mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/06/17 06:32:48
This commit is contained in:
parent
13f235950d
commit
675ac1f912
25 changed files with 125 additions and 233 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-16T08:53:44Z",
|
||||
"updated_at": "2023-06-17T04:52:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1708,
|
||||
"watchers_count": 1708,
|
||||
"stargazers_count": 1709,
|
||||
"watchers_count": 1709,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1708,
|
||||
"watchers": 1709,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-16T08:53:44Z",
|
||||
"updated_at": "2023-06-17T04:52:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1708,
|
||||
"watchers_count": 1708,
|
||||
"stargazers_count": 1709,
|
||||
"watchers_count": 1709,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1708,
|
||||
"watchers": 1709,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -568,10 +568,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-16T08:53:44Z",
|
||||
"updated_at": "2023-06-17T04:52:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1708,
|
||||
"watchers_count": 1708,
|
||||
"stargazers_count": 1709,
|
||||
"watchers_count": 1709,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -601,7 +601,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1708,
|
||||
"watchers": 1709,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,12 +42,12 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-06-16T02:02:20Z",
|
||||
"updated_at": "2023-06-17T03:31:18Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3784,
|
||||
"watchers_count": 3784,
|
||||
"stargazers_count": 3786,
|
||||
"watchers_count": 3786,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1083,
|
||||
"forks_count": 1084,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -73,8 +73,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1083,
|
||||
"watchers": 3784,
|
||||
"forks": 1084,
|
||||
"watchers": 3786,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2023-06-14T15:29:49Z",
|
||||
"updated_at": "2023-06-17T01:06:51Z",
|
||||
"pushed_at": "2021-09-12T02:55:24Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 170,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-16T08:53:44Z",
|
||||
"updated_at": "2023-06-17T04:52:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1708,
|
||||
"watchers_count": 1708,
|
||||
"stargazers_count": 1709,
|
||||
"watchers_count": 1709,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -220,7 +220,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1708,
|
||||
"watchers": 1709,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"has_discussions": false,
|
||||
"forks_count": 170,
|
||||
"forks_count": 171,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 170,
|
||||
"forks": 171,
|
||||
"watchers": 676,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,34 +59,5 @@
|
|||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 454504034,
|
||||
"name": "CVE-2020-14321-modified-exploit",
|
||||
"full_name": "f0ns1\/CVE-2020-14321-modified-exploit",
|
||||
"owner": {
|
||||
"login": "f0ns1",
|
||||
"id": 61078210,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61078210?v=4",
|
||||
"html_url": "https:\/\/github.com\/f0ns1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f0ns1\/CVE-2020-14321-modified-exploit",
|
||||
"description": "Modified Moodle exploit for privilege escalation (Dorvack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-01T18:29:11Z",
|
||||
"updated_at": "2022-02-01T18:30:53Z",
|
||||
"pushed_at": "2022-02-01T18:41:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-06-16T02:02:20Z",
|
||||
"updated_at": "2023-06-17T03:31:18Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3784,
|
||||
"watchers_count": 3784,
|
||||
"stargazers_count": 3786,
|
||||
"watchers_count": 3786,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1083,
|
||||
"forks_count": 1084,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,8 +44,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1083,
|
||||
"watchers": 3784,
|
||||
"forks": 1084,
|
||||
"watchers": 3786,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-16T08:53:44Z",
|
||||
"updated_at": "2023-06-17T04:52:30Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1708,
|
||||
"watchers_count": 1708,
|
||||
"stargazers_count": 1709,
|
||||
"watchers_count": 1709,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1708,
|
||||
"watchers": 1709,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 456180379,
