mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-04-05 14:55:38 +02:00
Auto Update 2023/07/24 18:25:10
This commit is contained in:
parent
a7f8ce999c
commit
63e0f257d8
37 changed files with 381 additions and 126 deletions
2017
2019
2020
CVE-2020-0668.jsonCVE-2020-10977.jsonCVE-2020-1472.jsonCVE-2020-14882.jsonCVE-2020-17530.jsonCVE-2020-17531.jsonCVE-2020-17533.jsonCVE-2020-8209.json
2021
CVE-2021-22214.jsonCVE-2021-26855.jsonCVE-2021-4034.jsonCVE-2021-41773.jsonCVE-2021-42237.jsonCVE-2021-42278.jsonCVE-2021-42287.jsonCVE-2021-44228.json
2022
2023
CVE-2023-20887.jsonCVE-2023-23752.jsonCVE-2023-27163.jsonCVE-2023-27524.jsonCVE-2023-28771.jsonCVE-2023-32243.jsonCVE-2023-32315.jsonCVE-2023-3269.jsonCVE-2023-3519.jsonCVE-2023-35885.jsonCVE-2023-38408.json
README.md
|
@ -187,6 +187,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T20:02:56Z",
|
||||
"updated_at": "2023-06-22T20:19:22Z",
|
||||
"updated_at": "2023-07-24T16:08:25Z",
|
||||
"pushed_at": "2018-09-04T21:35:36Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
},
|
||||
|
|
|
@ -238,5 +238,45 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 670217467,
|
||||
"name": "CVE-2017-7921-EXPLOIT",
|
||||
"full_name": "K3ysTr0K3R\/CVE-2017-7921-EXPLOIT",
|
||||
"owner": {
|
||||
"login": "K3ysTr0K3R",
|
||||
"id": 70909693,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2017-7921-EXPLOIT",
|
||||
"description": "The presence of a proof of concept (POC) further underscores the criticality of this security flaw. It demonstrates the feasibility of an attacker exploiting the vulnerability and reinforces the urgency of applying security patches or updates to mitigate the risk.",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-24T14:48:38Z",
|
||||
"updated_at": "2023-07-24T15:08:56Z",
|
||||
"pushed_at": "2023-07-24T15:10:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2017-7921",
|
||||
"exploit",
|
||||
"hack",
|
||||
"hacked",
|
||||
"hikvision",
|
||||
"hikvision-camera",
|
||||
"information-disclosure",
|
||||
"proof-of-concept",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 3817,
|
||||
"watchers_count": 3817,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"forks_count": 1086,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -74,7 +74,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"forks": 1086,
|
||||
"watchers": 3817,
|
||||
"score": 0,
|
||||
"subscribers_count": 154
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 214392452,
|
||||
"name": "SysTracingPoc",
|
||||
"full_name": "itm4n\/SysTracingPoc",
|
||||
"owner": {
|
||||
"login": "itm4n",
|
||||
"id": 30777390,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4",
|
||||
"html_url": "https:\/\/github.com\/itm4n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc",
|
||||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-11T09:08:02Z",
|
||||
"updated_at": "2023-07-07T19:11:10Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 111,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
{
|
||||
"id": 241809572,
|
||||
"name": "CVE-2020-0668",
|
||||
|
@ -89,6 +59,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 243427813,
|
||||
"name": "SysTracingPoc",
|
||||
"full_name": "modulexcite\/SysTracingPoc",
|
||||
"owner": {
|
||||
"login": "modulexcite",
|
||||
"id": 12729391,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12729391?v=4",
|
||||
"html_url": "https:\/\/github.com\/modulexcite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/modulexcite\/SysTracingPoc",
|
||||
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T04:09:29Z",
|
||||
"updated_at": "2023-07-24T16:19:26Z",
|
||||
"pushed_at": "2020-02-26T09:24:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 422076432,
|
||||
"name": "CVE-2020-0668",
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2023-05-26T16:30:59Z",
|
||||
"updated_at": "2023-07-24T14:57:47Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1244,6 +1244,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 311800203,
