Auto Update 2023/08/29 18:50:52

This commit is contained in:
motikan2010-bot 2023-08-30 03:50:52 +09:00
parent 3f72ffa1bb
commit 7ccfcc348f
73 changed files with 1325 additions and 227 deletions

View file

@ -28,5 +28,35 @@
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 62456741,
"name": "jboss-autopwn",
"full_name": "gitcollect\/jboss-autopwn",
"owner": {
"login": "gitcollect",
"id": 17906239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17906239?v=4",
"html_url": "https:\/\/github.com\/gitcollect"
},
"html_url": "https:\/\/github.com\/gitcollect\/jboss-autopwn",
"description": "JBoss Autopwn CVE-2010-0738 JBoss authentication bypass ",
"fork": false,
"created_at": "2016-07-02T15:17:07Z",
"updated_at": "2018-06-15T07:31:47Z",
"pushed_at": "2016-04-03T09:57:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2023-08-27T04:55:07Z",
"updated_at": "2023-08-29T14:58:50Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 3
},

View file

@ -1,4 +1,34 @@
[
{
"id": 69224981,
"name": "cve-2010-3333",
"full_name": "whiteHat001\/cve-2010-3333",
"owner": {
"login": "whiteHat001",
"id": 18191034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18191034?v=4",
"html_url": "https:\/\/github.com\/whiteHat001"
},
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2010-3333",
"description": null,
"fork": false,
"created_at": "2016-09-26T07:35:41Z",
"updated_at": "2016-09-26T07:35:41Z",
"pushed_at": "2016-09-26T08:19:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 524884923,
"name": "CVE-2010-3333-reproduction",

32
2010/CVE-2010-3904.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 37162047,
"name": "-cve-2010-3904-report",
"full_name": "redhatkaty\/-cve-2010-3904-report",
"owner": {
"login": "redhatkaty",
"id": 5626053,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5626053?v=4",
"html_url": "https:\/\/github.com\/redhatkaty"
},
"html_url": "https:\/\/github.com\/redhatkaty\/-cve-2010-3904-report",
"description": null,
"fork": false,
"created_at": "2015-06-09T22:27:23Z",
"updated_at": "2016-09-04T16:50:01Z",
"pushed_at": "2015-06-09T22:45:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-08-28T09:44:30Z",
"updated_at": "2023-08-29T13:24:01Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1774,
"watchers_count": 1774,
"stargazers_count": 1773,
"watchers_count": 1773,
"has_discussions": false,
"forks_count": 331,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 331,
"watchers": 1774,
"watchers": 1773,
"score": 0,
"subscribers_count": 34
},

View file

@ -2102,6 +2102,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -479,13 +479,13 @@
"stargazers_count": 397,
"watchers_count": 397,
"has_discussions": false,
"forks_count": 134,
"forks_count": 136,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 134,
"forks": 136,
"watchers": 397,
"score": 0,
"subscribers_count": 9

View file

@ -209,6 +209,41 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 153643745,
"name": "hunt-for-cve-2018-10933",
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
"owner": {
"login": "marco-lancini",
"id": 1472968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
"html_url": "https:\/\/github.com\/marco-lancini"
},
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2023-06-20T11:06:21Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"elasticsearch",
"exploit",
"nmap",
"pentesting"
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 153675108,
"name": "cve-2018-10933",
@ -393,6 +428,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 153975086,
"name": "pythonprojects-CVE-2018-10933",
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
"owner": {
"login": "shifa123",
"id": 18241082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
"html_url": "https:\/\/github.com\/shifa123"
},
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2022-01-03T19:20:42Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 154050332,
"name": "CVE-2018-10933",

View file

@ -18,7 +18,7 @@
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"poc"
],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 59,
"score": 0,
"subscribers_count": 7

View file

@ -2914,10 +2914,10 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2023-08-22T20:33:05Z",
"updated_at": "2023-08-29T14:30:29Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 230,
"watchers_count": 230,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -2926,7 +2926,7 @@
"topics": [],
"visibility": "public",
"forks": 78,
"watchers": 229,
"watchers": 230,
"score": 0,
"subscribers_count": 22
},
@ -3230,6 +3230,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 318113571,
"name": "Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"full_name": "DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"owner": {
"login": "DeathStroke-source",
"id": 23089257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23089257?v=4",
"html_url": "https:\/\/github.com\/DeathStroke-source"
},
"html_url": "https:\/\/github.com\/DeathStroke-source\/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit",
"description": "Scan through given ip list",
"fork": false,
"created_at": "2020-12-03T07:40:19Z",
"updated_at": "2021-01-29T14:08:43Z",
"pushed_at": "2019-05-22T22:32:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 330872202,
"name": "CVE-2019-0708-EXP-Windows",

32
2019/CVE-2019-1041.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 435284718,
"name": "CVE-2019-1041",
"full_name": "5l1v3r1\/CVE-2019-1041",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-1041",
"description": null,
"fork": false,
"created_at": "2021-12-05T21:36:21Z",
"updated_at": "2023-06-08T15:44:37Z",
"pushed_at": "2019-09-17T15:53:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -28,5 +28,35 @@
"watchers": 112,
"score": 0,
"subscribers_count": 3
},
{
"id": 231926488,
"name": "CVE-2019-10758",
"full_name": "lp008\/CVE-2019-10758",
"owner": {
"login": "lp008",
"id": 11436275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
"html_url": "https:\/\/github.com\/lp008"
},
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-10758",
"description": "CVE-2019-10758",
"fork": false,
"created_at": "2020-01-05T14:05:56Z",
"updated_at": "2021-12-05T21:57:04Z",
"pushed_at": "2020-01-05T14:21:15Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -253,10 +253,10 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2023-07-24T06:04:12Z",
"updated_at": "2023-08-29T18:04:23Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 144,
"watchers": 143,
"score": 0,
"subscribers_count": 9
},

32
2019/CVE-2019-1215.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 232197518,
"name": "CVE-2019-1215",
"full_name": "bluefrostsecurity\/CVE-2019-1215",
"owner": {
"login": "bluefrostsecurity",
"id": 4976074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
"html_url": "https:\/\/github.com\/bluefrostsecurity"
},
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2019-1215",
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2023-05-22T09:24:46Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 147,
"score": 0,
"subscribers_count": 5
}
]

32
2019/CVE-2019-13404.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 231223198,
"name": "CVE-2019-13404",
"full_name": "alidnf\/CVE-2019-13404",
"owner": {
"login": "alidnf",
"id": 54067374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54067374?v=4",
"html_url": "https:\/\/github.com\/alidnf"
},
"html_url": "https:\/\/github.com\/alidnf\/CVE-2019-13404",
"description": null,
"fork": false,
"created_at": "2020-01-01T14:00:55Z",
"updated_at": "2022-11-24T11:11:19Z",
"pushed_at": "2020-01-01T14:09:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

32
2019/CVE-2019-13504.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 435291799,
"name": "fuzzenv-exiv2",
"full_name": "5l1v3r1\/fuzzenv-exiv2",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/fuzzenv-exiv2",
"description": "https:\/\/fuzzit.dev\/2019\/07\/11\/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing\/",
"fork": false,
"created_at": "2021-12-05T22:15:28Z",
"updated_at": "2022-08-16T08:26:01Z",
"pushed_at": "2019-09-08T12:59:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2019/CVE-2019-1385.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 269204367,
"name": "CVE-2019-1385",
"full_name": "0x413x4\/CVE-2019-1385",
"owner": {
"login": "0x413x4",
"id": 11176964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11176964?v=4",
"html_url": "https:\/\/github.com\/0x413x4"
},
"html_url": "https:\/\/github.com\/0x413x4\/CVE-2019-1385",
"description": "Enjoy hacking ;)",
"fork": false,
"created_at": "2020-06-03T22:06:49Z",
"updated_at": "2020-07-15T19:44:52Z",
"pushed_at": "2019-12-25T11:20:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -308,6 +308,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 258967892,
"name": "sudo-vulnerability-CVE-2019-14287",
"full_name": "axax002\/sudo-vulnerability-CVE-2019-14287",
"owner": {
"login": "axax002",
"id": 55937601,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55937601?v=4",
"html_url": "https:\/\/github.com\/axax002"
},
"html_url": "https:\/\/github.com\/axax002\/sudo-vulnerability-CVE-2019-14287",
"description": "Sudo Vulnerability CVE-2019-14287",
"fork": false,
"created_at": "2020-04-26T07:29:44Z",
"updated_at": "2021-04-14T16:06:10Z",
"pushed_at": "2019-12-04T07:25:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 263100309,
"name": "Exploit-CVE-2019-14287",
@ -672,6 +702,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 435340206,
"name": "cve-2019-14287sudoexp",
"full_name": "5l1v3r1\/cve-2019-14287sudoexp",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/cve-2019-14287sudoexp",
"description": null,
"fork": false,
"created_at": "2021-12-06T02:50:12Z",
"updated_at": "2021-12-06T02:50:13Z",
"pushed_at": "2019-10-21T02:01:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 550531926,
"name": "CVE-2019-14287",

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-14314 - NextGEN Gallery 3.2.10 Authenticated SQL Injection",
"fork": false,
"created_at": "2020-01-31T09:54:06Z",
"updated_at": "2023-05-12T00:48:18Z",
"updated_at": "2023-08-29T17:43:30Z",
"pushed_at": "2020-01-31T10:51:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

32
2019/CVE-2019-15112.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 435339590,
"name": "CVE-2019-15112",
"full_name": "5l1v3r1\/CVE-2019-15112",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2019-15112",
"description": null,
"fork": false,
"created_at": "2021-12-06T02:47:15Z",
"updated_at": "2021-12-06T02:47:16Z",
"pushed_at": "2019-08-25T06:03:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -209,6 +209,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 231220055,
"name": "CVE-2019-16278",
"full_name": "NHPT\/CVE-2019-16278",
"owner": {
"login": "NHPT",
"id": 42366434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
"html_url": "https:\/\/github.com\/NHPT"
},
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo Web服务器的RCE漏洞",
"fork": false,
"created_at": "2020-01-01T13:28:40Z",
"updated_at": "2023-01-31T11:26:23Z",
"pushed_at": "2020-01-01T13:36:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 251251110,
"name": "cve-2019-16278",

32
2019/CVE-2019-17427.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 231651324,
"name": "CVE-2019-17427",
"full_name": "RealLinkers\/CVE-2019-17427",
"owner": {
"login": "RealLinkers",
"id": 22389074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
"html_url": "https:\/\/github.com\/RealLinkers"
},
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-17427",
"description": "CVE-2019-17427 Persistent XSS POC",
"fork": false,
"created_at": "2020-01-03T19:25:54Z",
"updated_at": "2021-07-17T15:56:02Z",
"pushed_at": "2020-01-03T19:32:31Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-08-29T06:24:35Z",
"updated_at": "2023-08-29T15:07:57Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3855,
"watchers_count": 3855,
"stargazers_count": 3856,
"watchers_count": 3856,
"has_discussions": false,
"forks_count": 1086,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1086,
"watchers": 3855,
"watchers": 3856,
"score": 0,
"subscribers_count": 155
},

32
2019/CVE-2019-18890.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 231370688,
"name": "CVE-2019-18890",
"full_name": "RealLinkers\/CVE-2019-18890",
"owner": {
"login": "RealLinkers",
"id": 22389074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
"html_url": "https:\/\/github.com\/RealLinkers"
},
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-18890",
"description": "CVE-2019-18890 POC (Proof of Concept)",
"fork": false,
"created_at": "2020-01-02T11:44:47Z",
"updated_at": "2023-07-19T22:07:24Z",
"pushed_at": "2020-01-06T13:13:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}
]

32
2019/CVE-2019-19782.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 233213627,
"name": "CVE-2019-19782",
"full_name": "Underwood12\/CVE-2019-19782",
"owner": {
"login": "Underwood12",
"id": 19386296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19386296?v=4",
"html_url": "https:\/\/github.com\/Underwood12"
},
"html_url": "https:\/\/github.com\/Underwood12\/CVE-2019-19782",
"description": null,
"fork": false,
"created_at": "2020-01-11T10:25:18Z",
"updated_at": "2020-01-11T10:25:20Z",
"pushed_at": "2020-01-10T05:12:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

62
2019/CVE-2019-20197.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 232512469,
"name": "CVE-2019-20197",
"full_name": "lp008\/CVE-2019-20197",
"owner": {
"login": "lp008",
"id": 11436275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
"html_url": "https:\/\/github.com\/lp008"
},
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-20197",
"description": "CVE-2019-20197",
"fork": false,
"created_at": "2020-01-08T08:11:58Z",
"updated_at": "2020-01-08T08:20:44Z",
"pushed_at": "2020-01-08T08:19:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 232513269,
"name": "CVE-2019-20197",
"full_name": "jas502n\/CVE-2019-20197",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-20197",
"description": "Nagios XI远程命令执行漏洞 <v5.6.9",
"fork": false,
"created_at": "2020-01-08T08:16:30Z",
"updated_at": "2023-02-28T01:21:42Z",
"pushed_at": "2020-01-08T08:30:03Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 23,
"score": 0,
"subscribers_count": 2
}
]

32
2019/CVE-2019-20224.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 233055034,
"name": "CVE-2019-20224",
"full_name": "mhaskar\/CVE-2019-20224",
"owner": {
"login": "mhaskar",
"id": 6861215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4",
"html_url": "https:\/\/github.com\/mhaskar"
},
"html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-20224",
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
"fork": false,
"created_at": "2020-01-10T13:41:28Z",
"updated_at": "2023-06-05T10:09:18Z",
"pushed_at": "2020-01-10T13:42:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 397,
"watchers_count": 397,
"has_discussions": false,
"forks_count": 134,
"forks_count": 136,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 134,
"forks": 136,
"watchers": 397,
"score": 0,
"subscribers_count": 9

32
2019/CVE-2019-5630.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 232403416,
"name": "CVE-2019-5630",
"full_name": "rbeede\/CVE-2019-5630",
"owner": {
"login": "rbeede",
"id": 1429214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1429214?v=4",
"html_url": "https:\/\/github.com\/rbeede"
},
"html_url": "https:\/\/github.com\/rbeede\/CVE-2019-5630",
"description": "https:\/\/www.rodneybeede.com\/curriculum%20vitae\/bio.html",
"fork": false,
"created_at": "2020-01-07T19:43:42Z",
"updated_at": "2020-01-07T19:44:19Z",
"pushed_at": "2020-01-07T19:44:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -514,6 +514,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 232528693,
"name": "CVE-2019-5736",
"full_name": "geropl\/CVE-2019-5736",
"owner": {
"login": "geropl",
"id": 32448529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32448529?v=4",
"html_url": "https:\/\/github.com\/geropl"
},
"html_url": "https:\/\/github.com\/geropl\/CVE-2019-5736",
"description": null,
"fork": false,
"created_at": "2020-01-08T09:37:54Z",
"updated_at": "2021-10-21T21:43:59Z",
"pushed_at": "2020-01-08T10:28:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 238321546,
"name": "CVE-2019-5736-Custom-Runtime",

View file

@ -77,11 +77,11 @@
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2023-06-10T16:09:01Z",
"pushed_at": "2023-03-29T12:25:16Z",
"pushed_at": "2023-08-29T17:49:28Z",
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 66,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -91,7 +91,7 @@
"rce"
],
"visibility": "public",
"forks": 66,
"forks": 67,
"watchers": 152,
"score": 0,
"subscribers_count": 8

32
2019/CVE-2019-8601.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 231278850,
"name": "CVE-2019-8601",
"full_name": "BadAccess11\/CVE-2019-8601",
"owner": {
"login": "BadAccess11",
"id": 59069469,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59069469?v=4",
"html_url": "https:\/\/github.com\/BadAccess11"
},
"html_url": "https:\/\/github.com\/BadAccess11\/CVE-2019-8601",
"description": "Exploiting a patched vulnerability in JavaScriptCore",
"fork": false,
"created_at": "2020-01-02T00:12:22Z",
"updated_at": "2023-07-10T12:03:02Z",
"pushed_at": "2020-01-02T00:13:22Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-04T04:52:47Z",
"updated_at": "2022-04-04T04:54:20Z",
"updated_at": "2023-08-29T14:53:10Z",
"pushed_at": "2022-04-04T04:54:32Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-04T04:44:39Z",
"updated_at": "2022-04-04T04:47:45Z",
"updated_at": "2023-08-29T14:42:24Z",
"pushed_at": "2022-04-04T04:48:10Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -154,6 +154,38 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 234191063,
"name": "CurveBall",
"full_name": "ly4k\/CurveBall",
"owner": {
"login": "ly4k",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ly4k"
},
"html_url": "https:\/\/github.com\/ly4k\/CurveBall",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2023-08-04T19:34:59Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 882,
"watchers_count": 882,
"has_discussions": false,
"forks_count": 219,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-0601"
],
"visibility": "public",
"forks": 219,
"watchers": 882,
"score": 0,
"subscribers_count": 34
},
{
"id": 234192123,
"name": "chainoffools",
@ -283,6 +315,36 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 234442281,
"name": "cve-2020-0601-utils",
"full_name": "0xxon\/cve-2020-0601-utils",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
"fork": false,
"created_at": "2020-01-17T01:02:52Z",
"updated_at": "2021-12-05T20:30:51Z",
"pushed_at": "2020-01-21T19:48:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 234574037,
"name": "Windows10_Cumulative_Updates_PowerShell",

View file

@ -1,4 +1,34 @@
[
{
"id": 236109748,
"name": "CVE-2020-0674",
"full_name": "5l1v3r1\/CVE-2020-0674",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-0674",
"description": "Info about CVE-2020-0674",
"fork": false,
"created_at": "2020-01-25T01:08:08Z",
"updated_at": "2022-11-09T23:02:59Z",
"pushed_at": "2020-01-23T12:54:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 262167867,
"name": "CVE-2020-0674-Exploit",

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-08-28T06:52:52Z",
"updated_at": "2023-08-29T14:58:34Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1635,
"watchers_count": 1635,
"stargazers_count": 1636,
"watchers_count": 1636,
"has_discussions": false,
"forks_count": 361,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 361,
"watchers": 1635,
"watchers": 1636,
"score": 0,
"subscribers_count": 90
},
@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2023-08-27T05:33:32Z",
"updated_at": "2023-08-29T15:02:07Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 551,
"watchers_count": 551,
"stargazers_count": 554,
"watchers_count": 554,
"has_discussions": false,
"forks_count": 144,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 144,
"watchers": 551,
"watchers": 554,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-08-29T06:24:35Z",
"updated_at": "2023-08-29T15:07:57Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3855,
"watchers_count": 3855,
"stargazers_count": 3856,
"watchers_count": 3856,
"has_discussions": false,
"forks_count": 1086,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1086,
"watchers": 3855,
"watchers": 3856,
"score": 0,
"subscribers_count": 155
},

38
2020/CVE-2020-1611.json Normal file
View file

@ -0,0 +1,38 @@
[
{
"id": 235582404,
"name": "CVE-2020-1611",
"full_name": "Ibonok\/CVE-2020-1611",
"owner": {
"login": "Ibonok",
"id": 37837775,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37837775?v=4",
"html_url": "https:\/\/github.com\/Ibonok"
},
"html_url": "https:\/\/github.com\/Ibonok\/CVE-2020-1611",
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
"fork": false,
"created_at": "2020-01-22T13:45:21Z",
"updated_at": "2022-12-18T15:46:11Z",
"pushed_at": "2020-01-22T14:01:32Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-1611",
"description",
"juniper",
"poc",
"vulnerability"
],
"visibility": "public",
"forks": 9,
"watchers": 29,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-04-13T12:51:46Z",
"updated_at": "2022-04-13T12:54:24Z",
"updated_at": "2023-08-29T15:54:45Z",
"pushed_at": "2022-04-13T12:54:42Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2022-05-30T08:41:07Z",
"updated_at": "2022-05-30T08:42:59Z",
"updated_at": "2023-08-29T14:00:30Z",
"pushed_at": "2022-05-30T08:43:23Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-08-29T07:20:13Z",
"updated_at": "2023-08-29T18:17:38Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1733,
"watchers_count": 1733,
"stargazers_count": 1734,
"watchers_count": 1734,
"has_discussions": false,
"forks_count": 589,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 589,
"watchers": 1733,
"watchers": 1734,
"score": 0,
"subscribers_count": 46
},
@ -306,13 +306,13 @@
"stargazers_count": 935,
"watchers_count": 935,
"has_discussions": false,
"forks_count": 228,
"forks_count": 229,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 228,
"forks": 229,
"watchers": 935,
"score": 0,
"subscribers_count": 26

View file

@ -851,12 +851,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-08-29T07:40:34Z",
"updated_at": "2023-08-29T15:33:43Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"stargazers_count": 1073,
"watchers_count": 1073,
"has_discussions": false,
"forks_count": 134,
"forks_count": 135,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -869,8 +869,8 @@
"vcenter"
],
"visibility": "public",
"forks": 134,
"watchers": 1072,
"forks": 135,
"watchers": 1073,
"score": 0,
"subscribers_count": 10
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2023-08-21T07:01:08Z",
"updated_at": "2023-08-29T16:00:31Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 244,
"watchers_count": 244,
"stargazers_count": 245,
"watchers_count": 245,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 244,
"watchers": 245,
"score": 0,
"subscribers_count": 13
},
@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2023-06-29T11:03:40Z",
"updated_at": "2023-08-29T16:03:43Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2023-08-28T05:07:23Z",
"updated_at": "2023-08-29T14:35:59Z",
"pushed_at": "2023-07-10T16:41:49Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 272,
"watchers": 273,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-03-02T19:07:37Z",
"updated_at": "2023-08-25T08:40:23Z",
"updated_at": "2023-08-29T14:36:10Z",
"pushed_at": "2022-03-08T15:37:34Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 93,
"watchers": 94,
"score": 0,
"subscribers_count": 5
}

View file

@ -1397,10 +1397,10 @@
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
"fork": false,
"created_at": "2021-10-09T02:12:39Z",
"updated_at": "2022-09-21T11:39:27Z",
"updated_at": "2023-08-29T14:26:41Z",
"pushed_at": "2021-10-12T07:27:09Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -1415,7 +1415,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 1
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-08-26T09:13:54Z",
"updated_at": "2023-08-29T18:18:08Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 629,
"watchers_count": 629,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 629,
"watchers": 630,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-08-29T07:32:26Z",
"updated_at": "2023-08-29T18:17:47Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1249,
"watchers_count": 1249,
"stargazers_count": 1250,
"watchers_count": 1250,
"has_discussions": false,
"forks_count": 318,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 318,
"watchers": 1249,
"watchers": 1250,
"score": 0,
"subscribers_count": 27
},

View file

@ -73,10 +73,10 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2023-08-24T08:24:08Z",
"updated_at": "2023-08-29T14:33:35Z",
"pushed_at": "2023-02-14T07:05:22Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 333,
"watchers": 334,
"score": 0,
"subscribers_count": 7
},

View file

@ -912,7 +912,7 @@
"stargazers_count": 1632,
"watchers_count": 1632,
"has_discussions": false,
"forks_count": 479,
"forks_count": 480,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,7 +923,7 @@
"security"
],
"visibility": "public",
"forks": 479,
"forks": 480,
"watchers": 1632,
"score": 0,
"subscribers_count": 25
@ -5752,10 +5752,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2023-08-02T11:59:07Z",
"updated_at": "2023-08-29T14:49:47Z",
"pushed_at": "2022-12-27T17:57:19Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 437,
"watchers_count": 437,
"has_discussions": true,
"forks_count": 94,
"allow_forking": true,
@ -5773,7 +5773,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 438,
"watchers": 437,
"score": 0,
"subscribers_count": 20
},

View file

@ -43,10 +43,10 @@
"description": "Automatic Mass Tool for checking vulnerability in CVE-2022-1386 - Fusion Builder < 3.6.2 - Unauthenticated SSRF",
"fork": false,
"created_at": "2023-03-05T01:46:41Z",
"updated_at": "2023-07-27T02:06:13Z",
"updated_at": "2023-08-29T14:28:02Z",
"pushed_at": "2023-03-08T18:25:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2023-08-28T20:52:20Z",
"updated_at": "2023-08-29T18:24:43Z",
"pushed_at": "2023-08-05T20:56:12Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 110,
"watchers": 112,
"score": 0,
"subscribers_count": 4
}

View file

@ -766,12 +766,12 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-08-29T07:40:34Z",
"updated_at": "2023-08-29T15:33:43Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 1072,
"watchers_count": 1072,
"stargazers_count": 1073,
"watchers_count": 1073,
"has_discussions": false,
"forks_count": 134,
"forks_count": 135,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -784,8 +784,8 @@
"vcenter"
],
"visibility": "public",
"forks": 134,
"watchers": 1072,
"forks": 135,
"watchers": 1073,
"score": 0,
"subscribers_count": 10
},

View file

@ -294,10 +294,10 @@
"description": "A loader for zimbra 2022 rce (cve-2022-27925)",
"fork": false,
"created_at": "2022-10-01T10:33:55Z",
"updated_at": "2023-07-21T06:27:33Z",
"updated_at": "2023-08-29T14:58:47Z",
"pushed_at": "2022-10-25T14:20:58Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -312,7 +312,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -2180,11 +2180,11 @@
"html_url": "https:\/\/github.com\/winstxnhdw"
},
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
"description": "Proof of concept for CVE-2022-30190 (Follina).",
"description": "A proof of concept for CVE-2022-30190 (Follina).",
"fork": false,
"created_at": "2022-09-15T16:12:57Z",
"updated_at": "2022-10-14T15:09:48Z",
"pushed_at": "2023-08-28T22:06:22Z",
"updated_at": "2023-08-29T16:29:42Z",
"pushed_at": "2023-08-29T16:30:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"unisoc"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 70,
"score": 0,
"subscribers_count": 3

View file

@ -581,13 +581,13 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 30,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-08-28T15:33:28Z",
"updated_at": "2023-08-29T16:31:31Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 829,
"watchers_count": 829,
"stargazers_count": 830,
"watchers_count": 830,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 829,
"watchers": 830,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-04-20T08:51:20Z",
"updated_at": "2023-08-29T06:19:40Z",
"updated_at": "2023-08-29T16:26:12Z",
"pushed_at": "2023-04-20T08:52:29Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 439,
"watchers_count": 439,
"has_discussions": false,
"forks_count": 161,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 161,
"forks": 162,
"watchers": 439,
"score": 0,
"subscribers_count": 10

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-23924 (Dompdf - RCE) PoC",
"fork": false,
"created_at": "2023-02-01T18:21:23Z",
"updated_at": "2023-05-13T02:06:18Z",
"updated_at": "2023-08-29T18:10:11Z",
"pushed_at": "2023-02-02T02:05:12Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-08-28T08:00:16Z",
"updated_at": "2023-08-28T08:04:58Z",
"pushed_at": "2023-08-28T08:57:38Z",
"pushed_at": "2023-08-29T14:38:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -173,10 +173,10 @@
"description": "Requests Baskets (CVE-2023-27163) and Mailtrail v0.53",
"fork": false,
"created_at": "2023-08-05T09:32:00Z",
"updated_at": "2023-08-05T09:37:36Z",
"updated_at": "2023-08-29T14:51:35Z",
"pushed_at": "2023-08-05T09:36:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -185,7 +185,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -313,35 +313,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 684617839,
"name": "CVE-2023-27163",
"full_name": "josephberger\/CVE-2023-27163",
"owner": {
"login": "josephberger",
"id": 38740973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38740973?v=4",
"html_url": "https:\/\/github.com\/josephberger"
},
"html_url": "https:\/\/github.com\/josephberger\/CVE-2023-27163",
"description": "PoC for 2023-27163 Maltrail v0.53",
"fork": false,
"created_at": "2023-08-29T14:02:42Z",
"updated_at": "2023-08-29T14:03:28Z",
"pushed_at": "2023-08-29T14:03:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ] ",
"fork": false,
"created_at": "2023-07-12T02:41:26Z",
"updated_at": "2023-08-28T18:43:32Z",
"updated_at": "2023-08-29T14:26:45Z",
"pushed_at": "2023-07-14T21:47:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the \/etc\/passwd file from a system running GitLab 16.0.0.",
"fork": false,
"created_at": "2023-05-25T13:25:10Z",
"updated_at": "2023-08-24T11:52:30Z",
"updated_at": "2023-08-29T18:19:26Z",
"pushed_at": "2023-06-02T12:10:06Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 138,
"watchers": 139,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,8 +43,8 @@
"description": "Scan for GhostScript files affected to CVE-2023-36664",
"fork": false,
"created_at": "2023-08-29T14:01:49Z",
"updated_at": "2023-08-29T14:01:50Z",
"pushed_at": "2023-08-29T14:01:50Z",
"updated_at": "2023-08-29T14:06:12Z",
"pushed_at": "2023-08-29T14:06:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-25T07:28:06Z",
"updated_at": "2023-08-29T13:15:34Z",
"updated_at": "2023-08-29T17:34:59Z",
"pushed_at": "2023-08-25T09:38:05Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 39,
"watchers": 49,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-08-29T10:01:08Z",
"updated_at": "2023-08-29T17:13:07Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 4
},
@ -103,10 +103,10 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
"updated_at": "2023-08-29T07:19:10Z",
"updated_at": "2023-08-29T14:46:43Z",
"pushed_at": "2023-08-25T00:30:01Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 117,
"watchers": 119,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover",
"fork": false,
"created_at": "2023-08-27T00:30:16Z",
"updated_at": "2023-08-29T11:45:11Z",
"updated_at": "2023-08-29T15:32:32Z",
"pushed_at": "2023-08-27T00:41:40Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,12 +43,12 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-08-29T14:00:25Z",
"updated_at": "2023-08-29T18:39:27Z",
"pushed_at": "2023-08-27T03:22:22Z",
"stargazers_count": 323,
"watchers_count": 323,
"stargazers_count": 349,
"watchers_count": 349,
"has_discussions": false,
"forks_count": 48,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,8 +58,8 @@
"exploit"
],
"visibility": "public",
"forks": 48,
"watchers": 323,
"forks": 50,
"watchers": 349,
"score": 0,
"subscribers_count": 4
},
@ -112,13 +112,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 1
@ -137,12 +137,12 @@
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
"fork": false,
"created_at": "2023-08-27T21:49:37Z",
"updated_at": "2023-08-29T13:14:54Z",
"updated_at": "2023-08-29T16:08:34Z",
"pushed_at": "2023-08-27T22:17:56Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 10,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -155,8 +155,8 @@
"winrar"
],
"visibility": "public",
"forks": 10,
"watchers": 49,
"forks": 12,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},
@ -204,19 +204,19 @@
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
"fork": false,
"created_at": "2023-08-28T08:56:16Z",
"updated_at": "2023-08-29T13:15:41Z",
"updated_at": "2023-08-29T14:18:42Z",
"pushed_at": "2023-08-28T09:32:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -234,10 +234,10 @@
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
"fork": false,
"created_at": "2023-08-28T14:48:22Z",
"updated_at": "2023-08-29T12:12:04Z",
"updated_at": "2023-08-29T15:07:14Z",
"pushed_at": "2023-08-28T15:33:27Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -246,7 +246,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},
@ -369,5 +369,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 684673194,
"name": "CVE-2023-38831-Exploit-and-Detection",
"full_name": "MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
"owner": {
"login": "MortySecurity",
"id": 6032062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4",
"html_url": "https:\/\/github.com\/MortySecurity"
},
"html_url": "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
"description": "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. ",
"fork": false,
"created_at": "2023-08-29T16:12:20Z",
"updated_at": "2023-08-29T16:16:01Z",
"pushed_at": "2023-08-29T16:15:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

62
2023/CVE-2023-40477.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 684635082,
"name": "Scan_WinRAR",
"full_name": "winkler-winsen\/Scan_WinRAR",
"owner": {
"login": "winkler-winsen",
"id": 43114182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43114182?v=4",
"html_url": "https:\/\/github.com\/winkler-winsen"
},
"html_url": "https:\/\/github.com\/winkler-winsen\/Scan_WinRAR",
"description": "Scan for WinRAR files affected to CVE-2023-40477",
"fork": false,
"created_at": "2023-08-29T14:41:58Z",
"updated_at": "2023-08-29T14:44:09Z",
"pushed_at": "2023-08-29T14:44:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 684680824,
"name": "Winrar-CVE-2023-40477-POC",
"full_name": "wildptr-io\/Winrar-CVE-2023-40477-POC",
"owner": {
"login": "wildptr-io",
"id": 130668432,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130668432?v=4",
"html_url": "https:\/\/github.com\/wildptr-io"
},
"html_url": "https:\/\/github.com\/wildptr-io\/Winrar-CVE-2023-40477-POC",
"description": "CVE-2023-40477 PoC by Wild-Pointer",
"fork": false,
"created_at": "2023-08-29T16:29:48Z",
"updated_at": "2023-08-29T16:30:00Z",
"pushed_at": "2023-08-29T16:29:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

125
README.md
View file

@ -1279,7 +1279,6 @@
- [thomas-osgood/CVE-2023-27163](https://github.com/thomas-osgood/CVE-2023-27163)
- [0xFTW/CVE-2023-27163](https://github.com/0xFTW/CVE-2023-27163)
- [samh4cks/CVE-2023-27163-InternalProber](https://github.com/samh4cks/CVE-2023-27163-InternalProber)
- [josephberger/CVE-2023-27163](https://github.com/josephberger/CVE-2023-27163)
### CVE-2023-27216 (2023-04-12)
@ -2839,6 +2838,7 @@
- [PascalAsch/CVE-2023-38831-KQL](https://github.com/PascalAsch/CVE-2023-38831-KQL)
- [my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc](https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc)
- [thegr1ffyn/CVE-2023-38831](https://github.com/thegr1ffyn/CVE-2023-38831)
- [MortySecurity/CVE-2023-38831-Exploit-and-Detection](https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection)
### CVE-2023-38836 (2023-08-21)
@ -2942,6 +2942,10 @@
### CVE-2023-40297
- [sahar042/CVE-2023-40297](https://github.com/sahar042/CVE-2023-40297)
### CVE-2023-40477
- [winkler-winsen/Scan_WinRAR](https://github.com/winkler-winsen/Scan_WinRAR)
- [wildptr-io/Winrar-CVE-2023-40477-POC](https://github.com/wildptr-io/Winrar-CVE-2023-40477-POC)
### CVE-2023-41080 (2023-08-25)
<code>URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.\n\nThe vulnerability is limited to the ROOT (default) web application.
@ -15879,10 +15883,12 @@
- [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601)
- [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [ly4k/CurveBall](https://github.com/ly4k/CurveBall)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BlueTeamSteve/CVE-2020-0601](https://github.com/BlueTeamSteve/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils)
- [Doug-Moody/Windows10_Cumulative_Updates_PowerShell](https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell)
- [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601)
- [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601)
@ -15957,6 +15963,7 @@
<code>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
</code>
- [5l1v3r1/CVE-2020-0674](https://github.com/5l1v3r1/CVE-2020-0674)
- [maxpl0it/CVE-2020-0674-Exploit](https://github.com/maxpl0it/CVE-2020-0674-Exploit)
- [Ken-Abruzzi/CVE-2020-0674](https://github.com/Ken-Abruzzi/CVE-2020-0674)
- [Neko-chanQwQ/CVE-2020-0674-PoC](https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC)
@ -16373,6 +16380,13 @@
- [0neb1n/CVE-2020-1493](https://github.com/0neb1n/CVE-2020-1493)
### CVE-2020-1611 (2020-01-15)
<code>A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
</code>
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
### CVE-2020-1764 (2020-03-26)
<code>A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
@ -20665,6 +20679,7 @@
- [JSec1337/Scanner-CVE-2019-0708](https://github.com/JSec1337/Scanner-CVE-2019-0708)
- [nochemax/bLuEkEeP-GUI](https://github.com/nochemax/bLuEkEeP-GUI)
- [AaronCaiii/CVE-2019-0708-POC](https://github.com/AaronCaiii/CVE-2019-0708-POC)
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
- [CircuitSoul/CVE-2019-0708](https://github.com/CircuitSoul/CVE-2019-0708)
- [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708)
@ -20784,6 +20799,13 @@
- [fox-it/cve-2019-1040-scanner](https://github.com/fox-it/cve-2019-1040-scanner)
- [QAX-A-Team/dcpwn](https://github.com/QAX-A-Team/dcpwn)
### CVE-2019-1041 (2019-06-12)
<code>An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1065.
</code>
- [5l1v3r1/CVE-2019-1041](https://github.com/5l1v3r1/CVE-2019-1041)
### CVE-2019-1064 (2019-06-12)
<code>An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
@ -20857,6 +20879,13 @@
- [info4mationprivate8tools/CVE-2019-1205](https://github.com/info4mationprivate8tools/CVE-2019-1205)
### CVE-2019-1215 (2019-09-11)
<code>An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
</code>
- [bluefrostsecurity/CVE-2019-1215](https://github.com/bluefrostsecurity/CVE-2019-1215)
### CVE-2019-1218 (2019-08-14)
<code>A spoofing vulnerability exists in the way Microsoft Outlook iOS software parses specifically crafted email messages, aka 'Outlook iOS Spoofing Vulnerability'.
@ -20902,6 +20931,13 @@
- [mandarenmanman/CVE-2019-1367](https://github.com/mandarenmanman/CVE-2019-1367)
### CVE-2019-1385 (2019-11-12)
<code>An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
</code>
- [0x413x4/CVE-2019-1385](https://github.com/0x413x4/CVE-2019-1385)
### CVE-2019-1388 (2019-11-12)
<code>An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.
@ -21373,6 +21409,13 @@
- [VoidSec/CVE-2019-5624](https://github.com/VoidSec/CVE-2019-5624)
### CVE-2019-5630 (2019-07-03)
<code>A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose InsightVM Security Console versions 6.5.0 through 6.5.68. This issue allows attackers to exploit CSRF vulnerabilities on API endpoints using Flash to circumvent a cross-domain pre-flight OPTIONS request.
</code>
- [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630)
### CVE-2019-5700 (2019-10-09)
<code>NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.
@ -21402,6 +21445,7 @@
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc)
- [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner)
- [geropl/CVE-2019-5736](https://github.com/geropl/CVE-2019-5736)
- [GiverOfGifts/CVE-2019-5736-Custom-Runtime](https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime)
- [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC)
- [BBRathnayaka/POC-CVE-2019-5736](https://github.com/BBRathnayaka/POC-CVE-2019-5736)
@ -21822,6 +21866,13 @@
- [jsherman212/used_sock](https://github.com/jsherman212/used_sock)
### CVE-2019-8601 (2019-12-18)
<code>Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
</code>
- [BadAccess11/CVE-2019-8601](https://github.com/BadAccess11/CVE-2019-8601)
### CVE-2019-8605 (2019-12-18)
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.
@ -22254,6 +22305,7 @@
</code>
- [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758)
- [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758)
### CVE-2019-10779 (2020-01-27)
@ -22904,6 +22956,13 @@
- [B3Bo1d/CVE-2019-13403](https://github.com/B3Bo1d/CVE-2019-13403)
### CVE-2019-13404 (2019-07-07)
<code>** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.
</code>
- [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404)
### CVE-2019-13496 (2019-11-04)
<code>One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response.
@ -22925,6 +22984,13 @@
- [FurqanKhan1/CVE-2019-13498](https://github.com/FurqanKhan1/CVE-2019-13498)
### CVE-2019-13504 (2019-07-10)
<code>There is an out-of-bounds read in Exiv2::MrwImage::readMetadata in mrwimage.cpp in Exiv2 through 0.27.2.
</code>
- [5l1v3r1/fuzzenv-exiv2](https://github.com/5l1v3r1/fuzzenv-exiv2)
### CVE-2019-13574 (2019-07-11)
<code>In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
@ -23018,6 +23084,7 @@
- [Sindadziy/cve-2019-14287](https://github.com/Sindadziy/cve-2019-14287)
- [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271)
- [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287)
- [axax002/sudo-vulnerability-CVE-2019-14287](https://github.com/axax002/sudo-vulnerability-CVE-2019-14287)
- [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287)
- [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-)
- [ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287](https://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287)
@ -23030,6 +23097,7 @@
- [DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights](https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-Rights)
- [crypticdante/CVE-2019-14287](https://github.com/crypticdante/CVE-2019-14287)
- [Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287](https://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287)
- [5l1v3r1/cve-2019-14287sudoexp](https://github.com/5l1v3r1/cve-2019-14287sudoexp)
- [MariliaMeira/CVE-2019-14287](https://github.com/MariliaMeira/CVE-2019-14287)
### CVE-2019-14314 (2019-08-27)
@ -23218,6 +23286,13 @@
- [gozn/detect-CVE-2019-15107-by-pyshark](https://github.com/gozn/detect-CVE-2019-15107-by-pyshark)
- [h4ck0rman/CVE-2019-15107](https://github.com/h4ck0rman/CVE-2019-15107)
### CVE-2019-15112 (2019-08-21)
<code>The wp-slimstat plugin before 4.8.1 for WordPress has XSS.
</code>
- [5l1v3r1/CVE-2019-15112](https://github.com/5l1v3r1/CVE-2019-15112)
### CVE-2019-15120 (2019-08-16)
<code>The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode.
@ -23375,6 +23450,7 @@
- [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278)
- [theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE)
- [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278)
- [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278)
- [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278)
- [crypticdante/CVE-2019-16278](https://github.com/crypticdante/CVE-2019-16278)
- [alexander-fernandes/CVE-2019-16278](https://github.com/alexander-fernandes/CVE-2019-16278)
@ -23575,6 +23651,13 @@
- [mavlevin/CVE-2019-17424](https://github.com/mavlevin/CVE-2019-17424)
### CVE-2019-17427 (2019-10-09)
<code>In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to textile formatting errors.
</code>
- [RealLinkers/CVE-2019-17427](https://github.com/RealLinkers/CVE-2019-17427)
### CVE-2019-17495 (2019-10-10)
<code>A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that &lt;style&gt;@import within the JSON data was a functional attack method.
@ -23795,6 +23878,13 @@
- [bobfuzzer/CVE-2019-18885](https://github.com/bobfuzzer/CVE-2019-18885)
### CVE-2019-18890 (2019-11-21)
<code>A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 allows Redmine users to access protected information via a crafted object query.
</code>
- [RealLinkers/CVE-2019-18890](https://github.com/RealLinkers/CVE-2019-18890)
### CVE-2019-18935 (2019-12-11)
<code>Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
@ -24037,6 +24127,13 @@
- [Vulnmachines/Ctirix_RCE-CVE-2019-19781](https://github.com/Vulnmachines/Ctirix_RCE-CVE-2019-19781)
- [k-fire/CVE-2019-19781-exploit](https://github.com/k-fire/CVE-2019-19781-exploit)
### CVE-2019-19782 (2019-12-13)
<code>The FTP client in AceaXe Plus 1.0 allows a buffer overflow via a long EHLO response from an FTP server.
</code>
- [Underwood12/CVE-2019-19782](https://github.com/Underwood12/CVE-2019-19782)
### CVE-2019-19844 (2019-12-18)
<code>Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
@ -24084,6 +24181,21 @@
- [AleDiBen/NVMS1000-Exploit](https://github.com/AleDiBen/NVMS1000-Exploit)
### CVE-2019-20197 (2019-12-31)
<code>In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.
</code>
- [lp008/CVE-2019-20197](https://github.com/lp008/CVE-2019-20197)
- [jas502n/CVE-2019-20197](https://github.com/jas502n/CVE-2019-20197)
### CVE-2019-20224 (2020-01-09)
<code>netflow_get_stats in functions_netflow.php in Pandora FMS 7.0NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter in an index.php?operation/netflow/nf_live_view request. This issue has been fixed in Pandora FMS 7.0 NG 742.
</code>
- [mhaskar/CVE-2019-20224](https://github.com/mhaskar/CVE-2019-20224)
### CVE-2019-20326 (2020-03-16)
<code>A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in extensions/cairo_io/cairo-image-surface-jpeg.c in GNOME gThumb before 3.8.3 and Linux Mint Pix before 2.4.5 allows attackers to cause a crash and potentially execute arbitrary code via a crafted JPEG file.
@ -25935,12 +26047,14 @@
- [gojhonny/libssh-scanner](https://github.com/gojhonny/libssh-scanner)
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
@ -33423,6 +33537,7 @@
</code>
- [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn)
- [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn)
### CVE-2010-1205 (2010-06-30)
@ -33494,6 +33609,7 @@
<code>Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka &quot;RTF Stack Buffer Overflow Vulnerability.&quot;
</code>
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
### CVE-2010-3490 (2010-09-28)
@ -33517,6 +33633,13 @@
- [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847)
### CVE-2010-3904 (2010-12-06)
<code>The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
</code>
- [redhatkaty/-cve-2010-3904-report](https://github.com/redhatkaty/-cve-2010-3904-report)
### CVE-2010-3971 (2010-12-22)
<code>Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka &quot;CSS Memory Corruption Vulnerability.&quot;