mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/02/12 12:26:24
This commit is contained in:
parent
bef25d6180
commit
6106180dcd
30 changed files with 160 additions and 125 deletions
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2024-01-04T16:05:53Z",
|
||||
"updated_at": "2024-02-12T10:37:28Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-22T23:03:30Z",
|
||||
"updated_at": "2024-01-10T06:46:34Z",
|
||||
"updated_at": "2024-02-12T10:51:54Z",
|
||||
"pushed_at": "2016-06-23T00:47:50Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 113,
|
||||
"forks": 62,
|
||||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2024-01-04T16:05:53Z",
|
||||
"updated_at": "2024-02-12T10:37:28Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"has_discussions": false,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
}
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2024-01-17T04:43:27Z",
|
||||
"updated_at": "2024-02-12T10:20:51Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-02-11T08:32:50Z",
|
||||
"updated_at": "2024-02-12T11:32:42Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3987,
|
||||
"watchers_count": 3987,
|
||||
"stargazers_count": 3986,
|
||||
"watchers_count": 3986,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1093,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1093,
|
||||
"watchers": 3987,
|
||||
"watchers": 3986,
|
||||
"score": 0,
|
||||
"subscribers_count": 154
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-02-11T08:32:50Z",
|
||||
"updated_at": "2024-02-12T11:32:42Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3987,
|
||||
"watchers_count": 3987,
|
||||
"stargazers_count": 3986,
|
||||
"watchers_count": 3986,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1093,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1093,
|
||||
"watchers": 3987,
|
||||
"watchers": 3986,
|
||||
"score": 0,
|
||||
"subscribers_count": 154
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2021-1961",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T13:31:13Z",
|
||||
"updated_at": "2024-01-24T19:14:59Z",
|
||||
"updated_at": "2024-02-12T10:44:25Z",
|
||||
"pushed_at": "2022-09-07T11:47:56Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2024-02-09T10:23:57Z",
|
||||
"updated_at": "2024-02-12T11:50:18Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 210,
|
||||
"watchers": 211,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -2143,5 +2143,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 756290635,
|
||||
"name": "LMU-CVE-2021-3156",
|
||||
"full_name": "SamTruss\/LMU-CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "SamTruss",
|
||||
"id": 46684055,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46684055?v=4",
|
||||
"html_url": "https:\/\/github.com\/SamTruss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SamTruss\/LMU-CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-12T11:24:31Z",
|
||||
"updated_at": "2024-02-12T11:24:32Z",
|
||||
"pushed_at": "2024-02-12T11:29:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-07T06:09:14Z",
|
||||
"updated_at": "2023-10-31T02:59:13Z",
|
||||
"updated_at": "2024-02-12T10:07:35Z",
|
||||
"pushed_at": "2023-01-07T19:41:36Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2024-02-12T02:02:12Z",
|
||||
"updated_at": "2024-02-12T10:14:39Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 951,
|
||||
"watchers_count": 951,
|
||||
"stargazers_count": 952,
|
||||
"watchers_count": 952,
|
||||
"has_discussions": false,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 951,
|
||||
"watchers": 952,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -907,12 +907,12 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-02-11T22:37:32Z",
|
||||
"updated_at": "2024-02-12T08:45:53Z",
|
||||
"pushed_at": "2023-11-08T21:02:16Z",
|
||||
"stargazers_count": 1694,
|
||||
"watchers_count": 1694,
|
||||
"stargazers_count": 1695,
|
||||
"watchers_count": 1695,
|
||||
"has_discussions": false,
|
||||
"forks_count": 501,
|
||||
"forks_count": 502,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -923,8 +923,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 501,
|
||||
"watchers": 1694,
|
||||
"forks": 502,
|
||||
"watchers": 1695,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
@ -6241,10 +6241,10 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2024-01-26T09:40:55Z",
|
||||
"updated_at": "2024-02-12T12:00:08Z",
|
||||
"pushed_at": "2022-03-23T18:12:51Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -6253,7 +6253,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 345,
|
||||
"watchers": 346,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-22T10:55:34Z",
|
||||
"updated_at": "2024-01-18T12:02:57Z",
|
||||
"updated_at": "2024-02-12T08:33:55Z",
|
||||
"pushed_at": "2023-11-22T11:09:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2024-02-09T03:46:16Z",
|
||||
"updated_at": "2024-02-12T07:28:19Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"stargazers_count": 1096,
|
||||
"watchers_count": 1096,
|
||||
"has_discussions": true,
|
||||
"forks_count": 186,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 186,
|
||||
"watchers": 1095,
|
||||
"watchers": 1096,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-02-11T04:57:28Z",
|
||||
"updated_at": "2024-02-12T06:44:21Z",
|
||||
"pushed_at": "2024-02-11T02:51:34Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"has_discussions": true,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 161,
|
||||
"watchers": 162,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2024-02-08T13:29:39Z",
|
||||
"updated_at": "2024-02-12T07:29:50Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-13T13:17:20Z",
|
||||
"updated_at": "2024-02-12T06:19:07Z",
|
||||
"updated_at": "2024-02-12T10:19:40Z",
|
||||
"pushed_at": "2024-02-11T03:01:51Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 48,
|
||||
"watchers": 50,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -172,10 +172,10 @@
|
|||
"description": "RCE exploit for CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T20:17:43Z",
|
||||
"updated_at": "2024-01-24T11:24:45Z",
|
||||
"updated_at": "2024-02-12T11:10:32Z",
|
||||
"pushed_at": "2023-08-23T16:27:28Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -184,7 +184,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 209,
|
||||
"watchers": 208,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -308,10 +308,10 @@
|
|||
"description": "Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-30T08:00:23Z",
|
||||
"updated_at": "2024-01-30T08:12:20Z",
|
||||
"updated_at": "2024-02-12T07:51:29Z",
|
||||
"pushed_at": "2024-01-30T08:23:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -320,7 +320,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This repository is to provide a write-up and PoC for CVE-2023-41717.",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-31T08:10:22Z",
|
||||
"updated_at": "2023-09-28T11:46:52Z",
|
||||
"updated_at": "2024-02-12T10:59:24Z",
|
||||
"pushed_at": "2023-08-31T09:51:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exploit for CVE-2023-41892",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-26T18:31:27Z",
|
||||
"updated_at": "2024-02-03T17:31:01Z",
|
||||
"updated_at": "2024-02-12T10:50:08Z",
|
||||
"pushed_at": "2023-12-26T22:39:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-09-21T05:22:51Z",
|
||||
"updated_at": "2024-01-30T02:34:04Z",
|
||||
"updated_at": "2024-02-12T09:34:32Z",
|
||||
"pushed_at": "2023-12-18T04:25:00Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 273,
|
||||
"watchers": 274,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
[
|
||||
{
|
||||
"id": 742770050,
|
||||
"id": 756306550,
|
||||
"name": "CVE-2023-51000",
|
||||
"full_name": "Team-Byerus\/CVE-2023-51000",
|
||||
"owner": {
|
||||
|
@ -12,11 +12,11 @@
|
|||
"html_url": "https:\/\/github.com\/Team-Byerus\/CVE-2023-51000",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-13T10:11:18Z",
|
||||
"updated_at": "2024-01-16T10:51:59Z",
|
||||
"pushed_at": "2024-01-18T13:27:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"created_at": "2024-02-12T12:06:07Z",
|
||||
"updated_at": "2024-02-12T12:06:08Z",
|
||||
"pushed_at": "2024-02-12T12:06:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC and Detection for CVE-2024-21626",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-01T15:28:37Z",
|
||||
"updated_at": "2024-02-10T19:28:47Z",
|
||||
"updated_at": "2024-02-12T07:30:29Z",
|
||||
"pushed_at": "2024-02-06T16:09:05Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-09T14:31:56Z",
|
||||
"updated_at": "2024-02-11T16:02:01Z",
|
||||
"updated_at": "2024-02-12T09:53:22Z",
|
||||
"pushed_at": "2024-02-09T15:14:03Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "File Upload vulnerability in MCMS 5.3.5",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-12T06:19:19Z",
|
||||
"updated_at": "2024-02-12T06:19:19Z",
|
||||
"pushed_at": "2024-02-12T06:19:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-02-12T08:22:45Z",
|
||||
"pushed_at": "2024-02-12T07:04:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-04T07:37:21Z",
|
||||
"updated_at": "2024-02-10T10:04:06Z",
|
||||
"updated_at": "2024-02-12T09:10:12Z",
|
||||
"pushed_at": "2024-02-05T02:11:42Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-02-08T06:09:40Z",
|
||||
"updated_at": "2024-02-12T07:57:06Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -6461,7 +6461,11 @@
|
|||
- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
|
||||
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
|
||||
|
||||
### CVE-2023-46615
|
||||
### CVE-2023-46615 (-)
|
||||
|
||||
<code>Deserialization of Untrusted Data vulnerability in Kalli Dan. KD Coming Soon.This issue affects KD Coming Soon: from n/a through 1.7.\n\n
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2023-46615](https://github.com/RandomRobbieBF/CVE-2023-46615)
|
||||
|
||||
### CVE-2023-46747 (2023-10-26)
|
||||
|
@ -14479,6 +14483,7 @@
|
|||
- [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156)
|
||||
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
|
||||
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
|
||||
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
|
Loading…
Reference in a new issue