mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/02/27 00:27:57
This commit is contained in:
parent
b001a5311e
commit
71ca257747
30 changed files with 142 additions and 112 deletions
|
@ -129,10 +129,10 @@
|
|||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2023-02-07T21:26:11Z",
|
||||
"updated_at": "2023-02-26T20:26:19Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 480,
|
||||
"watchers_count": 480,
|
||||
"has_discussions": false,
|
||||
"forks_count": 472,
|
||||
"forks_count": 471,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 472,
|
||||
"forks": 471,
|
||||
"watchers": 480,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -92,13 +92,13 @@
|
|||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"has_discussions": false,
|
||||
"forks_count": 184,
|
||||
"forks_count": 183,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 184,
|
||||
"forks": 183,
|
||||
"watchers": 502,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -83,7 +83,7 @@
|
|||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"has_discussions": false,
|
||||
"forks_count": 176,
|
||||
"forks_count": 177,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -99,7 +99,7 @@
|
|||
"sa-core-2018-002"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 176,
|
||||
"forks": 177,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1312,13 +1312,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 406,
|
||||
"forks_count": 405,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 406,
|
||||
"forks": 405,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T04:54:31Z",
|
||||
"updated_at": "2023-02-09T17:25:40Z",
|
||||
"updated_at": "2023-02-26T18:36:30Z",
|
||||
"pushed_at": "2022-03-15T05:15:48Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1037,7 +1037,7 @@
|
|||
"stargazers_count": 1236,
|
||||
"watchers_count": 1236,
|
||||
"has_discussions": false,
|
||||
"forks_count": 371,
|
||||
"forks_count": 370,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1049,7 +1049,7 @@
|
|||
"smbghost"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 371,
|
||||
"forks": 370,
|
||||
"watchers": 1236,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2023-02-20T01:20:09Z",
|
||||
"updated_at": "2023-02-26T22:53:33Z",
|
||||
"pushed_at": "2021-08-07T16:48:55Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"stargazers_count": 387,
|
||||
"watchers_count": 387,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 388,
|
||||
"watchers": 387,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2022-11-09T18:12:35Z",
|
||||
"updated_at": "2023-02-26T19:35:43Z",
|
||||
"pushed_at": "2021-09-20T07:58:29Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1044,13 +1044,13 @@
|
|||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"has_discussions": false,
|
||||
"forks_count": 155,
|
||||
"forks_count": 156,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 155,
|
||||
"forks": 156,
|
||||
"watchers": 569,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-07T06:09:14Z",
|
||||
"updated_at": "2023-01-23T11:55:51Z",
|
||||
"updated_at": "2023-02-26T23:08:08Z",
|
||||
"pushed_at": "2023-01-07T19:41:36Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-23T06:36:47Z",
|
||||
"updated_at": "2023-02-24T22:46:45Z",
|
||||
"updated_at": "2023-02-26T18:38:49Z",
|
||||
"pushed_at": "2023-02-23T19:09:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -76,7 +76,7 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"path-traversal-exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -167,13 +167,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -3281,19 +3281,19 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2023-02-02T23:09:58Z",
|
||||
"updated_at": "2023-02-26T21:14:28Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 340,
|
||||
"forks": 50,
|
||||
"watchers": 341,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "WordPress WP_Query SQL Injection POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-28T13:12:51Z",
|
||||
"updated_at": "2023-01-06T06:20:38Z",
|
||||
"updated_at": "2023-02-26T18:36:45Z",
|
||||
"pushed_at": "2022-07-30T08:20:53Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -141,7 +141,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Authenticated Remote Command Execution in Gitlab via GitHub import",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-08T11:42:49Z",
|
||||
"updated_at": "2023-02-09T01:38:28Z",
|
||||
"updated_at": "2023-02-26T19:35:32Z",
|
||||
"pushed_at": "2022-10-09T03:54:53Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 203,
|
||||
"watchers": 204,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -129,7 +129,7 @@
|
|||
"description": "Bitbucket CVE-2022-36804 unauthenticated remote command execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-21T10:36:50Z",
|
||||
"updated_at": "2023-01-21T19:03:58Z",
|
||||
"updated_at": "2023-02-26T21:59:53Z",
|
||||
"pushed_at": "2023-01-21T02:14:15Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-02-26T13:29:28Z",
|
||||
"updated_at": "2023-02-27T00:19:50Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"stargazers_count": 218,
|
||||
"watchers_count": 218,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 217,
|
||||
"watchers": 218,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T18:13:59Z",
|
||||
"updated_at": "2023-02-26T00:31:09Z",
|
||||
"updated_at": "2023-02-26T21:16:02Z",
|
||||
"pushed_at": "2022-10-13T20:13:44Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 83,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -100,7 +100,7 @@
|
|||
"description": "Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T21:07:50Z",
|
||||
"updated_at": "2023-02-24T16:48:14Z",
|
||||
"updated_at": "2023-02-26T21:59:46Z",
|
||||
"pushed_at": "2023-01-21T02:17:48Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
|
|
|
@ -129,7 +129,7 @@
|
|||
"description": "CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-09T15:27:40Z",
|
||||
"updated_at": "2023-02-13T03:21:21Z",
|
||||
"updated_at": "2023-02-26T22:00:00Z",
|
||||
"pushed_at": "2023-01-21T01:57:59Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T11:53:14Z",
|
||||
"updated_at": "2023-02-21T15:10:33Z",
|
||||
"updated_at": "2023-02-26T21:14:09Z",
|
||||
"pushed_at": "2023-01-03T08:37:33Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 75,
|
||||
"forks": 20,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -129,12 +129,12 @@
|
|||
"description": "PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-22T09:35:26Z",
|
||||
"updated_at": "2023-02-25T13:00:40Z",
|
||||
"updated_at": "2023-02-26T22:17:00Z",
|
||||
"pushed_at": "2023-01-10T08:09:36Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -148,8 +148,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 57,
|
||||
"forks": 24,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -272,7 +272,7 @@
|
|||
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-19T11:49:08Z",
|
||||
"updated_at": "2023-01-21T01:52:55Z",
|
||||
"updated_at": "2023-02-26T22:00:23Z",
|
||||
"pushed_at": "2023-01-21T01:52:51Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
|
|
|
@ -281,7 +281,7 @@
|
|||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T02:00:51Z",
|
||||
"updated_at": "2023-02-13T02:27:18Z",
|
||||
"updated_at": "2023-02-26T21:58:54Z",
|
||||
"pushed_at": "2023-02-13T02:26:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -117,20 +117,49 @@
|
|||
},
|
||||
{
|
||||
"id": 606615026,
|
||||
"name": "Analysis4CVE-2023-0669",
|
||||
"full_name": "yosef0x01\/Analysis4CVE-2023-0669",
|
||||
"name": "CVE-2023-0669-Analysis",
|
||||
"full_name": "yosef0x01\/CVE-2023-0669-Analysis",
|
||||
"owner": {
|
||||
"login": "yosef0x01",
|
||||
"id": 96077889,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96077889?v=4",
|
||||
"html_url": "https:\/\/github.com\/yosef0x01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yosef0x01\/Analysis4CVE-2023-0669",
|
||||
"html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-0669-Analysis",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-26T02:33:54Z",
|
||||
"updated_at": "2023-02-26T02:33:54Z",
|
||||
"pushed_at": "2023-02-26T02:46:02Z",
|
||||
"updated_at": "2023-02-26T22:38:19Z",
|
||||
"pushed_at": "2023-02-26T22:38:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 606877054,
|
||||
"name": "CVE-2023-0669-bis",
|
||||
"full_name": "trhacknon\/CVE-2023-0669-bis",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2023-0669-bis",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-26T20:22:20Z",
|
||||
"updated_at": "2023-02-26T20:22:36Z",
|
||||
"pushed_at": "2023-02-26T20:22:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2023-02-26T06:29:49Z",
|
||||
"updated_at": "2023-02-26T22:11:54Z",
|
||||
"pushed_at": "2023-02-03T03:07:59Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-02-26T18:00:44Z",
|
||||
"updated_at": "2023-02-27T00:23:42Z",
|
||||
"pushed_at": "2023-02-26T11:24:37Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,8 +27,8 @@
|
|||
"weblogic"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 171,
|
||||
"forks": 22,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-21T16:08:56Z",
|
||||
"updated_at": "2023-02-26T11:37:11Z",
|
||||
"updated_at": "2023-02-27T00:20:39Z",
|
||||
"pushed_at": "2023-02-26T06:43:18Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-24T08:33:19Z",
|
||||
"updated_at": "2023-02-26T14:32:05Z",
|
||||
"updated_at": "2023-02-26T22:14:26Z",
|
||||
"pushed_at": "2023-01-24T12:51:29Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -219,10 +219,10 @@
|
|||
"description": "simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T01:33:55Z",
|
||||
"updated_at": "2023-02-25T12:16:13Z",
|
||||
"updated_at": "2023-02-26T19:07:35Z",
|
||||
"pushed_at": "2023-02-24T04:45:36Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -231,7 +231,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T15:33:41Z",
|
||||
"updated_at": "2023-02-25T00:09:16Z",
|
||||
"updated_at": "2023-02-26T20:21:14Z",
|
||||
"pushed_at": "2023-02-09T09:06:15Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-22T19:44:08Z",
|
||||
"updated_at": "2023-02-26T14:14:03Z",
|
||||
"updated_at": "2023-02-26T20:36:10Z",
|
||||
"pushed_at": "2023-02-24T15:39:38Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 36,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,7 +36,8 @@ Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication
|
|||
- [cataiovita/CVE-2023-0669](https://github.com/cataiovita/CVE-2023-0669)
|
||||
- [Griffin-01/CVE-2023-0669](https://github.com/Griffin-01/CVE-2023-0669)
|
||||
- [trhacknon/CVE-2023-0669](https://github.com/trhacknon/CVE-2023-0669)
|
||||
- [yosef0x01/Analysis4CVE-2023-0669](https://github.com/yosef0x01/Analysis4CVE-2023-0669)
|
||||
- [yosef0x01/CVE-2023-0669-Analysis](https://github.com/yosef0x01/CVE-2023-0669-Analysis)
|
||||
- [trhacknon/CVE-2023-0669-bis](https://github.com/trhacknon/CVE-2023-0669-bis)
|
||||
|
||||
### CVE-2023-0748 (2023-02-08)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue