Auto Update 2023/07/24 18:25:10

This commit is contained in:
motikan2010-bot 2023-07-25 03:25:10 +09:00
parent a7f8ce999c
commit 63e0f257d8
37 changed files with 381 additions and 126 deletions

View file

@ -187,6 +187,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -103,10 +103,10 @@
"description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber",
"fork": false,
"created_at": "2017-10-19T20:02:56Z",
"updated_at": "2023-06-22T20:19:22Z",
"updated_at": "2023-07-24T16:08:25Z",
"pushed_at": "2018-09-04T21:35:36Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -123,7 +123,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 15
},

View file

@ -238,5 +238,45 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 670217467,
"name": "CVE-2017-7921-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2017-7921-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2017-7921-EXPLOIT",
"description": "The presence of a proof of concept (POC) further underscores the criticality of this security flaw. It demonstrates the feasibility of an attacker exploiting the vulnerability and reinforces the urgency of applying security patches or updates to mitigate the risk.",
"fork": false,
"created_at": "2023-07-24T14:48:38Z",
"updated_at": "2023-07-24T15:08:56Z",
"pushed_at": "2023-07-24T15:10:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2017-7921",
"exploit",
"hack",
"hacked",
"hikvision",
"hikvision-camera",
"information-disclosure",
"proof-of-concept",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -48,7 +48,7 @@
"stargazers_count": 3817,
"watchers_count": 3817,
"has_discussions": false,
"forks_count": 1087,
"forks_count": 1086,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,7 +74,7 @@
"webshell"
],
"visibility": "public",
"forks": 1087,
"forks": 1086,
"watchers": 3817,
"score": 0,
"subscribers_count": 154

View file

@ -48,7 +48,7 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -62,7 +62,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 5,
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 1

View file

@ -1,34 +1,4 @@
[
{
"id": 214392452,
"name": "SysTracingPoc",
"full_name": "itm4n\/SysTracingPoc",
"owner": {
"login": "itm4n",
"id": 30777390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4",
"html_url": "https:\/\/github.com\/itm4n"
},
"html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2023-07-07T19:11:10Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 111,
"score": 0,
"subscribers_count": 9
},
{
"id": 241809572,
"name": "CVE-2020-0668",
@ -89,6 +59,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 243427813,
"name": "SysTracingPoc",
"full_name": "modulexcite\/SysTracingPoc",
"owner": {
"login": "modulexcite",
"id": 12729391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12729391?v=4",
"html_url": "https:\/\/github.com\/modulexcite"
},
"html_url": "https:\/\/github.com\/modulexcite\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2020-02-27T04:09:29Z",
"updated_at": "2023-07-24T16:19:26Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 422076432,
"name": "CVE-2020-0668",

View file

@ -48,10 +48,10 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
"updated_at": "2023-05-26T16:30:59Z",
"updated_at": "2023-07-24T14:57:47Z",
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 3
},

View file

@ -1244,6 +1244,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 311800203,
"name": "The_big_Zero",
"full_name": "JayP232\/The_big_Zero",
"owner": {
"login": "JayP232",
"id": 40582783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40582783?v=4",
"html_url": "https:\/\/github.com\/JayP232"
},
"html_url": "https:\/\/github.com\/JayP232\/The_big_Zero",
"description": "The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DC",
"fork": false,
"created_at": "2020-11-10T22:29:56Z",
"updated_at": "2020-12-04T21:08:46Z",
"pushed_at": "2020-12-04T21:08:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 313376422,
"name": "CVE-2020-1472",

View file

@ -18,7 +18,7 @@
"stargazers_count": 3817,
"watchers_count": 3817,
"has_discussions": false,
"forks_count": 1087,
"forks_count": 1086,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
"forks": 1087,
"forks": 1086,
"watchers": 3817,
"score": 0,
"subscribers_count": 154

View file

@ -1,4 +1,34 @@
[
{
"id": 319912115,
"name": "CVE-2020-17530",
"full_name": "ka1n4t\/CVE-2020-17530",
"owner": {
"login": "ka1n4t",
"id": 22983012,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22983012?v=4",
"html_url": "https:\/\/github.com\/ka1n4t"
},
"html_url": "https:\/\/github.com\/ka1n4t\/CVE-2020-17530",
"description": null,
"fork": false,
"created_at": "2020-12-09T09:53:08Z",
"updated_at": "2023-02-02T09:32:39Z",
"pushed_at": "2020-12-09T09:57:45Z",
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 65,
"score": 0,
"subscribers_count": 3
},
{
"id": 320346242,
"name": "CVE-2020-17530",

32
2020/CVE-2020-17531.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 319884337,
"name": "CVE-2020-17531",
"full_name": "154802388\/CVE-2020-17531",
"owner": {
"login": "154802388",
"id": 44390729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44390729?v=4",
"html_url": "https:\/\/github.com\/154802388"
},
"html_url": "https:\/\/github.com\/154802388\/CVE-2020-17531",
"description": "Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架。Apache Struts于2020年12月08日披露 S2-061 Struts 远程代码执行漏洞CVE-2020-17530在使用某些tag等情况下可能存在OGNL表达式注入漏洞从而造成远程代码执行风险极大。提醒我校Apache Struts用户尽快采取安全措施阻止漏洞攻击。",
"fork": false,
"created_at": "2020-12-09T08:01:10Z",
"updated_at": "2020-12-24T03:29:48Z",
"pushed_at": "2020-12-09T03:10:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2020/CVE-2020-17533.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 319951353,
"name": "CVE-2020-17533",
"full_name": "pazeray\/CVE-2020-17533",
"owner": {
"login": "pazeray",
"id": 75724257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75724257?v=4",
"html_url": "https:\/\/github.com\/pazeray"
},
"html_url": "https:\/\/github.com\/pazeray\/CVE-2020-17533",
"description": null,
"fork": false,
"created_at": "2020-12-09T12:34:54Z",
"updated_at": "2021-09-09T13:27:49Z",
"pushed_at": "2020-12-09T00:42:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2020/CVE-2020-8209.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 313538484,
"name": "CVE-2020-8209",
"full_name": "B1anda0\/CVE-2020-8209",
"owner": {
"login": "B1anda0",
"id": 74232513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
"html_url": "https:\/\/github.com\/B1anda0"
},
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2020-8209",
"description": "该脚本为Citrix XenMobile 目录遍历漏洞CVE-2020-8209批量检测脚本。",
"fork": false,
"created_at": "2020-11-17T07:20:46Z",
"updated_at": "2021-10-18T03:32:04Z",
"pushed_at": "2020-12-07T07:46:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 30,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -103,10 +103,10 @@
"description": "POC for CVE-2021-22214: Gitlab SSRF",
"fork": false,
"created_at": "2022-01-04T05:52:57Z",
"updated_at": "2022-12-15T07:44:49Z",
"updated_at": "2023-07-24T16:43:55Z",
"pushed_at": "2022-01-04T12:10:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -123,7 +123,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -1310,10 +1310,10 @@
"description": "ProxyLogon (CVE-2021-26855+CVE-2021-27065) Exchange Server RCE (SSRF->GetWebShell)",
"fork": false,
"created_at": "2022-06-27T08:07:48Z",
"updated_at": "2023-07-07T19:11:57Z",
"updated_at": "2023-07-24T16:34:20Z",
"pushed_at": "2023-03-28T19:07:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1335,7 +1335,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-07-24T11:21:51Z",
"updated_at": "2023-07-24T18:16:33Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 814,
"watchers_count": 814,
"stargazers_count": 815,
"watchers_count": 815,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 814,
"watchers": 815,
"score": 0,
"subscribers_count": 13
},

View file

@ -326,10 +326,10 @@
"description": "CVE-2021-41773 POC with Docker",
"fork": false,
"created_at": "2021-10-06T02:30:40Z",
"updated_at": "2023-06-08T08:10:57Z",
"updated_at": "2023-07-24T14:18:40Z",
"pushed_at": "2022-10-07T23:37:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -338,7 +338,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "An exploit\/PoC for CVE-2021-42237",
"fork": false,
"created_at": "2022-01-16T05:22:30Z",
"updated_at": "2023-05-11T03:08:23Z",
"updated_at": "2023-07-24T14:50:30Z",
"pushed_at": "2022-01-16T05:40:17Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 909,
"watchers_count": 909,
"has_discussions": false,
"forks_count": 188,
"forks_count": 189,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"s4u2self"
],
"visibility": "public",
"forks": 188,
"forks": 189,
"watchers": 909,
"score": 0,
"subscribers_count": 25

View file

@ -18,13 +18,13 @@
"stargazers_count": 1236,
"watchers_count": 1236,
"has_discussions": false,
"forks_count": 315,
"forks_count": 316,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 315,
"forks": 316,
"watchers": 1236,
"score": 0,
"subscribers_count": 26

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-07-24T05:26:40Z",
"updated_at": "2023-07-24T18:17:41Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1619,
"watchers_count": 1619,
"stargazers_count": 1620,
"watchers_count": 1620,
"has_discussions": false,
"forks_count": 476,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 476,
"watchers": 1619,
"watchers": 1620,
"score": 0,
"subscribers_count": 25
},
@ -10335,10 +10335,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2023-07-19T14:05:41Z",
"updated_at": "2023-07-24T14:55:36Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -10352,7 +10352,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 4
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"ssti"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "Wordpress Vulnerability - XSS ( Cross-Site Scripting )",
"fork": false,
"created_at": "2022-09-05T12:08:50Z",
"updated_at": "2023-06-01T01:38:57Z",
"updated_at": "2023-07-24T14:40:44Z",
"pushed_at": "2022-09-05T12:21:59Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,12 +13,12 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2023-07-24T04:56:59Z",
"updated_at": "2023-07-24T15:53:20Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 535,
"watchers_count": 535,
"stargazers_count": 536,
"watchers_count": 536,
"has_discussions": false,
"forks_count": 112,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"spookyssl"
],
"visibility": "public",
"forks": 112,
"watchers": 535,
"forks": 113,
"watchers": 536,
"score": 0,
"subscribers_count": 48
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-07-20T14:30:58Z",
"updated_at": "2023-07-21T13:22:12Z",
"pushed_at": "2023-07-20T14:37:46Z",
"pushed_at": "2023-07-24T14:14:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 41,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve-2023-20887"
],
"visibility": "public",
"forks": 41,
"forks": 42,
"watchers": 207,
"score": 0,
"subscribers_count": 4

View file

@ -478,7 +478,7 @@
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -491,7 +491,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 32,
"score": 0,
"subscribers_count": 1

View file

@ -18,7 +18,7 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -34,7 +34,7 @@
"ssrf"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 1

View file

@ -18,13 +18,13 @@
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 67,
"score": 0,
"subscribers_count": 7

View file

@ -50,13 +50,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -287,10 +287,10 @@
"description": "Python 2.7",
"fork": false,
"created_at": "2023-07-03T04:16:16Z",
"updated_at": "2023-07-17T13:51:37Z",
"updated_at": "2023-07-24T14:30:30Z",
"pushed_at": "2023-07-03T04:17:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -299,7 +299,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "rce",
"fork": false,
"created_at": "2023-06-14T09:43:31Z",
"updated_at": "2023-07-24T11:44:55Z",
"updated_at": "2023-07-24T15:16:43Z",
"pushed_at": "2023-06-15T01:35:51Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-07-24T10:12:40Z",
"pushed_at": "2023-07-08T09:27:10Z",
"stargazers_count": 297,
"watchers_count": 297,
"updated_at": "2023-07-24T17:41:37Z",
"pushed_at": "2023-07-24T18:08:05Z",
"stargazers_count": 298,
"watchers_count": 298,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 297,
"watchers": 298,
"score": 0,
"subscribers_count": 19
}

View file

@ -251,5 +251,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 670205651,
"name": "CVE-2023-3519",
"full_name": "binbz\/CVE-2023-3519",
"owner": {
"login": "binbz",
"id": 109405786,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109405786?v=4",
"html_url": "https:\/\/github.com\/binbz"
},
"html_url": "https:\/\/github.com\/binbz\/CVE-2023-3519",
"description": "Citrix exploit",
"fork": false,
"created_at": "2023-07-24T14:20:33Z",
"updated_at": "2023-07-24T14:20:34Z",
"pushed_at": "2023-07-24T16:50:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2023-07-24T01:33:13Z",
"updated_at": "2023-07-24T14:35:13Z",
"pushed_at": "2023-07-24T01:43:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,12 +13,12 @@
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-07-24T13:16:32Z",
"updated_at": "2023-07-24T15:11:41Z",
"pushed_at": "2023-07-21T01:56:59Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 10,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"exploit-development"
],
"visibility": "public",
"forks": 10,
"watchers": 17,
"forks": 12,
"watchers": 20,
"score": 0,
"subscribers_count": 1
}

View file

@ -370,7 +370,7 @@
### CVE-2023-3338 (2023-06-30)
<code>A flaw null pointer dereference in the Linux kernel DECnet networking protocol was found. A remote user could use this flaw to crash the system.
<code>A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.
</code>
- [TurtleARM/CVE-2023-3338-DECPwn](https://github.com/TurtleARM/CVE-2023-3338-DECPwn)
@ -400,8 +400,13 @@
- [SalehLardhi/CVE-2023-3519](https://github.com/SalehLardhi/CVE-2023-3519)
- [KR0N-SECURITY/CVE-2023-3519](https://github.com/KR0N-SECURITY/CVE-2023-3519)
- [sanmasa3/citrix_CVE-2023-3519](https://github.com/sanmasa3/citrix_CVE-2023-3519)
- [binbz/CVE-2023-3519](https://github.com/binbz/CVE-2023-3519)
### CVE-2023-3640 (2023-07-24)
<code>A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.
</code>
### CVE-2023-3640
- [pray77/CVE-2023-3640](https://github.com/pray77/CVE-2023-3640)
### CVE-2023-20052 (2023-03-01)
@ -15198,9 +15203,9 @@
<code>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.
</code>
- [itm4n/SysTracingPoc](https://github.com/itm4n/SysTracingPoc)
- [RedCursorSecurityConsulting/CVE-2020-0668](https://github.com/RedCursorSecurityConsulting/CVE-2020-0668)
- [Nan3r/CVE-2020-0668](https://github.com/Nan3r/CVE-2020-0668)
- [modulexcite/SysTracingPoc](https://github.com/modulexcite/SysTracingPoc)
- [ycdxsb/CVE-2020-0668](https://github.com/ycdxsb/CVE-2020-0668)
- [bypazs/CVE-2020-0668.exe](https://github.com/bypazs/CVE-2020-0668.exe)
@ -15609,6 +15614,7 @@
- [CPO-EH/CVE-2020-1472_ZeroLogonChecker](https://github.com/CPO-EH/CVE-2020-1472_ZeroLogonChecker)
- [puckiestyle/CVE-2020-1472](https://github.com/puckiestyle/CVE-2020-1472)
- [mingchen-script/CVE-2020-1472-visualizer](https://github.com/mingchen-script/CVE-2020-1472-visualizer)
- [JayP232/The_big_Zero](https://github.com/JayP232/The_big_Zero)
- [b1ack0wl/CVE-2020-1472](https://github.com/b1ack0wl/CVE-2020-1472)
- [SaharAttackit/CVE-2020-1472](https://github.com/SaharAttackit/CVE-2020-1472)
- [wrathfulDiety/zerologon](https://github.com/wrathfulDiety/zerologon)
@ -16565,6 +16571,13 @@
- [PR3R00T/CVE-2020-8193-Citrix-Scanner](https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner)
- [ctlyz123/CVE-2020-8193](https://github.com/ctlyz123/CVE-2020-8193)
### CVE-2020-8209 (2020-08-17)
<code>Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
</code>
- [B1anda0/CVE-2020-8209](https://github.com/B1anda0/CVE-2020-8209)
### CVE-2020-8218 (2020-07-30)
<code>A code injection vulnerability exists in Pulse Connect Secure &lt;9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.
@ -18433,6 +18446,7 @@
<code>Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
</code>
- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530)
- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530)
- [Al1ex/CVE-2020-17530](https://github.com/Al1ex/CVE-2020-17530)
- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061)
@ -18442,6 +18456,20 @@
- [killmonday/CVE-2020-17530-s2-061](https://github.com/killmonday/CVE-2020-17530-s2-061)
- [keyuan15/CVE-2020-17530](https://github.com/keyuan15/CVE-2020-17530)
### CVE-2020-17531 (2020-12-08)
<code>A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the &quot;sp&quot; parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
</code>
- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531)
### CVE-2020-17533 (2020-12-29)
<code>Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
</code>
- [pazeray/CVE-2020-17533](https://github.com/pazeray/CVE-2020-17533)
### CVE-2020-18324 (2022-03-04)
<code>Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template.
@ -27627,6 +27655,7 @@
- [201646613/CVE-2017-7921](https://github.com/201646613/CVE-2017-7921)
- [inj3ction/CVE-2017-7921-EXP](https://github.com/inj3ction/CVE-2017-7921-EXP)
- [krypton612/hikivision](https://github.com/krypton612/hikivision)
- [K3ysTr0K3R/CVE-2017-7921-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2017-7921-EXPLOIT)
### CVE-2017-7998 (2018-01-08)