|
||||
"name": "The_big_Zero",
|
||||
"full_name": "JayP232\/The_big_Zero",
|
||||
"owner": {
|
||||
"login": "JayP232",
|
||||
"id": 40582783,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40582783?v=4",
|
||||
"html_url": "https:\/\/github.com\/JayP232"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JayP232\/The_big_Zero",
|
||||
"description": "The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DC",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T22:29:56Z",
|
||||
"updated_at": "2020-12-04T21:08:46Z",
|
||||
"pushed_at": "2020-12-04T21:08:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 313376422,
|
||||
"name": "CVE-2020-1472",
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 3817,
|
||||
"watchers_count": 3817,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1087,
|
||||
"forks_count": 1086,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1087,
|
||||
"forks": 1086,
|
||||
"watchers": 3817,
|
||||
"score": 0,
|
||||
"subscribers_count": 154
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 319912115,
|
||||
"name": "CVE-2020-17530",
|
||||
"full_name": "ka1n4t\/CVE-2020-17530",
|
||||
"owner": {
|
||||
"login": "ka1n4t",
|
||||
"id": 22983012,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22983012?v=4",
|
||||
"html_url": "https:\/\/github.com\/ka1n4t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ka1n4t\/CVE-2020-17530",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T09:53:08Z",
|
||||
"updated_at": "2023-02-02T09:32:39Z",
|
||||
"pushed_at": "2020-12-09T09:57:45Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 320346242,
|
||||
"name": "CVE-2020-17530",
|
||||
|
|
32
2020/CVE-2020-17531.json
Normal file
32
2020/CVE-2020-17531.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 319884337,
|
||||
"name": "CVE-2020-17531",
|
||||
"full_name": "154802388\/CVE-2020-17531",
|
||||
"owner": {
|
||||
"login": "154802388",
|
||||
"id": 44390729,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44390729?v=4",
|
||||
"html_url": "https:\/\/github.com\/154802388"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/154802388\/CVE-2020-17531",
|
||||
"description": "Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架。Apache Struts于2020年12月08日披露 S2-061 Struts 远程代码执行漏洞(CVE-2020-17530),在使用某些tag等情况下可能存在OGNL表达式注入漏洞,从而造成远程代码执行,风险极大。提醒我校Apache Struts用户尽快采取安全措施阻止漏洞攻击。",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T08:01:10Z",
|
||||
"updated_at": "2020-12-24T03:29:48Z",
|
||||
"pushed_at": "2020-12-09T03:10:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2020/CVE-2020-17533.json
Normal file
32
2020/CVE-2020-17533.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 319951353,
|
||||
"name": "CVE-2020-17533",
|
||||
"full_name": "pazeray\/CVE-2020-17533",
|
||||
"owner": {
|
||||
"login": "pazeray",
|
||||
"id": 75724257,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75724257?v=4",
|
||||
"html_url": "https:\/\/github.com\/pazeray"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pazeray\/CVE-2020-17533",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T12:34:54Z",
|
||||
"updated_at": "2021-09-09T13:27:49Z",
|
||||
"pushed_at": "2020-12-09T00:42:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2020/CVE-2020-8209.json
Normal file
32
2020/CVE-2020-8209.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 313538484,
|
||||
"name": "CVE-2020-8209",
|
||||
"full_name": "B1anda0\/CVE-2020-8209",
|
||||
"owner": {
|
||||
"login": "B1anda0",
|
||||
"id": 74232513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1anda0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2020-8209",
|
||||
"description": "该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-17T07:20:46Z",
|
||||
"updated_at": "2021-10-18T03:32:04Z",
|
||||
"pushed_at": "2020-12-07T07:46:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "POC for CVE-2021-22214: Gitlab SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-04T05:52:57Z",
|
||||
"updated_at": "2022-12-15T07:44:49Z",
|
||||
"updated_at": "2023-07-24T16:43:55Z",
|
||||
"pushed_at": "2022-01-04T12:10:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -123,7 +123,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -1310,10 +1310,10 @@
|
|||
"description": "ProxyLogon (CVE-2021-26855+CVE-2021-27065) Exchange Server RCE (SSRF->GetWebShell)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-27T08:07:48Z",
|
||||
"updated_at": "2023-07-07T19:11:57Z",
|
||||
"updated_at": "2023-07-24T16:34:20Z",
|
||||
"pushed_at": "2023-03-28T19:07:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -1335,7 +1335,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -938,10 +938,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-07-24T11:21:51Z",
|
||||
"updated_at": "2023-07-24T18:16:33Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"stargazers_count": 815,
|
||||
"watchers_count": 815,
|
||||
"has_discussions": false,
|
||||
"forks_count": 167,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 167,
|
||||
"watchers": 814,
|
||||
"watchers": 815,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -326,10 +326,10 @@
|
|||
"description": "CVE-2021-41773 POC with Docker",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T02:30:40Z",
|
||||
"updated_at": "2023-06-08T08:10:57Z",
|
||||
"updated_at": "2023-07-24T14:18:40Z",
|
||||
"pushed_at": "2022-10-07T23:37:10Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -338,7 +338,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "An exploit\/PoC for CVE-2021-42237",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-16T05:22:30Z",
|
||||
"updated_at": "2023-05-11T03:08:23Z",
|
||||
"updated_at": "2023-07-24T14:50:30Z",
|
||||
"pushed_at": "2022-01-16T05:40:17Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 909,
|
||||
"watchers_count": 909,
|
||||
"has_discussions": false,
|
||||
"forks_count": 188,
|
||||
"forks_count": 189,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"forks": 189,
|
||||
"watchers": 909,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 315,
|
||||
"forks_count": 316,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 315,
|
||||
"forks": 316,
|
||||
"watchers": 1236,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-07-24T05:26:40Z",
|
||||
"updated_at": "2023-07-24T18:17:41Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1619,
|
||||
"watchers_count": 1619,
|
||||
"stargazers_count": 1620,
|
||||
"watchers_count": 1620,
|
||||
"has_discussions": false,
|
||||
"forks_count": 476,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 476,
|
||||
"watchers": 1619,
|
||||
"watchers": 1620,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -10335,10 +10335,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2023-07-19T14:05:41Z",
|
||||
"updated_at": "2023-07-24T14:55:36Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -10352,7 +10352,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
"ssti"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Wordpress Vulnerability - XSS ( Cross-Site Scripting )",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T12:08:50Z",
|
||||
"updated_at": "2023-06-01T01:38:57Z",
|
||||
"updated_at": "2023-07-24T14:40:44Z",
|
||||
"pushed_at": "2022-09-05T12:21:59Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T09:51:41Z",
|
||||
"updated_at": "2023-07-24T04:56:59Z",
|
||||
"updated_at": "2023-07-24T15:53:20Z",
|
||||
"pushed_at": "2022-11-18T15:47:17Z",
|
||||
"stargazers_count": 535,
|
||||
"watchers_count": 535,
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"has_discussions": false,
|
||||
"forks_count": 112,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,8 +29,8 @@
|
|||
"spookyssl"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 535,
|
||||
"forks": 113,
|
||||
"watchers": 536,
|
||||
"score": 0,
|
||||
"subscribers_count": 48
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-20T14:30:58Z",
|
||||
"updated_at": "2023-07-21T13:22:12Z",
|
||||
"pushed_at": "2023-07-20T14:37:46Z",
|
||||
"pushed_at": "2023-07-24T14:14:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"cve-2023-20887"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"forks": 42,
|
||||
"watchers": 207,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -478,7 +478,7 @@
|
|||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -491,7 +491,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
"ssrf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -287,10 +287,10 @@
|
|||
"description": "Python 2.7",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-03T04:16:16Z",
|
||||
"updated_at": "2023-07-17T13:51:37Z",
|
||||
"updated_at": "2023-07-24T14:30:30Z",
|
||||
"pushed_at": "2023-07-03T04:17:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -299,7 +299,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "rce",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-14T09:43:31Z",
|
||||
"updated_at": "2023-07-24T11:44:55Z",
|
||||
"updated_at": "2023-07-24T15:16:43Z",
|
||||
"pushed_at": "2023-06-15T01:35:51Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-07-24T10:12:40Z",
|
||||
"pushed_at": "2023-07-08T09:27:10Z",
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"updated_at": "2023-07-24T17:41:37Z",
|
||||
"pushed_at": "2023-07-24T18:08:05Z",
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 297,
|
||||
"watchers": 298,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
}
|
||||
|
|
|
@ -251,5 +251,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 670205651,
|
||||
"name": "CVE-2023-3519",
|
||||
"full_name": "binbz\/CVE-2023-3519",
|
||||
"owner": {
|
||||
"login": "binbz",
|
||||
"id": 109405786,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109405786?v=4",
|
||||
"html_url": "https:\/\/github.com\/binbz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/binbz\/CVE-2023-3519",
|
||||
"description": "Citrix exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-24T14:20:33Z",
|
||||
"updated_at": "2023-07-24T14:20:34Z",
|
||||
"pushed_at": "2023-07-24T16:50:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Cloudpanel 0-day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T09:20:22Z",
|
||||
"updated_at": "2023-07-24T01:33:13Z",
|
||||
"updated_at": "2023-07-24T14:35:13Z",
|
||||
"pushed_at": "2023-07-24T01:43:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-21T01:53:10Z",
|
||||
"updated_at": "2023-07-24T13:16:32Z",
|
||||
"updated_at": "2023-07-24T15:11:41Z",
|
||||
"pushed_at": "2023-07-21T01:56:59Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,8 +27,8 @@
|
|||
"exploit-development"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 17,
|
||||
"forks": 12,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
35
README.md
35
README.md
|
@ -370,7 +370,7 @@
|
|||
|
||||
### CVE-2023-3338 (2023-06-30)
|
||||
|
||||
<code>A flaw null pointer dereference in the Linux kernel DECnet networking protocol was found. A remote user could use this flaw to crash the system.
|
||||
<code>A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.
|
||||
</code>
|
||||
|
||||
- [TurtleARM/CVE-2023-3338-DECPwn](https://github.com/TurtleARM/CVE-2023-3338-DECPwn)
|
||||
|
@ -400,8 +400,13 @@
|
|||
- [SalehLardhi/CVE-2023-3519](https://github.com/SalehLardhi/CVE-2023-3519)
|
||||
- [KR0N-SECURITY/CVE-2023-3519](https://github.com/KR0N-SECURITY/CVE-2023-3519)
|
||||
- [sanmasa3/citrix_CVE-2023-3519](https://github.com/sanmasa3/citrix_CVE-2023-3519)
|
||||
- [binbz/CVE-2023-3519](https://github.com/binbz/CVE-2023-3519)
|
||||
|
||||
### CVE-2023-3640 (2023-07-24)
|
||||
|
||||
<code>A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.
|
||||
</code>
|
||||
|
||||
### CVE-2023-3640
|
||||
- [pray77/CVE-2023-3640](https://github.com/pray77/CVE-2023-3640)
|
||||
|
||||
### CVE-2023-20052 (2023-03-01)
|
||||
|
@ -15198,9 +15203,9 @@
|
|||
<code>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.
|
||||
</code>
|
||||
|
||||
- [itm4n/SysTracingPoc](https://github.com/itm4n/SysTracingPoc)
|
||||
- [RedCursorSecurityConsulting/CVE-2020-0668](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
|
||||
- [Nan3r/CVE-2020-0668](https://github.com/Nan3r/CVE-2020-0668)
|
||||
- [modulexcite/SysTracingPoc](https://github.com/modulexcite/SysTracingPoc)
|
||||
- [ycdxsb/CVE-2020-0668](https://github.com/ycdxsb/CVE-2020-0668)
|
||||
- [bypazs/CVE-2020-0668.exe](https://github.com/bypazs/CVE-2020-0668.exe)
|
||||
|
||||
|
@ -15609,6 +15614,7 @@
|
|||
- [CPO-EH/CVE-2020-1472_ZeroLogonChecker](https://github.com/CPO-EH/CVE-2020-1472_ZeroLogonChecker)
|
||||
- [puckiestyle/CVE-2020-1472](https://github.com/puckiestyle/CVE-2020-1472)
|
||||
- [mingchen-script/CVE-2020-1472-visualizer](https://github.com/mingchen-script/CVE-2020-1472-visualizer)
|
||||
- [JayP232/The_big_Zero](https://github.com/JayP232/The_big_Zero)
|
||||
- [b1ack0wl/CVE-2020-1472](https://github.com/b1ack0wl/CVE-2020-1472)
|
||||
- [SaharAttackit/CVE-2020-1472](https://github.com/SaharAttackit/CVE-2020-1472)
|
||||
- [wrathfulDiety/zerologon](https://github.com/wrathfulDiety/zerologon)
|
||||
|
@ -16565,6 +16571,13 @@
|
|||
- [PR3R00T/CVE-2020-8193-Citrix-Scanner](https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner)
|
||||
- [ctlyz123/CVE-2020-8193](https://github.com/ctlyz123/CVE-2020-8193)
|
||||
|
||||
### CVE-2020-8209 (2020-08-17)
|
||||
|
||||
<code>Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
|
||||
</code>
|
||||
|
||||
- [B1anda0/CVE-2020-8209](https://github.com/B1anda0/CVE-2020-8209)
|
||||
|
||||
### CVE-2020-8218 (2020-07-30)
|
||||
|
||||
<code>A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.
|
||||
|
@ -18433,6 +18446,7 @@
|
|||
<code>Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
|
||||
</code>
|
||||
|
||||
- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530)
|
||||
- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530)
|
||||
- [Al1ex/CVE-2020-17530](https://github.com/Al1ex/CVE-2020-17530)
|
||||
- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061)
|
||||
|
@ -18442,6 +18456,20 @@
|
|||
- [killmonday/CVE-2020-17530-s2-061](https://github.com/killmonday/CVE-2020-17530-s2-061)
|
||||
- [keyuan15/CVE-2020-17530](https://github.com/keyuan15/CVE-2020-17530)
|
||||
|
||||
### CVE-2020-17531 (2020-12-08)
|
||||
|
||||
<code>A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
|
||||
</code>
|
||||
|
||||
- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531)
|
||||
|
||||
### CVE-2020-17533 (2020-12-29)
|
||||
|
||||
<code>Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
|
||||
</code>
|
||||
|
||||
- [pazeray/CVE-2020-17533](https://github.com/pazeray/CVE-2020-17533)
|
||||
|
||||
### CVE-2020-18324 (2022-03-04)
|
||||
|
||||
<code>Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template.
|
||||
|
@ -27627,6 +27655,7 @@
|
|||
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
|
||||
- [inj3ction/CVE-2017-7921-EXP](https://github.com/inj3ction/CVE-2017-7921-EXP)
|
||||
- [krypton612/hikivision](https://github.com/krypton612/hikivision)
|
||||
- [K3ysTr0K3R/CVE-2017-7921-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2017-7921-EXPLOIT)
|
||||
|
||||
### CVE-2017-7998 (2018-01-08)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue