11882)
- [Sunqiz/CVE-2017-11882-reproduction](https://github.com/Sunqiz/CVE-2017-11882-reproduction)
@ -33628,6 +33639,7 @@
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
- [xiaokp7/Tomcat_PUT_GUI_EXP](https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP)
@ -33938,6 +33950,13 @@
- [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568)
### CVE-2017-16651 (2017-11-09)
<code>Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&amp;_action=upload-display&amp;_from=timezone requests.
</code>
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
### CVE-2017-16720 (2018-01-05)
<code>A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device.
@ -39126,13 +39145,6 @@
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
### CVE-2001-0758 (2001-10-12)
<code>Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via &quot;CWD ...&quot; command.
</code>
- [alt3kx/CVE-2001-0758](https://github.com/alt3kx/CVE-2001-0758)
### CVE-2001-0931 (2002-02-02)
<code>Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET.