mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/01/22 18:31:58
This commit is contained in:
parent
cf4568a22d
commit
585e7e0212
56 changed files with 625 additions and 240 deletions
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132980512,
|
||||
"name": "CVE-2001-0758",
|
||||
"full_name": "alt3kx\/CVE-2001-0758",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0758",
|
||||
"description": "Directory traversal vulnerability in Shambala 4.5 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T02:47:18Z",
|
||||
"updated_at": "2018-05-11T09:16:42Z",
|
||||
"pushed_at": "2018-05-11T09:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -275,7 +275,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 679476726,
|
||||
|
|
|
@ -597,7 +597,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 18649488,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-01-21T18:55:26Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1867,
|
||||
"watchers_count": 1867,
|
||||
"stargazers_count": 1866,
|
||||
"watchers_count": 1866,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1867,
|
||||
"watchers": 1866,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -267,7 +267,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 24451053,
|
||||
|
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 66863858,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-01-21T18:55:26Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1867,
|
||||
"watchers_count": 1867,
|
||||
"stargazers_count": 1866,
|
||||
"watchers_count": 1866,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1867,
|
||||
"watchers": 1866,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -811,10 +811,10 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2023-09-26T14:11:13Z",
|
||||
"updated_at": "2024-01-22T14:35:29Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -823,7 +823,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 128,
|
||||
"watchers": 127,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -28,5 +28,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 323575291,
|
||||
"name": "CVE-2017-11610",
|
||||
"full_name": "yaunsky\/CVE-2017-11610",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/CVE-2017-11610",
|
||||
"description": "Supervisord远程命令执行漏洞脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-22T09:08:49Z",
|
||||
"updated_at": "2022-03-20T05:21:38Z",
|
||||
"pushed_at": "2020-12-22T09:12:07Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -636,6 +636,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 202340795,
|
||||
"name": "CVE-2017-11882",
|
||||
"full_name": "littlebin404\/CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "littlebin404",
|
||||
"id": 54022042,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54022042?v=4",
|
||||
"html_url": "https:\/\/github.com\/littlebin404"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/littlebin404\/CVE-2017-11882",
|
||||
"description": "CVE-2017-11882(通杀Office 2003到2016)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-14T11:55:00Z",
|
||||
"updated_at": "2023-09-28T11:05:07Z",
|
||||
"pushed_at": "2020-12-22T07:23:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 232606684,
|
||||
"name": "Overflow-Demo-CVE-2017-11882",
|
||||
|
@ -756,6 +786,49 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 332744031,
|
||||
"name": "SignHere",
|
||||
"full_name": "Retr0-code\/SignHere",
|
||||
"owner": {
|
||||
"login": "Retr0-code",
|
||||
"id": 60541996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60541996?v=4",
|
||||
"html_url": "https:\/\/github.com\/Retr0-code"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Retr0-code\/SignHere",
|
||||
"description": "SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T12:44:03Z",
|
||||
"updated_at": "2023-02-12T18:04:41Z",
|
||||
"pushed_at": "2021-01-26T16:29:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"automation",
|
||||
"build-tool",
|
||||
"builder",
|
||||
"cve",
|
||||
"cve-2017-11882",
|
||||
"equation",
|
||||
"malicious",
|
||||
"microsoft",
|
||||
"office",
|
||||
"python3",
|
||||
"rtf",
|
||||
"vulnerabilities"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 431719997,
|
||||
"name": "CVE-2017-11882-exp",
|
||||
|
|
|
@ -299,6 +299,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 328929654,
|
||||
"name": "CVE-2017-12615-EXP",
|
||||
"full_name": "w0x68y\/CVE-2017-12615-EXP",
|
||||
"owner": {
|
||||
"login": "w0x68y",
|
||||
"id": 22195911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
|
||||
"html_url": "https:\/\/github.com\/w0x68y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
|
||||
"description": "CVE-2017-12615 任意文件写入exp,写入webshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T09:07:12Z",
|
||||
"updated_at": "2022-10-23T07:40:44Z",
|
||||
"pushed_at": "2021-01-13T03:23:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 565419626,
|
||||
"name": "AttackTomcat",
|
||||
|
|
32
2017/CVE-2017-16651.json
Normal file
32
2017/CVE-2017-16651.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 327169091,
|
||||
"name": "CVE-2017-16651",
|
||||
"full_name": "ropbear\/CVE-2017-16651",
|
||||
"owner": {
|
||||
"login": "ropbear",
|
||||
"id": 11134586,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134586?v=4",
|
||||
"html_url": "https:\/\/github.com\/ropbear"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ropbear\/CVE-2017-16651",
|
||||
"description": "Python implementation of Roundcube LFI (CVE-2017-16651)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-06T01:46:39Z",
|
||||
"updated_at": "2023-09-24T16:23:48Z",
|
||||
"pushed_at": "2021-01-06T01:47:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-18T22:12:54Z",
|
||||
"updated_at": "2024-01-19T14:15:44Z",
|
||||
"updated_at": "2024-01-22T16:04:38Z",
|
||||
"pushed_at": "2024-01-20T01:47:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-01-21T18:55:26Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1867,
|
||||
"watchers_count": 1867,
|
||||
"stargazers_count": 1866,
|
||||
"watchers_count": 1866,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1867,
|
||||
"watchers": 1866,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -926,7 +926,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 93710291,
|
||||
|
|
|
@ -209,6 +209,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 330894535,
|
||||
"name": "exploit-nginx-1.10.3",
|
||||
"full_name": "gemboxteam\/exploit-nginx-1.10.3",
|
||||
"owner": {
|
||||
"login": "gemboxteam",
|
||||
"id": 27276452,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27276452?v=4",
|
||||
"html_url": "https:\/\/github.com\/gemboxteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gemboxteam\/exploit-nginx-1.10.3",
|
||||
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-19T07:12:10Z",
|
||||
"updated_at": "2023-12-26T17:34:28Z",
|
||||
"pushed_at": "2021-01-19T07:17:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 331347189,
|
||||
"name": "Remote-Integer-Overflow-Vulnerability",
|
||||
|
|
|
@ -59,6 +59,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 312471106,
|
||||
"name": "cve-2017-7921-golang",
|
||||
"full_name": "MisakaMikato\/cve-2017-7921-golang",
|
||||
"owner": {
|
||||
"login": "MisakaMikato",
|
||||
"id": 31957147,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4",
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang",
|
||||
"description": "Hikvision IP camera access bypass exploit, developed by golang. ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T04:15:31Z",
|
||||
"updated_at": "2023-06-25T06:04:21Z",
|
||||
"pushed_at": "2021-01-11T05:52:22Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 334195499,
|
||||
"name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 117610085,
|
||||
"name": "dp_crypto",
|
||||
"full_name": "bao7uo\/dp_crypto",
|
||||
"owner": {
|
||||
"login": "bao7uo",
|
||||
"id": 21125224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4",
|
||||
"html_url": "https:\/\/github.com\/bao7uo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bao7uo\/dp_crypto",
|
||||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2024-01-14T06:47:28Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
{
|
||||
"id": 143378191,
|
||||
"name": "Telewreck",
|
||||
|
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-01-21T18:55:26Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1867,
|
||||
"watchers_count": 1867,
|
||||
"stargazers_count": 1866,
|
||||
"watchers_count": 1866,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1867,
|
||||
"watchers": 1866,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-01-22T09:28:44Z",
|
||||
"updated_at": "2024-01-22T14:35:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3980,
|
||||
"watchers_count": 3980,
|
||||
"stargazers_count": 3979,
|
||||
"watchers_count": 3979,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1091,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1091,
|
||||
"watchers": 3980,
|
||||
"watchers": 3979,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2024-01-15T16:13:52Z",
|
||||
"updated_at": "2024-01-22T14:35:34Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
"stargazers_count": 922,
|
||||
"watchers_count": 922,
|
||||
"has_discussions": false,
|
||||
"forks_count": 182,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 182,
|
||||
"watchers": 923,
|
||||
"watchers": 922,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
},
|
||||
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-01-21T18:55:26Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1867,
|
||||
"watchers_count": 1867,
|
||||
"stargazers_count": 1866,
|
||||
"watchers_count": 1866,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1867,
|
||||
"watchers": 1866,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-01-22T09:28:44Z",
|
||||
"updated_at": "2024-01-22T14:35:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3980,
|
||||
"watchers_count": 3980,
|
||||
"stargazers_count": 3979,
|
||||
"watchers_count": 3979,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1091,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1091,
|
||||
"watchers": 3980,
|
||||
"watchers": 3979,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2024-01-12T13:09:45Z",
|
||||
"updated_at": "2024-01-22T14:35:46Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1079,
|
||||
"watchers_count": 1079,
|
||||
"stargazers_count": 1078,
|
||||
"watchers_count": 1078,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1079,
|
||||
"watchers": 1078,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
}
|
||||
|
|
|
@ -403,10 +403,10 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2024-01-19T21:15:40Z",
|
||||
"updated_at": "2024-01-22T14:35:39Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -421,7 +421,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 331,
|
||||
"watchers": 330,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2024-01-21T18:55:26Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1867,
|
||||
"watchers_count": 1867,
|
||||
"stargazers_count": 1866,
|
||||
"watchers_count": 1866,
|
||||
"has_discussions": true,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1867,
|
||||
"watchers": 1866,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
@ -154,10 +154,10 @@
|
|||
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-16T03:01:32Z",
|
||||
"updated_at": "2023-09-14T03:04:31Z",
|
||||
"updated_at": "2024-01-22T14:35:40Z",
|
||||
"pushed_at": "2022-08-07T06:36:30Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -166,7 +166,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 87,
|
||||
"watchers": 86,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-4464 \/ CVE-2020-4450",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-17T08:44:49Z",
|
||||
"updated_at": "2023-07-25T03:14:10Z",
|
||||
"updated_at": "2024-01-22T14:35:49Z",
|
||||
"pushed_at": "2021-08-24T15:02:19Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 33,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T13:57:14Z",
|
||||
"updated_at": "2024-01-09T13:17:46Z",
|
||||
"updated_at": "2024-01-22T14:35:38Z",
|
||||
"pushed_at": "2020-02-13T12:56:31Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 104,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2023-12-22T03:30:07Z",
|
||||
"updated_at": "2024-01-22T14:35:39Z",
|
||||
"pushed_at": "2020-04-14T12:31:19Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 115,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -223,10 +223,10 @@
|
|||
"description": "Exploit script for CVE-2020-7961",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T19:18:13Z",
|
||||
"updated_at": "2024-01-11T07:41:23Z",
|
||||
"updated_at": "2024-01-22T14:35:45Z",
|
||||
"pushed_at": "2021-01-15T10:51:58Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 20,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T02:25:25Z",
|
||||
"updated_at": "2024-01-17T16:03:47Z",
|
||||
"updated_at": "2024-01-22T17:34:48Z",
|
||||
"pushed_at": "2022-01-11T11:22:06Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-01-20T08:41:57Z",
|
||||
"updated_at": "2024-01-22T14:35:55Z",
|
||||
"pushed_at": "2023-12-06T15:30:56Z",
|
||||
"stargazers_count": 1197,
|
||||
"watchers_count": 1197,
|
||||
"stargazers_count": 1196,
|
||||
"watchers_count": 1196,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 1197,
|
||||
"watchers": 1196,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2024-01-19T10:16:01Z",
|
||||
"updated_at": "2024-01-22T14:35:50Z",
|
||||
"pushed_at": "2022-11-16T08:14:33Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
|
@ -147,7 +147,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 248,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2024-01-12T13:09:45Z",
|
||||
"updated_at": "2024-01-22T14:35:46Z",
|
||||
"pushed_at": "2023-05-11T14:36:58Z",
|
||||
"stargazers_count": 1079,
|
||||
"watchers_count": 1079,
|
||||
"stargazers_count": 1078,
|
||||
"watchers_count": 1078,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1079,
|
||||
"watchers": 1078,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2024-01-19T23:20:57Z",
|
||||
"updated_at": "2024-01-22T14:35:49Z",
|
||||
"pushed_at": "2021-12-03T22:09:31Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 300,
|
||||
"watchers": 299,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2023-12-20T10:39:17Z",
|
||||
"updated_at": "2024-01-22T15:18:15Z",
|
||||
"pushed_at": "2023-07-10T16:41:49Z",
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 280,
|
||||
"watchers": 281,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2024-01-18T15:35:11Z",
|
||||
"updated_at": "2024-01-22T14:35:51Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"stargazers_count": 948,
|
||||
"watchers_count": 948,
|
||||
"has_discussions": false,
|
||||
"forks_count": 192,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 192,
|
||||
"watchers": 950,
|
||||
"watchers": 948,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T06:39:07Z",
|
||||
"updated_at": "2023-08-07T08:43:00Z",
|
||||
"updated_at": "2024-01-22T18:02:15Z",
|
||||
"pushed_at": "2023-01-12T09:05:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -401,10 +401,10 @@
|
|||
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T14:22:49Z",
|
||||
"updated_at": "2024-01-04T17:04:04Z",
|
||||
"updated_at": "2024-01-22T14:35:51Z",
|
||||
"pushed_at": "2021-12-14T15:16:15Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -420,7 +420,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 125,
|
||||
"watchers": 124,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
@ -760,10 +760,10 @@
|
|||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:46:18Z",
|
||||
"updated_at": "2024-01-11T07:41:27Z",
|
||||
"updated_at": "2024-01-22T14:35:51Z",
|
||||
"pushed_at": "2021-12-13T22:27:25Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -772,7 +772,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 193,
|
||||
"watchers": 191,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-01-20T06:15:16Z",
|
||||
"updated_at": "2024-01-22T14:35:51Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 760,
|
||||
"watchers_count": 760,
|
||||
"stargazers_count": 759,
|
||||
"watchers_count": 759,
|
||||
"has_discussions": false,
|
||||
"forks_count": 116,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 116,
|
||||
"watchers": 760,
|
||||
"watchers": 759,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -3546,10 +3546,10 @@
|
|||
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T01:55:51Z",
|
||||
"updated_at": "2024-01-02T13:31:49Z",
|
||||
"updated_at": "2024-01-22T16:55:42Z",
|
||||
"pushed_at": "2021-12-13T09:18:19Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -3558,7 +3558,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -3666,10 +3666,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2024-01-21T08:54:48Z",
|
||||
"updated_at": "2024-01-22T14:35:52Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3331,
|
||||
"watchers_count": 3331,
|
||||
"stargazers_count": 3330,
|
||||
"watchers_count": 3330,
|
||||
"has_discussions": true,
|
||||
"forks_count": 748,
|
||||
"allow_forking": true,
|
||||
|
@ -3678,7 +3678,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 748,
|
||||
"watchers": 3331,
|
||||
"watchers": 3330,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
@ -5715,10 +5715,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2024-01-16T02:05:08Z",
|
||||
"updated_at": "2024-01-22T14:32:44Z",
|
||||
"pushed_at": "2022-12-27T17:57:19Z",
|
||||
"stargazers_count": 436,
|
||||
"watchers_count": 436,
|
||||
"stargazers_count": 434,
|
||||
"watchers_count": 434,
|
||||
"has_discussions": true,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
|
@ -5736,7 +5736,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 436,
|
||||
"watchers": 434,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A script for exploiting CVE-2022-1227",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-01T07:28:15Z",
|
||||
"updated_at": "2023-12-07T11:08:12Z",
|
||||
"updated_at": "2024-01-22T13:04:24Z",
|
||||
"pushed_at": "2023-04-13T12:36:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-05T10:35:35Z",
|
||||
"updated_at": "2023-12-27T09:56:14Z",
|
||||
"updated_at": "2024-01-22T14:35:53Z",
|
||||
"pushed_at": "2022-05-09T21:09:45Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 52,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -140,10 +140,10 @@
|
|||
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-07T17:54:08Z",
|
||||
"updated_at": "2024-01-04T17:08:24Z",
|
||||
"updated_at": "2024-01-22T14:35:54Z",
|
||||
"pushed_at": "2022-05-09T11:15:27Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -152,7 +152,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 93,
|
||||
"watchers": 92,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -290,10 +290,10 @@
|
|||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T10:22:31Z",
|
||||
"updated_at": "2024-01-10T06:17:42Z",
|
||||
"updated_at": "2024-01-22T14:35:54Z",
|
||||
"pushed_at": "2022-06-28T18:14:40Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -302,7 +302,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 85,
|
||||
"watchers": 84,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -410,10 +410,10 @@
|
|||
"description": "POC for CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T11:46:45Z",
|
||||
"updated_at": "2024-01-17T16:04:02Z",
|
||||
"updated_at": "2024-01-22T14:35:54Z",
|
||||
"pushed_at": "2022-05-09T20:52:07Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -422,7 +422,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 232,
|
||||
"watchers": 231,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -473,10 +473,10 @@
|
|||
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T14:02:34Z",
|
||||
"updated_at": "2022-10-07T14:45:05Z",
|
||||
"updated_at": "2024-01-22T14:35:54Z",
|
||||
"pushed_at": "2022-08-22T01:20:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -485,7 +485,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2024-01-19T10:16:11Z",
|
||||
"updated_at": "2024-01-22T13:40:37Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -796,10 +796,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-01-20T08:41:57Z",
|
||||
"updated_at": "2024-01-22T14:35:55Z",
|
||||
"pushed_at": "2023-12-06T15:30:56Z",
|
||||
"stargazers_count": 1197,
|
||||
"watchers_count": 1197,
|
||||
"stargazers_count": 1196,
|
||||
"watchers_count": 1196,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"allow_forking": true,
|
||||
|
@ -815,7 +815,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"watchers": 1197,
|
||||
"watchers": 1196,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T01:40:04Z",
|
||||
"updated_at": "2024-01-11T07:41:28Z",
|
||||
"updated_at": "2024-01-22T14:35:53Z",
|
||||
"pushed_at": "2023-03-05T12:41:19Z",
|
||||
"stargazers_count": 353,
|
||||
"watchers_count": 353,
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 353,
|
||||
"watchers": 351,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -242,5 +242,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 746721441,
|
||||
"name": "CVE-2022-25765",
|
||||
"full_name": "lowercasenumbers\/CVE-2022-25765",
|
||||
"owner": {
|
||||
"login": "lowercasenumbers",
|
||||
"id": 95596630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95596630?v=4",
|
||||
"html_url": "https:\/\/github.com\/lowercasenumbers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lowercasenumbers\/CVE-2022-25765",
|
||||
"description": "Exploit for CVE-2022-25765",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T14:45:34Z",
|
||||
"updated_at": "2024-01-22T14:49:17Z",
|
||||
"pushed_at": "2024-01-22T15:04:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2024-01-13T08:10:08Z",
|
||||
"updated_at": "2024-01-22T14:35:55Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 289,
|
||||
"watchers": 287,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -73,8 +73,38 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T11:38:55Z",
|
||||
"updated_at": "2024-01-22T11:38:56Z",
|
||||
"updated_at": "2024-01-22T15:44:40Z",
|
||||
"pushed_at": "2024-01-22T12:07:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 746667961,
|
||||
"name": "CVE-2023-22527",
|
||||
"full_name": "cleverg0d\/CVE-2023-22527",
|
||||
"owner": {
|
||||
"login": "cleverg0d",
|
||||
"id": 108401157,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108401157?v=4",
|
||||
"html_url": "https:\/\/github.com\/cleverg0d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cleverg0d\/CVE-2023-22527",
|
||||
"description": "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T13:26:45Z",
|
||||
"updated_at": "2024-01-22T13:26:45Z",
|
||||
"pushed_at": "2024-01-22T13:31:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -148,5 +148,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 746664124,
|
||||
"name": "CVE-2023-28588_G2.5_singlefile",
|
||||
"full_name": "uthrasri\/CVE-2023-28588_G2.5_singlefile",
|
||||
"owner": {
|
||||
"login": "uthrasri",
|
||||
"id": 145666390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
|
||||
"html_url": "https:\/\/github.com\/uthrasri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uthrasri\/CVE-2023-28588_G2.5_singlefile",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T13:17:35Z",
|
||||
"updated_at": "2024-01-22T13:18:30Z",
|
||||
"pushed_at": "2024-01-22T13:19:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -478,5 +478,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 746752421,
|
||||
"name": "CVE-2023-29489",
|
||||
"full_name": "Praveenms13\/CVE-2023-29489",
|
||||
"owner": {
|
||||
"login": "Praveenms13",
|
||||
"id": 60701202,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60701202?v=4",
|
||||
"html_url": "https:\/\/github.com\/Praveenms13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Praveenms13\/CVE-2023-29489",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-22T15:54:49Z",
|
||||
"updated_at": "2024-01-22T15:55:28Z",
|
||||
"pushed_at": "2024-01-22T17:57:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Privilege escalation using the XAML diagnostics API (CVE-2023-36003)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-11T19:17:13Z",
|
||||
"updated_at": "2024-01-22T12:03:07Z",
|
||||
"updated_at": "2024-01-22T13:27:36Z",
|
||||
"pushed_at": "2024-01-11T19:42:03Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-36802",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T17:32:15Z",
|
||||
"updated_at": "2024-01-22T01:34:31Z",
|
||||
"updated_at": "2024-01-22T14:45:18Z",
|
||||
"pushed_at": "2023-10-10T17:44:17Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 142,
|
||||
"watchers": 143,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for file upload vulnerability in BoidCMS version <=2.0.0",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-16T14:30:30Z",
|
||||
"updated_at": "2023-10-24T07:56:24Z",
|
||||
"updated_at": "2024-01-22T17:53:30Z",
|
||||
"pushed_at": "2023-09-06T05:59:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T07:14:06Z",
|
||||
"updated_at": "2024-01-22T11:59:38Z",
|
||||
"updated_at": "2024-01-22T14:46:22Z",
|
||||
"pushed_at": "2024-01-21T05:04:01Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 31,
|
||||
"watchers": 34,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -179,6 +179,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 733255762,
|
||||
"name": "webp-CVE-2023-4863",
|
||||
"full_name": "LiveOverflow\/webp-CVE-2023-4863",
|
||||
"owner": {
|
||||
"login": "LiveOverflow",
|
||||
"id": 12161158,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12161158?v=4",
|
||||
"html_url": "https:\/\/github.com\/LiveOverflow"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LiveOverflow\/webp-CVE-2023-4863",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-18T23:12:25Z",
|
||||
"updated_at": "2024-01-22T17:47:25Z",
|
||||
"pushed_at": "2024-01-22T14:29:21Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 733283933,
|
||||
"name": "NotEnough",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Postfix SMTP Smuggling - Expect Script POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T17:02:20Z",
|
||||
"updated_at": "2024-01-06T15:16:31Z",
|
||||
"updated_at": "2024-01-22T15:36:20Z",
|
||||
"pushed_at": "2023-12-26T20:16:45Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-12T15:08:01Z",
|
||||
"updated_at": "2024-01-22T12:24:32Z",
|
||||
"updated_at": "2024-01-22T15:25:22Z",
|
||||
"pushed_at": "2024-01-14T07:14:33Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
28
README.md
28
README.md
|
@ -912,6 +912,7 @@
|
|||
- [OITApps/Find-VulnerableElectronVersion](https://github.com/OITApps/Find-VulnerableElectronVersion)
|
||||
- [GTGalaxi/ElectronVulnerableVersion](https://github.com/GTGalaxi/ElectronVulnerableVersion)
|
||||
- [murphysecurity/libwebp-checker](https://github.com/murphysecurity/libwebp-checker)
|
||||
- [LiveOverflow/webp-CVE-2023-4863](https://github.com/LiveOverflow/webp-CVE-2023-4863)
|
||||
- [caoweiquan322/NotEnough](https://github.com/caoweiquan322/NotEnough)
|
||||
|
||||
### CVE-2023-4911 (2023-10-03)
|
||||
|
@ -1728,6 +1729,7 @@
|
|||
- [Sudistark/patch-diff-CVE-2023-22527](https://github.com/Sudistark/patch-diff-CVE-2023-22527)
|
||||
- [ga0we1/CVE-2023-22527_Confluence_RCE](https://github.com/ga0we1/CVE-2023-22527_Confluence_RCE)
|
||||
- [Drun1baby/CVE-2023-22527](https://github.com/Drun1baby/CVE-2023-22527)
|
||||
- [cleverg0d/CVE-2023-22527](https://github.com/cleverg0d/CVE-2023-22527)
|
||||
|
||||
### CVE-2023-22551 (2023-01-01)
|
||||
|
||||
|
@ -2679,6 +2681,7 @@
|
|||
- [uthrasri/CVE-2023-28588_system_bt](https://github.com/uthrasri/CVE-2023-28588_system_bt)
|
||||
- [uthrasri/CVE-2023-28588_Singlefile](https://github.com/uthrasri/CVE-2023-28588_Singlefile)
|
||||
- [uthrasri/G2.5_CVE-2023-28588](https://github.com/uthrasri/G2.5_CVE-2023-28588)
|
||||
- [uthrasri/CVE-2023-28588_G2.5_singlefile](https://github.com/uthrasri/CVE-2023-28588_G2.5_singlefile)
|
||||
|
||||
### CVE-2023-28771 (2023-04-24)
|
||||
|
||||
|
@ -2815,6 +2818,7 @@
|
|||
- [SynixCyberCrimeMy/CVE-2023-29489](https://github.com/SynixCyberCrimeMy/CVE-2023-29489)
|
||||
- [Makurorororororororo/Validate-CVE-2023-29489-scanner-](https://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner-)
|
||||
- [prasad-1808/tool-29489](https://github.com/prasad-1808/tool-29489)
|
||||
- [Praveenms13/CVE-2023-29489](https://github.com/Praveenms13/CVE-2023-29489)
|
||||
|
||||
### CVE-2023-29808 (2023-05-11)
|
||||
|
||||
|
@ -6563,7 +6567,7 @@
|
|||
|
||||
### CVE-2023-51764 (2023-12-24)
|
||||
|
||||
<code>Postfix through 3.8.4 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required: the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
|
||||
<code>Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
|
||||
</code>
|
||||
|
||||
- [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764)
|
||||
|
@ -9270,6 +9274,7 @@
|
|||
- [nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765](https://github.com/nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765)
|
||||
- [UNICORDev/exploit-CVE-2022-25765](https://github.com/UNICORDev/exploit-CVE-2022-25765)
|
||||
- [lekosbelas/PDFkit-CMD-Injection](https://github.com/lekosbelas/PDFkit-CMD-Injection)
|
||||
- [lowercasenumbers/CVE-2022-25765](https://github.com/lowercasenumbers/CVE-2022-25765)
|
||||
|
||||
### CVE-2022-25813 (2022-09-02)
|
||||
|
||||
|
@ -32896,6 +32901,7 @@
|
|||
- [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529)
|
||||
- [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529)
|
||||
- [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow)
|
||||
- [gemboxteam/exploit-nginx-1.10.3](https://github.com/gemboxteam/exploit-nginx-1.10.3)
|
||||
- [fardeen-ahmed/Remote-Integer-Overflow-Vulnerability](https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability)
|
||||
- [mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability](https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability)
|
||||
- [fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit](https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit)
|
||||
|
@ -32938,6 +32944,7 @@
|
|||
|
||||
- [JrDw0/CVE-2017-7921-EXP](https://github.com/JrDw0/CVE-2017-7921-EXP)
|
||||
- [BurnyMcDull/CVE-2017-7921](https://github.com/BurnyMcDull/CVE-2017-7921)
|
||||
- [MisakaMikato/cve-2017-7921-golang](https://github.com/MisakaMikato/cve-2017-7921-golang)
|
||||
- [chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
- [p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor](https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor)
|
||||
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
|
||||
|
@ -33163,6 +33170,7 @@
|
|||
<code>Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
|
||||
</code>
|
||||
|
||||
- [bao7uo/dp_crypto](https://github.com/bao7uo/dp_crypto)
|
||||
- [capt-meelo/Telewreck](https://github.com/capt-meelo/Telewreck)
|
||||
- [ictnamanh/CVE-2017-9248](https://github.com/ictnamanh/CVE-2017-9248)
|
||||
- [ZhenwarX/Telerik-CVE-2017-9248-PoC](https://github.com/ZhenwarX/Telerik-CVE-2017-9248-PoC)
|
||||
|
@ -33498,6 +33506,7 @@
|
|||
</code>
|
||||
|
||||
- [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610)
|
||||
- [yaunsky/CVE-2017-11610](https://github.com/yaunsky/CVE-2017-11610)
|
||||
|
||||
### CVE-2017-11611 (2017-09-08)
|
||||
|
||||
|
@ -33553,10 +33562,12 @@
|
|||
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
|
||||
- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882)
|
||||
- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882)
|
||||
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882)
|
||||
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)
|
||||
- [HaoJame/CVE-2017-11882](https://github.com/HaoJame/CVE-2017-11882)
|
||||
- [5l1v3r1/rtfkit](https://github.com/5l1v3r1/rtfkit)
|
||||
- [ActorExpose/CVE-2017-11882](https://github.com/ActorExpose/CVE-2017-11882)
|
||||
- [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere)
|
||||
- [lisinan988/CVE-2017-11882-exp](https://github.com/lisinan988/CVE-2017-11882-exp)
|
||||
- [tzwlhack/CVE-2017-11882](https://github.com/tzwlhack/CVE-2017-11882)
|
||||
- [Sunqiz/CVE-2017-11882-reproduction](https://github.com/Sunqiz/CVE-2017-11882-reproduction)
|
||||
|
@ -33628,6 +33639,7 @@
|
|||
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
|
||||
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
|
||||
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
|
||||
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
|
||||
- [tpt11fb/AttackTomcat](https://github.com/tpt11fb/AttackTomcat)
|
||||
- [xiaokp7/Tomcat_PUT_GUI_EXP](https://github.com/xiaokp7/Tomcat_PUT_GUI_EXP)
|
||||
|
||||
|
@ -33938,6 +33950,13 @@
|
|||
|
||||
- [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568)
|
||||
|
||||
### CVE-2017-16651 (2017-11-09)
|
||||
|
||||
<code>Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
|
||||
</code>
|
||||
|
||||
- [ropbear/CVE-2017-16651](https://github.com/ropbear/CVE-2017-16651)
|
||||
|
||||
### CVE-2017-16720 (2018-01-05)
|
||||
|
||||
<code>A Path Traversal issue was discovered in WebAccess versions 8.3.2 and earlier. An attacker has access to files within the directory structure of the target device.
|
||||
|
@ -39126,13 +39145,6 @@
|
|||
|
||||
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
|
||||
|
||||
### CVE-2001-0758 (2001-10-12)
|
||||
|
||||
<code>Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via "CWD ..." command.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2001-0758](https://github.com/alt3kx/CVE-2001-0758)
|
||||
|
||||
### CVE-2001-0931 (2002-02-02)
|
||||
|
||||
<code>Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attackers to list or read arbitrary files and directories via a .. (dot dot) in (1) LS or (2) GET.
|
||||
|
|
Loading…
Reference in a new issue