Auto Update 2023/04/11 12:32:12

This commit is contained in:
motikan2010-bot 2023-04-11 21:32:12 +09:00
parent 2c91f21fb1
commit 6f526bf7ad
42 changed files with 325 additions and 149 deletions

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-10T21:46:09Z", "updated_at": "2023-04-11T11:49:01Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1662, "stargazers_count": 1663,
"watchers_count": 1662, "watchers_count": 1663,
"has_discussions": false, "has_discussions": false,
"forks_count": 324, "forks_count": 324,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 324, "forks": 324,
"watchers": 1662, "watchers": 1663,
"score": 0 "score": 0
}, },
{ {

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-10T21:46:09Z", "updated_at": "2023-04-11T11:49:01Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1662, "stargazers_count": 1663,
"watchers_count": 1662, "watchers_count": 1663,
"has_discussions": false, "has_discussions": false,
"forks_count": 324, "forks_count": 324,
"allow_forking": true, "allow_forking": true,
@ -75,7 +75,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 324, "forks": 324,
"watchers": 1662, "watchers": 1663,
"score": 0 "score": 0
}, },
{ {

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-10T21:46:09Z", "updated_at": "2023-04-11T11:49:01Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1662, "stargazers_count": 1663,
"watchers_count": 1662, "watchers_count": 1663,
"has_discussions": false, "has_discussions": false,
"forks_count": 324, "forks_count": 324,
"allow_forking": true, "allow_forking": true,
@ -601,7 +601,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 324, "forks": 324,
"watchers": 1662, "watchers": 1663,
"score": 0 "score": 0
}, },
{ {

View file

@ -47,13 +47,13 @@
"stargazers_count": 137, "stargazers_count": 137,
"watchers_count": 137, "watchers_count": 137,
"has_discussions": false, "has_discussions": false,
"forks_count": 70, "forks_count": 71,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 70, "forks": 71,
"watchers": 137, "watchers": 137,
"score": 0 "score": 0
}, },

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-09T03:40:06Z", "updated_at": "2023-04-11T11:52:45Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3716, "stargazers_count": 3717,
"watchers_count": 3716, "watchers_count": 3717,
"has_discussions": false, "has_discussions": false,
"forks_count": 1072, "forks_count": 1072,
"allow_forking": true, "allow_forking": true,
@ -74,7 +74,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1072, "forks": 1072,
"watchers": 3716, "watchers": 3717,
"score": 0 "score": 0
}, },
{ {

31
2019/CVE-2019-18370.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 626379744,
"name": "CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis",
"full_name": "FzBacon\/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis",
"owner": {
"login": "FzBacon",
"id": 48304150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48304150?v=4",
"html_url": "https:\/\/github.com\/FzBacon"
},
"html_url": "https:\/\/github.com\/FzBacon\/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis",
"description": null,
"fork": false,
"created_at": "2023-04-11T10:58:30Z",
"updated_at": "2023-04-11T10:58:30Z",
"pushed_at": "2023-04-11T11:01:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-10T21:46:09Z", "updated_at": "2023-04-11T11:49:01Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1662, "stargazers_count": 1663,
"watchers_count": 1662, "watchers_count": 1663,
"has_discussions": false, "has_discussions": false,
"forks_count": 324, "forks_count": 324,
"allow_forking": true, "allow_forking": true,
@ -220,7 +220,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 324, "forks": 324,
"watchers": 1662, "watchers": 1663,
"score": 0 "score": 0
} }
] ]

View file

@ -47,13 +47,13 @@
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -47,7 +47,7 @@
"stargazers_count": 254, "stargazers_count": 254,
"watchers_count": 254, "watchers_count": 254,
"has_discussions": false, "has_discussions": false,
"forks_count": 80, "forks_count": 81,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -56,7 +56,7 @@
"cve-2020-0610" "cve-2020-0610"
], ],
"visibility": "public", "visibility": "public",
"forks": 80, "forks": 81,
"watchers": 254, "watchers": 254,
"score": 0 "score": 0
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-13933 靶场: shiro 认证绕过漏洞", "description": "CVE-2020-13933 靶场: shiro 认证绕过漏洞",
"fork": false, "fork": false,
"created_at": "2020-09-09T10:20:25Z", "created_at": "2020-09-09T10:20:25Z",
"updated_at": "2023-01-24T11:26:49Z", "updated_at": "2023-04-11T06:45:19Z",
"pushed_at": "2023-04-09T02:44:24Z", "pushed_at": "2023-04-09T02:44:24Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 12, "watchers": 13,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-04-09T03:40:06Z", "updated_at": "2023-04-11T11:52:45Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3716, "stargazers_count": 3717,
"watchers_count": 3716, "watchers_count": 3717,
"has_discussions": false, "has_discussions": false,
"forks_count": 1072, "forks_count": 1072,
"allow_forking": true, "allow_forking": true,
@ -45,7 +45,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1072, "forks": 1072,
"watchers": 3716, "watchers": 3717,
"score": 0 "score": 0
}, },
{ {
@ -859,5 +859,34 @@
"forks": 1, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 626325185,
"name": "CVE-2020-14882",
"full_name": "nik0nz7\/CVE-2020-14882",
"owner": {
"login": "nik0nz7",
"id": 130441760,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130441760?v=4",
"html_url": "https:\/\/github.com\/nik0nz7"
},
"html_url": "https:\/\/github.com\/nik0nz7\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2023-04-11T08:38:47Z",
"updated_at": "2023-04-11T08:39:22Z",
"pushed_at": "2023-04-11T08:39:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false, "fork": false,
"created_at": "2021-06-29T04:38:24Z", "created_at": "2021-06-29T04:38:24Z",
"updated_at": "2023-04-09T21:51:01Z", "updated_at": "2023-04-11T07:56:04Z",
"pushed_at": "2022-04-14T03:17:44Z", "pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 366, "stargazers_count": 367,
"watchers_count": 366, "watchers_count": 367,
"has_discussions": false, "has_discussions": false,
"forks_count": 43, "forks_count": 43,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 43, "forks": 43,
"watchers": 366, "watchers": 367,
"score": 0 "score": 0
} }
] ]

View file

@ -889,10 +889,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false, "fork": false,
"created_at": "2022-11-13T11:01:41Z", "created_at": "2022-11-13T11:01:41Z",
"updated_at": "2023-04-07T07:32:16Z", "updated_at": "2023-04-11T12:15:24Z",
"pushed_at": "2022-11-15T09:05:50Z", "pushed_at": "2022-11-15T09:05:50Z",
"stargazers_count": 54, "stargazers_count": 55,
"watchers_count": 54, "watchers_count": 55,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -901,7 +901,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 54, "watchers": 55,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-04-10T21:46:09Z", "updated_at": "2023-04-11T11:49:01Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1662, "stargazers_count": 1663,
"watchers_count": 1662, "watchers_count": 1663,
"has_discussions": false, "has_discussions": false,
"forks_count": 324, "forks_count": 324,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 324, "forks": 324,
"watchers": 1662, "watchers": 1663,
"score": 0 "score": 0
}, },
{ {

View file

@ -216,10 +216,10 @@
"description": "ApacheOfBiz 17.12.01 - Unauthorized Remote Code Executión ", "description": "ApacheOfBiz 17.12.01 - Unauthorized Remote Code Executión ",
"fork": false, "fork": false,
"created_at": "2022-08-15T18:15:11Z", "created_at": "2022-08-15T18:15:11Z",
"updated_at": "2022-08-18T04:53:14Z", "updated_at": "2023-04-11T10:38:18Z",
"pushed_at": "2022-08-20T18:07:16Z", "pushed_at": "2022-08-20T18:07:16Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -228,7 +228,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool", "description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
"fork": false, "fork": false,
"created_at": "2021-05-11T18:45:07Z", "created_at": "2021-05-11T18:45:07Z",
"updated_at": "2023-04-01T19:29:56Z", "updated_at": "2023-04-11T11:18:17Z",
"pushed_at": "2021-05-20T21:42:43Z", "pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 75, "stargazers_count": 77,
"watchers_count": 75, "watchers_count": 77,
"has_discussions": false, "has_discussions": false,
"forks_count": 31, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 31, "forks": 31,
"watchers": 75, "watchers": 77,
"score": 0 "score": 0
}, },
{ {
@ -132,10 +132,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-08-02T18:56:16Z", "created_at": "2021-08-02T18:56:16Z",
"updated_at": "2023-03-02T14:46:34Z", "updated_at": "2023-04-11T10:54:01Z",
"pushed_at": "2021-10-26T16:51:48Z", "pushed_at": "2021-10-26T16:51:48Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -144,7 +144,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 26, "watchers": 27,
"score": 0 "score": 0
}, },
{ {

View file

@ -452,10 +452,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool", "description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false, "fork": false,
"created_at": "2021-11-11T04:34:07Z", "created_at": "2021-11-11T04:34:07Z",
"updated_at": "2023-04-05T08:53:18Z", "updated_at": "2023-04-11T11:56:53Z",
"pushed_at": "2022-01-16T15:54:14Z", "pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 168, "stargazers_count": 169,
"watchers_count": 168, "watchers_count": 169,
"has_discussions": false, "has_discussions": false,
"forks_count": 35, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
@ -471,7 +471,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 35,
"watchers": 168, "watchers": 169,
"score": 0 "score": 0
}, },
{ {

View file

@ -143,13 +143,13 @@
"stargazers_count": 85, "stargazers_count": 85,
"watchers_count": 85, "watchers_count": 85,
"has_discussions": false, "has_discussions": false,
"forks_count": 56, "forks_count": 55,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 56, "forks": 55,
"watchers": 85, "watchers": 85,
"score": 0 "score": 0
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-11T15:10:30Z", "created_at": "2021-12-11T15:10:30Z",
"updated_at": "2023-04-07T01:24:42Z", "updated_at": "2023-04-11T09:38:15Z",
"pushed_at": "2022-07-10T22:23:13Z", "pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 890, "stargazers_count": 891,
"watchers_count": 890, "watchers_count": 891,
"has_discussions": false, "has_discussions": false,
"forks_count": 185, "forks_count": 185,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 185, "forks": 185,
"watchers": 890, "watchers": 891,
"score": 0 "score": 0
}, },
{ {
@ -47,10 +47,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-04-10T18:19:35Z", "updated_at": "2023-04-11T10:46:49Z",
"pushed_at": "2023-01-29T03:31:27Z", "pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 561, "stargazers_count": 562,
"watchers_count": 561, "watchers_count": 562,
"has_discussions": false, "has_discussions": false,
"forks_count": 101, "forks_count": 101,
"allow_forking": true, "allow_forking": true,
@ -59,7 +59,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 101, "forks": 101,
"watchers": 561, "watchers": 562,
"score": 0 "score": 0
}, },
{ {

View file

@ -3652,13 +3652,13 @@
"stargazers_count": 3224, "stargazers_count": 3224,
"watchers_count": 3224, "watchers_count": 3224,
"has_discussions": true, "has_discussions": true,
"forks_count": 747, "forks_count": 746,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 747, "forks": 746,
"watchers": 3224, "watchers": 3224,
"score": 0 "score": 0
}, },

View file

@ -42,7 +42,7 @@
"description": "wo ee cve-2022-2185 gitlab authenticated rce", "description": "wo ee cve-2022-2185 gitlab authenticated rce",
"fork": false, "fork": false,
"created_at": "2022-07-29T11:14:03Z", "created_at": "2022-07-29T11:14:03Z",
"updated_at": "2023-04-11T01:55:22Z", "updated_at": "2023-04-11T10:30:40Z",
"pushed_at": "2022-07-29T11:28:59Z", "pushed_at": "2022-07-29T11:28:59Z",
"stargazers_count": 71, "stargazers_count": 71,
"watchers_count": 71, "watchers_count": 71,

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-08-09T15:53:48Z", "created_at": "2022-08-09T15:53:48Z",
"updated_at": "2023-04-09T01:36:21Z", "updated_at": "2023-04-11T08:16:34Z",
"pushed_at": "2023-03-02T19:43:36Z", "pushed_at": "2023-03-02T19:43:36Z",
"stargazers_count": 198, "stargazers_count": 199,
"watchers_count": 198, "watchers_count": 199,
"has_discussions": false, "has_discussions": false,
"forks_count": 43, "forks_count": 43,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 43, "forks": 43,
"watchers": 198, "watchers": 199,
"score": 0 "score": 0
}, },
{ {

View file

@ -337,10 +337,10 @@
"description": "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.", "description": "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.",
"fork": false, "fork": false,
"created_at": "2022-10-29T18:25:26Z", "created_at": "2022-10-29T18:25:26Z",
"updated_at": "2023-02-10T09:21:10Z", "updated_at": "2023-04-11T11:25:15Z",
"pushed_at": "2022-12-09T13:44:00Z", "pushed_at": "2022-12-09T13:44:00Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -360,7 +360,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 15, "watchers": 16,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false, "fork": false,
"created_at": "2022-03-30T07:54:45Z", "created_at": "2022-03-30T07:54:45Z",
"updated_at": "2023-04-05T21:08:53Z", "updated_at": "2023-04-11T10:58:38Z",
"pushed_at": "2022-11-09T15:46:06Z", "pushed_at": "2022-11-09T15:46:06Z",
"stargazers_count": 322, "stargazers_count": 323,
"watchers_count": 322, "watchers_count": 323,
"has_discussions": false, "has_discussions": false,
"forks_count": 104, "forks_count": 104,
"allow_forking": true, "allow_forking": true,
@ -34,7 +34,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 104, "forks": 104,
"watchers": 322, "watchers": 323,
"score": 0 "score": 0
}, },
{ {
@ -1434,10 +1434,10 @@
"description": "CVE-2022-22965 pocsuite3 POC", "description": "CVE-2022-22965 pocsuite3 POC",
"fork": false, "fork": false,
"created_at": "2022-04-07T02:30:26Z", "created_at": "2022-04-07T02:30:26Z",
"updated_at": "2022-08-17T13:34:38Z", "updated_at": "2023-04-11T11:56:18Z",
"pushed_at": "2022-04-07T02:31:28Z", "pushed_at": "2022-04-07T02:31:28Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -1446,7 +1446,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
}, },
{ {

View file

@ -42,10 +42,10 @@
"description": "There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog.", "description": "There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog.",
"fork": false, "fork": false,
"created_at": "2023-04-11T00:12:33Z", "created_at": "2023-04-11T00:12:33Z",
"updated_at": "2023-04-11T00:27:27Z", "updated_at": "2023-04-11T11:56:57Z",
"pushed_at": "2023-04-11T00:27:37Z", "pushed_at": "2023-04-11T00:27:37Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -54,7 +54,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -134,10 +134,10 @@
"description": "Zimbra CVE-2022-27925 PoC", "description": "Zimbra CVE-2022-27925 PoC",
"fork": false, "fork": false,
"created_at": "2022-08-20T15:58:29Z", "created_at": "2022-08-20T15:58:29Z",
"updated_at": "2023-04-05T02:31:28Z", "updated_at": "2023-04-11T10:35:34Z",
"pushed_at": "2022-08-27T20:30:21Z", "pushed_at": "2022-08-27T20:30:21Z",
"stargazers_count": 33, "stargazers_count": 34,
"watchers_count": 33, "watchers_count": 34,
"has_discussions": false, "has_discussions": false,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
@ -152,7 +152,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 33, "watchers": 34,
"score": 0 "score": 0
}, },
{ {

View file

@ -311,10 +311,10 @@
"description": "CobaltStrike <= 4.7.1 RCE", "description": "CobaltStrike <= 4.7.1 RCE",
"fork": false, "fork": false,
"created_at": "2022-10-14T11:46:01Z", "created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-03-28T11:57:53Z", "updated_at": "2023-04-11T10:29:19Z",
"pushed_at": "2022-10-25T05:32:54Z", "pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 315, "stargazers_count": 316,
"watchers_count": 315, "watchers_count": 316,
"has_discussions": false, "has_discussions": false,
"forks_count": 81, "forks_count": 81,
"allow_forking": true, "allow_forking": true,
@ -323,7 +323,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 81, "forks": 81,
"watchers": 315, "watchers": 316,
"score": 0 "score": 0
}, },
{ {

View file

@ -195,13 +195,13 @@
"stargazers_count": 140, "stargazers_count": 140,
"watchers_count": 140, "watchers_count": 140,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 22,
"watchers": 140, "watchers": 140,
"score": 0 "score": 0
}, },

View file

@ -402,19 +402,19 @@
"description": "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0", "description": "Unauthenticated Remote Code Execution through authentication bypass and command injection in Cacti < 1.2.23 and < 1.3.0",
"fork": false, "fork": false,
"created_at": "2023-04-07T23:40:53Z", "created_at": "2023-04-07T23:40:53Z",
"updated_at": "2023-04-07T23:44:02Z", "updated_at": "2023-04-11T08:16:52Z",
"pushed_at": "2023-04-09T11:02:59Z", "pushed_at": "2023-04-09T11:02:59Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -42,19 +42,19 @@
"description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "description": "针对CVE-2023-0179漏洞利用 该漏洞被分配为CVE-2023-0179影响了从5.5到6.2-rc3的所有Linux版本该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
"fork": false, "fork": false,
"created_at": "2023-03-16T02:20:52Z", "created_at": "2023-03-16T02:20:52Z",
"updated_at": "2023-04-11T06:28:06Z", "updated_at": "2023-04-11T11:34:28Z",
"pushed_at": "2023-03-16T02:22:28Z", "pushed_at": "2023-03-16T02:22:28Z",
"stargazers_count": 63, "stargazers_count": 84,
"watchers_count": 63, "watchers_count": 84,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 14,
"watchers": 63, "watchers": 84,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit", "description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
"fork": false, "fork": false,
"created_at": "2023-01-30T12:57:48Z", "created_at": "2023-01-30T12:57:48Z",
"updated_at": "2023-04-10T19:33:25Z", "updated_at": "2023-04-11T07:28:28Z",
"pushed_at": "2023-02-27T04:51:20Z", "pushed_at": "2023-02-27T04:51:20Z",
"stargazers_count": 190, "stargazers_count": 191,
"watchers_count": 190, "watchers_count": 191,
"has_discussions": false, "has_discussions": false,
"forks_count": 43, "forks_count": 43,
"allow_forking": true, "allow_forking": true,
@ -35,7 +35,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 43, "forks": 43,
"watchers": 190, "watchers": 191,
"score": 0 "score": 0
}, },
{ {

View file

@ -173,13 +173,13 @@
"stargazers_count": 284, "stargazers_count": 284,
"watchers_count": 284, "watchers_count": 284,
"has_discussions": false, "has_discussions": false,
"forks_count": 51, "forks_count": 52,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 51, "forks": 52,
"watchers": 284, "watchers": 284,
"score": 0 "score": 0
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-03-22T11:23:44Z", "created_at": "2023-03-22T11:23:44Z",
"updated_at": "2023-04-03T09:58:19Z", "updated_at": "2023-04-11T09:14:22Z",
"pushed_at": "2023-04-03T10:10:42Z", "pushed_at": "2023-04-03T10:10:42Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 12, "watchers": 13,
"score": 0 "score": 0
} }
] ]

View file

@ -42,10 +42,10 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)", "description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false, "fork": false,
"created_at": "2023-01-25T03:21:42Z", "created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-04-06T09:28:16Z", "updated_at": "2023-04-11T09:30:39Z",
"pushed_at": "2023-02-10T08:03:59Z", "pushed_at": "2023-02-10T08:03:59Z",
"stargazers_count": 243, "stargazers_count": 244,
"watchers_count": 243, "watchers_count": 244,
"has_discussions": false, "has_discussions": false,
"forks_count": 39, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
@ -54,7 +54,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 39,
"watchers": 243, "watchers": 244,
"score": 0 "score": 0
}, },
{ {

31
2023/CVE-2023-26852.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 626287396,
"name": "CVE-2023-26852-Textpattern-v4.8.8-and-",
"full_name": "leekenghwa\/CVE-2023-26852-Textpattern-v4.8.8-and-",
"owner": {
"login": "leekenghwa",
"id": 45155253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45155253?v=4",
"html_url": "https:\/\/github.com\/leekenghwa"
},
"html_url": "https:\/\/github.com\/leekenghwa\/CVE-2023-26852-Textpattern-v4.8.8-and-",
"description": "Textpattern v4.8.8 and Below are vulnerable to Unrestricted File Upload Leading to Remote Code Execution",
"fork": false,
"created_at": "2023-04-11T07:00:04Z",
"updated_at": "2023-04-11T07:00:04Z",
"pushed_at": "2023-04-11T08:51:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2023/CVE-2023-26976.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 626381488,
"name": "CVE-2023-26976_tenda_AC6_stack_overflow",
"full_name": "FzBacon\/CVE-2023-26976_tenda_AC6_stack_overflow",
"owner": {
"login": "FzBacon",
"id": 48304150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48304150?v=4",
"html_url": "https:\/\/github.com\/FzBacon"
},
"html_url": "https:\/\/github.com\/FzBacon\/CVE-2023-26976_tenda_AC6_stack_overflow",
"description": null,
"fork": false,
"created_at": "2023-04-11T11:02:48Z",
"updated_at": "2023-04-11T11:05:12Z",
"pushed_at": "2023-04-11T11:05:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2023-04-11T06:24:04Z", "created_at": "2023-04-11T06:24:04Z",
"updated_at": "2023-04-11T06:24:04Z", "updated_at": "2023-04-11T06:24:04Z",
"pushed_at": "2023-04-11T06:29:30Z", "pushed_at": "2023-04-11T06:39:41Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

31
2023/CVE-2023-27704.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 626280876,
"name": "CVE-2023-27704",
"full_name": "happy0717\/CVE-2023-27704",
"owner": {
"login": "happy0717",
"id": 36958703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36958703?v=4",
"html_url": "https:\/\/github.com\/happy0717"
},
"html_url": "https:\/\/github.com\/happy0717\/CVE-2023-27704",
"description": "CVE-2023-27704 Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS)",
"fork": false,
"created_at": "2023-04-11T06:41:58Z",
"updated_at": "2023-04-11T06:41:58Z",
"pushed_at": "2023-04-11T06:46:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE", "description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
"fork": false, "fork": false,
"created_at": "2023-03-27T08:53:04Z", "created_at": "2023-03-27T08:53:04Z",
"updated_at": "2023-04-10T18:43:46Z", "updated_at": "2023-04-11T07:22:25Z",
"pushed_at": "2023-04-04T05:26:59Z", "pushed_at": "2023-04-04T05:26:59Z",
"stargazers_count": 176, "stargazers_count": 177,
"watchers_count": 176, "watchers_count": 177,
"has_discussions": false, "has_discussions": false,
"forks_count": 25, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 25,
"watchers": 176, "watchers": 177,
"score": 0 "score": 0
} }
] ]

View file

@ -13,19 +13,19 @@
"description": "Clone from gist", "description": "Clone from gist",
"fork": false, "fork": false,
"created_at": "2023-04-07T18:26:25Z", "created_at": "2023-04-07T18:26:25Z",
"updated_at": "2023-04-08T19:00:03Z", "updated_at": "2023-04-11T08:15:46Z",
"pushed_at": "2023-04-07T18:26:38Z", "pushed_at": "2023-04-07T18:26:38Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
}, },
{ {

View file

@ -1,6 +1,6 @@
[ [
{ {
"id": 625925446, "id": 626384673,
"name": "CVE-2023-30459", "name": "CVE-2023-30459",
"full_name": "Toxich4\/CVE-2023-30459", "full_name": "Toxich4\/CVE-2023-30459",
"owner": { "owner": {
@ -12,11 +12,11 @@
"html_url": "https:\/\/github.com\/Toxich4\/CVE-2023-30459", "html_url": "https:\/\/github.com\/Toxich4\/CVE-2023-30459",
"description": "CVE-2023-30459", "description": "CVE-2023-30459",
"fork": false, "fork": false,
"created_at": "2023-04-10T12:18:41Z", "created_at": "2023-04-11T11:11:29Z",
"updated_at": "2023-04-10T12:18:41Z", "updated_at": "2023-04-11T11:23:24Z",
"pushed_at": "2023-04-10T12:18:41Z", "pushed_at": "2023-04-11T11:17:29Z",
"stargazers_count": 0, "stargazers_count": 2,
"watchers_count": 0, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -596,6 +596,9 @@ ZCBS Zijper Collectie Beheer Systeem (ZCBS), Zijper Publication Management Syste
- [bigzooooz/CVE-2023-26692](https://github.com/bigzooooz/CVE-2023-26692) - [bigzooooz/CVE-2023-26692](https://github.com/bigzooooz/CVE-2023-26692)
### CVE-2023-26852
- [leekenghwa/CVE-2023-26852-Textpattern-v4.8.8-and-](https://github.com/leekenghwa/CVE-2023-26852-Textpattern-v4.8.8-and-)
### CVE-2023-26866 (2023-04-04) ### CVE-2023-26866 (2023-04-04)
<code> <code>
@ -604,6 +607,14 @@ GreenPacket OH736's WR-1200 Indoor Unit, OT-235 with firmware versions M-IDU-1.6
- [lionelmusonza/CVE-2023-26866](https://github.com/lionelmusonza/CVE-2023-26866) - [lionelmusonza/CVE-2023-26866](https://github.com/lionelmusonza/CVE-2023-26866)
### CVE-2023-26976 (2023-04-03)
<code>
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
</code>
- [FzBacon/CVE-2023-26976_tenda_AC6_stack_overflow](https://github.com/FzBacon/CVE-2023-26976_tenda_AC6_stack_overflow)
### CVE-2023-26982 (2023-03-29) ### CVE-2023-26982 (2023-03-29)
<code> <code>
@ -663,6 +674,9 @@ ReadtoMyShoe, a web app that lets users upload articles and listen to them later
### CVE-2023-27703 ### CVE-2023-27703
- [happy0717/CVE-2023-27703](https://github.com/happy0717/CVE-2023-27703) - [happy0717/CVE-2023-27703](https://github.com/happy0717/CVE-2023-27703)
### CVE-2023-27704
- [happy0717/CVE-2023-27704](https://github.com/happy0717/CVE-2023-27704)
### CVE-2023-27842 (2023-03-21) ### CVE-2023-27842 (2023-03-21)
<code> <code>
@ -17267,6 +17281,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [N0Coriander/CVE-2020-14882-14883](https://github.com/N0Coriander/CVE-2020-14882-14883) - [N0Coriander/CVE-2020-14882-14883](https://github.com/N0Coriander/CVE-2020-14882-14883)
- [Manor99/CVE-2020-14882-](https://github.com/Manor99/CVE-2020-14882-) - [Manor99/CVE-2020-14882-](https://github.com/Manor99/CVE-2020-14882-)
- [Serendipity-Lucky/CVE-2020-14882_ALL](https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL) - [Serendipity-Lucky/CVE-2020-14882_ALL](https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL)
- [nik0nz7/CVE-2020-14882](https://github.com/nik0nz7/CVE-2020-14882)
### CVE-2020-14883 (2020-10-21) ### CVE-2020-14883 (2020-10-21)
@ -22800,6 +22815,14 @@ An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0
- [M-ensimag/CVE-2019-18276](https://github.com/M-ensimag/CVE-2019-18276) - [M-ensimag/CVE-2019-18276](https://github.com/M-ensimag/CVE-2019-18276)
- [SABI-Ensimag/CVE-2019-18276](https://github.com/SABI-Ensimag/CVE-2019-18276) - [SABI-Ensimag/CVE-2019-18276](https://github.com/SABI-Ensimag/CVE-2019-18276)
### CVE-2019-18370 (2019-10-23)
<code>
An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The backup file is in tar.gz format. After uploading, the application uses the tar zxf command to decompress, so one can control the contents of the files in the decompressed directory. In addition, the application's sh script for testing upload and download speeds reads a URL list from /tmp/speedtest_urls.xml, and there is a command injection vulnerability, as demonstrated by api/xqnetdetect/netspeed.
</code>
- [FzBacon/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis](https://github.com/FzBacon/CVE-2019-18370_XiaoMi_Mi_WIFI_RCE_analysis)
### CVE-2019-18371 (2019-10-23) ### CVE-2019-18371 (2019-10-23)
<code> <code>