mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2023/07/04 06:40:11
This commit is contained in:
parent
c568c48941
commit
6ac82e7750
32 changed files with 102 additions and 126 deletions
2007
2014
2016
2018
2019
2020
2021
2022
CVE-2022-0847.jsonCVE-2022-26809.jsonCVE-2022-29464.jsonCVE-2022-38694.jsonCVE-2022-40494.jsonCVE-2022-42889.jsonCVE-2022-44268.jsonCVE-2022-46689.json
2023
CVE-2023-23752.jsonCVE-2023-25136.jsonCVE-2023-27350.jsonCVE-2023-27524.jsonCVE-2023-28343.jsonCVE-2023-29343.jsonCVE-2023-32243.jsonCVE-2023-32315.jsonCVE-2023-34960.json
README.md
|
@ -89,36 +89,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 235003634,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "JoseBarrios\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "JoseBarrios",
|
||||
"id": 794342,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
|
||||
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T02:30:35Z",
|
||||
"updated_at": "2020-01-20T02:30:39Z",
|
||||
"pushed_at": "2020-01-20T02:30:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 257885318,
|
||||
"name": "CVE-2007-2447",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2023-06-22T18:29:23Z",
|
||||
"updated_at": "2023-07-04T04:48:00Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2294,
|
||||
"watchers_count": 2294,
|
||||
"stargazers_count": 2295,
|
||||
"watchers_count": 2295,
|
||||
"has_discussions": false,
|
||||
"forks_count": 489,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 489,
|
||||
"watchers": 2294,
|
||||
"watchers": 2295,
|
||||
"score": 0,
|
||||
"subscribers_count": 118
|
||||
},
|
||||
|
|
|
@ -167,10 +167,10 @@
|
|||
"description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T08:40:10Z",
|
||||
"updated_at": "2023-06-29T09:11:25Z",
|
||||
"updated_at": "2023-07-04T03:15:46Z",
|
||||
"pushed_at": "2022-04-02T08:55:07Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -179,7 +179,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2023-06-15T01:45:00Z",
|
||||
"updated_at": "2023-07-04T01:37:08Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"stargazers_count": 487,
|
||||
"watchers_count": 487,
|
||||
"has_discussions": false,
|
||||
"forks_count": 190,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 190,
|
||||
"watchers": 486,
|
||||
"watchers": 487,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 610,
|
||||
"watchers_count": 610,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -67,7 +67,7 @@
|
|||
"xss"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"forks": 131,
|
||||
"watchers": 610,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2018-8174_python",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T03:12:32Z",
|
||||
"updated_at": "2023-06-02T15:24:14Z",
|
||||
"updated_at": "2023-07-04T01:18:27Z",
|
||||
"pushed_at": "2022-04-19T13:24:53Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 139,
|
||||
"watchers": 140,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-07-03T22:04:51Z",
|
||||
"updated_at": "2023-07-04T04:55:40Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3800,
|
||||
"watchers_count": 3800,
|
||||
"stargazers_count": 3801,
|
||||
"watchers_count": 3801,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3800,
|
||||
"watchers": 3801,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2023-07-02T00:25:49Z",
|
||||
"updated_at": "2023-07-04T03:39:07Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 304,
|
||||
"watchers": 306,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -76,7 +76,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2023-06-30T02:36:21Z",
|
||||
"pushed_at": "2023-01-17T13:41:58Z",
|
||||
"pushed_at": "2023-07-04T05:16:05Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-07-03T22:04:51Z",
|
||||
"updated_at": "2023-07-04T04:55:40Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3800,
|
||||
"watchers_count": 3800,
|
||||
"stargazers_count": 3801,
|
||||
"watchers_count": 3801,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1085,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1085,
|
||||
"watchers": 3800,
|
||||
"watchers": 3801,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2023-06-16T01:31:18Z",
|
||||
"updated_at": "2023-07-04T04:33:14Z",
|
||||
"pushed_at": "2023-06-11T08:47:04Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2023-07-03T21:18:23Z",
|
||||
"updated_at": "2023-07-04T02:17:08Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1832,
|
||||
"watchers_count": 1832,
|
||||
"stargazers_count": 1831,
|
||||
"watchers_count": 1831,
|
||||
"has_discussions": false,
|
||||
"forks_count": 513,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 513,
|
||||
"watchers": 1832,
|
||||
"watchers": 1831,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
|
|
@ -1268,7 +1268,7 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-06-29T20:10:04Z",
|
||||
"updated_at": "2023-07-04T03:58:27Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 696,
|
||||
"watchers_count": 696,
|
||||
|
@ -2212,13 +2212,13 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -1220,13 +1220,13 @@
|
|||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"has_discussions": false,
|
||||
"forks_count": 124,
|
||||
"forks_count": 125,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 124,
|
||||
"forks": 125,
|
||||
"watchers": 424,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -257,10 +257,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2023-07-03T07:25:19Z",
|
||||
"updated_at": "2023-07-04T03:13:14Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -269,7 +269,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 358,
|
||||
"watchers": 359,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -769,10 +769,10 @@
|
|||
"description": "Perform With Mass Exploits In WSO Management.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T09:45:18Z",
|
||||
"updated_at": "2023-05-10T15:03:46Z",
|
||||
"updated_at": "2023-07-04T02:51:53Z",
|
||||
"pushed_at": "2023-05-27T16:18:23Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "unlock bootloader for theoretically ALL unisoc ud710 and ums512 model",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-07-03T21:36:58Z",
|
||||
"updated_at": "2023-07-04T01:11:01Z",
|
||||
"pushed_at": "2023-06-27T17:11:29Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2023-07-03T14:19:38Z",
|
||||
"updated_at": "2023-07-04T01:45:23Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 240,
|
||||
"watchers": 242,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -1304,7 +1304,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-22T06:57:55Z",
|
||||
"updated_at": "2023-05-23T07:32:45Z",
|
||||
"pushed_at": "2023-06-29T06:04:29Z",
|
||||
"pushed_at": "2023-07-04T05:36:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -467,6 +467,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 55,
|
||||
"watchers": 814,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
|
|
|
@ -635,10 +635,10 @@
|
|||
"description": "Perform With Mass Exploiter In Joomla 4.2.8.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-09T13:20:48Z",
|
||||
"updated_at": "2023-06-17T15:57:10Z",
|
||||
"updated_at": "2023-07-04T02:51:49Z",
|
||||
"pushed_at": "2023-05-24T07:29:16Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -651,7 +651,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-18T21:47:47Z",
|
||||
"updated_at": "2023-06-10T12:46:57Z",
|
||||
"updated_at": "2023-07-04T06:32:00Z",
|
||||
"pushed_at": "2023-04-21T14:22:41Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -199,10 +199,10 @@
|
|||
"description": "OpenSSH 9.1漏洞大规模扫描和利用",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-30T09:34:36Z",
|
||||
"updated_at": "2023-07-03T18:00:45Z",
|
||||
"updated_at": "2023-07-04T02:18:11Z",
|
||||
"pushed_at": "2023-06-30T09:36:19Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -211,7 +211,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Perfom With Massive Authentication Bypass In PaperCut MF\/NG",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-27T11:32:35Z",
|
||||
"updated_at": "2023-05-27T15:09:06Z",
|
||||
"updated_at": "2023-07-04T02:51:51Z",
|
||||
"pushed_at": "2023-05-27T15:24:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Perform With Apache-SuperSet Leaked Token [CSRF]",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-04T21:43:48Z",
|
||||
"updated_at": "2023-05-20T22:09:46Z",
|
||||
"updated_at": "2023-07-04T02:51:38Z",
|
||||
"pushed_at": "2023-05-05T06:56:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -149,7 +149,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -87,6 +87,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T11:14:08Z",
|
||||
"updated_at": "2023-07-03T19:38:48Z",
|
||||
"updated_at": "2023-07-04T04:39:44Z",
|
||||
"pushed_at": "2023-06-18T11:51:54Z",
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 142,
|
||||
"watchers": 143,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -301,6 +301,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -133,7 +133,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-07-02T20:38:14Z",
|
||||
"updated_at": "2023-07-03T10:34:46Z",
|
||||
"updated_at": "2023-07-04T02:52:01Z",
|
||||
"pushed_at": "2023-07-03T01:29:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -617,7 +617,7 @@
|
|||
|
||||
- [Saboor-Hakimi/CVE-2023-22894](https://github.com/Saboor-Hakimi/CVE-2023-22894)
|
||||
|
||||
### CVE-2023-22906 (-)
|
||||
### CVE-2023-22906 (2023-07-03)
|
||||
|
||||
<code>Hero Qubo HCD01_02_V1.38_20220125 devices allow TELNET access with root privileges by default, without a password.
|
||||
</code>
|
||||
|
@ -32809,7 +32809,6 @@
|
|||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
|
||||
- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447)
|
||||
- [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3)
|
||||
|
@ -33145,6 +33144,13 @@
|
|||
|
||||
- [alt3kx/CVE-2002-0288](https://github.com/alt3kx/CVE-2002-0288)
|
||||
|
||||
### CVE-2002-0289 (2002-05-03)
|
||||
|
||||
<code>Buffer overflow in Phusion web server 1.0 allows remote attackers to cause a denial of service and execute arbitrary code via a long HTTP request.
|
||||
</code>
|
||||
|
||||
- [alt3kx/CVE-2002-0289](https://github.com/alt3kx/CVE-2002-0289)
|
||||
|
||||
### CVE-2002-0346 (2002-05-03)
|
||||
|
||||
<code>Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi.
|
||||
|
|
Loading…
Add table
Reference in a new issue