mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/12/10 18:30:41
This commit is contained in:
parent
ac936d78cb
commit
5ee2a20815
43 changed files with 490 additions and 222 deletions
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132968731,
|
||||
"name": "CVE-2001-0680",
|
||||
"full_name": "alt3kx\/CVE-2001-0680",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680",
|
||||
"description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T00:29:56Z",
|
||||
"updated_at": "2018-05-11T09:19:48Z",
|
||||
"pushed_at": "2018-05-11T09:19:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2023-12-06T21:33:40Z",
|
||||
"updated_at": "2023-12-10T16:28:14Z",
|
||||
"pushed_at": "2023-09-12T16:52:26Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 7481496,
|
||||
"name": "diaggetroot",
|
||||
"full_name": "hiikezoe\/diaggetroot",
|
||||
"owner": {
|
||||
"login": "hiikezoe",
|
||||
"id": 188175,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4",
|
||||
"html_url": "https:\/\/github.com\/hiikezoe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot",
|
||||
"description": "Obtain root access through CVE-2012-4220",
|
||||
"fork": false,
|
||||
"created_at": "2013-01-07T11:45:35Z",
|
||||
"updated_at": "2023-09-28T10:21:15Z",
|
||||
"pushed_at": "2013-04-03T11:58:57Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 11198771,
|
||||
"name": "root-zte-open",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 8106302,
|
||||
"name": "MySQL-Fu.rb",
|
||||
"full_name": "Hood3dRob1n\/MySQL-Fu.rb",
|
||||
"owner": {
|
||||
"login": "Hood3dRob1n",
|
||||
"id": 1881344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hood3dRob1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hood3dRob1n\/MySQL-Fu.rb",
|
||||
"description": "MySQL-Fu is a Ruby based MySQL Client Script I wrote. It does most of the stuff a normal MySQL client might do: SQL Shell, Update\/Delete\/Drop Database\/Table, Add\/Delete Users, Dump Database(s)\/Table w\/ option for gzip...... Plus a few extra options to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2013-02-09T04:59:43Z",
|
||||
"updated_at": "2023-06-21T15:30:06Z",
|
||||
"pushed_at": "2013-02-09T05:02:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 137385853,
|
||||
"name": "UDFPwn-CVE-2012-5613",
|
||||
|
|
32
2012/CVE-2012-5664.json
Normal file
32
2012/CVE-2012-5664.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 7420891,
|
||||
"name": "rails-cve-2012-5664-test",
|
||||
"full_name": "phusion\/rails-cve-2012-5664-test",
|
||||
"owner": {
|
||||
"login": "phusion",
|
||||
"id": 830588,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/830588?v=4",
|
||||
"html_url": "https:\/\/github.com\/phusion"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phusion\/rails-cve-2012-5664-test",
|
||||
"description": "Demo app showing how the Rails CVE-2013-5664 vulnerability works.",
|
||||
"fork": false,
|
||||
"created_at": "2013-01-03T10:07:27Z",
|
||||
"updated_at": "2018-03-12T19:42:18Z",
|
||||
"pushed_at": "2013-01-03T13:15:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
]
|
32
2012/CVE-2012-5958.json
Normal file
32
2012/CVE-2012-5958.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 9437130,
|
||||
"name": "vulnupnp",
|
||||
"full_name": "lochiiconnectivity\/vulnupnp",
|
||||
"owner": {
|
||||
"login": "lochiiconnectivity",
|
||||
"id": 4155305,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4",
|
||||
"html_url": "https:\/\/github.com\/lochiiconnectivity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp",
|
||||
"description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959",
|
||||
"fork": false,
|
||||
"created_at": "2013-04-14T23:34:56Z",
|
||||
"updated_at": "2016-09-04T16:49:13Z",
|
||||
"pushed_at": "2013-04-14T23:37:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -119,6 +119,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 188897438,
|
||||
"name": "CVE-2013-0156",
|
||||
"full_name": "R3dKn33-zz\/CVE-2013-0156",
|
||||
"owner": {
|
||||
"login": "R3dKn33-zz",
|
||||
"id": 31809058,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31809058?v=4",
|
||||
"html_url": "https:\/\/github.com\/R3dKn33-zz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R3dKn33-zz\/CVE-2013-0156",
|
||||
"description": "Arbitrary deserialization that can be used to trigger SQL injection and even Code execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-27T19:17:55Z",
|
||||
"updated_at": "2019-05-27T19:25:01Z",
|
||||
"pushed_at": "2019-05-27T19:24:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 672302842,
|
||||
"name": "kuang_grade_mk11",
|
||||
|
|
|
@ -59,6 +59,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 200347068,
|
||||
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"owner": {
|
||||
"login": "tachibana51",
|
||||
"id": 29031994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
|
||||
"html_url": "https:\/\/github.com\/tachibana51"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"description": "this is not stable",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-03T07:38:18Z",
|
||||
"updated_at": "2019-10-26T18:48:26Z",
|
||||
"pushed_at": "2019-08-03T07:58:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 275396332,
|
||||
"name": "CVE-2013-2028-Exploit",
|
||||
|
|
|
@ -148,5 +148,35 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 198426665,
|
||||
"name": "CVE-2013-2094",
|
||||
"full_name": "vnik5287\/CVE-2013-2094",
|
||||
"owner": {
|
||||
"login": "vnik5287",
|
||||
"id": 9650718,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4",
|
||||
"html_url": "https:\/\/github.com\/vnik5287"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vnik5287\/CVE-2013-2094",
|
||||
"description": "perf_swevent_init",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T12:31:55Z",
|
||||
"updated_at": "2019-07-23T12:33:10Z",
|
||||
"pushed_at": "2019-07-23T12:33:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2016/CVE-2016-2118.json
Normal file
32
2016/CVE-2016-2118.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 56461631,
|
||||
"name": "cfengine-CVE-2016-2118",
|
||||
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
|
||||
"description": "An example detection and remediation policy.",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-17T22:22:04Z",
|
||||
"updated_at": "2016-04-18T02:57:44Z",
|
||||
"pushed_at": "2016-04-19T14:24:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2016/CVE-2016-3141.json
Normal file
32
2016/CVE-2016-3141.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 56758577,
|
||||
"name": "CVE-2016-3141",
|
||||
"full_name": "peternguyen93\/CVE-2016-3141",
|
||||
"owner": {
|
||||
"login": "peternguyen93",
|
||||
"id": 1802870,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
|
||||
"html_url": "https:\/\/github.com\/peternguyen93"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
|
||||
"description": "CVE-2016-3141",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-21T08:59:05Z",
|
||||
"updated_at": "2023-03-11T18:41:15Z",
|
||||
"pushed_at": "2016-04-23T15:55:01Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -29,36 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 95974378,
|
||||
"name": "CVE-2017-0213",
|
||||
"full_name": "zcgonvh\/CVE-2017-0213",
|
||||
"owner": {
|
||||
"login": "zcgonvh",
|
||||
"id": 25787677,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
|
||||
"html_url": "https:\/\/github.com\/zcgonvh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
|
||||
"description": "CVE-2017-0213 for command line",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-01T16:07:04Z",
|
||||
"updated_at": "2023-10-05T08:56:22Z",
|
||||
"pushed_at": "2017-07-01T16:19:12Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 105444160,
|
||||
"name": "CVE-2017-0213",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2023-11-29T09:10:14Z",
|
||||
"updated_at": "2023-12-10T12:31:29Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"stargazers_count": 559,
|
||||
"watchers_count": 559,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 558,
|
||||
"watchers": 559,
|
||||
"score": 0,
|
||||
"subscribers_count": 53
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2023-11-29T09:10:14Z",
|
||||
"updated_at": "2023-12-10T12:31:29Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"stargazers_count": 559,
|
||||
"watchers_count": 559,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 558,
|
||||
"watchers": 559,
|
||||
"score": 0,
|
||||
"subscribers_count": 53
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-09T22:25:02Z",
|
||||
"updated_at": "2023-12-10T11:10:13Z",
|
||||
"updated_at": "2023-12-10T16:51:42Z",
|
||||
"pushed_at": "2023-12-09T22:25:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -1841,10 +1841,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2023-12-02T20:43:48Z",
|
||||
"updated_at": "2023-12-10T16:19:31Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1155,
|
||||
"watchers_count": 1155,
|
||||
"stargazers_count": 1156,
|
||||
"watchers_count": 1156,
|
||||
"has_discussions": false,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
|
@ -1853,7 +1853,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 1155,
|
||||
"watchers": 1156,
|
||||
"score": 0,
|
||||
"subscribers_count": 69
|
||||
},
|
||||
|
|
|
@ -134,7 +134,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-12-10T11:52:48Z",
|
||||
"updated_at": "2023-12-10T12:11:32Z",
|
||||
"pushed_at": "2023-12-10T12:11:29Z",
|
||||
"pushed_at": "2023-12-10T16:31:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-01T12:41:03Z",
|
||||
"updated_at": "2023-11-24T20:22:52Z",
|
||||
"updated_at": "2023-12-10T18:13:17Z",
|
||||
"pushed_at": "2022-03-01T16:11:31Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-27T17:13:55Z",
|
||||
"updated_at": "2023-12-09T10:39:00Z",
|
||||
"pushed_at": "2023-12-09T10:36:50Z",
|
||||
"pushed_at": "2023-12-10T15:44:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -420,10 +420,10 @@
|
|||
"description": "A Golang implementation of clubby789's implementation of CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T04:58:16Z",
|
||||
"updated_at": "2023-08-09T21:34:27Z",
|
||||
"updated_at": "2023-12-10T18:14:05Z",
|
||||
"pushed_at": "2022-01-27T16:12:20Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -435,7 +435,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1305,10 +1305,10 @@
|
|||
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T17:53:16Z",
|
||||
"updated_at": "2023-12-05T12:38:22Z",
|
||||
"updated_at": "2023-12-10T18:14:03Z",
|
||||
"pushed_at": "2022-01-28T00:29:15Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -1317,7 +1317,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2023-12-09T15:40:46Z",
|
||||
"updated_at": "2023-12-10T18:15:31Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 938,
|
||||
"watchers_count": 938,
|
||||
"stargazers_count": 939,
|
||||
"watchers_count": 939,
|
||||
"has_discussions": false,
|
||||
"forks_count": 188,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,8 +29,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 938,
|
||||
"forks": 189,
|
||||
"watchers": 939,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-12-09T19:27:06Z",
|
||||
"updated_at": "2023-12-10T18:15:28Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1266,
|
||||
"watchers_count": 1266,
|
||||
"stargazers_count": 1267,
|
||||
"watchers_count": 1267,
|
||||
"has_discussions": false,
|
||||
"forks_count": 315,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 315,
|
||||
"watchers": 1266,
|
||||
"forks": 316,
|
||||
"watchers": 1267,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -603,10 +603,10 @@
|
|||
"description": "Hashes for vulnerable LOG4J versions",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T18:06:06Z",
|
||||
"updated_at": "2023-11-03T08:19:10Z",
|
||||
"updated_at": "2023-12-10T13:23:50Z",
|
||||
"pushed_at": "2021-12-17T17:02:24Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -615,7 +615,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 154,
|
||||
"watchers": 153,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
@ -760,10 +760,10 @@
|
|||
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:46:18Z",
|
||||
"updated_at": "2023-11-24T20:20:51Z",
|
||||
"updated_at": "2023-12-10T18:14:43Z",
|
||||
"pushed_at": "2021-12-13T22:27:25Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -772,7 +772,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2023-12-01T17:33:48Z",
|
||||
"pushed_at": "2023-12-10T15:54:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
@ -1837,10 +1837,10 @@
|
|||
"description": "Detections for CVE-2021-44228 inside of nested binaries",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T16:08:47Z",
|
||||
"updated_at": "2023-09-28T11:33:59Z",
|
||||
"updated_at": "2023-12-10T13:23:50Z",
|
||||
"pushed_at": "2021-12-18T22:20:25Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -1858,7 +1858,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"watchers": 33,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -3063,10 +3063,10 @@
|
|||
"description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T16:49:45Z",
|
||||
"updated_at": "2023-09-28T11:34:02Z",
|
||||
"updated_at": "2023-12-10T18:14:49Z",
|
||||
"pushed_at": "2021-12-12T21:48:06Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -3075,7 +3075,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -3703,10 +3703,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-12-08T12:40:36Z",
|
||||
"updated_at": "2023-12-10T16:35:42Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3317,
|
||||
"watchers_count": 3317,
|
||||
"stargazers_count": 3318,
|
||||
"watchers_count": 3318,
|
||||
"has_discussions": true,
|
||||
"forks_count": 750,
|
||||
"allow_forking": true,
|
||||
|
@ -3715,7 +3715,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 750,
|
||||
"watchers": 3317,
|
||||
"watchers": 3318,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
@ -6097,10 +6097,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T21:32:42Z",
|
||||
"updated_at": "2023-10-08T19:09:47Z",
|
||||
"updated_at": "2023-12-10T18:15:18Z",
|
||||
"pushed_at": "2021-12-15T11:23:38Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -6109,7 +6109,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T14:23:41Z",
|
||||
"updated_at": "2023-08-07T14:13:44Z",
|
||||
"updated_at": "2023-12-10T14:44:59Z",
|
||||
"pushed_at": "2023-03-15T14:33:48Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-21392: Local Privilege Escalation via NMR SUID in Oracle Enterprise Manager ",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T20:13:23Z",
|
||||
"updated_at": "2023-12-08T20:39:44Z",
|
||||
"updated_at": "2023-12-10T18:13:59Z",
|
||||
"pushed_at": "2023-12-08T20:27:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2023-12-08T12:43:47Z",
|
||||
"updated_at": "2023-12-10T18:13:43Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 455,
|
||||
"watchers_count": 455,
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 455,
|
||||
"watchers": 456,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -505,11 +505,11 @@
|
|||
"html_url": "https:\/\/github.com\/kamal-marouane"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kamal-marouane\/CVE-2022-21907",
|
||||
"description": "HTTP Protocol Stack Remote Code Execution or System Crashing Vulnerability.",
|
||||
"description": "Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-09T22:26:49Z",
|
||||
"updated_at": "2023-12-10T04:41:18Z",
|
||||
"pushed_at": "2023-12-10T05:30:41Z",
|
||||
"updated_at": "2023-12-10T15:48:49Z",
|
||||
"pushed_at": "2023-12-10T17:52:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T01:40:04Z",
|
||||
"updated_at": "2023-12-07T09:47:53Z",
|
||||
"updated_at": "2023-12-10T18:11:07Z",
|
||||
"pushed_at": "2023-03-05T12:41:19Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"has_discussions": false,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 86,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2023-12-08T12:43:52Z",
|
||||
"updated_at": "2023-12-10T18:11:27Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"stargazers_count": 448,
|
||||
"watchers_count": 448,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 447,
|
||||
"watchers": 448,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2023-12-09T19:23:45Z",
|
||||
"updated_at": "2023-12-10T18:10:33Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 693,
|
||||
"watchers_count": 693,
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"has_discussions": false,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 693,
|
||||
"watchers": 694,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -515,10 +515,10 @@
|
|||
"description": "Mass Exploit for CVE 2022-29464 on Carbon",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-22T20:58:33Z",
|
||||
"updated_at": "2023-10-13T03:02:50Z",
|
||||
"updated_at": "2023-12-10T13:56:28Z",
|
||||
"pushed_at": "2022-06-22T23:54:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -538,7 +538,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -67,33 +67,33 @@
|
|||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 568677659,
|
||||
"name": "cve-2022-41352-zimbra-rce",
|
||||
"full_name": "aryrz\/cve-2022-41352-zimbra-rce",
|
||||
"id": 651133271,
|
||||
"name": "cve-2022-41352-zimbra-rce-1",
|
||||
"full_name": "lolminerxmrig\/cve-2022-41352-zimbra-rce-1",
|
||||
"owner": {
|
||||
"login": "aryrz",
|
||||
"id": 87161647,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87161647?v=4",
|
||||
"html_url": "https:\/\/github.com\/aryrz"
|
||||
"login": "lolminerxmrig",
|
||||
"id": 108659226,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108659226?v=4",
|
||||
"html_url": "https:\/\/github.com\/lolminerxmrig"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aryrz\/cve-2022-41352-zimbra-rce",
|
||||
"html_url": "https:\/\/github.com\/lolminerxmrig\/cve-2022-41352-zimbra-rce-1",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-11-21T07:10:12Z",
|
||||
"updated_at": "2022-11-22T08:49:55Z",
|
||||
"created_at": "2023-06-08T15:08:23Z",
|
||||
"updated_at": "2023-12-10T16:15:47Z",
|
||||
"pushed_at": "2022-11-21T07:10:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T08:32:26Z",
|
||||
"updated_at": "2023-12-10T11:21:39Z",
|
||||
"updated_at": "2023-12-10T15:15:25Z",
|
||||
"pushed_at": "2023-12-10T11:23:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-12-08T12:44:21Z",
|
||||
"updated_at": "2023-12-10T13:23:50Z",
|
||||
"pushed_at": "2023-08-17T19:26:55Z",
|
||||
"stargazers_count": 592,
|
||||
"watchers_count": 592,
|
||||
"stargazers_count": 591,
|
||||
"watchers_count": 591,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 592,
|
||||
"watchers": 591,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-12-09T04:35:12Z",
|
||||
"updated_at": "2023-12-10T16:04:01Z",
|
||||
"pushed_at": "2023-11-26T06:46:44Z",
|
||||
"stargazers_count": 707,
|
||||
"watchers_count": 707,
|
||||
"stargazers_count": 708,
|
||||
"watchers_count": 708,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 707,
|
||||
"watchers": 708,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-10T14:20:42Z",
|
||||
"updated_at": "2023-12-10T09:24:13Z",
|
||||
"updated_at": "2023-12-10T15:55:12Z",
|
||||
"pushed_at": "2023-10-14T16:43:31Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 195,
|
||||
"watchers": 194,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2023-12-02T12:13:51Z",
|
||||
"updated_at": "2023-12-10T13:23:19Z",
|
||||
"pushed_at": "2023-10-05T23:33:49Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -362,5 +362,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 729907332,
|
||||
"name": "Looney-Tunables",
|
||||
"full_name": "snurkeburk\/Looney-Tunables",
|
||||
"owner": {
|
||||
"login": "snurkeburk",
|
||||
"id": 70603096,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70603096?v=4",
|
||||
"html_url": "https:\/\/github.com\/snurkeburk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snurkeburk\/Looney-Tunables",
|
||||
"description": "PoC of CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-10T18:05:27Z",
|
||||
"updated_at": "2023-12-10T18:14:12Z",
|
||||
"pushed_at": "2023-12-10T18:12:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -150,7 +150,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-26T09:32:48Z",
|
||||
"updated_at": "2023-10-26T09:41:40Z",
|
||||
"pushed_at": "2023-10-26T09:39:46Z",
|
||||
"pushed_at": "2023-12-10T16:57:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T20:47:52Z",
|
||||
"updated_at": "2023-12-09T10:20:17Z",
|
||||
"updated_at": "2023-12-10T18:13:57Z",
|
||||
"pushed_at": "2023-12-09T10:54:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-06T05:46:16Z",
|
||||
"updated_at": "2023-12-04T01:13:06Z",
|
||||
"updated_at": "2023-12-10T13:15:23Z",
|
||||
"pushed_at": "2023-10-11T04:30:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
42
README.md
42
README.md
|
@ -827,6 +827,7 @@
|
|||
- [KernelKrise/CVE-2023-4911](https://github.com/KernelKrise/CVE-2023-4911)
|
||||
- [Diego-AltF4/CVE-2023-4911](https://github.com/Diego-AltF4/CVE-2023-4911)
|
||||
- [teraGL/looneyCVE](https://github.com/teraGL/looneyCVE)
|
||||
- [snurkeburk/Looney-Tunables](https://github.com/snurkeburk/Looney-Tunables)
|
||||
|
||||
### CVE-2023-4966 (2023-10-10)
|
||||
|
||||
|
@ -7210,7 +7211,7 @@
|
|||
|
||||
### CVE-2022-22817 (2022-01-07)
|
||||
|
||||
<code>PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used,
|
||||
<code>PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
|
||||
</code>
|
||||
|
||||
- [JawadPy/CVE-2022-22817-Exploit](https://github.com/JawadPy/CVE-2022-22817-Exploit)
|
||||
|
@ -10921,7 +10922,7 @@
|
|||
|
||||
- [segfault-it/cve-2022-41352](https://github.com/segfault-it/cve-2022-41352)
|
||||
- [Cr4ckC4t/cve-2022-41352-zimbra-rce](https://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce)
|
||||
- [aryrz/cve-2022-41352-zimbra-rce](https://github.com/aryrz/cve-2022-41352-zimbra-rce)
|
||||
- [lolminerxmrig/cve-2022-41352-zimbra-rce-1](https://github.com/lolminerxmrig/cve-2022-41352-zimbra-rce-1)
|
||||
|
||||
### CVE-2022-41358 (2022-10-19)
|
||||
|
||||
|
@ -30986,7 +30987,6 @@
|
|||
</code>
|
||||
|
||||
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
|
||||
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
|
||||
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
|
||||
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
|
||||
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
|
||||
|
@ -33484,6 +33484,13 @@
|
|||
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
|
||||
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
|
||||
|
||||
### CVE-2016-2118 (2016-04-12)
|
||||
|
||||
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
|
||||
</code>
|
||||
|
||||
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
|
||||
|
||||
### CVE-2016-2173 (2017-04-21)
|
||||
|
||||
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
|
||||
|
@ -33605,6 +33612,13 @@
|
|||
|
||||
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
|
||||
|
||||
### CVE-2016-3141 (2016-03-31)
|
||||
|
||||
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
|
||||
</code>
|
||||
|
||||
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
|
||||
|
||||
### CVE-2016-3238 (2016-07-12)
|
||||
|
||||
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability."
|
||||
|
@ -36131,6 +36145,7 @@
|
|||
- [heroku/heroku-CVE-2013-0156](https://github.com/heroku/heroku-CVE-2013-0156)
|
||||
- [josal/crack-0.1.8-fixed](https://github.com/josal/crack-0.1.8-fixed)
|
||||
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
|
||||
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
|
||||
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
|
||||
|
||||
### CVE-2013-0212 (2013-02-24)
|
||||
|
@ -36241,6 +36256,7 @@
|
|||
|
||||
- [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0)
|
||||
- [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn)
|
||||
- [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC)
|
||||
- [m4drat/CVE-2013-2028-Exploit](https://github.com/m4drat/CVE-2013-2028-Exploit)
|
||||
- [mambroziak/docker-cve-2013-2028](https://github.com/mambroziak/docker-cve-2013-2028)
|
||||
- [jptr218/nginxhack](https://github.com/jptr218/nginxhack)
|
||||
|
@ -36263,6 +36279,7 @@
|
|||
- [Pashkela/CVE-2013-2094](https://github.com/Pashkela/CVE-2013-2094)
|
||||
- [tarunyadav/fix-cve-2013-2094](https://github.com/tarunyadav/fix-cve-2013-2094)
|
||||
- [timhsutw/cve-2013-2094](https://github.com/timhsutw/cve-2013-2094)
|
||||
- [vnik5287/CVE-2013-2094](https://github.com/vnik5287/CVE-2013-2094)
|
||||
|
||||
### CVE-2013-2165 (2013-07-22)
|
||||
|
||||
|
@ -36721,6 +36738,7 @@
|
|||
<code>diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
|
||||
</code>
|
||||
|
||||
- [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot)
|
||||
- [poliva/root-zte-open](https://github.com/poliva/root-zte-open)
|
||||
|
||||
### CVE-2012-4431 (2012-12-19)
|
||||
|
@ -36787,8 +36805,19 @@
|
|||
<code>** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
|
||||
</code>
|
||||
|
||||
- [Hood3dRob1n/MySQL-Fu.rb](https://github.com/Hood3dRob1n/MySQL-Fu.rb)
|
||||
- [w4fz5uck5/UDFPwn-CVE-2012-5613](https://github.com/w4fz5uck5/UDFPwn-CVE-2012-5613)
|
||||
|
||||
### CVE-2012-5664
|
||||
- [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test)
|
||||
|
||||
### CVE-2012-5958 (2013-01-31)
|
||||
|
||||
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
|
||||
</code>
|
||||
|
||||
- [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp)
|
||||
|
||||
### CVE-2012-5960 (2013-01-31)
|
||||
|
||||
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.
|
||||
|
@ -37948,13 +37977,6 @@
|
|||
|
||||
- [gilberto47831/Network-Filesystem-Forensics](https://github.com/gilberto47831/Network-Filesystem-Forensics)
|
||||
|
||||
### CVE-2001-0680 (2002-03-09)
|
||||
|
||||
<code>Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 allows a remote attacker to traverse directories on the web server via a "dot dot" attack in a LIST (ls) command.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
|
||||
|
||||
### CVE-2001-0758 (2001-10-12)
|
||||
|
||||
<code>Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via "CWD ..." command.
|
||||
|
|
Loading…
Reference in a new issue