|
||||
"name": "Wordpress-CVE-2020-35749",
|
||||
"full_name": "M4xSec\/Wordpress-CVE-2020-35749",
|
||||
"owner": {
|
||||
"login": "M4xSec",
|
||||
"id": 57313495,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57313495?v=4",
|
||||
"html_url": "https:\/\/github.com\/M4xSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M4xSec\/Wordpress-CVE-2020-35749",
|
||||
"description": "Wordpress Plugin Simple Job Board 2.9.3 LFI Vulnerability (CVE-2020-35749) proof of concept exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-06T14:52:22Z",
|
||||
"updated_at": "2022-09-24T00:43:08Z",
|
||||
"pushed_at": "2022-02-07T10:54:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 457327392,
|
||||
"name": "codoforum",
|
||||
"full_name": "prasanthc41m\/codoforum",
|
||||
"owner": {
|
||||
"login": "prasanthc41m",
|
||||
"id": 58906808,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58906808?v=4",
|
||||
"html_url": "https:\/\/github.com\/prasanthc41m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/prasanthc41m\/codoforum",
|
||||
"description": "CVE-2020-5842 Stored XSS Vulnerability in Codoforum 4.8.3",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-09T11:20:16Z",
|
||||
"updated_at": "2022-02-09T11:20:16Z",
|
||||
"pushed_at": "2022-02-10T04:48:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 455530268,
|
||||
"name": "audit-xss-cve-2020-7934",
|
||||
"full_name": "Sergio235705\/audit-xss-cve-2020-7934",
|
||||
"owner": {
|
||||
"login": "Sergio235705",
|
||||
"id": 51259770,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51259770?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sergio235705"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sergio235705\/audit-xss-cve-2020-7934",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-04T11:56:52Z",
|
||||
"updated_at": "2022-02-04T11:58:21Z",
|
||||
"pushed_at": "2022-02-04T11:58:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T20:57:00Z",
|
||||
"updated_at": "2022-03-24T10:38:00Z",
|
||||
"updated_at": "2023-06-17T06:16:02Z",
|
||||
"pushed_at": "2021-08-15T23:05:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Remote OS Command Injection in TastyIgniter v3.0.7 Sendmail Path field",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-15T02:15:54Z",
|
||||
"updated_at": "2023-04-13T07:15:16Z",
|
||||
"updated_at": "2023-06-17T06:06:48Z",
|
||||
"pushed_at": "2022-11-08T22:31:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,11 +10,11 @@
|
|||
"html_url": "https:\/\/github.com\/TomKing062"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TomKing062\/CVE-2022-38694_unlock_bootloader",
|
||||
"description": "unlock bootloader for tyyh2020 and tyyh2021, ALL unisoc T7510 model can be supported.",
|
||||
"description": "unlock bootloader for theoretically ALL unisoc T7510 model",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-06-16T06:31:41Z",
|
||||
"pushed_at": "2023-06-15T01:23:45Z",
|
||||
"updated_at": "2023-06-17T03:59:36Z",
|
||||
"pushed_at": "2023-06-17T06:32:02Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -42,19 +42,19 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T00:08:55Z",
|
||||
"updated_at": "2023-06-16T10:45:11Z",
|
||||
"updated_at": "2023-06-17T06:28:29Z",
|
||||
"pushed_at": "2023-06-02T08:29:26Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 90,
|
||||
"forks": 4,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof of concept code for CVE-2023-2008",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-12T14:41:53Z",
|
||||
"updated_at": "2023-06-16T20:24:22Z",
|
||||
"updated_at": "2023-06-17T04:26:31Z",
|
||||
"pushed_at": "2023-06-12T15:04:02Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:17:23Z",
|
||||
"updated_at": "2023-06-16T20:24:08Z",
|
||||
"updated_at": "2023-06-17T05:32:39Z",
|
||||
"pushed_at": "2023-06-13T14:39:17Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 127,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2023/CVE-2023-24078.json
Normal file
31
2023/CVE-2023-24078.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 654818931,
|
||||
"name": "CVE-2023-24078",
|
||||
"full_name": "overgrowncarrot1\/CVE-2023-24078",
|
||||
"owner": {
|
||||
"login": "overgrowncarrot1",
|
||||
"id": 78485709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78485709?v=4",
|
||||
"html_url": "https:\/\/github.com\/overgrowncarrot1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/overgrowncarrot1\/CVE-2023-24078",
|
||||
"description": "CVE-2023-24078 for FuguHub \/ BarracudaDrive",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-17T03:39:35Z",
|
||||
"updated_at": "2023-06-17T03:44:23Z",
|
||||
"pushed_at": "2023-06-17T03:44:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-06-15T09:17:42Z",
|
||||
"updated_at": "2023-06-17T06:27:36Z",
|
||||
"pushed_at": "2023-06-03T23:23:11Z",
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 472,
|
||||
"watchers": 473,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "MOVEit CVE-2023-34362",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T19:07:32Z",
|
||||
"updated_at": "2023-06-16T23:50:41Z",
|
||||
"updated_at": "2023-06-17T01:29:04Z",
|
||||
"pushed_at": "2023-06-12T11:29:46Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -187,10 +187,10 @@
|
|||
"description": "Repository with everything I have tracking the impact of MOVEit CVE-2023-34362",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T00:39:37Z",
|
||||
"updated_at": "2023-06-16T13:48:21Z",
|
||||
"pushed_at": "2023-06-16T02:15:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2023-06-17T04:05:05Z",
|
||||
"pushed_at": "2023-06-17T04:40:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-34960 Chamilo PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T10:32:22Z",
|
||||
"updated_at": "2023-06-16T16:53:37Z",
|
||||
"updated_at": "2023-06-17T04:48:44Z",
|
||||
"pushed_at": "2023-06-09T10:33:47Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
33
README.md
33
README.md
|
@ -804,6 +804,14 @@ Grand Theft Auto V for PC allows attackers to achieve partial remote code execut
|
|||
|
||||
- [gmh5225/CVE-2023-24059](https://github.com/gmh5225/CVE-2023-24059)
|
||||
|
||||
### CVE-2023-24078 (2023-02-17)
|
||||
|
||||
<code>
|
||||
Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
|
||||
</code>
|
||||
|
||||
- [overgrowncarrot1/CVE-2023-24078](https://github.com/overgrowncarrot1/CVE-2023-24078)
|
||||
|
||||
### CVE-2023-24317 (2023-02-23)
|
||||
|
||||
<code>
|
||||
|
@ -16739,14 +16747,6 @@ Symantec Endpoint Detection And Response, prior to 4.4, may be susceptible to an
|
|||
|
||||
- [nasbench/CVE-2020-5839](https://github.com/nasbench/CVE-2020-5839)
|
||||
|
||||
### CVE-2020-5842 (2020-01-07)
|
||||
|
||||
<code>
|
||||
Codoforum 4.8.3 allows XSS in the user registration page: via the username field to the index.php?u=/user/register URI. The payload is, for example, executed on the admin/index.php?page=users/manage page.
|
||||
</code>
|
||||
|
||||
- [prasanthc41m/codoforum](https://github.com/prasanthc41m/codoforum)
|
||||
|
||||
### CVE-2020-5844 (2020-03-16)
|
||||
|
||||
<code>
|
||||
|
@ -17104,14 +17104,6 @@ In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads
|
|||
|
||||
- [gquere/CVE-2020-7931](https://github.com/gquere/CVE-2020-7931)
|
||||
|
||||
### CVE-2020-7934 (2020-01-28)
|
||||
|
||||
<code>
|
||||
In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and Last Name fields for user accounts in MyAccountPortlet are all vulnerable to a persistent XSS issue. Any user can modify these fields with a particular XSS payload, and it will be stored in the database. The payload will then be rendered when a user utilizes the search feature to search for other users (i.e., if a user with modified fields occurs in the search results). This issue was fixed in Liferay Portal CE version 7.3.0 GA1.
|
||||
</code>
|
||||
|
||||
- [Sergio235705/audit-xss-cve-2020-7934](https://github.com/Sergio235705/audit-xss-cve-2020-7934)
|
||||
|
||||
### CVE-2020-7961 (2020-03-20)
|
||||
|
||||
<code>
|
||||
|
@ -18670,7 +18662,6 @@ In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, teachers of a course were able
|
|||
|
||||
- [HoangKien1020/CVE-2020-14321](https://github.com/HoangKien1020/CVE-2020-14321)
|
||||
- [lanzt/CVE-2020-14321](https://github.com/lanzt/CVE-2020-14321)
|
||||
- [f0ns1/CVE-2020-14321-modified-exploit](https://github.com/f0ns1/CVE-2020-14321-modified-exploit)
|
||||
|
||||
### CVE-2020-14343 (2021-02-09)
|
||||
|
||||
|
@ -20605,14 +20596,6 @@ KLog Server 2.4.1 allows OS command injection via shell metacharacters in the ac
|
|||
|
||||
- [Al1ex/CVE-2020-35729](https://github.com/Al1ex/CVE-2020-35729)
|
||||
|
||||
### CVE-2020-35749 (2021-01-15)
|
||||
|
||||
<code>
|
||||
Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php.
|
||||
</code>
|
||||
|
||||
- [M4xSec/Wordpress-CVE-2020-35749](https://github.com/M4xSec/Wordpress-CVE-2020-35749)
|
||||
|
||||
### CVE-2020-35846 (2020-12-29)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue